<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Publisher — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/publisher/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/publisher/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious Image Load (taskschd.dll) from MS Office</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-image-load-office/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-image-load-office/</guid><description>Detection of taskschd.dll image loads from Microsoft Office applications indicates potential COM-based scheduled task creation for persistence, bypassing traditional schtasks.exe usage.</description><content:encoded><![CDATA[<p>This detection rule identifies a suspicious image load (<code>taskschd.dll</code>) originating from Microsoft Office applications (WINWORD.EXE, EXCEL.EXE, POWERPNT.EXE, MSPUB.EXE, MSACCESS.EXE). The behavior suggests potential adversarial activity involving the creation of scheduled tasks through the Windows Component Object Model (COM). Attackers may exploit this technique to establish persistence, circumventing traditional monitoring focused on the <code>schtasks.exe</code> utility. The use of COM for scheduled task management allows for stealthier operation and evasion of standard security controls, making it a valuable persistence mechanism for malicious actors. The rule is designed for data generated by Elastic Defend, Sysmon, and other endpoint detection platforms.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>User opens a malicious Microsoft Office document (e.g., Word, Excel).</li>
<li>The document executes embedded macro code or exploits a vulnerability.</li>
<li>The macro or exploit leverages the Component Object Model (COM).</li>
<li>The Office application (e.g., WINWORD.EXE) loads the <code>taskschd.dll</code> library, providing access to the Task Scheduler service.</li>
<li>The COM interface is used to programmatically create a new scheduled task.</li>
<li>The scheduled task is configured to execute a malicious payload at a later time or on a recurring basis.</li>
<li>The malicious payload could be a script, executable, or command-line instruction.</li>
<li>Upon execution, the payload achieves the attacker&rsquo;s objective, such as establishing persistence, downloading additional malware, or compromising the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leveraging this technique can allow adversaries to maintain persistent access to a compromised system. This can lead to long-term data exfiltration, lateral movement within the network, and deployment of ransomware. The low severity score assigned to the original rule may underestimate the potential impact, as persistence is a critical component of many advanced attacks. Affected systems may require extensive remediation to remove all traces of the malicious activity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Office Application Loading Task Scheduler DLL&rdquo; to your SIEM and tune for your environment to detect this specific activity.</li>
<li>Enable Sysmon Event ID 7 (Image Loaded) logging on Windows endpoints to provide visibility into DLL loading events, which is a prerequisite for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the specific scheduled tasks that are created and the payloads they execute.</li>
<li>Monitor for scheduled task creation events (Event ID 4698) and deletion events (Event ID 4699) in the Windows Event Logs, as referenced in the rule&rsquo;s investigation guide.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>execution</category><category>windows</category><category>image_load</category><category>scheduled_task</category></item></channel></rss>