<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Symantec Endpoint Protection — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/symantec-endpoint-protection/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jul 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/symantec-endpoint-protection/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious Registry Hive Access via RegBack</title><link>https://feed.craftedsignal.io/briefs/2024-07-regback-hive-access/</link><pubDate>Tue, 02 Jul 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-regback-hive-access/</guid><description>This rule detects attempts to access registry backup hives (SAM, SECURITY, SYSTEM) via RegBack on Windows systems, which can contain or enable access to credential material.</description><content:encoded><![CDATA[<p>This detection identifies suspicious attempts to access registry backup hives (SAM, SECURITY, and SYSTEM) located in the <code>RegBack</code> folder on Windows systems. These hives contain sensitive credential material, making them attractive targets for attackers seeking to compromise system security. The detection logic focuses on file access events, specifically successful file opens, while excluding known benign processes such as <code>taskhostw.exe</code> and various AV/EDR solutions (SophosScanCoordinator.exe, MsSense.exe, ccSvcHst.exe, etc.) to minimize false positives. The rule is designed to provide defenders with high-fidelity alerts when unauthorized access to these critical registry hives is detected. The scope includes any Windows system where endpoint file access logging is enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through various means.</li>
<li>The attacker attempts to access the <code>SAM</code>, <code>SECURITY</code>, or <code>SYSTEM</code> registry hives located in the <code>C:\\Windows\\System32\\config\\RegBack\\</code> directory.</li>
<li>The attacker leverages a tool or script to open one or more of these registry hives. This could involve using built-in Windows utilities, scripting languages, or custom-developed tools.</li>
<li>If the attacker successfully opens the <code>SAM</code> and <code>SYSTEM</code> hives, they can extract user account credentials, including usernames, password hashes, and other sensitive information. The <code>SECURITY</code> hive is also useful.</li>
<li>The attacker may stage the registry hive files by copying them to a different location on the system for further analysis or exfiltration.</li>
<li>The attacker uses credential dumping tools (e.g., Mimikatz, secretsdump.py) or custom scripts to extract credentials from the staged registry hives.</li>
<li>The attacker leverages the extracted credentials to escalate privileges, move laterally within the network, or access sensitive data.</li>
<li>The final objective is typically to gain unauthorized access to critical systems, steal sensitive data, or establish long-term persistence within the compromised environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this technique can lead to the compromise of user account credentials, enabling attackers to escalate privileges, move laterally within the network, and gain unauthorized access to sensitive data. The impact can range from data breaches and financial losses to reputational damage and disruption of critical business operations. The number of victims can vary depending on the scope of the attacker&rsquo;s activities and the security posture of the targeted organization. Sectors commonly targeted include finance, healthcare, government, and critical infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable file access monitoring for the <code>C:\\Windows\\System32\\config\\RegBack\\</code> directory to capture file open events.</li>
<li>Deploy the Sigma rule <code>Registry Hive Access via RegBack</code> to your SIEM and tune the exclusions based on your environment.</li>
<li>Monitor <code>process_creation</code> events for unusual processes accessing files in <code>C:\\Windows\\System32\\config\\RegBack\\</code>, using the rule <code>Suspicious Process Accessing RegBack Hives</code>.</li>
<li>Enable Sysmon process creation logging and file creation to activate the rules above.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>regback</category><category>windows</category></item><item><title>Suspicious Process Access via Direct System Call</title><link>https://feed.craftedsignal.io/briefs/2024-01-direct-syscall-process-access/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-direct-syscall-process-access/</guid><description>Detects suspicious process access events where the call trace does not originate from known Windows system DLLs, indicating potential defense evasion by bypassing hooked APIs via direct syscalls.</description><content:encoded><![CDATA[<p>This detection identifies suspicious process access events on Windows systems where a process attempts to access another process&rsquo;s memory via direct system calls, bypassing standard Windows API calls. Endpoint security solutions often hook userland Windows APIs to detect malicious code execution. Attackers can evade these hooks by directly invoking syscalls, which are lower-level instructions that interact directly with the operating system kernel. The rule specifically looks for process access events (Sysmon Event ID 10) where the call trace does not originate from known Windows system DLLs like ntdll.dll, indicating a potential attempt to bypass security measures. The rule excludes certain legitimate applications, such as Malwarebytes Anti-Exploit, Cisco AMP, Microsoft EdgeWebView, and Adobe Acrobat DC, to reduce false positives. This technique is often employed by advanced malware and red teams to evade detection.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A malicious process is executed on the system, either through user interaction or exploitation of a vulnerability.</li>
<li>The process attempts to gain access to another process&rsquo;s memory space (Target Process).</li>
<li>Instead of using standard Windows API calls, the malicious process directly invokes system calls (syscalls) to access the target process&rsquo;s memory.</li>
<li>The <code>CallTrace</code> in the Sysmon event does not originate from expected system DLLs like <code>ntdll.dll</code>, <code>sysfer.dll</code>, <code>wow64cpu.dll</code>, <code>wow64win.dll</code>, or <code>win32u.dll</code>, indicating a direct syscall.</li>
<li>The process might attempt to read sensitive information such as credentials, inject malicious code, or manipulate the target process&rsquo;s behavior.</li>
<li>The malicious process performs actions within the context of the target process, such as executing injected code or accessing sensitive data.</li>
<li>The attacker leverages the compromised process to achieve their objectives, such as data exfiltration, lateral movement, or privilege escalation.</li>
<li>The attacker cleans up any traces of their activity and attempts to maintain persistence on the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the compromise of sensitive data, the injection of malicious code into legitimate processes, and the complete takeover of the affected system. This can result in data breaches, financial loss, and reputational damage. The impact is especially significant if the target process holds sensitive credentials, browser secrets, or has security-product context.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process access logging (Event ID 10) with call tracing and ingest the logs into your SIEM to activate the rules above (<a href="https://ela.st/sysmon-event-10-setup">https://ela.st/sysmon-event-10-setup</a>).</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM and tune them for your environment to detect direct syscall process access.</li>
<li>Investigate any alerts generated by these rules, focusing on the <code>SourceImage</code>, <code>TargetImage</code>, <code>GrantedAccess</code>, and <code>CallTrace</code> fields in the Sysmon event to determine the legitimacy of the process access attempt.</li>
<li>Prioritize investigation of alerts where the target process is <code>lsass.exe</code> or other security-sensitive processes.</li>
<li>Implement robust endpoint detection and response (EDR) solutions to detect and prevent malicious activity on endpoints.</li>
<li>Monitor for suspicious process creation events originating from the flagged processes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>windows</category></item></channel></rss>