<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>QEMU — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/qemu/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/qemu/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious QEMU Execution on Windows</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-qemu-execution/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-qemu-execution/</guid><description>Detects the execution of QEMU with the -nographic flag and an image file on Windows systems, a technique used for persistence and initial access by installing a rogue Linux virtual machine.</description><content:encoded><![CDATA[<p>This threat brief focuses on the suspicious execution of QEMU (Quick Emulator) on Windows systems. Attackers are leveraging QEMU, a legitimate open-source machine emulator and virtualizer, to establish persistence and potentially gain initial access. By executing QEMU with the <code>-nographic</code> flag along with an image file, the virtual machine operates in the background without a graphical display, making it less conspicuous to the user. This technique has been observed as a method to deploy rogue Linux virtual machines, which can then be used for various malicious activities. The securonix.com blog and bleepingcomputer.com news have reported on this technique being used in the wild.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access to a Windows system, potentially through social engineering or exploiting existing vulnerabilities.</li>
<li><strong>QEMU Installation (or Existing):</strong> The attacker either installs QEMU (if not already present) or leverages an existing installation.</li>
<li><strong>Image File Placement:</strong> A malicious Linux image file (<code>.img</code>) is placed on the compromised system.</li>
<li><strong>Persistence via Scheduled Task/Service:</strong> The attacker creates a scheduled task or Windows service to execute QEMU automatically upon system startup or at specific intervals.</li>
<li><strong>QEMU Execution:</strong> The scheduled task or service executes QEMU with the <code>-nographic</code> flag and points to the malicious Linux image file. Example command: <code>qemu-system-x86_64.exe -nographic -hda malicious.img</code>.</li>
<li><strong>Rogue VM Initialization:</strong> The Linux virtual machine boots in the background without any user interaction.</li>
<li><strong>Malicious Activity within VM:</strong> The rogue VM executes malicious scripts, downloads additional payloads, or establishes communication with a command-and-control (C2) server.</li>
<li><strong>Lateral Movement/Data Exfiltration:</strong> The attacker leverages the compromised VM as a staging point for lateral movement within the network or for exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to establish persistent access to a compromised Windows system, potentially bypassing traditional security measures. The rogue Linux virtual machine provides a hidden environment for executing malicious activities, such as installing backdoors, conducting reconnaissance, or launching further attacks against the internal network. This can lead to data theft, system compromise, and significant disruption of business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Suspicious QEMU Execution&rdquo; to detect QEMU processes running with the <code>-nographic</code> flag and an image file (see <code>rules</code>).</li>
<li>Monitor process execution logs for command lines containing &ldquo;qemu&rdquo; and &ldquo;-nographic&rdquo; to identify potential rogue VM deployments.</li>
<li>Investigate any scheduled tasks or services that launch QEMU with the <code>-nographic</code> flag to determine their legitimacy.</li>
<li>Review and whitelist approved systems that legitimately run QEMU with the -nographic flag to reduce false positives as noted in the <code>known_false_positives</code> section.</li>
<li>Enable Sysmon Event ID 1 logging to capture process creation events, providing the data needed for the Sigma rules (see <code>data_source</code>).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>qemu</category><category>virtualization</category><category>persistence</category><category>linux</category><category>windows</category></item></channel></rss>