<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Sysmon — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/sysmon/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 14:17:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/sysmon/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious Windows PowerShell Arguments Detected</title><link>https://feed.craftedsignal.io/briefs/2024-09-susp-powershell-args/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-09-susp-powershell-args/</guid><description>This rule identifies the execution of PowerShell with suspicious argument values, often observed during malware installation, by detecting unusual PowerShell arguments indicative of abuse, focusing on patterns like encoded commands, suspicious downloads, and obfuscation techniques.</description><content:encoded><![CDATA[<p>This detection rule identifies the execution of PowerShell with suspicious argument values on Windows systems. This behavior is frequently associated with malware installation and other malicious activities. PowerShell is a powerful scripting language, and adversaries often exploit its capabilities to execute malicious scripts, download payloads, and obfuscate commands. The rule focuses on detecting patterns such as encoded commands, suspicious downloads (e.g., using WebClient or Invoke-WebRequest), and various obfuscation techniques used to evade detection. The rule is designed to work with various data sources, including Elastic Defend, Windows Security Event Logs, Sysmon, and third-party EDR solutions like CrowdStrike, Microsoft Defender XDR, and SentinelOne, enhancing its applicability across different environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker uses PowerShell to download a malicious payload from a remote server using commands like <code>DownloadFile</code> or <code>DownloadString</code>.</li>
<li>The downloaded payload is often encoded or obfuscated to evade detection. Common techniques include Base64 encoding, character manipulation, and compression.</li>
<li>PowerShell is then used to decode or deobfuscate the payload using methods like <code>[Convert]::FromBase64String</code> or <code>[char[]](...) -join ''</code>.</li>
<li>The deobfuscated payload is executed directly in memory using techniques like <code>iex</code> (Invoke-Expression) or <code>Reflection.Assembly.Load</code>.</li>
<li>The executed payload performs malicious actions, such as installing malware, establishing persistence, or exfiltrating data.</li>
<li>The attacker may use techniques like <code>WebClient</code> to download files from a remote URL.</li>
<li>Commands like <code>nslookup -q=txt</code> are used for command and control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to malware installation, data theft, system compromise, and further propagation of the attack within the network. The detection of suspicious PowerShell arguments helps to identify and prevent these malicious activities before significant damage can occur. Without proper detection, attackers can maintain persistence, escalate privileges, and compromise sensitive data. The rule helps defenders identify and respond to these threats quickly, minimizing the impact of potential attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect suspicious PowerShell activity.</li>
<li>Enable Sysmon process creation logging with command line arguments to ensure the necessary data is captured for the Sigma rules to function effectively.</li>
<li>Investigate any alerts generated by the Sigma rules to determine the legitimacy of the PowerShell activity and take appropriate remediation steps.</li>
<li>Continuously tune the Sigma rules based on your environment to reduce false positives and improve detection accuracy.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>powershell</category><category>malware</category><category>execution</category></item><item><title>Suspicious Execution via Windows Command Debugging Utility</title><link>https://feed.craftedsignal.io/briefs/2024-07-cdb-execution/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-cdb-execution/</guid><description>Adversaries can abuse the Windows command line debugging utility cdb.exe to execute commands or shellcode from non-standard paths, evading traditional security measures.</description><content:encoded><![CDATA[<p>The Windows command line debugging utility, cdb.exe, is a legitimate tool used for debugging applications. However, adversaries can exploit it to execute unauthorized commands or shellcode, bypassing security measures. This can be achieved by running cdb.exe from non-standard installation paths and using specific command-line arguments to execute malicious commands. The LOLBAS project documents this technique, highlighting its potential for defense evasion. This activity has been observed across various environments, necessitating detection strategies that focus on identifying anomalous executions of cdb.exe.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system.</li>
<li>The attacker copies cdb.exe to a non-standard location (outside &ldquo;Program Files&rdquo; and &ldquo;Program Files (x86)&rdquo;).</li>
<li>The attacker executes cdb.exe with the <code>-cf</code>, <code>-c</code>, or <code>-pd</code> command-line arguments.</li>
<li>These arguments are used to specify a command file or execute a direct command.</li>
<li>The command file or command directly executes malicious code, such as shellcode.</li>
<li>The malicious code performs actions such as creating new processes, modifying files, or establishing network connections.</li>
<li>These actions allow the attacker to maintain persistence or escalate privileges.</li>
<li>The ultimate goal is to evade defenses and execute arbitrary code on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows adversaries to execute arbitrary commands and shellcode on the affected system, potentially leading to complete system compromise. This can result in data theft, installation of malware, or further propagation within the network. The technique is effective at bypassing application whitelisting and other security controls that rely on standard execution paths.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Execution via Windows Command Debugging Utility&rdquo; to your SIEM to detect suspicious cdb.exe executions (see rules section).</li>
<li>Enable process creation logging via Sysmon or Windows Security Event Logs to provide the necessary data for the Sigma rule.</li>
<li>Implement application whitelisting to prevent execution of cdb.exe from non-standard paths.</li>
<li>Monitor process command lines for the <code>-cf</code>, <code>-c</code>, and <code>-pd</code> flags when cdb.exe is executed.</li>
<li>Investigate any instances of cdb.exe running from unusual directories to determine legitimacy.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lolbas</category><category>defense-evasion</category><category>windows</category></item><item><title>Remote Desktop File Opened from Suspicious Path</title><link>https://feed.craftedsignal.io/briefs/2024-11-rdp-file-attachment/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-rdp-file-attachment/</guid><description>Adversaries may abuse RDP files delivered via phishing from suspicious locations to gain unauthorized access to systems.</description><content:encoded><![CDATA[<p>Attackers are increasingly using malicious Remote Desktop Protocol (RDP) files to gain initial access to systems. These RDP files, often delivered via spearphishing attachments, contain connection settings that, when opened, can compromise a system. This technique allows adversaries to bypass traditional security measures by leveraging a legitimate tool (mstsc.exe) with a malicious configuration file. The observed activity involves opening RDP files from suspicious locations like Downloads, temporary folders (AppData\Local\Temp), and Outlook content cache (INetCache\Content.Outlook). This campaign has been observed as recently as October 2024, where Midnight Blizzard conducted large-scale spear-phishing using RDP files. Defenders should monitor for the execution of mstsc.exe with RDP files from untrusted locations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a spearphishing email containing a malicious RDP file as an attachment.</li>
<li>The victim receives the email and, lured by social engineering, downloads the attached RDP file to a local directory, often the Downloads folder.</li>
<li>The victim double-clicks the RDP file, initiating the execution of <code>mstsc.exe</code>.</li>
<li><code>mstsc.exe</code> reads the connection settings from the RDP file, which may include malicious configurations such as altered gateway settings or credential theft mechanisms.</li>
<li><code>mstsc.exe</code> attempts to establish a remote desktop connection based on the RDP file&rsquo;s settings.</li>
<li>If the connection is successful, the attacker gains unauthorized access to the remote system.</li>
<li>The attacker may then perform reconnaissance, move laterally, and escalate privileges within the compromised network.</li>
<li>The final objective could be data exfiltration, ransomware deployment, or establishing persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using malicious RDP files can lead to unauthorized access to sensitive systems and data. The consequences range from data breaches and financial loss to complete system compromise and disruption of operations. The Microsoft Security blog reported a large-scale spear-phishing campaign utilizing RDP files as recently as October 2024. The targets may be across various sectors, with potentially widespread impact depending on the attacker&rsquo;s objectives and the scope of the compromised network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Remote Desktop File Opened from Suspicious Path</code> to your SIEM and tune for your environment, focusing on the specified file paths and <code>mstsc.exe</code> execution.</li>
<li>Enable process creation logging with command-line arguments to capture the execution of <code>mstsc.exe</code> and the paths of the RDP files being opened.</li>
<li>Educate users on the risks associated with opening RDP files from untrusted sources, particularly those received as email attachments.</li>
<li>Implement strict email filtering to block or quarantine emails with RDP attachments from external sources.</li>
<li>Monitor network connections for unusual RDP traffic originating from systems where suspicious RDP files were executed.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>initial-access</category><category>rdp</category><category>phishing</category><category>windows</category></item><item><title>Detection of VScode Remote Tunneling for Command and Control</title><link>https://feed.craftedsignal.io/briefs/2024-09-vscode-tunnel/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-09-vscode-tunnel/</guid><description>The rule detects the execution of the VScode portable binary with the tunnel command line option, potentially indicating an attempt to establish a remote tunnel session to Github or a remote VScode instance for unauthorized access and command and control.</description><content:encoded><![CDATA[<p>This detection focuses on identifying the misuse of Visual Studio Code&rsquo;s (VScode) remote tunnel feature to establish unauthorized access or control over systems. While the VScode remote tunnel feature is designed to allow developers to connect to remote environments seamlessly, attackers can abuse this functionality for malicious purposes. The rule specifically looks for the execution of the VScode portable binary with the &ldquo;tunnel&rdquo; command-line option, which is indicative of an attempt to establish a remote tunnel session to either GitHub or a remote VScode instance. Successful exploitation can lead to command and control capabilities, allowing attackers to remotely manage and compromise the affected system. The rule aims to detect this suspicious behavior by monitoring process execution and command-line arguments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system through unspecified means.</li>
<li>The attacker downloads a portable version of Visual Studio Code (VScode) onto the compromised system.</li>
<li>The attacker executes the VScode binary with the <code>tunnel</code> command-line argument to initiate a remote tunnel session.</li>
<li>The attacker specifies additional arguments such as <code>--accept-server-license-terms</code> to bypass license agreement prompts.</li>
<li>The VScode tunnel attempts to establish a connection to a remote server, potentially a GitHub repository or a remote VScode instance controlled by the attacker.</li>
<li>If successful, the tunnel creates a persistent connection, allowing the attacker to execute commands and transfer files.</li>
<li>The attacker uses the established tunnel to remotely access the compromised system, enabling them to perform malicious activities such as data exfiltration or lateral movement.</li>
<li>The attacker maintains persistent access through the established tunnel, allowing for long-term command and control of the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to establish a persistent command and control channel, enabling them to remotely manage the compromised system. This can lead to data theft, deployment of ransomware, or further lateral movement within the network. While the number of potential victims and specific sectors targeted are not explicitly stated, the widespread use of VScode makes a wide range of organizations vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Attempt to Establish VScode Remote Tunnel&rdquo; rule to detect suspicious VScode tunnel activity in your environment.</li>
<li>Enable Sysmon process-creation logging to capture the necessary process execution data.</li>
<li>Investigate any alerts triggered by the rule, focusing on the command-line arguments and process behaviors to confirm malicious intent.</li>
<li>Monitor network connections originating from VScode processes for unusual or unauthorized connections to external servers.</li>
<li>Review and whitelist legitimate uses of VScode&rsquo;s tunnel feature by authorized developers to reduce false positives.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>vscode</category><category>remote-access-tools</category><category>windows</category></item><item><title>WDAC Policy File Creation by Unusual Process</title><link>https://feed.craftedsignal.io/briefs/2024-11-wdac-policy-evasion/</link><pubDate>Sat, 02 Nov 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-wdac-policy-evasion/</guid><description>Adversaries may use a specially crafted Windows Defender Application Control (WDAC) policy to restrict the execution of security products, detected by unusual process creation of WDAC policy files.</description><content:encoded><![CDATA[<p>Attackers are increasingly targeting Windows Defender Application Control (WDAC) to disable or weaken endpoint defenses. By crafting malicious WDAC policies, adversaries can block legitimate security software and evade detection. This technique involves creating WDAC policy files (.p7b or .cip) in protected system directories using unauthorized processes. The activity often occurs when attackers have already gained a foothold in the system and are attempting to solidify their position. Successful deployment of a malicious WDAC policy can significantly hinder incident response and allow malware to operate undetected. This tactic has gained traction since late 2024, with offensive tools like Krueger demonstrating the potential for weaponizing WDAC against EDR solutions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to the system through methods such as phishing or exploiting a software vulnerability.</li>
<li><strong>Privilege Escalation:</strong> The attacker escalates privileges to gain administrative access, which is required to modify WDAC policies.</li>
<li><strong>Policy Creation:</strong> The attacker crafts a malicious WDAC policy using tools or scripts. This policy is designed to block specific security products or processes.</li>
<li><strong>Staging:</strong> The malicious policy is staged in a temporary location on the system, often within user-writable directories.</li>
<li><strong>Policy Placement:</strong> The attacker moves the malicious WDAC policy file (.p7b or .cip) to a protected system directory, such as <code>C:\Windows\System32\CodeIntegrity\</code> or <code>C:\Windows\System32\CodeIntegrity\CiPolicies\Active\</code>. The tool used may be a Living-off-the-Land Binary (LOLBin) or a custom .NET assembly.</li>
<li><strong>Activation:</strong> The attacker triggers the activation of the new WDAC policy, which often requires a system reboot or the use of a service control utility.</li>
<li><strong>Defense Evasion:</strong> Once the policy is active, the targeted security products are blocked, allowing the attacker to operate with reduced risk of detection.</li>
<li><strong>Lateral Movement/Objectives:</strong> With defenses weakened, the attacker can move laterally within the network, exfiltrate data, or achieve other objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack targeting WDAC can severely impair an organization&rsquo;s ability to detect and respond to threats. By blocking security software, attackers can operate with impunity, leading to data breaches, financial losses, and reputational damage. Observed damage includes disabled endpoint detection and response (EDR) solutions, allowing ransomware and other malware to execute without interference. The scope of impact can range from individual workstations to entire domains, depending on the breadth of the WDAC policy deployment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;WDAC Policy File by an Unusual Process&rdquo; Sigma rule to your SIEM to detect unauthorized WDAC policy modifications.</li>
<li>Monitor file creation events with extensions .p7b and .cip in <code>C:\Windows\System32\CodeIntegrity\</code> and <code>C:\Windows\System32\CodeIntegrity\CiPolicies\Active\</code> directories, specifically filtering for processes other than <code>poqexec.exe</code>, <code>TiWorker.exe</code>, and <code>omadmclient.exe</code>.</li>
<li>Enable Sysmon Event ID 11 (File Create) logging to capture file creation events and provide the necessary data for the Sigma rule to function effectively.</li>
<li>Implement strict access control policies on WDAC policy directories to prevent unauthorized modification.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wdac</category><category>defense-evasion</category><category>windows</category></item><item><title>MsiExec Child Process Spawning Network Connections for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-10-msiexec-network-connection/</link><pubDate>Sat, 26 Oct 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-10-msiexec-network-connection/</guid><description>Detection of MsiExec spawning child processes that initiate network connections, potentially indicating abuse of Windows Installers for malware delivery and defense evasion.</description><content:encoded><![CDATA[<p>Adversaries may abuse the Windows Installer service (msiexec.exe) to proxy the execution of malicious payloads, effectively bypassing application control and other security mechanisms. This technique, known as &ldquo;Msiexec&rdquo; proxy execution (T1218.007), involves using msiexec.exe to execute malicious DLLs or scripts. The detection focuses on identifying child processes spawned by MsiExec, particularly those exhibiting network activity. This behavior is atypical for legitimate software installations and updates, making it a strong indicator of potential malicious use. Defenders should be aware of this technique as it allows attackers to blend in with legitimate system processes. The Elastic detection rule, updated on 2026-05-04, aims to identify this suspicious activity across multiple data sources including Elastic Defend, Sysmon, and SentinelOne.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system through an exploit or social engineering.</li>
<li>Attacker leverages msiexec.exe to execute a malicious MSI package with a <code>/v</code> parameter, commonly used to pass verbose logging options, potentially hiding malicious commands.</li>
<li>The malicious MSI package contains custom actions that execute arbitrary code.</li>
<li>Msiexec.exe spawns a child process (e.g., powershell.exe, cmd.exe, or another executable) to carry out malicious actions.</li>
<li>The child process establishes a network connection to an external server or performs DNS lookups, possibly for command and control (C2) communication or to download additional payloads.</li>
<li>The attacker uses the network connection to download and execute further tools or scripts.</li>
<li>The attacker performs lateral movement within the network.</li>
<li>The final objective could be data exfiltration, ransomware deployment, or persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass application control and execute arbitrary code on the system. This can lead to malware installation, data theft, or complete system compromise. While the exact number of victims is not specified in the provided source, the technique can be applied across various sectors. The impact can range from individual workstation compromises to large-scale breaches affecting entire organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>MsiExec Child Process with Unusual Executable and Network Connection</code> to detect suspicious msiexec.exe child processes initiating network connections based on unusual executable paths.</li>
<li>Enable Sysmon process creation logging (Event ID 1) and network connection logging (Event ID 3) to provide the necessary data for the Sigma rule.</li>
<li>Investigate any alerts triggered by the Sigma rules, focusing on the process tree, command-line arguments, and network destinations.</li>
<li>Review and whitelist legitimate software installations and automated deployment tools that use MsiExec and require network access to minimize false positives, as detailed in the &ldquo;False positive analysis&rdquo; section of the source material.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>msiexec</category></item><item><title>NTDS Dump via Wbadmin</title><link>https://feed.craftedsignal.io/briefs/2024-07-ntds-dump-wbadmin/</link><pubDate>Wed, 03 Jul 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-ntds-dump-wbadmin/</guid><description>Attackers with Backup Operator privileges may abuse wbadmin.exe to access the NTDS.dit file, enabling credential dumping and domain compromise.</description><content:encoded><![CDATA[<p>This detection identifies the execution of <code>wbadmin.exe</code> with arguments indicative of an attempt to access and dump the NTDS.dit file from a Windows domain controller. Attackers with sufficient privileges, specifically those belonging to groups like Backup Operators, can abuse the legitimate <code>wbadmin.exe</code> utility to create a backup of the Active Directory database (NTDS.dit). This file contains sensitive credential information, and once obtained, attackers can extract password hashes and compromise the entire domain. This activity is often part of a larger attack aimed at gaining persistent access and control over the network. The Elastic detection rule was published on 2024-06-05 and last updated on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the target network. This may be achieved through phishing, exploiting vulnerabilities, or compromised credentials.</li>
<li>The attacker escalates privileges to obtain membership in the Backup Operators group or a similar privileged group capable of running backups.</li>
<li>The attacker executes <code>wbadmin.exe</code> with the <code>recovery</code> argument, targeting the NTDS.dit file. The command line includes parameters to create a system state backup.</li>
<li>Wbadmin creates a backup of the system state, including the NTDS.dit file, in a specified location.</li>
<li>The attacker copies the NTDS.dit file from the backup location to a separate location for offline analysis.</li>
<li>The attacker uses tools such as <code>ntdsutil.exe</code> or <code>secretsdump.py</code> to extract password hashes from the NTDS.dit file.</li>
<li>The attacker cracks the password hashes or uses them in pass-the-hash attacks to gain access to other systems and resources within the domain.</li>
<li>The attacker achieves domain dominance and persistence, allowing them to control critical systems and data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to dump credentials from the NTDS.dit file, leading to complete compromise of the Active Directory domain. This enables them to move laterally, access sensitive data, and establish persistent control over the environment. The impact can include data breaches, ransomware deployment, and long-term disruption of business operations. The medium risk score indicates that while the attack requires specific privileges, the consequences are significant if successful.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line arguments to detect <code>wbadmin.exe</code> execution as described in the Attack Chain (Data Source: Windows Security Event Logs, Sysmon).</li>
<li>Implement the provided Sigma rule to detect suspicious <code>wbadmin.exe</code> execution with NTDS.dit related arguments in your SIEM (Rule: NTDS Dump via Wbadmin).</li>
<li>Monitor and restrict membership in privileged groups like Backup Operators to minimize the risk of abuse (Reference: <a href="https://medium.com/r3d-buck3t/windows-privesc-with-sebackupprivilege-65d2cd1eb960)">https://medium.com/r3d-buck3t/windows-privesc-with-sebackupprivilege-65d2cd1eb960)</a>.</li>
<li>Review and whitelist legitimate backup schedules or disaster recovery processes to reduce false positives (False positive analysis).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>windows</category><category>wbadmin</category><category>ntds.dit</category></item><item><title>Network-Level Authentication (NLA) Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-nla/</link><pubDate>Wed, 31 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-nla/</guid><description>Adversaries may disable Network-Level Authentication (NLA) by modifying specific registry keys to bypass authentication requirements for Remote Desktop Protocol (RDP) and enable persistence mechanisms.</description><content:encoded><![CDATA[<p>Network Level Authentication (NLA) is a security feature in Windows that requires users to authenticate before establishing a full RDP session, adding an extra layer of protection against unauthorized access. Attackers might attempt to disable NLA to gain access to the Windows sign-in screen without proper authentication. This tactic can facilitate the deployment of persistence mechanisms, such as leveraging Accessibility Features like Sticky Keys, or enable unauthorized remote access. This brief addresses the registry modifications associated with disabling NLA and provides detection strategies to identify such attempts. The references indicate that this technique is used in conjunction with other attacks for lateral movement within a compromised network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access to the system is gained (potentially via compromised credentials or vulnerability exploitation).</li>
<li>The attacker elevates privileges to modify system-level settings.</li>
<li>The attacker modifies the registry key <code>HKLM\SYSTEM\ControlSet*\Control\Terminal Server\WinStations\RDP-Tcp\UserAuthentication</code> to disable NLA.</li>
<li>The <code>UserAuthentication</code> value is set to &ldquo;0&rdquo; or &ldquo;0x00000000&rdquo;.</li>
<li>The attacker attempts to establish an RDP connection to the compromised system.</li>
<li>Due to the disabled NLA, the attacker bypasses the initial authentication screen.</li>
<li>The attacker leverages accessibility features (e.g., Sticky Keys) for persistence or further exploitation.</li>
<li>The attacker gains unauthorized access to the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of NLA allows attackers to bypass authentication and gain unauthorized access to systems via RDP. This can lead to data theft, malware installation, or further lateral movement within the network. While the exact number of victims and sectors targeted are unspecified, the potential impact includes significant data breaches and system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process-creation and registry event logging to detect the registry modifications (Elastic Defend, Elastic Endgame, Microsoft Defender XDR, SentinelOne, Sysmon).</li>
<li>Deploy the Sigma rule provided to detect attempts to modify the <code>UserAuthentication</code> registry key (Sysmon Registry Events).</li>
<li>Review and harden RDP configurations across the environment to prevent unauthorized access (Microsoft documentation).</li>
<li>Monitor endpoint security policies to detect unauthorized registry modifications (Endpoint Security Policies).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>lateral-movement</category><category>registry-modification</category><category>windows</category></item><item><title>Wireless Credential Dumping via Netsh</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-wireless-creds-dumping/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-wireless-creds-dumping/</guid><description>Adversaries use the Windows built-in utility Netsh to dump Wireless saved access keys in clear text, potentially leading to credential compromise.</description><content:encoded><![CDATA[<p>Attackers often target wireless credentials to gain unauthorized network access. This involves using the legitimate Windows command-line tool <code>netsh.exe</code> to extract Wi-Fi passwords stored on a compromised system. By leveraging <code>netsh</code>, attackers can bypass traditional security measures and retrieve sensitive information without deploying custom malware. The technique involves specific command-line arguments that instruct <code>netsh</code> to display wireless keys in cleartext, exposing the network passwords. Defenders must monitor <code>netsh</code> command-line activity to identify potential credential access attempts. This activity can lead to lateral movement within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a Windows system (e.g., via phishing or exploiting a software vulnerability).</li>
<li>The attacker executes <code>netsh.exe</code> with specific arguments to list available wireless profiles.</li>
<li>The attacker identifies a target wireless profile from the list.</li>
<li>The attacker executes <code>netsh.exe</code> again, this time specifying the target profile and requesting the key to be displayed in cleartext using the <code>key=clear</code> argument.</li>
<li><code>Netsh.exe</code> retrieves the Wi-Fi password from the Windows Wireless LAN service.</li>
<li>The password is displayed in the command output, which the attacker captures.</li>
<li>The attacker uses the obtained Wi-Fi password to connect to the wireless network.</li>
<li>The attacker can now perform lateral movement and access internal resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful credential dumping allows attackers to gain unauthorized access to wireless networks. This can lead to lateral movement within the organization&rsquo;s network, access to sensitive data, and further compromise of systems and resources. The impact includes potential data breaches, financial losses, and reputational damage. This technique allows attackers to bypass traditional network access controls.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Wireless Credential Dumping via Netsh</code> to identify suspicious <code>netsh.exe</code> commands in your environment.</li>
<li>Enable Sysmon process creation logging to capture the <code>netsh.exe</code> command-line arguments.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on the process lineage and user context as outlined in the &ldquo;Triage and analysis&rdquo; section of the source.</li>
<li>Implement strong password policies for Wi-Fi networks, including the use of WPA2 or WPA3 encryption.</li>
<li>Review and restrict the use of <code>netsh.exe</code> on systems where it is not required, using application control solutions.</li>
<li>Monitor for related alerts indicating lateral movement, staging, remote access, or persistence, as mentioned in the &ldquo;Triage and analysis&rdquo; section of the source.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>netsh</category><category>windows</category></item><item><title>Potential Exploitation of an Unquoted Service Path Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-unquoted-service-path/</link><pubDate>Mon, 29 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-unquoted-service-path/</guid><description>This rule detects potential exploitation of unquoted service path vulnerabilities, where adversaries may escalate privileges by placing a malicious executable in a higher-level directory within the path of an unquoted service executable.</description><content:encoded><![CDATA[<p>Unquoted service paths in Windows can be exploited to escalate privileges. When a service path lacks quotes, Windows may execute a malicious executable placed in a higher-level directory. This detection rule identifies suspicious processes starting from common unquoted paths, like &ldquo;C:\Program.exe&rdquo; or executables within &ldquo;C:\Program Files (x86)\&rdquo; or &ldquo;C:\Program Files\&rdquo;, signaling potential exploitation attempts. The rule aims to detect early stages of privilege escalation threats. This rule is designed for data generated by Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, Windows Security Event Logs, and Crowdstrike.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a service running with an unquoted path, such as &ldquo;C:\Program Files\Unquoted Path Service\Common\Service.exe&rdquo;.</li>
<li>The attacker places a malicious executable named &ldquo;Program.exe&rdquo; in &ldquo;C:&quot;</li>
<li>The operating system attempts to start the service &ldquo;C:\Program Files\Unquoted Path Service\Common\Service.exe&rdquo;.</li>
<li>Due to the unquoted path, the OS incorrectly parses the path and first attempts to execute &ldquo;C:\Program.exe&rdquo;.</li>
<li>The malicious &ldquo;Program.exe&rdquo; executes with the privileges of the service account.</li>
<li>The malicious executable performs actions to escalate privileges, such as adding a user to the local administrators group.</li>
<li>The attacker gains elevated access to the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of an unquoted service path vulnerability can lead to complete system compromise, as the attacker gains the privileges of the service account. This can allow the attacker to install programs, view, change, or delete data, or create new accounts with full user rights. The impact is high, potentially leading to a loss of confidentiality, integrity, and availability of the affected system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Review process executable paths to confirm if they match the patterns specified in the rule query, such as &ldquo;?:\Program.exe&rdquo; or executables within &ldquo;C:\Program Files (x86)\&rdquo; or &ldquo;C:\Program Files\&rdquo;.</li>
<li>Deploy the Sigma rule &ldquo;Potential Exploitation of an Unquoted Service Path Vulnerability&rdquo; to your SIEM and tune for your environment.</li>
<li>Enable Sysmon process-creation logging with Event ID 1 to activate the Sigma rules above.</li>
<li>Conduct a thorough review of service configurations to identify and correct any unquoted service paths as part of remediation steps.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>privilege-escalation</category><category>unquoted-service-path</category><category>windows</category></item><item><title>AMSI Enable Registry Key Modification for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-amsi-registry-disable/</link><pubDate>Sat, 27 Jan 2024 18:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-amsi-registry-disable/</guid><description>Adversaries modify the AmsiEnable registry key to 0 to disable Windows Script AMSI scanning, bypassing AMSI protections for Windows Script Host or JScript execution.</description><content:encoded><![CDATA[<p>Attackers can disable the Antimalware Scan Interface (AMSI) to evade detection by modifying the <code>AmsiEnable</code> registry key. This technique is commonly employed to execute malicious scripts without triggering security warnings or blocks. The AMSI, a Windows feature, allows applications and services to request the scanning of potentially malicious content (e.g., PowerShell scripts, JScript) before execution. By setting the <code>AmsiEnable</code> value to 0, an attacker can disable AMSI for the current user, effectively bypassing real-time script scanning. This action is often a precursor to deploying further malicious payloads or establishing persistence on a compromised system. This behavior has been observed since at least 2019 and continues to be a relevant defense evasion technique.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system, possibly through phishing or exploiting a vulnerability.</li>
<li>The attacker executes a script or binary that attempts to modify the <code>AmsiEnable</code> registry key.</li>
<li>The script or binary uses <code>reg.exe</code>, PowerShell, or another tool to set the <code>AmsiEnable</code> registry value to 0. The registry key location is typically <code>HKEY_USERS\&lt;SID&gt;\Software\Microsoft\Windows Script\Settings\AmsiEnable</code>.</li>
<li>After successfully disabling AMSI, the attacker proceeds to execute malicious scripts or code. These scripts may use <code>powershell.exe</code>, <code>wscript.exe</code>, or <code>cscript.exe</code>.</li>
<li>The malicious scripts download and execute additional payloads, such as malware or remote access tools (RATs).</li>
<li>The attacker performs lateral movement within the network using the compromised system as a pivot.</li>
<li>The attacker attempts to establish persistence, ensuring continued access to the system even after reboots.</li>
<li>The attacker exfiltrates sensitive data or deploys ransomware to achieve their objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the <code>AmsiEnable</code> registry key allows attackers to execute malicious scripts without triggering AMSI alerts, leading to potential malware infections, data breaches, and system compromise. Disabling AMSI significantly reduces the effectiveness of endpoint security solutions, making the system more vulnerable to attack. The impact can range from individual workstation compromise to widespread network infections, depending on the attacker&rsquo;s objectives and the organization&rsquo;s security posture.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect AmsiEnable Registry Modification via Registry Events</code> to your SIEM to detect modifications to the <code>AmsiEnable</code> registry key.</li>
<li>Enable Sysmon registry event logging to provide the necessary data for the Sigma rule to function.</li>
<li>Monitor process creation events for processes modifying registry keys, especially <code>reg.exe</code> and PowerShell, using the rule <code>Detect AmsiEnable Registry Modification via Process Creation</code>.</li>
<li>Investigate any alerts generated by these rules promptly to determine if the activity is malicious or legitimate.</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted scripts and binaries.</li>
<li>Harden systems by restricting user permissions to modify critical registry keys.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>amsi</category><category>registry</category><category>windows</category></item><item><title>First Time Seen Remote Monitoring and Management Tool Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-first-time-seen-rmm/</link><pubDate>Wed, 24 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-first-time-seen-rmm/</guid><description>Detects the execution of previously unseen remote monitoring and management (RMM) tools or remote access software on compromised Windows endpoints, often leveraged for command-and-control, persistence, and execution of malicious commands.</description><content:encoded><![CDATA[<p>Attackers commonly abuse legitimate remote monitoring and management (RMM) tools and remote access software for command and control (C2), persistence, and execution of native commands on compromised endpoints. These tools provide attackers with the ability to maintain access, execute commands, and move laterally within a network. This detection identifies when a process associated with commonly abused RMM/remote access tools is observed for the first time on a host. The rule is designed to trigger when a new process name or code signature associated with RMM software, or a child process of such software, is seen within a configured history window. This helps defenders quickly identify potentially malicious use of legitimate tools.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to a target system through various methods, such as exploiting vulnerabilities or using compromised credentials.</li>
<li>Tool Deployment: The attacker deploys a remote monitoring and management (RMM) tool or remote access software on the compromised endpoint. This may involve downloading and installing the tool, or exploiting existing installations.</li>
<li>Persistence: The RMM tool is configured to run persistently on the system, ensuring that the attacker maintains access even after a reboot or other disruption. This may involve creating a service or adding a registry key to ensure the tool starts automatically.</li>
<li>Command and Control: The attacker uses the RMM tool to establish a command and control (C2) channel with the compromised system. This allows them to remotely execute commands, transfer files, and monitor activity on the system.</li>
<li>Lateral Movement: Using the RMM tool, the attacker moves laterally within the network, compromising additional systems and escalating their access. This may involve using the tool to access shared resources or execute commands on other systems.</li>
<li>Data Exfiltration or Ransomware Deployment: The attacker uses their access to exfiltrate sensitive data from the compromised network or deploy ransomware to encrypt files and demand a ransom payment.</li>
<li>Cleanup: The attacker may attempt to remove traces of their activity, such as logs or files associated with the RMM tool, to avoid detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromise via RMM tools can lead to significant data breaches, financial losses, and reputational damage. The use of legitimate tools makes detection more difficult. Successful attacks can result in ransomware deployment, data theft, and prolonged unauthorized access to sensitive systems. Organizations in all sectors are potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the process creation rule to detect the execution of RMM tools on endpoints based on <code>process.name</code> and <code>process.code_signature.subject_name</code> criteria in the query.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to ensure the collection of necessary event data for the detection rule.</li>
<li>Investigate any alerts generated by the detection rule to determine whether the execution of the RMM tool is authorized and legitimate. Refer to the references for a list of commonly abused RMM tools and associated indicators.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>remote-access</category><category>rmm</category><category>command-and-control</category><category>persistence</category></item><item><title>Credential Acquisition via Registry Hive Dumping</title><link>https://feed.craftedsignal.io/briefs/2024-01-24-registry-hive-dump/</link><pubDate>Wed, 24 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-24-registry-hive-dump/</guid><description>Detects attempts to export sensitive Windows registry hives (SAM/SECURITY) using reg.exe, potentially leading to credential compromise.</description><content:encoded><![CDATA[<p>This detection identifies attempts to export registry hives containing sensitive credential information using the Windows <code>reg.exe</code> utility. Attackers may target the <code>HKLM\SAM</code> and <code>HKLM\SECURITY</code> hives to extract stored credentials, including password hashes and LSA secrets. The activity is often part of a broader credential access campaign. The rule focuses on detecting the execution of <code>reg.exe</code> with specific arguments indicating an attempt to save or export these critical registry hives. The use of <code>reg.exe</code> makes this technique accessible to various threat actors, including ransomware groups and nation-state actors. Defenders need to monitor for this activity to prevent unauthorized credential access and potential lateral movement within the network. This rule specifically looks for &ldquo;save&rdquo; and &ldquo;export&rdquo; arguments targeting SAM and SECURITY hives.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker executes <code>reg.exe</code> from the command line or through a script.</li>
<li>The <code>reg.exe</code> command includes arguments to save or export registry hives.</li>
<li>The target registry hives are <code>HKLM\SAM</code> and <code>HKLM\SECURITY</code>, containing sensitive credential information.</li>
<li>The exported registry hive is saved to a file on disk or a network share.</li>
<li>The attacker may compress or encrypt the exported registry hive to evade detection.</li>
<li>The attacker retrieves the exported registry hive for offline analysis.</li>
<li>The attacker extracts credential information from the registry hive, such as password hashes and LSA secrets, to use in lateral movement or privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to acquire sensitive credentials stored within the registry. This can lead to lateral movement within the network, privilege escalation, and ultimately, data exfiltration or system compromise. Compromised credentials can be used to access critical systems and data, causing significant damage to the organization. The impact is considered high due to the potential for widespread access and control over the compromised environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation auditing with command line arguments to capture the execution of <code>reg.exe</code> with relevant arguments. (<a href="https://ela.st/audit-process-creation">Data Source: Windows Security Event Logs, Sysmon</a>)</li>
<li>Deploy the Sigma rule <code>Detect Registry Hive Export via Reg.exe</code> to your SIEM to detect the execution of <code>reg.exe</code> with arguments indicative of registry hive dumping.</li>
<li>Implement access controls and monitor file system activity to detect unauthorized access or modification of registry hive files.</li>
<li>Review and restrict the use of <code>reg.exe</code> to authorized personnel and processes.</li>
<li>Monitor for parent processes of <code>reg.exe</code> that are unusual or unexpected, which might indicate malicious activity.</li>
<li>Investigate any alerts generated by the Sigma rule by reviewing the process command line, parent process, and destination of the exported registry hive.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>registry-dump</category><category>windows</category></item><item><title>Windows Sandbox Abuse with Sensitive Configuration</title><link>https://feed.craftedsignal.io/briefs/2024-01-windows-sandbox-abuse/</link><pubDate>Wed, 10 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-windows-sandbox-abuse/</guid><description>This rule detects the abuse of Windows Sandbox with sensitive configurations to evade detection, where malware may abuse the sandbox feature to gain write access to the host file system, enable network connections, and automatically execute commands via logon, identifying the start of a new container with these sensitive configurations.</description><content:encoded><![CDATA[<p>Attackers may abuse the Windows Sandbox feature to evade detection by running malicious code within the isolated environment. This involves configuring the sandbox with sensitive options such as granting write access to the host file system, enabling network connections, and setting up automatic command execution via logon. By running within the sandbox with these configurations, malware can potentially interact with the host system, while making detection more difficult. This technique is used for defense evasion, hiding artifacts, and executing malicious activities within a virtualized environment to avoid direct exposure on the host. The rule identifies the start of a new container with sensitive configurations like write access to the host file system, network connection and automatic execution via logon command.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through an exploit or social engineering.</li>
<li>The attacker leverages Windows Sandbox by executing <code>wsb.exe</code> or <code>WindowsSandboxClient.exe</code>.</li>
<li>The attacker configures the sandbox to enable networking using <code>&lt;Networking&gt;Enable&lt;/Networking&gt;</code> or <code>&lt;NetworkingEnabled&gt;true&lt;/NetworkingEnabled&gt;</code>.</li>
<li>The attacker grants the sandbox write access to the host file system using <code>&lt;HostFolder&gt;C:\\&lt;ReadOnly&gt;false</code>.</li>
<li>The attacker sets up a logon command to automatically execute malicious code when the sandbox starts using <code>&lt;LogonCommand&gt;</code>.</li>
<li>The sandbox initializes and executes the configured logon command.</li>
<li>The malicious code interacts with the host file system and network, performing actions such as data exfiltration or lateral movement.</li>
<li>The attacker achieves their objective, such as deploying ransomware or stealing sensitive information, while operating from within the isolated sandbox environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using Windows Sandbox abuse can lead to a range of negative impacts. Attackers may gain unauthorized access to sensitive data, compromise system integrity, or disrupt business operations. The use of the sandbox environment helps to conceal malicious activity, making detection and remediation more challenging. The damage can include data breaches, financial losses, reputational damage, and regulatory penalties. Successful exploitation allows malware to interact with the host system, potentially affecting multiple systems on the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Windows Sandbox with Sensitive Configuration&rdquo; detection rule to your SIEM to identify potential sandbox abuse attempts.</li>
<li>Monitor process creation events for <code>wsb.exe</code> and <code>WindowsSandboxClient.exe</code> with command-line arguments that enable networking (<code>&lt;Networking&gt;Enable&lt;/Networking&gt;</code>, <code>&lt;NetworkingEnabled&gt;true&lt;/NetworkingEnabled&gt;</code>).</li>
<li>Monitor process creation events for <code>wsb.exe</code> and <code>WindowsSandboxClient.exe</code> with command-line arguments that enable write access to the host file system (<code>&lt;HostFolder&gt;C:\\&lt;ReadOnly&gt;false</code>).</li>
<li>Monitor process creation events for <code>wsb.exe</code> and <code>WindowsSandboxClient.exe</code> with command-line arguments that define logon commands (<code>&lt;LogonCommand&gt;</code>).</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture the necessary command-line arguments.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows-sandbox</category><category>windows</category></item><item><title>Unusual Service Host Child Process - Childless Service</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-svchost-child-process/</link><pubDate>Thu, 04 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-svchost-child-process/</guid><description>This detection identifies unusual child processes of Service Host (svchost.exe) that traditionally do not spawn child processes, potentially indicating code injection or exploitation.</description><content:encoded><![CDATA[<p>The Windows Service Host process (svchost.exe) is a critical system component that hosts multiple Windows services to optimize resource utilization. Certain services running under svchost.exe are not expected to spawn child processes. Attackers may inject malicious code into these &ldquo;childless&rdquo; svchost processes to execute unauthorized commands and evade traditional detection methods. This detection rule identifies anomalies by monitoring child processes of svchost.exe instances associated with services known to be childless, such as <code>WdiSystemHost</code>, <code>LicenseManager</code>, and <code>StorSvc</code>, flagging potential process injection or exploitation attempts. The rule aims to identify deviations from the expected behavior of these services, providing an early warning of potential malicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system through an exploit or by leveraging existing credentials.</li>
<li>The attacker injects malicious code into a running svchost.exe process associated with a childless service like <code>WdiSystemHost</code> or <code>StorSvc</code>.</li>
<li>The injected code spawns a child process from the targeted svchost.exe instance. This could involve executing a system utility or a custom payload.</li>
<li>The child process executes commands or performs actions dictated by the injected code, such as establishing a reverse shell or downloading additional payloads.</li>
<li>The attacker uses the spawned process to perform reconnaissance activities, gathering information about the system and network.</li>
<li>The attacker escalates privileges, potentially leveraging vulnerabilities or misconfigurations accessible from the compromised svchost process.</li>
<li>The attacker moves laterally to other systems on the network, using the compromised system as a pivot point.</li>
<li>The attacker achieves their final objective, which may include data exfiltration, ransomware deployment, or establishing persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to privilege escalation, allowing attackers to gain control of the compromised system and potentially the entire network. Attackers can use the compromised system as a staging ground for further attacks, exfiltrate sensitive data, deploy ransomware, or disrupt critical services. The medium severity score reflects the potential for significant impact if the activity is not detected and contained promptly.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Unusual Svchost Child Process - Childless Service</code> to your SIEM to detect potential process injection attacks targeting svchost.exe.</li>
<li>Tune the rule by adding known false positives to the exclusion list, such as <code>WerFault.exe</code>, <code>WerFaultSecure.exe</code>, and <code>wermgr.exe</code> to reduce alert fatigue.</li>
<li>Enable process creation logging via Sysmon (Event ID 1) with command line details for better visibility into spawned processes, as described in the <a href="https://ela.st/sysmon-event-1-setup">setup guide</a>.</li>
<li>Investigate any alerts generated by the rule, focusing on the process details and parent-child relationships to determine the legitimacy of the spawned process.</li>
<li>Consider using endpoint detection and response (EDR) solutions like Elastic Defend for enhanced visibility and automated response capabilities, as the rule is designed for data generated by <a href="https://www.elastic.co/security/endpoint-security">Elastic Defend</a>.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>process_injection</category><category>privilege_escalation</category><category>defense_evasion</category><category>windows</category></item><item><title>Process Activity via Compiled HTML File Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-compiled-html-execution/</link><pubDate>Wed, 03 Jan 2024 18:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-compiled-html-execution/</guid><description>Adversaries may conceal malicious code in compiled HTML files (.chm) and deliver them to a victim for execution, using the HTML Help executable (hh.exe) to proxy the execution of scripting interpreters and bypass security controls.</description><content:encoded><![CDATA[<p>Attackers are known to deliver malicious payloads within compiled HTML files (.chm) to bypass security measures and gain initial access to systems. This technique leverages the Microsoft HTML Help system and its associated executable, hh.exe, to proxy the execution of malicious code. Compiled HTML files can contain various types of content, including HTML documents, images, and scripting languages like VBA, JScript, Java, and ActiveX. By embedding malicious scripts or executables within a .chm file, attackers can trick users into executing them when they open the file. This is particularly effective because hh.exe is a signed binary, which may allow it to bypass certain security controls. The scope of this technique affects Windows systems where the HTML Help system is installed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious .chm file containing embedded malicious code, such as a PowerShell script or executable.</li>
<li>The attacker delivers the .chm file to the victim via social engineering, such as phishing or malicious websites.</li>
<li>The victim opens the .chm file, causing hh.exe to launch.</li>
<li>hh.exe processes the .chm file, rendering its content, which includes the embedded malicious script or executable.</li>
<li>The malicious code executes, often spawning a scripting interpreter like <code>powershell.exe</code> or <code>cmd.exe</code>.</li>
<li>The scripting interpreter executes commands to download additional payloads or perform malicious actions on the system.</li>
<li>The attacker gains initial access to the victim&rsquo;s system.</li>
<li>The attacker escalates privileges and moves laterally within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to initial access, code execution, and potentially full system compromise. This can result in data theft, malware installation, and further lateral movement within the network. The severity and impact depend on the permissions of the user running hh.exe and the nature of the malicious payload.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Compiled HTML File Spawning Suspicious Processes&rdquo; to your SIEM to detect instances where <code>hh.exe</code> is the parent process of scripting interpreters.</li>
<li>Enable Sysmon process creation logging to provide the necessary data for the Sigma rule to function correctly.</li>
<li>Monitor process execution chains for unknown processes originating from <code>hh.exe</code>, as mentioned in the investigation guide.</li>
<li>Implement email filtering and security awareness training to prevent users from opening malicious .chm files delivered via phishing.</li>
<li>Block the execution of unsigned or untrusted executables in the environment to reduce the risk of malicious code execution.</li>
<li>Use endpoint detection and response (EDR) solutions like Elastic Defend, CrowdStrike, Microsoft Defender XDR, and SentinelOne to detect and respond to malicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>execution</category><category>defense-evasion</category><category>compiled-html</category><category>windows</category><category>proxy-execution</category></item><item><title>MSBuild запускает необычные процессы</title><link>https://feed.craftedsignal.io/briefs/2024-01-msbuild-unusual-process/</link><pubDate>Wed, 03 Jan 2024 15:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-msbuild-unusual-process/</guid><description>Adversaries may exploit MSBuild to execute malicious scripts or compile code, bypassing security controls; this rule detects unusual processes initiated by MSBuild, such as PowerShell or C# compiler, signaling potential misuse for executing unauthorized or harmful actions.</description><content:encoded><![CDATA[<p>The Microsoft Build Engine (MSBuild) is a legitimate tool used for building applications. However, adversaries may abuse MSBuild to execute malicious scripts or compile code, effectively bypassing security controls. This technique is often employed to deploy malicious payloads. This detection focuses on identifying instances where MSBuild initiates unusual processes such as PowerShell, Internet Explorer, or the Visual C# Command Line Compiler (csc.exe). This activity is considered suspicious because legitimate software development workflows do not typically involve MSBuild directly spawning these processes. The original Elastic detection rule was created on 2020-03-25 and last updated on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker modifies or creates an MSBuild project file (.csproj or .sln) containing malicious commands.</li>
<li>The malicious MSBuild project file is crafted to execute a script or compile code.</li>
<li>The attacker uses the MSBuild.exe or msbuild.exe utility to execute the malicious project file.</li>
<li>MSBuild spawns an unusual process such as powershell.exe, csc.exe, or iexplore.exe based on the malicious project file configuration.</li>
<li>PowerShell executes arbitrary commands, downloads further payloads, or performs other malicious actions.</li>
<li>The C# compiler (csc.exe) compiles malicious code into an executable or library.</li>
<li>The compiled malware or downloaded payloads execute, leading to further compromise, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, allowing attackers to deploy malware, compromise sensitive data, and establish persistence on the targeted system. The use of MSBuild for malicious purposes allows attackers to bypass application whitelisting and other security controls that trust signed Microsoft binaries. While the precise number of victims is unknown, this technique can be employed against a wide range of organizations, particularly those with vulnerable systems or inadequate endpoint protection.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging, specifically including parent-child relationships, to detect unusual process spawning by MSBuild (logs-endpoint.events.process-*, logs-system.security*, logs-windows.forwarded*, logs-windows.sysmon_operational-*, winlogbeat-*).</li>
<li>Deploy the Sigma rule &ldquo;Microsoft Build Engine Started an Unusual Process&rdquo; to your SIEM to identify instances of MSBuild spawning suspicious processes, and tune for your environment.</li>
<li>Investigate any instances of MSBuild spawning PowerShell, csc.exe, or iexplore.exe to determine if the activity is legitimate or malicious (process.name:(&ldquo;csc.exe&rdquo; or &ldquo;iexplore.exe&rdquo; or &ldquo;powershell.exe&rdquo;)).</li>
<li>Monitor for modifications to MSBuild project files (.proj or .sln) for signs of tampering.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>msbuild</category></item><item><title>Suspicious Enumeration Commands Spawned via WMIPrvSE</title><link>https://feed.craftedsignal.io/briefs/2024-01-wmiprvse-enumeration/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wmiprvse-enumeration/</guid><description>This rule detects suspicious execution of system enumeration commands by the Windows Management Instrumentation Provider Service (WMIPrvSE), indicating potential reconnaissance or malicious activity on Windows systems.</description><content:encoded><![CDATA[<p>Attackers can leverage the Windows Management Instrumentation (WMI) to execute commands for reconnaissance and enumeration within a compromised system. This involves spawning native Windows tools via the WMI Provider Service (WMIPrvSE). This activity is often used to gather system and network information in a stealthy manner, which could be part of a larger attack, such as lateral movement or privilege escalation. This behavior matters because it allows adversaries to gather information about the target environment without using easily detectable methods, potentially leading to further compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a Windows system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker uses WMI to execute a reconnaissance command.</li>
<li>WMIPrvSE.exe is invoked to execute the attacker&rsquo;s specified command.</li>
<li>The attacker executes commands such as <code>ipconfig.exe</code>, <code>net.exe</code>, or <code>systeminfo.exe</code> via WMIPrvSE.exe to gather network configuration details, user information, and system information.</li>
<li>The enumerated information is collected and potentially exfiltrated to a command and control server.</li>
<li>The attacker uses the gathered information to identify further targets within the network.</li>
<li>The attacker moves laterally to other systems using stolen credentials or exploited vulnerabilities.</li>
<li>The attacker achieves their final objective, such as data exfiltration, ransomware deployment, or persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of enumeration commands via WMIPrvSE allows attackers to gather sensitive information about the system and network environment. This information can be used to facilitate lateral movement, privilege escalation, and data theft, potentially leading to significant financial loss, reputational damage, and disruption of business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging to capture the execution of enumeration commands (Data Source: Sysmon).</li>
<li>Deploy the Sigma rule &ldquo;Enumeration Command Spawned via WMIPrvSE&rdquo; to your SIEM to detect suspicious WMIPrvSE activity (Sigma rule).</li>
<li>Investigate any instances of WMIPrvSE spawning common enumeration tools such as <code>net.exe</code>, <code>ipconfig.exe</code>, or <code>systeminfo.exe</code> (Sigma rule).</li>
<li>Implement network segmentation to limit the scope of potential lateral movement following successful enumeration (Attack Chain).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>enumeration</category><category>wmi</category><category>discovery</category><category>execution</category><category>windows</category></item><item><title>Suspicious Process Writing to Startup Folder for Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-01-startup-persistence/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-startup-persistence/</guid><description>Adversaries may establish persistence by writing malicious files to the Windows Startup folder, allowing them to automatically execute upon user logon; this detection identifies suspicious processes creating files in these locations.</description><content:encoded><![CDATA[<p>Attackers often leverage the Windows Startup folder to maintain persistence, as any executable placed in this folder will automatically run when a user logs into the system. This technique is particularly effective because it requires no user interaction and can easily be automated. This rule detects when processes commonly abused by attackers, such as cmd.exe, powershell.exe, or mshta.exe, write or modify files within the Startup folders. The rule focuses on identifying unauthorized persistence mechanisms and helps defenders uncover potentially compromised systems. By monitoring file creation events in the Startup folders by suspicious processes, this detection aims to catch malicious activity early in the attack chain.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker executes a command shell (e.g., <code>cmd.exe</code>, <code>powershell.exe</code>) on the compromised system.</li>
<li>The attacker uses the command shell to write a malicious executable or script file to one of the Windows Startup folders (<code>C:\\Users\\*\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\*</code> or <code>C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\StartUp\\*</code>).</li>
<li>The attacker modifies the file attributes (e.g., using <code>attrib.exe</code>) to hide the file or make it more difficult to detect.</li>
<li>The attacker schedules a reboot or waits for the user to log off and back on.</li>
<li>Upon user logon, the malicious executable or script in the Startup folder is automatically executed.</li>
<li>The malicious code establishes persistence, potentially downloading additional payloads or establishing a command and control (C2) channel.</li>
<li>The attacker maintains persistent access to the compromised system, enabling further malicious activities such as data theft or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to persistent access on the compromised system, allowing attackers to maintain their foothold even after system reboots. This can lead to data exfiltration, installation of ransomware, or further propagation within the network. The number of affected systems depends on the scope of the initial compromise and the attacker&rsquo;s ability to move laterally. Sectors commonly targeted by persistence techniques include finance, healthcare, and government.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 11 (File Create) to capture file creation events, as referenced in the <a href="#setup">setup instructions</a>.</li>
<li>Deploy the Sigma rule <code>Suspicious Process Writing to Startup Folder</code> to your SIEM to detect suspicious processes creating files in the startup folder, and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule to determine if the activity is malicious, referencing the <a href="#note">investigation guide</a>.</li>
<li>Block the processes listed in the rule (<code>cmd.exe</code>, <code>powershell.exe</code>, etc.) from writing to the startup folders if legitimate use is not required.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>startup</category><category>windows</category></item><item><title>Windows Script Interpreter Executing Process via WMI</title><link>https://feed.craftedsignal.io/briefs/2024-01-wmi-script-execution/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wmi-script-execution/</guid><description>The rule identifies the use of Windows script interpreters (cscript.exe or wscript.exe) executing a process via Windows Management Instrumentation (WMI), which may indicate malicious activity, especially when initiated by non-system accounts.</description><content:encoded><![CDATA[<p>This detection identifies the use of Windows script interpreters (cscript.exe or wscript.exe) to execute processes via Windows Management Instrumentation (WMI). Adversaries exploit WMI to execute scripts or processes stealthily, often using script interpreters. The rule monitors for these interpreters executing processes via WMI, specifically when initiated by non-system accounts, indicating potential malicious intent. The detection focuses on identifying scenarios where <code>wmiutils.dll</code> is loaded by <code>wscript.exe</code> or <code>cscript.exe</code>, followed by <code>wmiprvse.exe</code> spawning a new process. This is often associated with malicious initial access or execution techniques.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access via phishing (T1566) or other means.</li>
<li>The attacker leverages a script, such as VBScript or JavaScript (T1059.005, T1059.007), to execute commands using WMI.</li>
<li>The script interpreter (<code>cscript.exe</code> or <code>wscript.exe</code>) loads <code>wmiutils.dll</code> to interact with WMI.</li>
<li>The WMI Provider Host process (<code>wmiprvse.exe</code>) is invoked as a parent process, triggered by the script execution.</li>
<li><code>wmiprvse.exe</code> executes a secondary process, such as <code>powershell.exe</code>, <code>cmd.exe</code>, or other executables, often from unusual locations like <code>C:\\Users\\</code> or <code>C:\\ProgramData\\</code>.</li>
<li>The executed process performs malicious actions, such as downloading additional payloads or establishing persistence.</li>
<li>The attacker attempts to maintain persistence by creating scheduled tasks or modifying registry keys.</li>
<li>The ultimate objective is often lateral movement, data exfiltration, or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary code, bypass security controls, and establish persistence on the compromised system. The use of WMI enables stealthy execution, making detection challenging. The impact can range from data theft and system compromise to full network takeover. In some cases, threat actors may deploy ransomware, leading to significant financial losses and operational disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 1 (Process Creation) and Event ID 7 (Image Loaded) logging to provide the necessary data for the provided Sigma rules.</li>
<li>Deploy the provided Sigma rule &ldquo;WMI Scripting Process Creation&rdquo; to detect suspicious process creation events originating from <code>wmiprvse.exe</code>.</li>
<li>Investigate any alerts generated by the provided Sigma rule &ldquo;WMI Scripting Process Creation&rdquo; with a focus on processes spawned by wmiprvse.exe from unusual locations or with suspicious command-line arguments.</li>
<li>Implement endpoint protection policies to block or alert on the execution of high-risk processes when initiated by non-system accounts as mentioned in the overview.</li>
<li>Regularly review and update endpoint protection policies to block or alert on the execution of high-risk processes like those listed in the detection query, especially when initiated by non-system accounts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>windows</category><category>wmi</category><category>script_execution</category><category>initial_access</category><category>execution</category></item><item><title>Windows Scheduled Tasks AT Command Enabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-at-command-enabled/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-at-command-enabled/</guid><description>Attackers may enable the deprecated Windows AT command via registry modification to achieve local persistence or lateral movement.</description><content:encoded><![CDATA[<p>The legacy Windows AT command allows scheduling tasks for execution. While deprecated since Windows 8 and Windows Server 2012, it remains present for backwards compatibility. Attackers may enable the AT command through registry modifications to achieve persistence or lateral movement within a network. This technique bypasses modern security controls and can be difficult to detect without specific monitoring. The detection rule monitors registry changes enabling this command, flagging potential misuse by checking specific registry paths and values indicative of enabling the AT command. The use of this command allows an attacker to execute commands with elevated privileges, potentially compromising the entire system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, possibly through phishing or exploiting a vulnerability.</li>
<li>The attacker attempts to enable the AT command by modifying the registry.</li>
<li>The registry key <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Configuration\EnableAt</code> is modified to a value of &ldquo;1&rdquo; or &ldquo;0x00000001&rdquo;.</li>
<li>The attacker uses the AT command to schedule a malicious task.</li>
<li>The scheduled task executes a command or script, such as downloading and executing malware.</li>
<li>The malware establishes persistence on the system.</li>
<li>The attacker uses the compromised system as a pivot point for lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Enabling the AT command can lead to unauthorized task scheduling, malware execution, persistence, and lateral movement within a network. Successful exploitation can compromise sensitive data, disrupt operations, and grant attackers persistent access to critical systems. The use of a deprecated command makes it harder to detect, increasing the impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor registry events for modifications to <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Configuration\EnableAt</code> as described in the rule overview.</li>
<li>Deploy the Sigma rule &ldquo;Scheduled Tasks AT Command Enabled&rdquo; to your SIEM and tune for your environment.</li>
<li>Enable Sysmon process creation and registry event logging to activate the rule.</li>
<li>Investigate any alerts triggered by the Sigma rule &ldquo;Scheduled Tasks AT Command Enabled&rdquo; for suspicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>lateral-movement</category><category>windows</category></item><item><title>Windows Root Certificate Modification Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-root-cert-modification/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-root-cert-modification/</guid><description>The modification of root certificates on Windows systems by unauthorized processes can allow attackers to masquerade malicious files as valid signed components and intercept/decrypt SSL traffic, leading to defense evasion and data collection.</description><content:encoded><![CDATA[<p>Attackers can install malicious root certificates to subvert trust controls and bypass security measures. Once a malicious root certificate is installed, attackers can sign malicious files, making them appear as legitimate software from trusted vendors like Microsoft. This allows the attacker to execute code undetected and maintain persistence on the system. Furthermore, a rogue root certificate can be used in adversary-in-the-middle attacks to decrypt SSL traffic, enabling the collection of sensitive data. This activity is typically achieved through registry modifications. Monitoring for these modifications can help security teams identify potential compromise attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, possibly through phishing or exploiting a software vulnerability.</li>
<li>The attacker elevates privileges to administrator or SYSTEM level, required to modify the trusted root certificate store.</li>
<li>The attacker uses tools like certutil.exe or PowerShell to import a malicious root certificate into the Windows registry.</li>
<li>The registry keys <code>HKLM\Software\Microsoft\SystemCertificates\Root\Certificates</code> or <code>HKLM\Software\Policies\Microsoft\SystemCertificates\Root\Certificates</code> are modified to add the new certificate.</li>
<li>The attacker uses the newly installed root certificate to sign malicious executables or scripts.</li>
<li>The signed malicious files are executed, bypassing signature-based detection mechanisms.</li>
<li>The attacker intercepts and decrypts SSL traffic, collecting sensitive data like credentials or financial information.</li>
<li>The attacker maintains persistence by using the trusted certificate to repeatedly sign and execute malicious code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful installation of a malicious root certificate allows attackers to bypass security controls, leading to the execution of arbitrary code and potential data theft. This can result in significant data breaches, financial losses, and reputational damage. Attackers can use this technique to maintain a long-term presence on compromised systems, making detection and remediation more challenging. While no specific victim counts are available, the technique is broadly applicable across many sectors and can affect any organization running Windows systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Root Certificate Modification&rdquo; to your SIEM to detect registry modifications related to root certificate installation.</li>
<li>Enable Sysmon registry event logging to provide the necessary data for the Sigma rule.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on processes modifying the registry keys related to root certificates.</li>
<li>Review the &ldquo;False Positives&rdquo; section in the rule documentation to tune the Sigma rule for your environment.</li>
<li>Monitor network traffic for suspicious SSL decryption activity following the detection of a root certificate modification.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>root certificate</category><category>mitm</category></item><item><title>Suspicious Script Object Execution via scrobj.dll</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-scrobj-load/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-scrobj-load/</guid><description>Detection of scrobj.dll loaded into unusual Microsoft processes indicates potential malicious scriptlet execution for defense evasion and execution by abusing legitimate system binaries.</description><content:encoded><![CDATA[<p>This detection identifies suspicious usage of <code>scrobj.dll</code>, a legitimate Windows library, when loaded into unusual Microsoft processes. Attackers may exploit <code>scrobj.dll</code> to execute malicious scriptlets within trusted processes, thereby evading detection. This technique allows adversaries to proxy execution through trusted system binaries. The rule focuses on detecting anomalous activity by excluding common executables, and flagging only non-standard processes loading <code>scrobj.dll</code>. The detection logic is based on identifying image load events where <code>scrobj.dll</code> is loaded into unexpected processes, indicating a potential misuse of the library. The rule is designed for data generated by Elastic Defend, Elastic Endgame, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means.</li>
<li>The attacker crafts or deploys a malicious scriptlet designed to execute malicious commands or payloads.</li>
<li>The attacker leverages a non-standard or less common Microsoft process to load <code>scrobj.dll</code>.</li>
<li><code>scrobj.dll</code> is loaded into the target process, enabling the execution of scriptlets.</li>
<li>The malicious scriptlet executes within the context of the trusted Microsoft process, bypassing application whitelisting or other security controls.</li>
<li>The scriptlet performs malicious actions, such as downloading additional payloads, modifying system configurations, or establishing command and control communication.</li>
<li>The attacker achieves their objectives, such as data exfiltration, lateral movement, or persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary code within the context of a trusted process, bypassing security controls and potentially leading to full system compromise. This could result in data theft, system corruption, or further propagation of the attack within the network. The impact is significant because it allows malware to operate under the guise of legitimate system processes.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Suspicious Scrobj.dll Image Load</code> to your SIEM to detect this activity (see rule below).</li>
<li>Enable Sysmon Event ID 7 (Image Loaded) to collect the necessary data for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule <code>Suspicious Scrobj.dll Image Load</code> to determine the legitimacy of the <code>scrobj.dll</code> loading activity.</li>
<li>Implement application whitelisting to prevent unauthorized execution of scripts and binaries, focusing on processes identified in the detection rule.</li>
<li>Continuously audit scheduled tasks and exclude known safe processes from the detection rule to minimize false positives, as described in the rule&rsquo;s Triage and Analysis section.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>windows</category></item><item><title>Suspicious Modifications to Windows Security Support Provider (SSP) Registry</title><link>https://feed.craftedsignal.io/briefs/2024-01-ssp-registry-modification/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ssp-registry-modification/</guid><description>Adversaries may modify the Windows Security Support Provider (SSP) configuration in the registry to establish persistence or evade defenses.</description><content:encoded><![CDATA[<p>Attackers can abuse the Windows Security Support Provider (SSP) mechanism to establish persistence on a compromised system. SSPs are DLLs loaded into the Local Security Authority Subsystem Service (LSASS) process, which handles authentication in Windows. By modifying specific registry keys related to SSP configuration, attackers can force LSASS to load malicious DLLs at startup, effectively creating a persistent backdoor. This technique is often used to maintain unauthorized access to a system even after a reboot. The registry keys of interest are <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\Security Packages</code> and <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\OSConfig\Security Packages</code>. Successful exploitation allows the attacker to intercept and manipulate authentication credentials.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through an exploit or compromised credentials (not detailed in source).</li>
<li>The attacker escalates privileges to gain administrative rights on the system.</li>
<li>The attacker modifies the registry key <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\Security Packages</code> to include a path to a malicious DLL.</li>
<li>Alternatively, the attacker modifies the registry key <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\OSConfig\Security Packages</code> to include a path to a malicious DLL.</li>
<li>The attacker triggers a system reboot, or restarts the LSASS process, causing the malicious SSP DLL to be loaded.</li>
<li>The malicious DLL intercepts authentication credentials and exfiltrates them or performs other malicious actions.</li>
<li>The attacker maintains persistent access to the system, even after reboots.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to achieve persistence and potentially compromise sensitive credentials handled by LSASS. This can lead to lateral movement within the network, data exfiltration, and further system compromise. The impact is significant as it bypasses standard security measures and provides a persistent foothold for malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Suspicious SSP Registry Modification&rdquo; to your SIEM to detect unauthorized modifications to SSP registry keys.</li>
<li>Enable Sysmon registry event logging to provide the necessary data for the Sigma rule to function.</li>
<li>Continuously monitor for unexpected processes writing to the <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\Security Packages</code> and <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\OSConfig\Security Packages</code> registry keys.</li>
<li>Review and whitelist legitimate software installers that frequently modify these registry entries to reduce false positives as mentioned in the brief.</li>
<li>Ensure access controls and permissions are strictly enforced to limit unauthorized modification of critical registry paths related to Security Support Providers.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>defense-evasion</category><category>registry-modification</category><category>ssp</category></item><item><title>Suspicious Microsoft Antimalware Service Executable Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-windefend-unusual-path/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-windefend-unusual-path/</guid><description>Detects suspicious execution of the Microsoft Antimalware Service Executable (MsMpEng.exe) from non-standard paths or renamed instances, which may indicate an attempt to evade defenses through DLL side-loading or masquerading.</description><content:encoded><![CDATA[<p>This detection identifies suspicious execution of the Microsoft Antimalware Service Executable (MsMpEng.exe) from non-standard paths or renamed instances. Attackers may attempt to evade defenses through DLL side-loading or by masquerading as the antimalware process. This technique is used to blend in with legitimate system activity and avoid detection by security tools. This rule is designed to detect instances where MsMpEng.exe is executed from unexpected locations or has been renamed, potentially indicating malicious activity. The rule leverages process monitoring data to identify deviations from the expected execution patterns of the antimalware service. This behavior has been seen associated with ransomware attacks, such as REvil.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker drops a malicious payload onto the system, placing it in a non-standard directory, such as a temporary folder or a user&rsquo;s profile directory.</li>
<li>The attacker renames or copies the legitimate MsMpEng.exe to the malicious payload&rsquo;s location.</li>
<li>The attacker executes the renamed or copied MsMpEng.exe from the non-standard location. This is intended to mimic legitimate activity and evade detection.</li>
<li>The malicious MsMpEng.exe then loads a malicious DLL through DLL side-loading, which executes arbitrary code within the context of the antimalware process.</li>
<li>The malicious code performs actions such as disabling security controls, escalating privileges, or establishing persistence.</li>
<li>The attacker leverages the compromised system to move laterally within the network, compromising additional systems.</li>
<li>The attacker achieves their final objective, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to complete system compromise, including the disabling of security controls, data theft, and ransomware deployment. This can result in significant financial losses, reputational damage, and disruption of business operations. Identifying and responding to this type of attack is critical to prevent further damage. The Sophos article references the REvil ransomware attack which impacted hundreds of businesses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging (Event ID 1) to capture process execution events, including image path and command-line arguments, which are essential for detecting this behavior.</li>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect suspicious MsMpEng.exe execution from unusual paths or renamed instances.</li>
<li>Investigate any alerts generated by these rules to determine the legitimacy of the MsMpEng.exe execution and identify any potential malicious activity.</li>
<li>Monitor process execution events for instances where the process name is &ldquo;MsMpEng.exe&rdquo; but the executable path is outside the standard Windows Defender or Microsoft Security Client directories.</li>
<li>Review the references provided for additional context and guidance on investigating this type of activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>windows</category></item><item><title>Suspicious DNS Queries to RMM Domains from Non-Browser Processes</title><link>https://feed.craftedsignal.io/briefs/2024-01-rmm-dns-non-browser/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rmm-dns-non-browser/</guid><description>Detection of DNS queries to remote monitoring and management (RMM) domains from non-browser processes indicating potential misuse of legitimate remote access tools for command and control.</description><content:encoded><![CDATA[<p>This detection identifies DNS queries to commonly abused remote monitoring and management (RMM) or remote access software domains originating from processes that are not web browsers. This activity can indicate the use of legitimate RMM tools for malicious purposes, such as command and control, persistence, or lateral movement within a network. The detection aims to surface RMM clients, scripts, or other non-browser activities contacting these services without legitimate user interaction. Defenders should investigate processes making these queries to confirm expected behavior and validate the security posture of their managed assets. The rule is based on a list of known RMM domains and excludes common browser processes to reduce false positives.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows host through unspecified means.</li>
<li>The attacker deploys or leverages an existing RMM tool on the compromised host.</li>
<li>The RMM tool, running as a non-browser process, initiates a DNS query to resolve a command and control server associated with the RMM service (e.g., teamviewer.com).</li>
<li>The DNS query is made by a process other than a known web browser (chrome.exe, firefox.exe, etc.).</li>
<li>The compromised host establishes a connection to the resolved IP address associated with the RMM domain.</li>
<li>The attacker uses the RMM tool to execute commands, transfer files, or perform other malicious activities on the compromised host.</li>
<li>The attacker may use the RMM tool for lateral movement, pivoting to other systems within the network.</li>
<li>The attacker achieves their objective, which could include data exfiltration, ransomware deployment, or maintaining persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromise via abused RMM software can lead to full system compromise, data theft, or deployment of ransomware. While the number of affected victims is unknown, the sectors most likely to be impacted include any organization that relies on RMM tools for IT management. Successful exploitation allows attackers to bypass traditional security controls by using legitimate software, making detection more challenging.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;DNS Queries to Known RMM Domains from Non-Browser Processes&rdquo; to your SIEM and tune the RMM domain list for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the process responsible for the DNS query and its parent process.</li>
<li>Implement application control policies to restrict the execution of unauthorized RMM tools.</li>
<li>Enable Sysmon DNS event logging to ensure the necessary data is available for the detection rule.</li>
<li>Correlate with other alerts to identify potential compromises.</li>
<li>Review process.code_signature for trusted RMM publishers and investigate any unsigned or unexpected signers.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>remote-access</category><category>windows</category></item><item><title>Scheduled Task Creation via Scripting</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-scheduled-task-scripting/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-scheduled-task-scripting/</guid><description>Detection of scheduled task creation by Windows scripting engines like cscript.exe, wscript.exe, or powershell.exe, used by adversaries to establish persistence on compromised systems.</description><content:encoded><![CDATA[<p>This rule detects the creation of scheduled tasks by Windows scripting engines, a tactic commonly employed by adversaries to establish persistence on compromised systems. The activity involves monitoring registry changes related to scheduled task actions and correlating them with script execution. Specifically, it looks for instances where cscript.exe, wscript.exe, powershell.exe, pwsh.exe or powershell_ise.exe are used to create or modify scheduled tasks. This behavior can be indicative of malicious activity, as legitimate software installations should not typically involve scripting engines directly creating scheduled tasks. Defenders should investigate any instances of this behavior to determine if it is malicious. The rule focuses on Windows environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through various means (e.g., phishing, exploit).</li>
<li>The attacker executes a script (e.g., PowerShell, VBScript) on the target system.</li>
<li>The script interacts with the <code>taskschd.dll</code> library to create or modify a scheduled task.</li>
<li>The script modifies the registry key <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\*\Actions</code> or <code>\REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\*\Actions</code> to define the actions performed by the scheduled task.</li>
<li>The scheduled task is configured to execute a malicious payload at a specific time or event.</li>
<li>The scheduled task executes, providing the attacker with persistent access to the system.</li>
<li>The attacker leverages the persistent access to perform further malicious activities, such as lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to persistence on the compromised system, allowing attackers to maintain access even after reboots or user logoffs. This can facilitate long-term data theft, deployment of ransomware, or further compromise of the network. The impact depends on the privileges of the account under which the scheduled task runs, potentially granting SYSTEM level access.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon ImageLoad events (Event ID 7) to detect when <code>taskschd.dll</code> is loaded by scripting engines (powershell.exe, cscript.exe, wscript.exe) as described in the <a href="https://ela.st/sysmon-event-7-setup">Sysmon Event ID 7 setup guide</a>.</li>
<li>Enable Sysmon Registry Events to monitor changes to the registry paths associated with scheduled task actions as described in the <a href="https://ela.st/sysmon-event-reg-setup">Sysmon Registry Events setup guide</a>.</li>
<li>Deploy the provided Sigma rules to your SIEM to detect scheduled task creation by scripting engines and tune for your environment.</li>
<li>Investigate any alerts generated by these rules, focusing on the specific scripts and scheduled tasks involved.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>scheduled-task</category><category>windows</category></item><item><title>RMM Domain DNS Queries from Non-Browser Processes</title><link>https://feed.craftedsignal.io/briefs/2024-01-rmm-domain-dns/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rmm-domain-dns/</guid><description>Detects DNS queries to commonly abused remote monitoring and management (RMM) or remote access software domains from non-browser processes, potentially indicating unauthorized remote access or command and control activity.</description><content:encoded><![CDATA[<p>This detection identifies potentially malicious use of Remote Monitoring and Management (RMM) tools by detecting DNS queries to known RMM domains originating from processes that are not web browsers. Attackers frequently abuse legitimate RMM software for command and control, persistence, and lateral movement within compromised networks. This rule focuses on surfacing RMM clients, scripts, or other non-browser activity contacting these services, thereby increasing the likelihood of detecting unauthorized remote access or malicious activity. The rule aims to reduce false positives by excluding common browser processes and focusing on unusual network activity. The identified domains are associated with various RMM tools like TeamViewer, AnyDesk, and ScreenConnect. This detection is relevant for organizations concerned about insider threats, supply chain attacks, or general compromise leading to unauthorized remote access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, possibly through phishing or exploiting a vulnerability.</li>
<li>The attacker installs an unauthorized RMM tool (e.g., using a script or installer).</li>
<li>The RMM tool initiates a DNS query to resolve its command and control domain (e.g., teamviewer.com).</li>
<li>The system, now running the RMM agent, establishes a connection to the attacker-controlled RMM server.</li>
<li>The attacker uses the RMM tool to execute commands on the compromised system.</li>
<li>The attacker uses the RMM tool for lateral movement within the network.</li>
<li>The attacker uses the RMM tool to maintain persistence on the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromise via unauthorized RMM tools can provide attackers with persistent remote access, enabling them to perform a range of malicious activities, including data theft, ransomware deployment, and further lateral movement within the network. Successful exploitation can lead to significant financial loss, reputational damage, and disruption of business operations. The number of affected systems can vary depending on the scope of the initial compromise and the attacker&rsquo;s ability to move laterally.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>RMM Domain DNS Queries from Non-Browser Processes</code> to your SIEM and tune it to your environment, excluding legitimate non-browser processes that use RMM tools.</li>
<li>Investigate any alerts generated by the rule, focusing on identifying the process making the DNS query and its parent process, as outlined in the rule&rsquo;s description.</li>
<li>Monitor DNS query logs for queries to the RMM domains listed in the IOC table, and block them at the DNS resolver if unauthorized RMM use is confirmed.</li>
<li>Enable Sysmon Event ID 22 (DNS Query) logging to provide the necessary data for this detection, as recommended in the &ldquo;Setup&rdquo; section of the content.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>rmm</category><category>dns</category></item><item><title>Persistence via WMI Event Subscription</title><link>https://feed.craftedsignal.io/briefs/2024-01-wmi-persistence/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wmi-persistence/</guid><description>Adversaries can leverage Windows Management Instrumentation (WMI) to establish persistence by creating event subscriptions that trigger malicious code execution when specific events occur, using tools like wmic.exe to create event consumers.</description><content:encoded><![CDATA[<p>Windows Management Instrumentation (WMI) provides a powerful framework for managing Windows systems, but adversaries can abuse its capabilities to establish persistence. By creating WMI event subscriptions, attackers can execute arbitrary code in response to defined system events. This technique involves creating event filters, providers, consumers, and bindings that automatically run malicious code. This can be achieved through tools like <code>wmic.exe</code>, which allows the creation of event consumers such as <code>ActiveScriptEventConsumer</code> or <code>CommandLineEventConsumer</code>. Successful exploitation of WMI for persistence allows attackers to maintain unauthorized access to a compromised system, even after reboots or other system changes. This activity has been observed across various environments, highlighting the need for robust detection mechanisms to identify and prevent WMI-based persistence.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through unspecified means.</li>
<li>The attacker uses <code>wmic.exe</code> to create a WMI event filter that defines a specific event to monitor.</li>
<li>A WMI event consumer, such as <code>ActiveScriptEventConsumer</code> or <code>CommandLineEventConsumer</code>, is created using <code>wmic.exe</code> specifying the malicious code or script to execute when the event occurs.</li>
<li>A WMI binding is established between the event filter and the event consumer using <code>wmic.exe</code>, linking the event to the action.</li>
<li>The malicious WMI event subscription is activated, monitoring for the defined event.</li>
<li>When the specified event occurs, the WMI service triggers the execution of the associated malicious code or script through the event consumer.</li>
<li>The attacker gains persistent access to the system, as the WMI event subscription will re-activate after reboots.</li>
<li>The attacker can then perform additional malicious activities, such as lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of WMI for persistence can allow an attacker to maintain long-term, unauthorized access to a compromised system. This can result in data theft, system compromise, and further malicious activities. While the exact number of victims is not specified in the source, the broad applicability of this technique means that many Windows systems are potentially at risk. If the attack succeeds, the attacker gains a foothold on the system that is difficult to detect and remove, which can lead to significant operational disruption and financial loss.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging and monitor for <code>wmic.exe</code> with command-line arguments related to creating event consumers, specifically <code>ActiveScriptEventConsumer</code> or <code>CommandLineEventConsumer</code>, to trigger the Sigma rule &ldquo;Detect Suspicious WMIC Process&rdquo;.</li>
<li>Deploy the provided Sigma rule to your SIEM to detect suspicious WMI event subscription creation.</li>
<li>Review the investigation steps outlined in the provided documentation to triage and analyze potential WMI persistence attempts.</li>
<li>Monitor Windows Security Event Logs and Sysmon for events related to WMI activity for broader coverage.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>execution</category><category>windows</category><category>wmi</category></item><item><title>NullSessionPipe Registry Modification for Lateral Movement</title><link>https://feed.craftedsignal.io/briefs/2024-01-nullsessionpipe-modification/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-nullsessionpipe-modification/</guid><description>Attackers modify the NullSessionPipe registry setting in Windows to enable anonymous access to named pipes, potentially facilitating lateral movement and unauthorized access to network resources.</description><content:encoded><![CDATA[<p>This detection rule identifies modifications to the <code>NullSessionPipe</code> registry setting in Windows. This setting defines named pipes that can be accessed without authentication, facilitating anonymous connections. Adversaries may exploit this by modifying the registry to enable lateral movement, allowing unauthorized access to network resources. By adding specific pipes to the <code>NullSessionPipes</code> registry key, an attacker can make services accessible without requiring authentication. This rule focuses on flagging modifications that introduce new accessible pipes, which could indicate malicious intent. The targeted configuration is located under <code>HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters</code>. The registry key <code>NullSessionPipes</code> is of particular interest when its values change.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of a system within the network.</li>
<li>The attacker gains elevated privileges on the compromised system.</li>
<li>The attacker modifies the Windows Registry, specifically the <code>HKLM\SYSTEM\CurrentControlSet\Services\LanmanServer\Parameters\NullSessionPipes</code> key. They add a new pipe name to this key, which will allow unauthenticated access to that named pipe.</li>
<li>The attacker uses <code>reg.exe</code> or PowerShell to modify the registry, potentially using commands like <code>reg add</code> or <code>Set-ItemProperty</code>.</li>
<li>A remote system attempts to connect to the newly accessible named pipe on the compromised system without authenticating.</li>
<li>The attacker exploits the now-accessible service or application associated with the named pipe to execute commands or transfer data.</li>
<li>The attacker leverages this access to move laterally within the network, compromising additional systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the <code>NullSessionPipes</code> registry setting can lead to unauthorized access to sensitive resources and lateral movement within the network. By enabling anonymous access to named pipes, attackers can potentially bypass authentication mechanisms and gain control over critical systems. While the direct number of victims is not specified, the impact can be significant, particularly in organizations where shared resources and services rely on secure authentication protocols.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Windows Registry auditing to capture changes to the <code>NullSessionPipes</code> registry key. This will allow you to detect unauthorized modifications as described in the overview.</li>
<li>Deploy the Sigma rule &ldquo;NullSessionPipe Registry Modification&rdquo; to your SIEM and tune for your environment to identify malicious activity related to named pipe modifications.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the specific named pipes being added or modified in the registry event details, as detailed in the rule&rsquo;s description.</li>
<li>Regularly review and validate the legitimacy of existing entries in the <code>NullSessionPipes</code> registry key to identify and remove any unauthorized pipes.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>defense-evasion</category><category>registry-modification</category></item><item><title>LOLBIN Network Connection for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-lolbin-network-connection/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-lolbin-network-connection/</guid><description>Adversaries can use Living-Off-The-Land Binaries (LOLBINs) such as expand.exe, extrac32.exe, ieexec.exe, and makecab.exe to establish network connections, potentially bypassing security controls and facilitating malicious activities on Windows systems.</description><content:encoded><![CDATA[<p>Attackers may leverage LOLBINs, signed binaries that are part of the operating system, to perform malicious actions while blending in with legitimate system activity. This technique allows them to evade detection by application allowlists and signature validation. This brief focuses on the abuse of expand.exe, extrac32.exe, ieexec.exe, and makecab.exe to initiate outbound network connections. The LOLBINs are used to execute malicious code, download additional payloads, or establish command and control channels. This activity can be indicative of malware installation, data exfiltration, or other malicious post-exploitation activities. Detection is crucial to identify potentially compromised systems and prevent further damage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system (e.g., through phishing or exploitation of a vulnerability).</li>
<li>The attacker executes a signed LOLBIN, such as <code>expand.exe</code>, <code>extrac32.exe</code>, <code>ieexec.exe</code>, or <code>makecab.exe</code>.</li>
<li>The LOLBIN is used to download or execute a malicious payload from a remote server.</li>
<li>The executed binary establishes a network connection to an external IP address.</li>
<li>Data exfiltration may occur over the established network connection.</li>
<li>The attacker maintains persistence on the system by scheduling tasks or modifying registry keys.</li>
<li>The attacker moves laterally within the network, compromising additional systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leveraging LOLBINs can result in the installation of malware, data theft, or full system compromise. The use of signed binaries makes it more difficult to detect malicious activity, potentially allowing attackers to operate undetected for extended periods. The financial and reputational damage caused by such attacks can be significant. While the risk score is low, the potential for defense evasion justifies monitoring.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the provided Sigma rule <code>Network Connection via Signed Binary</code> to detect suspicious network connections initiated by LOLBINs.</li>
<li>Monitor process execution logs for instances of <code>expand.exe</code>, <code>extrac32.exe</code>, <code>ieexec.exe</code>, and <code>makecab.exe</code> using process creation logging.</li>
<li>Review network connection logs for outbound connections initiated by these processes, excluding connections to internal networks based on the provided list of private IP ranges.</li>
<li>Investigate any detected instances of LOLBINs making external network connections, correlating with other suspicious activities on the affected host, as detailed in the &ldquo;Triage and analysis&rdquo; section.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lolbin</category><category>defense-evasion</category><category>windows</category></item><item><title>Execution via Local SxS Shared Module</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-local-sxs-dll-execution/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-local-sxs-dll-execution/</guid><description>This rule detects the creation, modification, or deletion of DLL files within Windows SxS local folders, which could indicate an attempt to execute malicious payloads by abusing shared module loading.</description><content:encoded><![CDATA[<p>This detection identifies potential abuse of the Windows Side-by-Side (SxS) feature to execute malicious code. Attackers can place a malicious DLL file within an application&rsquo;s local SxS folder (application.exe.local) and trick the Windows module loader into prioritizing it over legitimate system DLLs. This technique, known as DLL hijacking or DLL redirection, allows adversaries to gain arbitrary code execution within the context of the targeted application. This technique may be used to bypass security controls, escalate privileges, or establish persistence. The detection focuses on file events related to DLLs within these specific SxS folders.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker identifies a legitimate application with an associated SxS folder (application.exe.local).</li>
<li>The attacker creates or modifies a malicious DLL file.</li>
<li>The attacker places the malicious DLL file in the application&rsquo;s SxS folder (application.exe.local).</li>
<li>A legitimate application attempts to load a DLL.</li>
<li>Due to the presence of the malicious DLL in the SxS folder, the Windows module loader prioritizes the attacker&rsquo;s DLL.</li>
<li>The malicious DLL is loaded and executed by the application.</li>
<li>The attacker achieves code execution within the context of the application.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution within the targeted application&rsquo;s context. This can result in privilege escalation, data theft, system compromise, or the establishment of persistence mechanisms. While the number of directly affected organizations is unknown, this technique can be used against a wide range of applications on Windows systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor file creation events for DLL files in <code>C:\*\*.exe.local\*.dll</code> and <code>\\Device\\HarddiskVolume*\\*\\*.exe.local\\*.dll</code> using the provided Sigma rule to detect potential malicious DLL planting.</li>
<li>Enable Sysmon Event ID 11 (File Create) to improve visibility into file creation events, as noted in the <a href="https://ela.st/sysmon-event-11-setup">setup instructions</a>.</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the DLL creation event and the involved application.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>execution</category><category>defense-evasion</category><category>dll-hijacking</category></item><item><title>Detection of Encrypted Archive Creation with WinRAR or 7-Zip</title><link>https://feed.craftedsignal.io/briefs/2024-01-winrar-7zip-encryption/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-winrar-7zip-encryption/</guid><description>Adversaries use WinRAR or 7-Zip with encryption options to compress and protect stolen data before exfiltration, making detection more challenging.</description><content:encoded><![CDATA[<p>Attackers frequently compress and encrypt data before exfiltration to reduce the amount of data being sent over the network and to obfuscate the contents. This behavior often indicates a later stage of intrusion where the attacker has already collected sensitive data and is preparing to move it out of the environment. The use of archiving tools like WinRAR and 7-Zip with encryption flags can help attackers to hide their activities, making it more difficult for defenders to identify and respond to data theft. This technique has been observed in multiple threat actors including Turla as documented by WeLiveSecurity. This brief focuses on detecting command-line activity indicative of archive creation with encryption using WinRAR or 7-Zip on Windows systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to the system through methods such as phishing, exploiting vulnerabilities, or using stolen credentials.</li>
<li><strong>Credential Access:</strong> The attacker attempts to obtain credentials using techniques such as Mimikatz or credential dumping.</li>
<li><strong>Discovery:</strong> The attacker performs reconnaissance to identify sensitive data and systems of interest.</li>
<li><strong>Data Collection:</strong> The attacker gathers sensitive data from various locations on the compromised system or network.</li>
<li><strong>Archive Creation:</strong> The attacker uses WinRAR or 7-Zip to create an encrypted archive of the collected data using command-line arguments like <code>-hp</code>, <code>-p</code>, <code>/hp</code>, or <code>/p</code> with <code>rar.exe</code> or <code>WinRAR.exe</code> or <code>-p*</code> with <code>7z.exe</code> or <code>7za.exe</code>.</li>
<li><strong>Data Staging:</strong> The encrypted archive is moved to a staging location, such as a temporary directory or removable media.</li>
<li><strong>Exfiltration:</strong> The attacker exfiltrates the encrypted archive from the network using various methods, such as FTP, SCP, or cloud storage services.</li>
<li><strong>Covering Tracks:</strong> The attacker deletes the archive from the staging location to remove evidence of the activity.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the exfiltration of sensitive data, including personally identifiable information (PII), financial records, intellectual property, and other confidential information. This can result in significant financial losses, reputational damage, legal liabilities, and regulatory fines for the victim organization. The number of victims and specific sectors targeted will vary depending on the attacker&rsquo;s objectives and the nature of the compromised data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Encrypting Files with WinRar or 7z - CommandLine&rdquo; to your SIEM to detect the execution of WinRAR or 7-Zip with encryption parameters (rule:Detect Encrypting Files with WinRar or 7z - CommandLine).</li>
<li>Enable process creation logging with command line arguments in Sysmon to ensure the necessary data is available for detection (Data Source: Sysmon).</li>
<li>Investigate any alerts generated by the Sigma rules to determine the scope and impact of the potential data exfiltration attempt (rule:Detect Encrypting Files with WinRar or 7z - CommandLine).</li>
<li>Monitor network traffic for unusual outbound connections, particularly to cloud storage services or other external destinations, that may indicate data exfiltration.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>collection</category><category>archive</category><category>exfiltration</category><category>windows</category></item><item><title>Command Obfuscation via Unicode Modifier Letters</title><link>https://feed.craftedsignal.io/briefs/2024-01-unicode-cmd-obfuscation/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unicode-cmd-obfuscation/</guid><description>Adversaries use Unicode modifier letters to obfuscate command-line arguments, evading string-based detections on common Windows utilities like PowerShell and cmd.exe.</description><content:encoded><![CDATA[<p>Attackers are increasingly employing Unicode modifier letters to obfuscate command-line arguments, thereby bypassing traditional string-based detection mechanisms. This technique involves replacing standard ASCII characters with visually similar Unicode characters, making it difficult for simple pattern-matching rules to identify malicious commands. The obfuscation targets common Windows utilities such as <code>reg.exe</code>, <code>net.exe</code>, <code>certutil.exe</code>, <code>PowerShell.exe</code>, <code>cmd.exe</code>, and others frequently abused in post-exploitation scenarios. Defenders need to implement more sophisticated detection methods that account for Unicode normalization or character range analysis to identify and mitigate this threat. This technique has become more prevalent in the last year as attackers seek to evade common detection strategies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a Windows system, potentially through phishing or exploiting a vulnerability.</li>
<li>Execution: The attacker executes a command-line utility like <code>cmd.exe</code> or <code>powershell.exe</code> to perform malicious actions.</li>
<li>Obfuscation: The command-line arguments are obfuscated by replacing ASCII characters with Unicode modifier letters.</li>
<li>Defense Evasion: The obfuscation allows the attacker to evade simple string-based detections that would normally flag the command as malicious.</li>
<li>Privilege Escalation: The attacker may use the obfuscated command to escalate privileges or gain access to sensitive resources.</li>
<li>Persistence: The attacker may establish persistence by creating a scheduled task or modifying the registry using obfuscated commands.</li>
<li>Lateral Movement: The attacker may use the obfuscated command to move laterally to other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful command obfuscation can lead to a significant compromise of Windows systems. Attackers can bypass security controls and execute malicious code undetected, potentially leading to data theft, system disruption, or ransomware deployment. The obfuscation makes it harder for security teams to identify and respond to attacks, increasing the dwell time and potential damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule provided below to detect the presence of Unicode modifier letters in command lines (references: Sigma rules).</li>
<li>Enable Sysmon process creation logging to capture command-line arguments for analysis (references: Sysmon setup instructions).</li>
<li>Investigate any alerts triggered by the Sigma rule and analyze the raw command lines to identify the true intent of the command (references: Triage and Analysis section of the source).</li>
<li>Consider implementing Unicode normalization techniques to remove the obfuscation before analyzing command lines.</li>
<li>Monitor the listed processes (<code>reg.exe</code>, <code>net.exe</code>, <code>certutil.exe</code>, etc.) more closely for suspicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>command-line</category><category>unicode</category><category>obfuscation</category></item><item><title>Suspicious Process Execution via Renamed PsExec Executable</title><link>https://feed.craftedsignal.io/briefs/2024-01-renamed-psexec/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-renamed-psexec/</guid><description>Detects suspicious PsExec activity where the PsExec service component is executed using a custom name, indicating an attempt to evade detections that look for the default PsExec service component name.</description><content:encoded><![CDATA[<p>PsExec is a legitimate remote administration tool developed by Microsoft as part of the Sysinternals Suite, enabling the execution of commands with both regular and SYSTEM privileges on Windows systems. It functions by executing a service component, <code>Psexecsvc.exe</code>, on a remote system, which then runs a specified process and returns the results to the local system. While commonly used by administrators, adversaries frequently abuse PsExec for lateral movement and to execute commands as SYSTEM, effectively disabling defenses and bypassing security protections. This detection identifies instances where the PsExec service component is executed using a custom name, a tactic employed to evade security controls or detections targeting the default PsExec service component name. The rule was last updated on 2026-05-04 and covers Elastic Defend, Windows, M365 Defender, and Crowdstrike data sources.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the network (e.g., via phishing or exploiting a public-facing application).</li>
<li>The attacker uploads a renamed version of <code>psexesvc.exe</code> to a compromised host.</li>
<li>The attacker uses a tool like the standard <code>PsExec.exe</code> to initiate a remote connection to a target system.</li>
<li>PsExec attempts to copy the renamed <code>psexesvc.exe</code> to the ADMIN$ share on the target system.</li>
<li>The renamed <code>psexesvc.exe</code> is executed as a service on the remote host.</li>
<li>The renamed service executes commands specified by the attacker with SYSTEM privileges.</li>
<li>The results of the commands are returned to the originating system.</li>
<li>The attacker leverages the command execution for lateral movement, data exfiltration, or further compromise of the environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to complete compromise of the target system and potentially the entire network. By executing commands with SYSTEM privileges, attackers can disable security controls, install malware, steal sensitive data, or move laterally to other critical systems. The use of a renamed PsExec executable demonstrates an attempt to evade detection, increasing the likelihood of a successful breach.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Suspicious Process Execution via Renamed PsExec Executable&rdquo; to your SIEM and tune for your environment to detect the execution of renamed <code>psexesvc.exe</code> executables.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture the necessary process execution details for the Sigma rule.</li>
<li>Investigate any alerts generated by this rule promptly, focusing on the commands executed and the target systems involved.</li>
<li>Review and enforce the principle of least privilege to minimize the potential impact of compromised accounts.</li>
<li>Monitor network traffic for SMB connections originating from unusual or untrusted systems, which could indicate PsExec usage.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>psexec</category><category>lateral-movement</category><category>execution</category><category>defense-evasion</category><category>windows</category></item><item><title>IIS HTTP Logging Disabled via AppCmd</title><link>https://feed.craftedsignal.io/briefs/2024-01-iis-http-logging-disabled/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-iis-http-logging-disabled/</guid><description>An attacker with IIS server access can disable HTTP Logging using `appcmd.exe` to evade defenses and prevent forensic analysis, as detected by the execution of `appcmd.exe` with arguments to disable logging.</description><content:encoded><![CDATA[<p>Attackers with access to an Internet Information Services (IIS) server, potentially through a webshell or other compromised entry point, may disable HTTP logging as a defense evasion technique. This is typically achieved by using the <code>appcmd.exe</code> utility with specific arguments to modify the IIS configuration, preventing the server from recording HTTP requests and responses. Disabling logging makes it significantly harder for defenders to detect malicious activity, trace attacker actions, and perform effective incident response. This activity is a common tactic employed by threat actors to obscure their presence and maintain persistence within a compromised environment, particularly when deploying webshells or conducting lateral movement. This behavior is typically observed post-exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the IIS server, possibly via a webshell or exploiting a vulnerability.</li>
<li>Attacker executes <code>appcmd.exe</code> to modify the IIS configuration.</li>
<li>The <code>appcmd.exe</code> command includes arguments to disable HTTP logging, such as <code>/dontLog*:*True</code>.</li>
<li>The command targets specific sites, applications, or the entire server depending on the attacker&rsquo;s objectives.</li>
<li>IIS configuration files, such as <code>applicationHost.config</code> or <code>web.config</code>, are modified to reflect the changes.</li>
<li>HTTP logging is disabled, preventing the server from recording HTTP requests and responses.</li>
<li>Attacker performs malicious activities, such as deploying webshells, without generating HTTP logs.</li>
<li>Attacker maintains persistence and evades detection by preventing forensic analysis.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of IIS HTTP logging can severely impair incident response capabilities. Organizations may be unable to detect malicious activity within their web infrastructure, leading to prolonged compromises and increased damage. This technique can be particularly damaging when attackers deploy webshells or conduct lateral movement within the network. Without HTTP logs, tracing attacker actions and identifying compromised systems becomes significantly more challenging. The impact can range from data breaches to system downtime and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;IIS HTTP Logging Disabled via AppCmd&rdquo; to your SIEM to detect when <code>appcmd.exe</code> is used to disable HTTP logging.</li>
<li>Enable Sysmon process creation logging with Event ID 1 to capture the execution of <code>appcmd.exe</code> with the relevant arguments, enabling detection via the Sigma rules.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the parent process of <code>appcmd.exe</code> and the user account under which it was executed.</li>
<li>Monitor for modifications to IIS configuration files (<code>applicationHost.config</code>, <code>web.config</code>) to detect unauthorized changes to logging settings.</li>
<li>Regularly review and validate the configuration of IIS HTTP logging to ensure it remains enabled and properly configured.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>iis</category><category>httplogging</category><category>appcmd</category><category>windows</category></item><item><title>Adding Hidden File Attribute via Attrib.exe</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-attrib-hidden-file/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-attrib-hidden-file/</guid><description>Adversaries can use attrib.exe to add the 'hidden' attribute to files to hide them from users and evade detection, which can be detected by monitoring process executions related to attrib.exe.</description><content:encoded><![CDATA[<p>Attackers can add the &lsquo;hidden&rsquo; attribute to files to hide them from the user in an attempt to evade detection. This technique involves using the <code>attrib.exe</code> utility to modify file attributes. By setting the hidden attribute, adversaries can conceal tooling and malware to prevent administrators and users from finding it, even if they are looking specifically for it. This tactic is often employed post-compromise to maintain a stealthy presence within the target environment. Detection focuses on monitoring process executions that involve <code>attrib.exe</code> with command-line arguments indicating the modification of the hidden attribute. The rule is designed for data generated by Elastic Defend, CrowdStrike, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, and Windows Security Event Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a Windows system through various means such as exploiting a vulnerability or using stolen credentials.</li>
<li>Privilege Escalation: The attacker escalates privileges to gain the necessary permissions to execute system utilities.</li>
<li>Defense Evasion: The attacker uses <code>attrib.exe</code> to modify the hidden attribute of a malicious file or directory. For example, <code>attrib.exe +h C:\path\to\malicious\file.exe</code>.</li>
<li>Concealment: The malicious file or directory is now hidden from normal directory listings, making it harder for users and administrators to detect.</li>
<li>Persistence: The attacker establishes persistence by hiding malicious scripts or executables in startup directories or scheduled tasks.</li>
<li>Lateral Movement: The attacker uses the hidden files to move laterally within the network, potentially using them as part of a larger attack campaign.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of this attack includes prolonged attacker presence, increased difficulty in detecting malicious activity, and potential data exfiltration or system compromise. While the risk score is relatively low, the technique contributes to a broader attack chain and can significantly hinder incident response efforts. A successful hiding of artifacts might lead to further compromise, data breaches, or ransomware deployment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Adding Hidden File Attribute via Attrib&rdquo; to your SIEM to detect suspicious usage of <code>attrib.exe</code>.</li>
<li>Enable process creation logging with command line monitoring in Windows environments to ensure the Sigma rule can capture relevant events.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the parent processes and target files to determine if the activity is legitimate.</li>
<li>Correlate detections of <code>attrib.exe</code> with other suspicious activities or alerts on the same host.</li>
<li>Implement file integrity monitoring to detect unauthorized changes to file attributes, including the hidden attribute.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>windows</category><category>attrib.exe</category></item></channel></rss>