<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Sysmon Event ID 11 - File Create — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/sysmon-event-id-11---file-create/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 29 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/sysmon-event-id-11---file-create/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious Managed Code Hosting Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-suspicious-managedcode-hosting/</link><pubDate>Mon, 29 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-suspicious-managedcode-hosting/</guid><description>This rule detects suspicious managed code hosting processes on Windows systems, potentially indicating code injection or defense evasion tactics by monitoring file events associated with processes commonly used to host managed code, such as wscript.exe, cscript.exe, and mshta.exe.</description><content:encoded><![CDATA[<p>This detection identifies suspicious managed code hosting processes on Windows systems. Attackers may leverage processes like <code>wscript.exe</code>, <code>cscript.exe</code>, <code>mshta.exe</code>, <code>wmic.exe</code>, <code>svchost.exe</code>, <code>dllhost.exe</code>, <code>cmstp.exe</code>, and <code>regsvr32.exe</code> to execute malicious code, often bypassing traditional security controls. These processes can be abused to load and execute .NET assemblies or other managed code components. The detection focuses on identifying unusual file creation events associated with these processes which could indicate an attacker is attempting to leverage these processes for malicious purposes. This activity might be indicative of code injection, defense evasion, or other suspicious code execution techniques. The rule uses EQL to search for file events associated with specific processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through a phishing email or compromised software.</li>
<li>The attacker uses a LOLBin such as <code>mshta.exe</code> or <code>regsvr32.exe</code> to bypass application control.</li>
<li>The LOLBin executes a malicious script or loads a malicious DLL from a user-writable location.</li>
<li>The malicious script or DLL performs reconnaissance activities, such as gathering system information or enumerating network resources.</li>
<li>The attacker then attempts to escalate privileges by exploiting a vulnerability or using stolen credentials.</li>
<li>The attacker uses the compromised process to download and execute additional malware.</li>
<li>The malware establishes persistence on the system through scheduled tasks or registry modifications.</li>
<li>The attacker performs lateral movement within the network, compromising additional systems and exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, allowing attackers to compromise systems, steal sensitive data, and establish persistence. The use of LOLBins can bypass application control, making detection more challenging. Depending on the scope of the attack, this could result in significant financial losses, reputational damage, and disruption of business operations. This is a high-severity finding due to the potential for attackers to gain full control over affected systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon file creation logging (Event ID 11) to collect the necessary data for this detection.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Managed Code Hosting Process&rdquo; to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by this rule, focusing on the file paths, process command lines, and parent processes involved.</li>
<li>Monitor for unexpected file creation events associated with processes like <code>wscript.exe</code>, <code>cscript.exe</code>, and <code>mshta.exe</code> in user-writable directories.</li>
<li>Implement application control policies to restrict the execution of LOLBins and other potentially malicious processes.</li>
<li>Correlate the detection with other security events to identify related malicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>managed code</category><category>lolbin</category></item></channel></rss>