<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Windows — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/windows/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 14:17:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/windows/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Pass-the-Hash (PtH) Attempt Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-potential-pth/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-potential-pth/</guid><description>This rule detects potential Pass-the-Hash (PtH) attempts in Windows environments by monitoring successful authentications with specific user IDs (S-1-5-21-* or S-1-12-1-*) and the `seclogo` logon process, where attackers use stolen password hashes to authenticate and move laterally across systems without needing plaintext passwords.</description><content:encoded><![CDATA[<p>Pass-the-Hash (PtH) is a technique where attackers leverage stolen password hashes to authenticate and move laterally within a Windows environment, bypassing standard system access controls. Instead of needing the plaintext password, adversaries use a hash of the password to authenticate to a remote service or server. This detection rule focuses on identifying potential PtH attempts by monitoring for successful logins using specific user IDs (S-1-5-21-* or S-1-12-1-*) and the <code>seclogo</code> logon process, which is commonly associated with credential theft and misuse. The rule aims to detect anomalous authentication patterns indicating that an attacker is using PtH to gain unauthorized access to systems. This is important because successful PtH attacks can lead to widespread compromise of sensitive data and critical infrastructure.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system through phishing or exploiting a vulnerability.</li>
<li>The attacker dumps password hashes from the compromised system using tools like Mimikatz.</li>
<li>The attacker identifies a target system within the network.</li>
<li>The attacker uses the stolen password hash to authenticate to the target system using the <code>seclogo</code> logon process.</li>
<li>Windows validates the hash, granting the attacker access without requiring the plaintext password.</li>
<li>The attacker successfully authenticates with the stolen credentials and a user ID matching the pattern S-1-5-21-* or S-1-12-1-*.</li>
<li>The attacker leverages their unauthorized access to move laterally to other systems or access sensitive data.</li>
<li>The attacker achieves their final objective, such as data exfiltration or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful Pass-the-Hash attacks can lead to significant damage, including unauthorized access to sensitive data, lateral movement within the network, and potential data exfiltration or ransomware deployment. Organizations can experience financial losses, reputational damage, and operational disruptions. While the specific number of victims is not stated, PtH is a common technique used in many breaches, potentially affecting any organization that relies on Windows authentication.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Logon to generate the necessary Windows Security Event Logs as referenced in the setup instructions <a href="https://ela.st/audit-logon">https://ela.st/audit-logon</a>.</li>
<li>Deploy the Sigma rule to your SIEM to detect potential Pass-the-Hash attempts. Tune the rule to account for legitimate uses of the <code>seclogo</code> logon process.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on correlating the successful authentication events with other security logs to identify any lateral movement or access to sensitive systems.</li>
<li>Review and update access controls and permissions for the affected accounts to ensure they adhere to the principle of least privilege after an incident, as detailed in the Response and Remediation section.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>threat-detection</category><category>windows</category></item><item><title>PhantomRPC: Windows RPC Privilege Escalation Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-phantom-rpc-privesc/</link><pubDate>Fri, 24 Apr 2026 08:00:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-phantom-rpc-privesc/</guid><description>A vulnerability in Windows RPC architecture allows an attacker to create a fake RPC server and escalate their privileges to SYSTEM level, leveraging processes with impersonation privileges.</description><content:encoded><![CDATA[<p>Kaspersky researchers discovered a critical vulnerability in the Windows Remote Procedure Call (RPC) architecture, dubbed PhantomRPC, that enables local privilege escalation. The flaw allows an attacker to create a rogue RPC server and, by exploiting existing processes with impersonation privileges (such as those running as Local Service or Network Service), elevate their own permissions to SYSTEM. The vulnerability resides in the architectural design of RPC itself, making it potentially exploitable across all Windows versions. The researcher has demonstrated five different exploitation paths escalating privileges from various local or network service contexts. This issue has been disclosed to Microsoft, but a patch has not yet been released. Due to the fundamental nature of the vulnerability, the number of potential attack vectors is effectively unlimited.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system with low privileges.</li>
<li>The attacker identifies a service running with <code>SeImpersonatePrivilege</code>, such as Local Service or Network Service.</li>
<li>The attacker crafts a malicious RPC server application designed to exploit the PhantomRPC vulnerability.</li>
<li>The attacker triggers a connection from the target service (e.g., Group Policy Client service) to the attacker&rsquo;s malicious RPC server via ALPC.</li>
<li>The malicious RPC server uses <code>RpcImpersonateClient</code> API to impersonate the SYSTEM account.</li>
<li>The attacker&rsquo;s malicious RPC server executes code within the security context of the SYSTEM account.</li>
<li>The attacker leverages the elevated privileges to perform arbitrary actions, such as installing malware, creating new accounts, or accessing sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of PhantomRPC allows a low-privileged attacker to gain complete control over the affected system by escalating privileges to SYSTEM. This can lead to complete system compromise, including data theft, malware installation, and denial of service. The vulnerability affects all Windows versions and given the number of potential attack vectors, it poses a significant risk to a large number of systems. While the exact number of potential victims remains unknown, the widespread use of RPC in Windows makes this a highly critical issue.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for the creation of suspicious ALPC ports, especially those targeting services with <code>SeImpersonatePrivilege</code>. Use the Sigma rule <code>Detect Suspicious ALPC Port Creation</code> to identify potential exploitation attempts.</li>
<li>Monitor for processes calling the <code>RpcImpersonateClient</code> API, especially those originating from unusual or untrusted processes. Use the Sigma rule <code>Detect RpcImpersonateClient API Call from Unusual Process</code> to identify potential exploitation attempts.</li>
<li>Restrict access to services with <code>SeImpersonatePrivilege</code> where possible, limiting the potential attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>privilege-escalation</category><category>rpc</category><category>windows</category></item><item><title>Trigona Ransomware Employing Custom Data Exfiltration Tool</title><link>https://feed.craftedsignal.io/briefs/2026-05-trigona-custom-exfil/</link><pubDate>Thu, 23 Apr 2026 19:02:17 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-trigona-custom-exfil/</guid><description>Trigona ransomware is using a custom data exfiltration tool named 'uploader_client.exe' to steal data from compromised environments, enhancing speed and evasion.</description><content:encoded><![CDATA[<p>Trigona ransomware, initially launched in October 2022, has been observed using a custom command-line tool named &ldquo;uploader_client.exe&rdquo; to exfiltrate data from compromised environments. This shift, observed in March 2026, suggests an effort to avoid detection by security solutions that commonly flag publicly available tools like Rclone and MegaSync. Symantec researchers believe this indicates a strategic investment in proprietary malware to maintain a lower profile during critical phases of attacks. The custom tool supports five simultaneous connections per file for faster data exfiltration via parallel uploads, rotates TCP connections after 2GB of traffic to evade monitoring, offers options for selective file type exfiltration, and utilizes an authentication key to restrict access to stolen data. Despite disruptions in October 2023, Trigona has resumed operations, incorporating additional techniques like installing the Huorong Network Security Suite tool HRSword and disabling security products.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of the target system through unspecified means.</li>
<li>Installation of the Huorong Network Security Suite tool HRSword as a kernel driver service.</li>
<li>Deployment of tools such as PCHunter, Gmer, YDark, WKTools, DumpGuard, and StpProcessMonitorByovd to disable security-related products by leveraging vulnerable kernel drivers to terminate endpoint protection processes.</li>
<li>Execution of utilities with PowerRun to launch apps, executables, and scripts with elevated privileges, bypassing user-mode protections.</li>
<li>Deployment of AnyDesk for direct remote access to the breached systems.</li>
<li>Execution of Mimikatz and Nirsoft utilities for credential theft and password recovery operations.</li>
<li>Use of the custom &ldquo;uploader_client.exe&rdquo; to exfiltrate valuable documents such as invoices and PDFs from network drives via parallel uploads, rotating TCP connections to evade monitoring, and using an authentication key to restrict data access.</li>
<li>Final stage involving the deployment of Trigona ransomware, demanding ransom payment in Monero cryptocurrency.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful Trigona ransomware attacks result in significant data theft and encryption, disrupting business operations and causing financial losses. The group has demonstrated the capability to resume operations even after suffering disruptions, indicating a persistent threat. Observed data exfiltration has included high-value documents such as invoices and PDFs, demonstrating a targeted approach to data theft. Victims face potential regulatory penalties, reputational damage, and recovery costs associated with restoring systems and data. The number of victims and specific financial impact varies per campaign, but the potential for severe disruption and financial strain is consistent.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for the execution of &ldquo;uploader_client.exe&rdquo; with command-line arguments indicative of data exfiltration (see Sigma rule below).</li>
<li>Implement network monitoring to detect connections to unusual or hardcoded server addresses used by the &ldquo;uploader_client.exe&rdquo; exfiltration tool (see IOC table).</li>
<li>Deploy endpoint detection rules to identify the installation of Huorong Network Security Suite (HRSword) as a kernel driver service and tools like PCHunter, Gmer, YDark, WKTools, DumpGuard, and StpProcessMonitorByovd.</li>
<li>Monitor for processes launched via PowerRun, especially if followed by credential dumping or remote access tool execution.</li>
<li>Review AnyDesk usage for unusual connections or after-hours access, as this tool is used for remote access.</li>
<li>Enable robust logging for credential access attempts and password recovery activity associated with Mimikatz and Nirsoft tools.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>trigona</category><category>ransomware</category><category>data exfiltration</category><category>custom tool</category></item><item><title>Powercat PowerShell Implementation Detection</title><link>https://feed.craftedsignal.io/briefs/2024-11-powercat-detection/</link><pubDate>Mon, 04 Nov 2024 14:27:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-powercat-detection/</guid><description>Adversaries may leverage Powercat, a PowerShell implementation of Netcat, to establish command and control channels or perform lateral movement within a compromised network.</description><content:encoded>&lt;p>Powercat is a PowerShell script that functions similarly to the traditional Netcat utility, allowing for network communication using TCP and UDP. Attackers can use Powercat to establish reverse shells, transfer files, and perform port scanning within a compromised environment. This activity is often employed during post-exploitation phases to maintain access and propagate further into the network. Defenders should be aware of PowerShell scripts invoking Powercat, especially in environments…&lt;/p>
</content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>execution</category><category>lateral-movement</category><category>powershell</category></item><item><title>Persistence via Windows Installer (Msiexec)</title><link>https://feed.craftedsignal.io/briefs/2024-09-msiexec-persistence/</link><pubDate>Thu, 05 Sep 2024 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-09-msiexec-persistence/</guid><description>Adversaries may establish persistence by abusing the Windows Installer (msiexec.exe) to create scheduled tasks or modify registry run keys, allowing for malicious code execution upon system startup or user logon.</description><content:encoded><![CDATA[<p>The Windows Installer (msiexec.exe) is a legitimate system tool used for installing, updating, and removing software on Windows systems. Adversaries can abuse msiexec.exe to establish persistence mechanisms by creating malicious scheduled tasks or modifying registry run keys. This allows them to execute arbitrary code during system startup or user logon. This technique is attractive to attackers due to msiexec.exe being a trusted Windows binary, potentially evading detection by security solutions that focus on flagging unknown or suspicious processes. The use of msiexec.exe for persistence can be difficult to detect without specific monitoring rules, as it is a common and legitimate system process. This activity can be observed across various Windows versions and is frequently integrated into automated attack frameworks and scripts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised system, potentially through phishing, exploitation of a vulnerability, or stolen credentials.</li>
<li>The attacker leverages msiexec.exe to create a new scheduled task using the <code>schtasks.exe</code> command, setting it to execute a malicious script or binary.</li>
<li>Alternatively, the attacker uses msiexec.exe in conjunction with <code>reg.exe</code> or PowerShell to modify registry keys under <code>HKLM\Software\Microsoft\Windows\CurrentVersion\Run</code> or <code>HKCU\Software\Microsoft\Windows\CurrentVersion\Run</code>, adding a pointer to their malicious executable.</li>
<li>The created scheduled task or registry entry points to a malicious payload, such as a reverse shell or a downloader.</li>
<li>The system is restarted, or the user logs on, triggering the execution of the newly created scheduled task or the malicious binary through the modified registry run key.</li>
<li>The malicious payload executes, establishing a persistent foothold for the attacker on the compromised system.</li>
<li>The attacker can now perform further actions, such as data exfiltration, lateral movement, or deployment of ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows the adversary to maintain persistent access to the compromised system. This can lead to data theft, system compromise, deployment of ransomware, or use of the system as a staging point for further attacks within the network. A single compromised system can be used to pivot and compromise additional systems, leading to a widespread security breach. The impact can include financial losses, reputational damage, and disruption of business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for msiexec.exe spawning <code>schtasks.exe</code> or <code>reg.exe</code> to create scheduled tasks or modify registry run keys (reference: rules in this brief).</li>
<li>Implement and tune the Sigma rules provided in this brief to detect suspicious msiexec.exe activity related to persistence mechanisms.</li>
<li>Review and audit existing scheduled tasks and registry run keys for any suspicious entries or anomalies.</li>
<li>Enable file integrity monitoring (FIM) on critical system directories, including the Windows Task Scheduler directory and registry run key locations (reference: event.category == &ldquo;file&rdquo; and file.path &hellip; and event.category == &ldquo;registry&rdquo; and registry.path &hellip; in the rule query).</li>
<li>Implement application control policies to restrict the execution of unauthorized or unknown executables (reference: rule query).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>defense-evasion</category><category>windows</category></item><item><title>Detecting Potential PowerShell Pass-the-Hash/Relay Scripts</title><link>https://feed.craftedsignal.io/briefs/2024-07-powershell-pth-relay/</link><pubDate>Wed, 03 Jul 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-powershell-pth-relay/</guid><description>This rule detects PowerShell scripts associated with NTLM relay or pass-the-hash tooling and SMB/NTLM negotiation artifacts, indicating potential credential access and lateral movement attempts by attackers.</description><content:encoded><![CDATA[<p>This detection identifies PowerShell scripts containing artifacts indicative of NTLM relay or pass-the-hash (PtH) attacks. These techniques allow attackers to authenticate to systems without needing plaintext passwords, enabling lateral movement and privilege escalation. The rule focuses on identifying specific byte sequences and strings within PowerShell script blocks that suggest NTLM/SMB negotiation and credential access attempts. This detection helps defenders identify and respond to potential credential theft and abuse within their Windows environments. The rule is based on observed techniques used in various publicly available tools such as Invoke-TheHash, Check-LocalAdminHash, and PoshC2.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means such as phishing or exploiting a vulnerability.</li>
<li>The attacker executes a PowerShell script on the compromised system. This script could be directly executed or obfuscated to evade initial detection.</li>
<li>The PowerShell script attempts to perform NTLM relay or pass-the-hash attacks by utilizing specific byte sequences related to NTLM/SMB negotiation, such as <code>NTLMSSPNegotiate</code> or <code>0x4e,0x54,0x4c,0x4d,0x53,0x53,0x50</code>.</li>
<li>The script may utilize tools like Invoke-WMIExec or Invoke-SMBExec to execute commands on remote systems using the stolen credentials.</li>
<li>The attacker attempts to authenticate to other systems on the network using the relayed credentials or password hashes.</li>
<li>Successful authentication allows the attacker to move laterally, accessing sensitive data or escalating privileges on other systems.</li>
<li>The attacker may deploy additional payloads or establish persistence mechanisms for continued access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful pass-the-hash or NTLM relay attack can grant an attacker unauthorized access to sensitive systems and data within the network. This can lead to data breaches, financial loss, or disruption of critical services. The impact could range from compromising a few systems to gaining domain administrator privileges, depending on the attacker&rsquo;s goals and the network&rsquo;s security posture. Organizations can experience significant financial and reputational damage due to data breaches and service disruptions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging to capture the necessary data for this detection. Refer to the setup instructions in the rule documentation for configuration details.</li>
<li>Deploy the Sigma rule <code>Detecting Potential PowerShell Pass-the-Hash/Relay Scripts</code> to your SIEM and tune it based on your environment.</li>
<li>Investigate any alerts generated by this rule to determine the scope and impact of the potential attack. Refer to the triage and analysis section in the rule documentation for guidance on investigation steps.</li>
<li>Implement network segmentation and access controls to limit the impact of lateral movement.</li>
<li>Monitor authentication events (event codes 4624, 4625, 4648) for suspicious activity, such as NTLM authentication from unexpected source IPs or to unusual target systems, as described in the rule&rsquo;s investigation notes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>pass-the-hash</category><category>ntlm-relay</category><category>powershell</category></item><item><title>Service Reconnaissance via WMIC.exe</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-wmic-service-recon/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-wmic-service-recon/</guid><description>Adversaries use WMIC.exe to enumerate running services on remote devices, potentially identifying valuable targets or misconfigured systems.</description><content:encoded><![CDATA[<p>Attackers may leverage the Windows Management Instrumentation Command-line (WMIC) tool for reconnaissance activities within a network. Specifically, WMIC can be used to query and retrieve information about services running on remote systems. By executing WMIC commands with the &lsquo;service&rsquo; parameter, adversaries can identify the presence and status of specific services, potentially revealing vulnerable or misconfigured systems. This information can then be used to guide further exploitation attempts. WMIC is a built-in Windows utility, making its activity blend with legitimate system administration tasks, increasing the difficulty of detection. This activity is a component of the broader T1047 technique (Windows Management Instrumentation).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a compromised system within the target network.</li>
<li>The attacker executes WMIC.exe from the command line.</li>
<li>WMIC.exe is invoked with the <code>service</code> parameter to query service information.</li>
<li>The command includes a target IP address or hostname to query a remote system.</li>
<li>The command attempts to retrieve service names and status information (e.g., <code>wmic /node:&quot;192.168.1.100&quot; service get name, state</code>).</li>
<li>WMIC attempts to connect to the remote host via RPC. An error message is generated if the remote host is unreachable: &ldquo;Node - (provided IP or default) ERROR Description =The RPC server is unavailable&rdquo;.</li>
<li>If the target service is not running, a &ldquo;No instance(s) Available&rdquo; message may be displayed.</li>
<li>The attacker parses the output from WMIC to identify running services of interest for further exploitation or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful service reconnaissance allows attackers to map potential attack vectors within a network. By identifying specific services running on remote systems, attackers can prioritize targets for exploitation based on known vulnerabilities or misconfigurations. This can lead to unauthorized access, data breaches, and system compromise. While the reconnaissance itself does not directly cause harm, it provides crucial information that enables subsequent malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious WMIC Service Enumeration</code> to your SIEM to identify potential service reconnaissance attempts via WMIC (logsource: process_creation, product: windows).</li>
<li>Monitor process creation events for <code>WMIC.exe</code> executions containing the <code>service</code> parameter using endpoint detection and response (EDR) solutions (logsource: process_creation, product: windows).</li>
<li>Implement network segmentation to limit the scope of potential reconnaissance activities.</li>
<li>Review and restrict the use of WMIC in your environment, as it is a common tool for both legitimate administration and malicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.execution</category><category>attack.t1047</category></item><item><title>Suspicious Registry Modifications by Scripting Engines</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-susp-reg-mod/</link><pubDate>Mon, 29 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-susp-reg-mod/</guid><description>The use of scripting engines like WScript and CScript to modify the Windows registry can indicate an attempt to bypass standard tools and evade defenses, potentially for persistence or other malicious activities.</description><content:encoded><![CDATA[<p>Attackers may leverage scripting engines, such as <code>wscript.exe</code> and <code>cscript.exe</code>, to directly modify the Windows Registry. These scripting engines are often abused for malicious purposes, including establishing persistence, escalating privileges, or disabling security controls. These scripting engines can modify the registry without using standard tools like <code>regedit.exe</code> or <code>reg.exe</code>, making it harder to detect malicious registry changes. Defenders should be aware of processes using these engines to modify the registry, as this behavior is uncommon in legitimate software installations or administrative tasks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system, potentially through social engineering or exploiting a software vulnerability.</li>
<li>The attacker executes a script (VBScript, JScript) via <code>wscript.exe</code> or <code>cscript.exe</code>.</li>
<li>The script contains commands to modify specific registry keys, such as the Run key for persistence (T1547.001).</li>
<li>The scripting engine process (e.g., <code>wscript.exe</code>) directly interacts with the Windows Registry to set the new values.</li>
<li>Upon system restart or user logon, the modified registry key triggers the execution of a malicious payload.</li>
<li>The attacker achieves persistence on the compromised system, allowing for continued access and control.</li>
<li>The attacker leverages the persistent access to perform lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to persistent access on compromised systems, enabling attackers to execute malicious code, steal sensitive information, or disrupt critical services. The registry modifications performed by scripting engines can bypass traditional security measures and make it difficult to detect and remediate the attack. This can result in significant data loss, financial damage, and reputational harm to affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Registry Tampering by Potentially Suspicious Processes&rdquo; to your SIEM to detect suspicious registry modifications made by scripting engines.</li>
<li>Investigate any alerts generated by the Sigma rule &ldquo;Registry Tampering by Potentially Suspicious Processes&rdquo; for unusual or unauthorized registry changes.</li>
<li>Monitor registry events for modifications made by processes such as <code>wscript.exe</code> and <code>cscript.exe</code> (logsource: registry_event).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>execution</category><category>registry-modification</category></item><item><title>Multiple Logon Failure from the Same Source Address</title><link>https://feed.craftedsignal.io/briefs/2024-01-multiple-logon-failure/</link><pubDate>Mon, 29 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-multiple-logon-failure/</guid><description>Detection of multiple consecutive logon failures from the same source address within a short time interval on Windows systems, indicating potential brute force or password spraying attacks targeting multiple user accounts.</description><content:encoded><![CDATA[<p>This detection rule identifies potential password guessing or brute force activity against Windows systems. It focuses on detecting a high number of failed network logon attempts originating from a single source IP address within a short time frame. The rule analyzes Windows Security Event Logs, specifically looking for event category &ldquo;authentication&rdquo; and event action &ldquo;logon-failed&rdquo;. By aggregating failed authentication counts within a 60-second window and filtering out common authentication misconfiguration errors, the rule aims to pinpoint suspicious activity indicative of credential access attempts. This is important for defenders as it highlights potential breaches or malicious actors attempting to compromise user accounts via brute-force or password spraying attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker initiates a network connection to a Windows system, likely targeting a service such as SMB or RDP.</li>
<li>The attacker attempts to authenticate using a list of usernames and passwords or commonly used passwords, generating failed logon attempts (Event ID 4625).</li>
<li>The Windows system logs the failed authentication attempts in the Security Event Log.</li>
<li>The detection rule monitors the Security Event Log for failed logon events (event.category == &ldquo;authentication&rdquo; and event.action == &ldquo;logon-failed&rdquo;).</li>
<li>The rule aggregates the number of failed logon attempts from the same source IP address within a 60-second time window.</li>
<li>If the number of failed attempts exceeds a threshold (e.g., 100) and involves multiple target usernames (Esql.count_distinct_target_user_name &gt;= 2), the rule triggers a detection.</li>
<li>The attacker may continue attempts after initial failures or pivot to successful credentials for lateral movement.</li>
<li>Successful credential access can lead to privilege escalation, data exfiltration, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful brute-force or password spraying attacks can lead to unauthorized access to user accounts and sensitive data. The impact can range from minor inconvenience to significant data breaches and financial losses, depending on the compromised accounts and the data they have access to. The rule aims to reduce the window of opportunity for attackers to gain a foothold in the environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Logon to generate the necessary Windows Security Event Logs. Follow the setup instructions outlined in the rule documentation.</li>
<li>Deploy the Sigma rule &ldquo;Multiple Logon Failure from the Same Source Address&rdquo; to your SIEM and tune the threshold values (Esql.failed_auth_count and Esql.count_distinct_target_user_name) to minimize false positives in your environment.</li>
<li>Investigate any triggered alerts by examining the logon failure reason codes and the targeted user names as described in the rule&rsquo;s investigation guide.</li>
<li>Monitor network connections from the source IP address for any suspicious outbound traffic or lateral movement activity.</li>
<li>Review and enforce strong password policies to mitigate the risk of successful brute-force attacks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>brute-force</category><category>password-spraying</category><category>windows</category></item><item><title>Windows Registry Classes Autorun Keys Modification for Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-01-28-classes-autorun-keys-modification/</link><pubDate>Sun, 28 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-28-classes-autorun-keys-modification/</guid><description>Adversaries modify Windows Registry Classes keys to establish persistence by executing malicious code when specific file types are opened or actions are performed, potentially leading to privilege escalation and persistent access.</description><content:encoded><![CDATA[<p>Attackers can manipulate Windows Registry Classes keys, an autostart extensibility point (ASEP), to achieve persistence. This involves modifying registry entries that control how the operating system handles specific file types or shell actions. By modifying these keys, adversaries can ensure their malicious code executes whenever a user interacts with a specific file type (e.g., opening an .exe) or performs a specific action within the shell. This technique, which has been observed since at least 2019, allows malicious actors to maintain a persistent foothold on compromised systems. While legitimate software also utilizes these registry keys, careful filtering and monitoring are crucial for distinguishing malicious modifications from benign software installations. Detection can be noisy due to the legitimate use of these keys, so tuning and review is critical.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access through a separate vector (e.g., phishing, exploit). This stage is not covered by this detection, which focuses on post-exploitation activity.</li>
<li>Privilege Escalation (if needed): The attacker may need elevated privileges to modify certain registry keys. This can involve exploiting vulnerabilities or leveraging existing administrative rights.</li>
<li>Registry Key Modification: The attacker modifies specific keys under <code>\Software\Classes</code> in the Windows Registry. Common targets include <code>\Folder\ShellEx\ExtShellFolderViews</code>, <code>\.exe</code>, and <code>\Directory\Shellex\DragDropHandlers</code>.</li>
<li>Payload植入：攻击者修改注册表项指向一个恶意可执行文件或脚本。这可能涉及替换默认命令或添加新的处理程序。</li>
<li>Execution Trigger: The malicious code is configured to execute when a user interacts with the associated file type or shell action (e.g., opening a .exe file, right-clicking a folder).</li>
<li>Malicious Payload Execution: When the configured trigger occurs, the malicious payload executes, giving the attacker control over the system.</li>
<li>Persistence Maintained: The modified registry keys ensure that the malicious payload will continue to execute whenever the trigger occurs, maintaining persistence across reboots or user logons.</li>
<li>Objective Achieved: The attacker leverages persistent access to achieve their objectives, such as data exfiltration, lateral movement, or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent access to compromised systems, bypassing traditional security measures. This can lead to significant data breaches, financial losses, and reputational damage. The number of potential victims is broad, as any Windows system is potentially vulnerable. The types of damage possible range from credential theft to ransomware deployment, depending on the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Windows Registry auditing and monitor <code>registry_set</code> events for modifications to keys under <code>\Software\Classes</code> to identify suspicious activity.</li>
<li>Deploy the Sigma rule &ldquo;Classes Autorun Keys Modification&rdquo; to your SIEM and tune the filters (filter_main_<em>, filter_optional_</em>) for your specific environment to reduce false positives.</li>
<li>Investigate any registry modifications detected by the Sigma rule, focusing on unusual executables or scripts being launched from these locations.</li>
<li>Regularly review and update the filters in the Sigma rule to account for legitimate software changes in your environment.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.privilege-escalation</category><category>attack.persistence</category><category>attack.t1547.001</category></item><item><title>Detection of Obfuscated IP Address Usage in Download Commands</title><link>https://feed.craftedsignal.io/briefs/2024-01-obfuscated-ip-download/</link><pubDate>Sat, 27 Jan 2024 18:29:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-obfuscated-ip-download/</guid><description>This brief details the use of obfuscated IP addresses within download commands, often employed to evade detection by hiding the true destination of malicious downloads.</description><content:encoded><![CDATA[<p>Attackers are increasingly using obfuscated IP addresses (e.g., hexadecimal, octal, or other encoded representations) within download commands to bypass security measures that rely on simple IP address blacklisting or pattern matching. This technique makes it more difficult to identify malicious network connections based on simple string matching. The observed commands include <code>Invoke-WebRequest</code>, <code>Invoke-RestMethod</code>, <code>wget</code>, <code>curl</code>, <code>DownloadFile</code>, and <code>DownloadString</code>. Defenders need to detect these obfuscated IPs to identify and block malicious download attempts. This technique has been observed across various attack campaigns and is a common tactic used to deliver malware while attempting to evade detection.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker crafts a command containing an obfuscated IP address. This may involve converting a standard IP address into its hexadecimal, octal, or decimal representation.</li>
<li>The attacker utilizes a command-line tool such as <code>curl</code>, <code>wget</code>, or PowerShell&rsquo;s <code>Invoke-WebRequest</code> to initiate a download. The command includes the obfuscated IP within a URL.</li>
<li>The command interpreter resolves the obfuscated IP address back to its standard format before initiating the network connection.</li>
<li>The target host establishes a connection to the attacker&rsquo;s server at the resolved IP address.</li>
<li>The attacker&rsquo;s server delivers a malicious payload, such as a script, executable, or document containing macros.</li>
<li>The downloaded payload is executed on the target system, potentially leading to further compromise, such as privilege escalation or lateral movement.</li>
<li>The attacker achieves their final objective, such as data exfiltration, ransomware deployment, or establishing persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the download and execution of malware, potentially compromising the targeted system. This can result in data breaches, system disruption, or financial loss. The use of obfuscation techniques makes it more difficult to detect and prevent these attacks, increasing the risk of successful compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Obfuscated IP Download Activity&rdquo; to your SIEM to detect the use of obfuscated IP addresses in download commands. Tune the rule for your environment to minimize false positives.</li>
<li>Investigate any process creation events that match the Sigma rule, paying close attention to the command-line arguments.</li>
<li>Consider implementing additional network-based detection mechanisms to identify connections to suspicious IP addresses, even if they are obfuscated.</li>
<li>Monitor process creation logs (Sysmon) for processes executing download commands like <code>Invoke-WebRequest</code>, <code>Invoke-RestMethod</code>, <code>wget</code>, <code>curl</code>, <code>DownloadFile</code>, and <code>DownloadString</code> with suspicious arguments.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>discovery</category><category>evasion</category><category>obfuscation</category></item><item><title>System Shells Launched via Windows Services</title><link>https://feed.craftedsignal.io/briefs/2024-01-system-shells-via-services/</link><pubDate>Fri, 26 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-system-shells-via-services/</guid><description>Attackers may configure existing services or create new ones to execute system shells to elevate their privileges from administrator to SYSTEM, using services.exe as the parent process of the shell.</description><content:encoded><![CDATA[<p>Attackers may configure existing Windows services or create new ones to execute system shells, in order to elevate their privileges from administrator to SYSTEM. This tactic is used to gain SYSTEM permissions and establish persistence. The detection rule focuses on identifying instances where <code>services.exe</code> is the parent process of a command shell (cmd.exe, powershell.exe, pwsh.exe, powershell_ise.exe), indicating that a service is being abused to run a shell. The rule is designed to work with data from Elastic Defend, CrowdStrike, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, and Windows Security Event Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system with administrator privileges.</li>
<li>Attacker identifies a legitimate service or creates a new service to abuse for privilege escalation.</li>
<li>Attacker modifies the service configuration to execute a command shell (cmd.exe, powershell.exe, pwsh.exe, or powershell_ise.exe). This may involve modifying the service&rsquo;s executable path or adding command-line arguments.</li>
<li>The system&rsquo;s Service Control Manager (SCM) starts the service.</li>
<li><code>services.exe</code> spawns the configured command shell process.</li>
<li>The command shell executes with SYSTEM privileges.</li>
<li>Attacker uses the SYSTEM shell to perform malicious activities, such as installing malware, accessing sensitive data, or creating new user accounts.</li>
<li>The service continues to run, providing persistent access to the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to privilege escalation to SYSTEM, granting the attacker complete control over the compromised system. This can result in data theft, malware installation, or further lateral movement within the network. The rule has a risk score of 47 and is categorized as medium severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>System Shells via Services</code> to detect the execution of command shells spawned by <code>services.exe</code> within your SIEM environment, and tune for your environment.</li>
<li>Investigate any process creation events where <code>services.exe</code> is the parent process of <code>cmd.exe</code>, <code>powershell.exe</code>, <code>pwsh.exe</code>, or <code>powershell_ise.exe</code> using the investigation guide provided in the content section.</li>
<li>Review service creation and modification events in Windows Event Logs (Event IDs 4697 and 7045) for suspicious entries.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture detailed process information.</li>
<li>Utilize osquery to retrieve detailed service information to identify potentially malicious services. Reference queries $osquery_0, $osquery_1, and $osquery_2 in the investigation guide.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>execution</category><category>privilege_escalation</category><category>windows</category></item><item><title>UAC Bypass via Windows Firewall MMC Snap-In Hijack</title><link>https://feed.craftedsignal.io/briefs/2024-01-uac-bypass-winfw-mmc/</link><pubDate>Wed, 24 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-uac-bypass-winfw-mmc/</guid><description>Attackers bypass User Account Control (UAC) by hijacking the Microsoft Management Console (MMC) Windows Firewall snap-in to execute code with elevated permissions, potentially leading to system compromise.</description><content:encoded><![CDATA[<p>This threat involves the exploitation of a User Account Control (UAC) bypass technique on Windows systems. Attackers leverage the Microsoft Management Console (MMC) and its Windows Firewall snap-in (WF.msc) to execute arbitrary code with elevated privileges. By hijacking this trusted process, malicious actors can circumvent security measures designed to restrict unauthorized access and modifications to the system. This UAC bypass method allows attackers to stealthily execute code, potentially leading to privilege escalation, malware installation, or data exfiltration. The technique is relevant to defenders because it enables attackers to bypass standard security controls, increasing the risk of successful compromise. This activity has been observed in various forms and can be adapted to deliver a range of malicious payloads.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>User executes a seemingly benign application or script.</li>
<li>The application triggers the execution of <code>mmc.exe</code> with the <code>WF.msc</code> argument, launching the Windows Firewall snap-in.</li>
<li>A malicious process is spawned as a child process of <code>mmc.exe</code>. This is the key indicator of compromise.</li>
<li>The malicious process exploits a vulnerability or misconfiguration within the MMC snap-in or related components.</li>
<li>The exploited process gains elevated privileges, bypassing UAC restrictions.</li>
<li>The attacker uses these elevated privileges to perform malicious actions, such as installing malware or modifying system settings.</li>
<li>The attacker achieves persistence through registry modifications or scheduled tasks.</li>
<li>The final objective is achieved, such as data exfiltration, system compromise, or lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful UAC bypass can lead to a significant compromise of the targeted system. Attackers can install persistent backdoors, escalate privileges, and gain control over critical system functions. This can result in data theft, system instability, or complete system takeover. The impact is amplified in environments where UAC is relied upon as a primary security control, potentially affecting a large number of systems across an organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;UAC Bypass via Windows Firewall MMC Snap-In Hijack&rdquo; to your SIEM to detect suspicious processes spawned by <code>mmc.exe</code> with the &ldquo;WF.msc&rdquo; argument.</li>
<li>Monitor process creation events for unexpected child processes of <code>mmc.exe</code> using process monitoring tools and tune the Sigma rule accordingly.</li>
<li>Enable process auditing and Sysmon event logging (Event ID 1) to capture detailed information about process creations, as specified in the setup instructions of the original rule.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the parent process chain and the actions performed by the spawned process.</li>
<li>Refer to the references provided for more information on UAC bypass techniques and mitigation strategies.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>uac-bypass</category><category>privilege-escalation</category><category>windows-firewall</category><category>mmc</category></item><item><title>Uncommon Svchost Command Line Parameters Indicate Potential Masquerading or Injection</title><link>https://feed.craftedsignal.io/briefs/2024-01-23-svchost-uncommon-params/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-23-svchost-uncommon-params/</guid><description>Detection of svchost.exe executing with uncommon command-line parameters, excluding known legitimate patterns, which may indicate file masquerading, process injection, or process hollowing.</description><content:encoded><![CDATA[<p>Svchost.exe (Service Host) is a critical Windows process responsible for hosting various Windows services. Attackers frequently target svchost.exe to disguise malicious activity, using techniques like process injection or file masquerading. By injecting malicious code into a legitimate svchost.exe process or creating a fake svchost.exe executable, attackers can evade detection and escalate privileges. This can be done by spawning the process with unusual arguments to trick the OS or a user. Detecting these anomalies is crucial for identifying potentially compromised systems. The attacks documented leveraging this technique started to gain prominence around 2018 and are still relevant in 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker uploads a malicious executable or script to the compromised system.</li>
<li>The attacker injects malicious code into a legitimate svchost.exe process. Alternatively, the attacker may copy the svchost.exe executable and rename it, placing it in a different directory.</li>
<li>The injected code or masqueraded executable executes with unusual command-line arguments, deviating from the standard &ldquo;-k <servicegroup>&rdquo; parameter.</li>
<li>The malicious svchost process performs unauthorized actions, such as establishing network connections, modifying files, or creating new processes.</li>
<li>The attacker leverages the elevated privileges of the svchost process to further compromise the system.</li>
<li>The attacker attempts to maintain persistence by modifying registry keys or scheduling tasks.</li>
<li>The ultimate goal is data exfiltration, lateral movement, or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised svchost.exe processes can lead to significant system instability and data breaches. Attackers may leverage these processes to gain complete control over affected systems, potentially impacting hundreds or thousands of machines in a network. The consequences can include data theft, financial losses, and reputational damage. Ransomware groups, such as BlackByte/Exbyte, and APT groups, like APT41, have been observed using similar techniques to evade detection and achieve their objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Uncommon Svchost Command Line Parameter&rdquo; to your SIEM to detect anomalous svchost.exe processes based on command-line arguments.</li>
<li>Investigate any alerts triggered by the Sigma rule to determine if they are indicative of malicious activity.</li>
<li>Enable process creation logging, specifically capturing command-line arguments, to provide the necessary data for detection.</li>
<li>Implement application control policies to restrict the execution of unauthorized executables, including masqueraded svchost.exe instances.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>privilege-escalation</category><category>process-injection</category></item><item><title>PowerShell Invoke-NinjaCopy Script Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-invoke-ninjacopy/</link><pubDate>Tue, 09 Jan 2024 14:27:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-invoke-ninjacopy/</guid><description>The Invoke-NinjaCopy PowerShell script is used by attackers to directly access volume files, such as NTDS.dit or registry hives, for credential dumping.</description><content:encoded><![CDATA[<p>Invoke-NinjaCopy is a PowerShell script used to perform direct volume file access, enabling attackers to bypass traditional file access controls. This technique allows reading locked system files, such as the NTDS.dit or registry hives, which are essential for credential dumping. The script, often incorporated into post-exploitation frameworks like Empire, leverages stealth functions to minimize detection. Defenders need to monitor PowerShell script block content for the presence of Invoke-NinjaCopy or related &ldquo;Stealth*&rdquo; functions to identify potential credential access attempts. This activity is typically observed in Windows environments where attackers attempt to escalate privileges or move laterally within a network. The use of NinjaCopy allows attackers to grab sensitive data without being blocked by standard security measures.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker executes a PowerShell script, either directly or through a command-line interface.</li>
<li>The PowerShell script contains the Invoke-NinjaCopy function or related StealthReadFile, StealthOpenFile functions.</li>
<li>The script utilizes the StealthOpenFile function to directly access the volume where the target file resides (e.g., NTDS.dit).</li>
<li>StealthReadFile is used to read the contents of the target file, bypassing standard file access controls.</li>
<li>The script copies the contents of the NTDS.dit or registry hives to a temporary location.</li>
<li>The attacker dumps credentials from the copied NTDS.dit file using tools like secretsdump.py or other credential harvesting tools.</li>
<li>The attacker uses the harvested credentials to escalate privileges or move laterally within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the compromise of domain credentials, granting the attacker access to sensitive information and systems. Credential dumping from NTDS.dit or registry hives can expose user accounts, service accounts, and other privileged credentials. The impact ranges from data breaches and financial losses to complete network compromise and disruption of services. If successful, attackers may gain persistent access and control over critical infrastructure, potentially affecting thousands of users and systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging and monitor event ID 4104 for script content containing <code>Invoke-NinjaCopy</code>, <code>StealthReadFile</code>, <code>StealthOpenFile</code>, <code>StealthCloseFileDelegate</code> as described in the Overview.</li>
<li>Deploy the Sigma rule &ldquo;PowerShell Invoke-NinjaCopy script&rdquo; to your SIEM and tune the rule for false positives in your environment.</li>
<li>Investigate any PowerShell processes with command-line arguments that contain the identified keywords to identify potential attacker activity as outlined in the Attack Chain.</li>
<li>Implement strict access controls on sensitive files like <code>NTDS.dit</code> and registry hives to limit the impact of successful credential access attempts.</li>
<li>Review PowerShell execution policies to prevent the execution of unsigned or untrusted scripts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>powershell</category><category>ninjacopy</category></item><item><title>Windows EventLog Autologger Session Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-autologger-disable/</link><pubDate>Tue, 09 Jan 2024 14:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-autologger-disable/</guid><description>Adversaries may attempt to disable Windows EventLog autologger sessions via registry modification to evade detection and prevent security monitoring of early boot activities and system events.</description><content:encoded><![CDATA[<p>Attackers may disable Windows EventLog autologger sessions by modifying specific registry keys, thus evading detection and preventing security monitoring of early boot activities and system events. The AutoLogger event tracing session records events early in the operating system boot process, allowing applications and device drivers to capture traces before user login. Disabling these sessions can blind security monitoring tools, especially those focused on early boot activity, making it harder to detect malicious activity. This technique allows attackers to operate with less scrutiny during critical phases of system startup, potentially enabling persistence or other malicious objectives.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system, possibly through exploitation of a vulnerability or through stolen credentials.</li>
<li>The attacker uses <code>reg.exe</code> or PowerShell to modify the registry.</li>
<li>The attacker targets registry keys under <code>\Control\WMI\Autologger\</code>.</li>
<li>The attacker modifies the <code>Start</code> value to disable specific autologger sessions like EventLog-Application or EventLog-System.</li>
<li>Alternatively, the attacker modifies the <code>Enabled</code> value to disable specific providers of an autologger session.</li>
<li>The attacker executes the command, changing the registry value to disable the targeted autologger session or provider.</li>
<li>The system no longer records events for the disabled autologger session or provider.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling the Windows EventLog autologger can severely impact an organization&rsquo;s ability to detect and respond to threats. Security monitoring tools that rely on these logs will be unable to record early boot activities and system events, leading to a gap in visibility. This can allow attackers to establish persistence mechanisms, escalate privileges, or perform other malicious activities without being detected. The impact could range from undetected malware infections to significant data breaches, depending on the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Windows EventLog Autologger Session Registry Modification Via CommandLine</code> to your SIEM and tune for your environment to detect this behavior in your environment.</li>
<li>Monitor process creation events for <code>reg.exe</code>, <code>powershell.exe</code>, or <code>pwsh.exe</code> with command-line arguments that contain <code>\Control\WMI\Autologger\</code> and either <code>Start</code> or <code>Enabled</code> based on the Sigma rule&rsquo;s detections.</li>
<li>Implement Atomic Red Team simulations to validate detections and train security staff.</li>
<li>Investigate any instances of registry modifications related to Autologger sessions to determine if they are legitimate or malicious.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>attack.defense-evasion</category><category>attack.t1562.002</category></item><item><title>Suspicious LSASS Access via Malicious Secondary Logon Service</title><link>https://feed.craftedsignal.io/briefs/2024-01-mal-seclogon-lsass/</link><pubDate>Tue, 09 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-mal-seclogon-lsass/</guid><description>An attacker abuses the Secondary Logon service (seclogon.dll) to gain unauthorized access to the LSASS process, potentially leaking credentials.</description><content:encoded><![CDATA[<p>This threat leverages the Windows Secondary Logon service (seclogon.dll) to gain unauthorized access to the Local Security Authority Subsystem Service (LSASS) process. The attack involves manipulating the seclogon service to leak an LSASS handle, which can then be used to extract credentials. This technique is often employed as a precursor to credential dumping and lateral movement within a compromised network. The detection focuses on identifying specific call traces to seclogon.dll coupled with suspicious access rights (0x14c0) when accessing LSASS, originating from svchost.exe. Defenders should monitor for this activity as it indicates a potential attempt to compromise sensitive credentials stored within LSASS memory.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., via phishing or exploitation of a vulnerability).</li>
<li>The attacker executes code within the context of a user account.</li>
<li>The attacker leverages the Secondary Logon service (seclogon.dll) to request access to LSASS.</li>
<li>The malicious code interacts with the seclogon service to obtain a handle to the LSASS process with specific access rights (0x14c0), typically from a svchost.exe process.</li>
<li>The seclogon service, acting on behalf of the attacker, grants access to LSASS.</li>
<li>The attacker uses the leaked LSASS handle to read memory contents.</li>
<li>The attacker extracts sensitive information, such as user credentials (passwords, NTLM hashes, Kerberos tickets), from the LSASS memory.</li>
<li>The attacker uses the stolen credentials for lateral movement, privilege escalation, or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to steal user credentials, leading to unauthorized access to sensitive systems and data. This can result in data breaches, financial losses, and reputational damage. The compromise of domain administrator credentials can grant the attacker complete control over the entire Windows domain.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging (event ID 1) and process access logging (event ID 10) to detect suspicious LSASS handle access.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Lsass Handle Access via MalSecLogon&rdquo; to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the call trace, access rights, and source process.</li>
<li>Monitor authentication events for signs of credential misuse following suspicious LSASS access.</li>
<li>Review local administrator and debug-privilege exposure, LSASS protection such as RunAsPPL or Credential Guard where supported, and Secondary Logon service necessity on critical servers</li>
<li>Block the GrantedAccess value &ldquo;0x14c0&rdquo; in conjunction with CallTrace &ldquo;<em>seclogon.dll</em>&rdquo; when the TargetImage is &ldquo;lsass.exe&rdquo; (Sysmon Event ID 10).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>lsass</category><category>seclogon</category><category>windows</category></item><item><title>Potential Timestomping of Executable Files on Windows</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-timestomp/</link><pubDate>Tue, 09 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-timestomp/</guid><description>This rule identifies potential timestomping behavior on Windows systems where the creation time of executable files in sensitive system directories is modified, potentially to blend malicious executables with legitimate system files and evade detection.</description><content:encoded><![CDATA[<p>This detection identifies attempts to modify the timestamps of executable files within sensitive directories on Windows systems, a technique known as timestomping. Timestomping is employed by adversaries to disguise malicious files as legitimate system components, making them harder to detect. The rule focuses on changes to file creation timestamps in directories like <code>System32</code>, <code>SysWOW64</code>, <code>ProgramData</code>, and common startup locations. It excludes known legitimate processes to reduce false positives. The goal of this technique is to evade detection and maintain persistence within the compromised system. This behavior is typically associated with post-exploitation activity after initial access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means (e.g., exploiting a vulnerability).</li>
<li>The attacker uploads a malicious executable (e.g., a backdoor or malware dropper) to a location on the filesystem.</li>
<li>The attacker uses a tool or script (e.g., PowerShell, built-in Windows utilities) to modify the creation timestamp of the malicious executable.</li>
<li>The timestamp is set to match that of a legitimate system file in the same directory, such as a DLL in <code>C:\Windows\System32</code>.</li>
<li>The attacker may then configure persistence for the timestomped executable, such as creating a registry entry in <code>HKLM\Software\Microsoft\Windows\CurrentVersion\Run</code>.</li>
<li>The malicious executable remains dormant, blending in with other legitimate files and evading initial detection.</li>
<li>The attacker triggers the execution of the timestomped executable, either manually or through scheduled tasks, registry entries or other persistence mechanisms.</li>
<li>The malicious executable performs its intended function, such as establishing a reverse shell or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful timestomping can allow attackers to maintain a persistent presence on a compromised system while evading detection by security tools and administrators. This can lead to prolonged data theft, system compromise, and other malicious activities. The technique is often used in conjunction with other evasion methods to further obscure malicious activity. A successful attack could lead to data exfiltration, ransomware deployment, or long-term espionage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 2 (File creation time changed) logging to capture timestomping activity as described in the setup instructions.</li>
<li>Deploy the Sigma rule &ldquo;Potential Timestomp in Executable Files&rdquo; to your SIEM to detect suspicious file timestamp modifications.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on processes modifying file creation times in sensitive system directories.</li>
<li>Review the process ancestry of processes modifying file timestamps to identify potentially malicious parent processes.</li>
<li>Monitor for execution of files with recently modified timestamps using process creation logs.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>timestomp</category><category>windows</category></item><item><title>Detection of Custom Shim Database Installation for Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-app-compat-shim-persistence/</link><pubDate>Tue, 09 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-app-compat-shim-persistence/</guid><description>Attackers abuse the Application Compatibility Shim functionality in Windows to establish persistence and achieve arbitrary code execution by installing malicious shim databases, which this detection identifies through monitoring registry changes.</description><content:encoded><![CDATA[<p>Attackers can exploit the Windows Application Compatibility Shim functionality to maintain persistence and execute arbitrary code within legitimate Windows processes. This is achieved by installing custom shim databases, which are designed to ensure older applications run smoothly on newer operating systems. By manipulating these databases, attackers can stealthily inject malicious code into trusted processes. The rule detects changes in specific registry paths associated with the installation of these databases, excluding known legitimate processes to minimize false positives. This technique allows for the execution of malicious code without directly modifying the target application&rsquo;s executable, making it difficult to detect with traditional methods.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker modifies the registry to create a new entry for a custom shim database. The registry path targeted is typically under <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Custom\</code>.</li>
<li>The attacker writes a malicious <code>.sdb</code> file containing the custom shim database to a location on disk.</li>
<li>The registry entry created points to the malicious <code>.sdb</code> file.</li>
<li>When a targeted application is launched, Windows checks the AppCompatFlags registry keys.</li>
<li>The system loads the malicious shim database specified in the registry.</li>
<li>The malicious code within the shim database is executed in the context of the targeted application.</li>
<li>The attacker achieves persistence, as the malicious shim database is loaded every time the targeted application is run.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent access to the system, even after reboots or software updates. The injected code runs within the context of a legitimate process, which can evade detection by traditional security tools. This can lead to data theft, system compromise, or further malicious activities, such as lateral movement within the network. The use of application shimming for persistence affects systems running Windows and can impact organizations of any size or sector.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Custom Shim Database Installation</code> to your SIEM to identify suspicious registry modifications related to application shimming.</li>
<li>Enable Sysmon registry event logging to ensure the necessary data is available for the Sigma rule to function.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on processes that are not in the exclusion list.</li>
<li>Block or quarantine any identified malicious <code>.sdb</code> files to prevent further execution.</li>
<li>Review and update the exclusion list in the Sigma rule with any newly identified legitimate applications that use shim databases, reducing false positives.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>app-compat</category><category>shim</category><category>windows</category></item><item><title>Process Execution from Suspicious Windows Directories</title><link>https://feed.craftedsignal.io/briefs/2024-01-process-execution-from-unusual-directory/</link><pubDate>Thu, 04 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-process-execution-from-unusual-directory/</guid><description>Adversaries may execute processes from unusual default Windows directories to masquerade malware and evade defenses by blending in with trusted paths, making malicious activity harder to detect.</description><content:encoded><![CDATA[<p>This detection identifies process execution from suspicious default Windows directories. Attackers may hide malware in trusted paths to evade defenses, making it difficult for analysts to distinguish between legitimate and malicious activity. The detection focuses on identifying processes running from directories like C:\PerfLogs, C:\Users\Public, and various Windows subdirectories (e.g., C:\Windows\Tasks, C:\Windows\AppReadiness), where executable files are not typically expected to reside. The detection excludes known legitimate processes like SpeechUXWiz.exe, SystemSettings.exe, TrustedInstaller.exe and other Intel and IBM executables to reduce false positives. This technique is often used to bypass security controls or take advantage of existing exceptions applied to these directories. This activity was observed being used by threat actors in the Siestagraph campaign.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker drops a malicious executable into a suspicious directory like C:\Users\Public or C:\Windows\Tasks.</li>
<li>The attacker executes the malware from the unusual directory. This might be achieved using <code>cmd.exe</code> or <code>powershell.exe</code>.</li>
<li>The executed malware establishes persistence by creating a scheduled task or modifying registry keys.</li>
<li>The malware connects to a command-and-control (C2) server to receive further instructions.</li>
<li>The C2 server instructs the malware to perform reconnaissance on the network.</li>
<li>The malware attempts to move laterally to other systems on the network using techniques like pass-the-hash or exploiting vulnerabilities.</li>
<li>The attacker achieves their objective, such as data exfiltration, ransomware deployment, or establishing long-term access to the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the execution of arbitrary code, persistence on the system, and further compromise of the network. Attackers can use this technique to bypass security controls and evade detection, potentially leading to data breaches, financial loss, or disruption of services. While the rule itself has a medium severity, the impact of a successful attack using this technique can be severe, depending on the attacker&rsquo;s objectives and the compromised data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Process Execution from Unusual Directory&rdquo; to your SIEM and tune for your environment to detect suspicious process execution.</li>
<li>Investigate any alerts generated by the Sigma rule to determine if the process execution is legitimate or malicious.</li>
<li>Enable process creation logging, specifically Event ID 4688 with command line process auditing, to ensure the Sigma rule has the necessary data to function effectively.</li>
<li>Review and harden permissions on the listed suspicious directories to prevent unauthorized file creation and execution.</li>
<li>Block execution of unsigned or untrusted executables from these directories using application control solutions.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>masquerading</category></item><item><title>DCOM Lateral Movement via ShellWindows/ShellBrowserWindow</title><link>https://feed.craftedsignal.io/briefs/2024-01-dcom-lateral-movement/</link><pubDate>Thu, 04 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-dcom-lateral-movement/</guid><description>This analytic identifies the use of Distributed Component Object Model (DCOM) to execute commands on a remote host, specifically when launched via ShellBrowserWindow or ShellWindows Application COM objects, indicating potential lateral movement by an attacker.</description><content:encoded><![CDATA[<p>This detection identifies the abuse of Distributed Component Object Model (DCOM) for lateral movement within a Windows environment. DCOM allows software components to communicate across a network, and attackers may leverage it to execute commands remotely. This rule specifically focuses on the use of ShellBrowserWindow or ShellWindows Application COM objects as the launching point for these remote commands. The technique enables stealthy lateral movement, as it leverages legitimate Windows functionality. This activity is detected by identifying incoming TCP connections on high ports associated with <code>explorer.exe</code> spawning child processes, which are indicative of DCOM abuse. The rule is designed to detect this behavior and alert security teams to potential unauthorized lateral movement attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised host within the network.</li>
<li>The attacker uses DCOM to initiate a connection to a target host.</li>
<li>The DCOM connection is established to the target host via high TCP ports (above 49151).</li>
<li>The <code>explorer.exe</code> process on the target host receives the DCOM connection.</li>
<li>The attacker uses ShellBrowserWindow or ShellWindows COM objects to execute commands.</li>
<li><code>explorer.exe</code> spawns a child process to execute the attacker-supplied command.</li>
<li>The spawned process performs malicious actions, such as reconnaissance or further lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary commands on the target system, leading to potential data exfiltration, system compromise, and further lateral movement within the network. This can result in significant damage, including data breaches, financial losses, and reputational harm. The DCOM protocol is commonly used in many Windows environments, so this technique could be broadly applicable across many victim organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;DCOM Lateral Movement with Explorer.exe&rdquo; to your SIEM and tune for your environment to detect suspicious process creations spawned by explorer.exe.</li>
<li>Enable Sysmon Event ID 3 (Network Connection) and Event ID 1 (Process Creation) logging to ensure the required data is available for the Sigma rule to function correctly.</li>
<li>Review network activity for incoming TCP connections to high ports (49151+) associated with <code>explorer.exe</code>, as highlighted in the &ldquo;Incoming DCOM Lateral Movement with ShellBrowserWindow or ShellWindows&rdquo; detection.</li>
<li>Investigate any unusual or unexpected child processes spawned by <code>explorer.exe</code>, as detected by the Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>dcom</category><category>windows</category></item><item><title>Suspicious Execution via Scheduled Task</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-scheduled-task-runtime/</link><pubDate>Wed, 03 Jan 2024 18:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-scheduled-task-runtime/</guid><description>This rule identifies execution of suspicious programs via scheduled tasks by looking at process lineage and command line usage, detecting processes such as cscript.exe, powershell.exe, and cmd.exe when executed from suspicious paths like C:\Users\ and C:\ProgramData\.</description><content:encoded><![CDATA[<p>This detection rule identifies suspicious program executions initiated by scheduled tasks on Windows systems. Adversaries often exploit scheduled tasks for persistence and to execute malicious programs. This rule focuses on detecting known malicious executables, such as PowerShell, Cmd, and MSHTA, when launched from unusual file paths like user directories or temporary folders. It leverages process lineage analysis, specifically looking for processes spawned by <code>svchost.exe</code> with the &ldquo;Schedule&rdquo; argument, to determine if the execution originated from a scheduled task. The rule aims to pinpoint potential threats effectively by excluding benign processes and focusing on suspicious combinations of executables and paths. The rule was last updated on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker creates or modifies a scheduled task to execute a malicious payload. This task is designed to run at a specific time or event.</li>
<li>The Windows Task Scheduler service (<code>svchost.exe</code> with &ldquo;Schedule&rdquo; argument) initiates the scheduled task.</li>
<li>The scheduled task executes a suspicious executable, such as <code>powershell.exe</code>, <code>cmd.exe</code>, or <code>mshta.exe</code>.</li>
<li>The suspicious executable is launched from an unusual or suspicious path, such as <code>C:\\Users\\</code>, <code>C:\\ProgramData\\</code>, or <code>C:\\Windows\\Temp\\</code>.</li>
<li>The executed payload performs malicious activities, such as downloading additional malware, establishing persistence, or exfiltrating data.</li>
<li>The attacker maintains persistence on the system through the scheduled task, allowing for repeated execution of the malicious payload.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent access to the compromised system, execute malicious code, and potentially escalate privileges. This can lead to data theft, system compromise, and further lateral movement within the network. The damage includes potential data exfiltration, malware installation, and disruption of normal system operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line arguments to detect suspicious executions (logs-endpoint.events.process-* and logs-windows.sysmon_operational-*).</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Execution via Scheduled Task&rdquo; to your SIEM to identify potentially malicious processes executed via scheduled tasks. Tune the rule to exclude legitimate software installations or updates (see rule section below).</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on processes with suspicious original file names and command line arguments (process.pe.original_file_name, process.args).</li>
<li>Monitor scheduled tasks for unauthorized modifications or additions, as this is a common technique for persistence (registry_set).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>execution</category><category>windows</category></item><item><title>Potential Credential Access via LSASS Handle Duplication</title><link>https://feed.craftedsignal.io/briefs/2024-01-lsass-dupehandle/</link><pubDate>Wed, 03 Jan 2024 17:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-lsass-dupehandle/</guid><description>Detection of suspicious LSASS handle access via DuplicateHandle from an unknown call trace module, indicating a potential attempt to bypass the NtOpenProcess API to evade detection and dump LSASS memory for credential access.</description><content:encoded><![CDATA[<p>This detection identifies suspicious attempts to access the Local Security Authority Subsystem Service (LSASS) memory via the DuplicateHandle function on Windows systems. LSASS is a critical process that manages user credentials, making it a prime target for credential dumping attacks. Attackers may use DuplicateHandle to bypass the NtOpenProcess API, which is commonly monitored, to evade detection. The rule focuses on EventCode 10, looking for lsass.exe requesting DuplicateHandle access rights (0x40) where the call trace originates from an unknown executable region (<em>UNKNOWN</em>). This technique is often associated with tools like MirrorDump.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system (e.g., via phishing or exploitation of a vulnerability).</li>
<li>The attacker executes a malicious program or script on the compromised system.</li>
<li>The malicious code attempts to open a handle to the LSASS process.</li>
<li>Instead of using NtOpenProcess, the attacker leverages the DuplicateHandle function to obtain a handle to LSASS.</li>
<li>The DuplicateHandle call originates from an unknown or suspicious module, as indicated by &ldquo;<em>UNKNOWN</em>&rdquo; in the call trace.</li>
<li>With a valid handle to LSASS, the attacker dumps the LSASS memory to a file or other location.</li>
<li>The attacker parses the dumped memory to extract sensitive credentials.</li>
<li>The attacker uses the stolen credentials for lateral movement, privilege escalation, or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could lead to the compromise of user credentials, including domain administrator accounts. This can give attackers unrestricted access to the entire domain, allowing them to steal sensitive data, install malware, or disrupt critical services. The impact can range from data breaches and financial loss to complete infrastructure compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation and event 10 logging to capture the necessary telemetry for this detection. (Setup instructions: <a href="https://ela.st/sysmon-event-10-setup">https://ela.st/sysmon-event-10-setup</a>)</li>
<li>Deploy the Sigma rule &ldquo;Potential Credential Access via DuplicateHandle in LSASS&rdquo; to your SIEM and tune for your environment to reduce false positives.</li>
<li>Investigate any alerts generated by this rule by reviewing the event logs and call trace details to identify suspicious modules or processes.</li>
<li>Implement enhanced monitoring and logging for LSASS and related processes to detect any future attempts to exploit the DuplicateHandle function.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>lsass</category><category>duplicatehandle</category><category>mirrordump</category><category>windows</category></item><item><title>Windows Account Discovery of Administrator Accounts</title><link>https://feed.craftedsignal.io/briefs/2024-01-admin-recon/</link><pubDate>Wed, 03 Jan 2024 17:14:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-admin-recon/</guid><description>Adversaries may execute the `net.exe` or `wmic.exe` commands to enumerate administrator accounts or groups, both locally and within the domain, to gather information for follow-on actions.</description><content:encoded><![CDATA[<p>Attackers often perform reconnaissance activities within a compromised environment to understand the available resources and potential targets. This reconnaissance helps them plan subsequent actions, such as privilege escalation and lateral movement. This activity involves using built-in Windows utilities like <code>net.exe</code> and <code>wmic.exe</code> to enumerate administrator-related user accounts and groups. This information can reveal potential targets for credential compromise or other post-exploitation activities. Lower privileged accounts commonly perform this enumeration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a Windows system.</li>
<li>The attacker executes <code>net.exe</code> with arguments to list users and groups.</li>
<li>The attacker filters the output for administrator-related keywords like &ldquo;admin&rdquo;, &ldquo;Domain Admins&rdquo;, &ldquo;Enterprise Admins&rdquo;, &ldquo;Remote Desktop Users&rdquo;, or &ldquo;Organization Management&rdquo;.</li>
<li>Alternatively, the attacker executes <code>wmic.exe</code> to query user accounts.</li>
<li>The attacker parses the output from <code>wmic.exe</code> to identify administrator accounts.</li>
<li>The attacker identifies privileged accounts to target for credential theft or privilege escalation.</li>
<li>The attacker uses the identified accounts to perform lateral movement or access sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enumeration of administrator accounts allows an attacker to identify high-value targets within the environment. This can lead to credential theft, privilege escalation, lateral movement, and ultimately, unauthorized access to sensitive data or systems. While the risk score is low, this activity serves as a precursor to more serious compromises.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for <code>net.exe</code> and <code>wmic.exe</code> commands with arguments related to user and group enumeration using the Sigma rules provided.</li>
<li>Investigate any instances of lower-privileged accounts executing these commands and filter out authorized administrative accounts performing the same actions.</li>
<li>Enable Windows process creation logging to capture the necessary events.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>account-discovery</category><category>windows</category></item><item><title>Detection of Invoke-Obfuscation via Standard Input</title><link>https://feed.craftedsignal.io/briefs/2024-01-invoke-obfuscation-stdin/</link><pubDate>Wed, 03 Jan 2024 15:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-invoke-obfuscation-stdin/</guid><description>This brief outlines detection strategies for adversaries leveraging Invoke-Obfuscation techniques within PowerShell scripts executed via standard input, a method commonly used to evade traditional detection mechanisms.</description><content:encoded><![CDATA[<p>Invoke-Obfuscation is a PowerShell obfuscation framework used to evade detection by security products. Attackers employ this technique to disguise malicious PowerShell code, making it harder to identify through static analysis or signature-based detection. This particular technique involves passing obfuscated PowerShell code via standard input (stdin) to the PowerShell interpreter. This method is often employed during the execution of scripts, where malicious code is dynamically constructed and executed, leaving a reduced footprint on the file system. Defenders should be aware of this technique because it is frequently used by threat actors in conjunction with other tactics to compromise systems and execute malicious payloads. This brief provides actionable detection strategies focused on identifying this specific obfuscation pattern.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access through a vulnerability or other means (not covered in this brief).</li>
<li>The attacker uploads a small, initial-stage script or binary to the target system.</li>
<li>This script prepares the environment for PowerShell execution, potentially setting environment variables or disabling security features.</li>
<li>The script then calls <code>powershell.exe</code> with parameters designed to accept input from stdin.</li>
<li>Obfuscated PowerShell code generated by Invoke-Obfuscation is piped into the <code>powershell.exe</code> process via stdin. This code often contains commands to download, execute, or further obfuscate malicious payloads.</li>
<li>The <code>powershell.exe</code> process executes the obfuscated code from stdin, bypassing some common detection rules.</li>
<li>The deobfuscated code performs malicious actions such as lateral movement, data exfiltration, or persistence.</li>
<li>The attacker achieves their final objective, which may include data theft, system compromise, or deployment of ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to a full compromise of the targeted system, potentially impacting other systems within the network. Obfuscation makes incident response more difficult, as identifying and analyzing the malicious code requires additional effort. Affected systems could suffer data loss, service disruption, or financial damage. The use of Invoke-Obfuscation also indicates a deliberate attempt to evade security controls, suggesting a sophisticated attacker.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Invoke-Obfuscation Via Stdin</code> to your SIEM to detect obfuscated PowerShell execution via standard input based on command-line patterns.</li>
<li>Enable process creation logging on Windows endpoints, ensuring that command-line arguments are captured to facilitate detection of obfuscated commands.</li>
<li>Investigate any process creation events where <code>powershell.exe</code> is executed with parameters that suggest input from stdin along with obfuscated code patterns.</li>
<li>Implement application control policies to restrict the execution of unauthorized PowerShell scripts, reducing the attack surface for Invoke-Obfuscation techniques.</li>
<li>Continuously update and refine detection rules to adapt to new obfuscation methods and variations of the Invoke-Obfuscation framework.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>obfuscation</category><category>powershell</category></item><item><title>Adversaries Disabling Important Scheduled Tasks</title><link>https://feed.craftedsignal.io/briefs/2024-01-schtasks-disable/</link><pubDate>Wed, 03 Jan 2024 15:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-schtasks-disable/</guid><description>Adversaries disable crucial scheduled tasks, such as those related to BitLocker, Windows Defender, System Restore and Windows Update, using schtasks.exe to disrupt services and potentially facilitate data destruction or ransomware deployment.</description><content:encoded><![CDATA[<p>Attackers are increasingly targeting scheduled tasks to disable critical system functions. This tactic involves using <code>schtasks.exe</code> to disable essential tasks related to security, backup, and update mechanisms. By disabling tasks like Windows Defender scans, System Restore points, BitLocker encryption, and Windows Update, adversaries can significantly weaken a system&rsquo;s defenses, making it more vulnerable to data destruction or ransomware attacks. The observed behavior involves the execution of…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>attack.impact</category><category>attack.t1489</category></item><item><title>Windows Time-Based Evasion via Choice Exec</title><link>https://feed.craftedsignal.io/briefs/2024-01-time-based-evasion-choice/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-time-based-evasion-choice/</guid><description>Detection of choice.exe used in batch files for time-based evasion, a technique observed in SnakeKeylogger malware, indicating potential stealthy code execution and persistence.</description><content:encoded><![CDATA[<p>This brief focuses on the detection of <code>choice.exe</code> being used within batch files as a time-delay tactic, a technique notably employed by the SnakeKeylogger malware. The analysis leverages data from Endpoint Detection and Response (EDR) agents, scrutinizing process names and command-line executions. This behavior is significant because it suggests the implementation of time-based evasion techniques designed to circumvent detection mechanisms. Successful evasion could enable attackers to execute malicious code covertly, remove incriminating files, and establish persistent access on compromised systems. The use of <code>choice.exe</code> for such purposes warrants immediate investigation by security operations center (SOC) analysts due to the potential for significant system compromise and data exfiltration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access via an unknown vector.</li>
<li>A batch script is executed on the target system.</li>
<li>The batch script uses <code>choice.exe</code> with the <code>/T</code> and <code>/N</code> parameters to introduce a time delay. The <code>/T</code> parameter specifies a timeout period, and the <code>/N</code> parameter suppresses the display of choices.</li>
<li>This delay allows the malware to evade time-sensitive detection mechanisms.</li>
<li>After the delay, the script executes further commands, potentially downloading and executing a payload.</li>
<li>The payload executes, installing a keylogger such as SnakeKeylogger or 0bj3ctivity Stealer.</li>
<li>The keylogger captures sensitive information such as keystrokes and clipboard data.</li>
<li>The stolen data is exfiltrated to a remote server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised systems can lead to data theft, intellectual property loss, and financial fraud. SnakeKeylogger and similar malware have been used to steal credentials and sensitive information from various targets. Successful exploitation could result in significant financial losses, reputational damage, and legal liabilities. The number of victims and the extent of the damage depend on the attacker&rsquo;s objectives and the compromised systems&rsquo; value.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Choice.exe Time Delay</code> to your SIEM to detect the use of <code>choice.exe</code> with time-delay parameters (log source: <code>process_creation</code>).</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture the necessary process execution data for the Sigma rule.</li>
<li>Investigate any instances of <code>choice.exe</code> being used with the <code>/T</code> and <code>/N</code> parameters to determine if it is part of a malicious script.</li>
<li>Block the execution of unsigned or untrusted batch scripts to prevent the initial execution of the malicious code.</li>
<li>Monitor endpoint activity for suspicious processes and network connections originating from systems where <code>choice.exe</code> has been detected.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>time-based-evasion</category><category>malware</category><category>persistence</category><category>defense-evasion</category><category>windows</category></item><item><title>Windows AutoLogger Session Tampering Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-autologger-tampering/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-autologger-tampering/</guid><description>Attackers may disable AutoLogger sessions by modifying specific registry values to evade detection and prevent security monitoring of early boot activities and system events, a technique observed in intrusions involving IcedID and XingLocker ransomware.</description><content:encoded><![CDATA[<p>Attackers are increasingly targeting Windows Event Tracing (ETW) and AutoLogger sessions to evade detection. The AutoLogger session is crucial as it records events early in the operating system boot process, providing security solutions with essential telemetry. This technique involves tampering with registry keys associated with AutoLogger sessions, specifically disabling or stopping them by setting DWORD values to 0. This is done to blind security solutions, preventing them from monitoring early boot activities and critical system events. Disabling these sessions allows adversaries to operate with less scrutiny, making it harder to detect malicious activities during the initial phases of a system compromise. This technique has been observed in attacks involving IcedID and XingLocker ransomware.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is achieved through an as-yet-unspecified method (e.g., exploitation, phishing).</li>
<li>The attacker gains administrative privileges on the target system.</li>
<li>The attacker identifies AutoLogger sessions to disable, focusing on those relevant to security monitoring, such as &lsquo;\EventLog-&rsquo; or &lsquo;\Defender&rsquo;.</li>
<li>The attacker modifies the registry to disable the targeted AutoLogger sessions. This involves setting the &lsquo;Enabled&rsquo; or &lsquo;Start&rsquo; DWORD values under the <code>HKLM\System\CurrentControlSet\Control\WMI\Autologger</code> registry key to 0.</li>
<li>The attacker may use tools like <code>wevtutil.exe</code> or directly interact with the registry via PowerShell or <code>cmd.exe</code> to make these changes.</li>
<li>The security monitoring capabilities reliant on the tampered AutoLogger sessions are effectively impaired or disabled.</li>
<li>With logging impaired, the attacker proceeds with the main objectives, such as lateral movement, data exfiltration, or ransomware deployment, with a reduced risk of detection.</li>
<li>The ultimate goal is to compromise the system, steal data, or deploy ransomware, bypassing security measures that rely on early boot and system event logging.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful tampering with AutoLogger sessions can significantly reduce the visibility of security solutions, allowing attackers to operate undetected for extended periods. This can lead to delayed incident response, increased dwell time, and greater potential for damage, including data breaches, financial losses, and reputational damage. The sectors most at risk are those heavily reliant on Windows-based systems and proactive security monitoring. The DFIR Report documented a case where adversaries moved from IcedID infection to XingLocker ransomware deployment within 24 hours, highlighting the speed and potential impact of these attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Potential AutoLogger Sessions Tampering</code> to your SIEM to detect malicious registry modifications related to AutoLogger sessions.</li>
<li>Investigate any registry modifications under the <code>\Control\WMI\Autologger\</code> path, focusing on changes to <code>Enabled</code> or <code>Start</code> values, as identified in the Sigma rule.</li>
<li>Monitor process creation events for <code>wevtutil.exe</code> modifying registry keys related to AutoLogger, as specified in the <code>filter_main_wevtutil</code> section of the Sigma rule.</li>
<li>Correlate registry modification events with process execution events to identify the source of the tampering, paying close attention to processes originating from the Windows Defender platform, as outlined in the <code>filter_main_defender</code> section of the Sigma rule.</li>
<li>Implement endpoint detection and response (EDR) solutions with robust registry monitoring capabilities to identify and block unauthorized modifications to AutoLogger settings.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>attack.defense-evasion</category><category>attack.t1562.002</category></item><item><title>Unusual Network Activity from Windows System Binaries</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-network-activity-windows/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-network-activity-windows/</guid><description>Detection of network connections initiated by unusual Windows system binaries, often leveraged by adversaries to proxy execution of malicious code and evade detection, indicating potential defense evasion and command and control activity.</description><content:encoded><![CDATA[<p>Attackers frequently abuse trusted Windows system binaries and developer utilities to proxy the execution of malicious payloads, effectively bypassing security controls that would otherwise prevent direct execution. This technique, known as &ldquo;System Binary Proxy Execution,&rdquo; allows adversaries to masquerade their activities and blend in with legitimate system processes. This detection identifies network activity from system applications such as <code>mshta.exe</code>, <code>regsvr32.exe</code>, and <code>installutil.exe</code> that are not expected to initiate network connections under normal circumstances. The original rule was created in September 2020, and updated in May 2026. The scope of targeting includes any Windows environment where adversaries might attempt to evade detection by proxying malicious activity through trusted system binaries.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system, often through phishing or exploiting a vulnerability.</li>
<li>The attacker drops a malicious payload onto the system, potentially obfuscated to avoid detection.</li>
<li>The attacker uses a trusted system binary, such as <code>mshta.exe</code>, <code>regsvr32.exe</code>, or <code>installutil.exe</code> to execute the payload.</li>
<li>The system binary initiates a network connection, potentially to a command-and-control (C2) server.</li>
<li>The attacker uses the C2 channel to download additional tools or exfiltrate data.</li>
<li>The attacker moves laterally within the network, compromising additional systems.</li>
<li>The attacker achieves their final objective, such as data theft, ransomware deployment, or system disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to a variety of negative impacts, including data breaches, system compromise, and potential financial losses. The technique is often employed in targeted attacks and can be difficult to detect due to the use of legitimate system binaries. If successful, attackers can maintain persistence, escalate privileges, and move laterally within the network, leading to widespread damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation (Event ID 1) and network connection (Event ID 3) logging to provide the necessary data for detection.</li>
<li>Deploy the Sigma rules in this brief to your SIEM to detect unusual network activity from Windows system binaries.</li>
<li>Regularly review and update the list of known benign network connections from these binaries to reduce false positives.</li>
<li>Implement application control policies to restrict the execution of untrusted applications.</li>
<li>Monitor DNS queries (Sysmon Event ID 22) for suspicious domain resolutions originating from system binaries.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>proxy-execution</category><category>windows</category></item><item><title>Script Execution via Microsoft HTML Application</title><link>https://feed.craftedsignal.io/briefs/2024-01-script-execution-via-html-app/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-script-execution-via-html-app/</guid><description>Detects the execution of scripts via HTML applications using Windows utilities rundll32.exe or mshta.exe to bypass defenses by proxying execution of malicious content with signed binaries.</description><content:encoded><![CDATA[<p>This detection identifies the execution of scripts via HTML applications, leveraging Windows utilities like <code>rundll32.exe</code> or <code>mshta.exe</code>. Attackers often use this method to bypass process and signature-based defenses by proxying the execution of malicious content through legitimate, signed binaries. The detection focuses on specific command-line arguments and patterns associated with this technique, while also excluding known legitimate uses by applications such as Citrix System32 (<code>wfshell.exe</code>), Microsoft Access (<code>MSACCESS.EXE</code>), and Quokka.Works (<code>GTInstaller.exe</code>). This technique is used by attackers to execute malicious scripts without directly running them, thus evading traditional security measures. The detection rule analyzes process names, command-line arguments, parent processes, and file paths to identify potentially malicious activity indicative of defense evasion.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access through various means (e.g., phishing, drive-by download).</li>
<li>The attacker leverages a malicious HTML application (HTA) file or a scriptlet (SCT) file.</li>
<li>The attacker uses <code>mshta.exe</code> or <code>rundll32.exe</code> to execute the malicious HTA or SCT file. The command line includes obfuscated or encoded script content.</li>
<li><code>mshta.exe</code> or <code>rundll32.exe</code> process spawns a child process, such as <code>cmd.exe</code> or <code>powershell.exe</code>, to execute further commands.</li>
<li>The spawned process executes malicious code, such as downloading and executing a payload.</li>
<li>The attacker achieves persistence by modifying registry keys or creating scheduled tasks.</li>
<li>The attacker performs lateral movement by exploiting vulnerabilities or using stolen credentials.</li>
<li>The final objective is achieved, such as data exfiltration, ransomware deployment, or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, allowing attackers to compromise the system, steal sensitive data, deploy ransomware, or establish a persistent foothold. Due to the nature of the technique, it can bypass many traditional security measures. The wide adoption of Windows and the inherent trust placed in signed binaries makes this a potent evasion technique. Failure to detect and prevent this attack can lead to significant financial and reputational damage for the targeted organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Script Execution via Microsoft HTML Application&rdquo; to your SIEM to detect suspicious <code>mshta.exe</code> and <code>rundll32.exe</code> executions. Tune the rule by adding exceptions for known legitimate uses in your environment.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to ensure the visibility required for the Sigma rules to function correctly.</li>
<li>Monitor process command lines for suspicious arguments like &ldquo;script:eval&rdquo;, &ldquo;WScript.Shell&rdquo;, and &ldquo;mshta http&rdquo; which are indicative of this technique.</li>
<li>Implement application control policies to restrict the execution of <code>mshta.exe</code> and <code>rundll32.exe</code> where they are not required for legitimate business purposes.</li>
<li>Investigate and block any identified malicious HTA files or scriptlet URLs found in the command lines of detected processes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>script-execution</category><category>windows</category></item><item><title>Suspicious Script Interpreter Execution from Environment Variable Folders</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-script-execution/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-script-execution/</guid><description>Malware may execute scripts from suspicious directories accessible via environment variables using script interpreters like cscript, wscript, mshta, and powershell to evade detection.</description><content:encoded><![CDATA[<p>Attackers may attempt to execute malicious scripts from suspicious directories or folders accessible by environment variables. This technique leverages script interpreters such as <code>cscript.exe</code>, <code>wscript.exe</code>, <code>mshta.exe</code>, and <code>powershell.exe</code> to run scripts from locations like the Temp directory, the Public user folder, or other user profile directories. The use of these locations can help attackers evade detection, as security tools may not thoroughly inspect files executed from these typically benign locations. This activity has been associated with threat actors such as Shuckworm, known to target Ukraine military.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access, potentially through phishing or exploiting a software vulnerability.</li>
<li>A malicious script is dropped into a suspicious folder such as <code>C:\Users\Public\</code>, <code>%TEMP%</code>, or <code>C:\Users\&lt;username&gt;\AppData\Local\Temp</code>.</li>
<li>The attacker uses <code>cscript.exe</code>, <code>wscript.exe</code>, or <code>mshta.exe</code> to execute the dropped script. The command line may contain flags to bypass execution policies (e.g., <code>-ExecutionPolicy bypass</code>) or hide the window (e.g., <code>-w hidden</code>).</li>
<li>Alternatively, PowerShell may be invoked with the <code>-ep bypass</code> or <code>-ExecutionPolicy Bypass</code> flags, along with a command to execute the script located in the temporary folder.</li>
<li>The script executes, performing malicious actions such as downloading additional payloads, establishing persistence, or exfiltrating data.</li>
<li>The script may leverage built-in Windows utilities for further malicious activities.</li>
<li>The attacker achieves their objective, such as data theft or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to a range of damaging outcomes, including system compromise, data theft, and further propagation of malware within the network. Organizations may experience data breaches, financial losses, and reputational damage. The compromise of systems can also disrupt business operations and require extensive recovery efforts.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Script Interpreter Execution From Suspicious Folder</code> to your SIEM to detect suspicious script executions.</li>
<li>Monitor process creation events with a focus on script interpreters (<code>cscript.exe</code>, <code>wscript.exe</code>, <code>mshta.exe</code>, <code>powershell.exe</code>) executing from suspicious directories, using the <code>logsource</code> and <code>detection</code> sections of the Sigma rule as a guide.</li>
<li>Tune the filters in the Sigma rule based on your environment to reduce false positives, as described in the <code>falsepositives</code> section.</li>
<li>Review and block any observed malicious command lines containing flags like <code>-ep bypass</code>, <code>-ExecutionPolicy bypass</code>, or <code>-w hidden</code>, as detailed in the <code>selection_proc_flags</code> section of the Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>execution</category><category>script-execution</category><category>malware</category></item><item><title>Invoke-Obfuscation via Clip.exe</title><link>https://feed.craftedsignal.io/briefs/2024-01-invoke-obfuscation-clip/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-invoke-obfuscation-clip/</guid><description>The use of `clip.exe` in conjunction with PowerShell and command-line obfuscation is used to evade detection.</description><content:encoded><![CDATA[<p>Attackers are increasingly using obfuscation techniques to evade detection, specifically leveraging <code>clip.exe</code> in conjunction with PowerShell and command-line interpreters. This combination allows for the execution of malicious code while bypassing traditional signature-based detections. This activity often includes encoding and splitting commands to avoid string-based detection. Invoke-Obfuscation is a known framework used to generate these types of payloads. Defenders should focus on detecting the specific patterns of command execution and data manipulation that are characteristic of this technique. The detection of such obfuscated PowerShell commands is crucial for identifying and mitigating potential security breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system (e.g., via phishing or exploiting a vulnerability).</li>
<li>A command interpreter (cmd.exe) is invoked to execute a complex, obfuscated command.</li>
<li>The command includes <code>echo</code> to write data to standard output, piping the output to <code>clip.exe</code>.</li>
<li><code>clip.exe</code> places the output (part of the malicious PowerShell code) into the clipboard.</li>
<li>Another <code>cmd.exe</code> process invokes PowerShell to execute the content retrieved from the clipboard.</li>
<li>PowerShell uses reflection to load and execute .NET assemblies from the clipboard.</li>
<li>The executed code performs malicious actions, such as downloading additional payloads or establishing persistence.</li>
<li>The clipboard content is cleared to remove traces of the injected code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of obfuscated PowerShell commands can lead to a range of malicious activities, including malware installation, data theft, and remote system control. The use of <code>clip.exe</code> and other obfuscation techniques significantly hinders detection efforts, potentially allowing attackers to operate undetected for extended periods. This can result in significant financial losses, data breaches, and reputational damage for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Invoke-Obfuscation Via Use Clip&rdquo; to your SIEM to detect command lines using <code>clip.exe</code> and obfuscated PowerShell (see rule details).</li>
<li>Monitor process creation events for instances of <code>cmd.exe</code> invoking <code>clip.exe</code> with command lines containing <code>echo</code> piped to <code>clip.exe</code> (logsource: process_creation, product: windows).</li>
<li>Inspect PowerShell execution logs for commands that access the clipboard, especially when followed by assembly loading or remote code execution (logsource: process_creation, product: windows).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>obfuscation</category></item><item><title>Unusual Network Connection via DllHost</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-dllhost-network-connection/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-dllhost-network-connection/</guid><description>The rule identifies unusual instances of dllhost.exe making outbound network connections to non-local IPs, which may indicate adversarial Command and Control activity and defense evasion.</description><content:encoded><![CDATA[<p>The detection rule identifies unusual instances of dllhost.exe making outbound network connections, which may indicate adversarial command and control activity. Dllhost.exe is a legitimate Windows process used to host DLL services. Adversaries may exploit it for stealthy command and control by initiating unauthorized network connections to non-local IPs. This approach helps in identifying potential threats by focusing on unusual network behaviors associated with this process. The rule aims to detect activity related to defense evasion, where adversaries use system binaries to proxy execution. The detection logic relies on identifying dllhost.exe processes initiating network connections to destinations outside of commonly used private IP ranges.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., via phishing or exploitation).</li>
<li>The attacker executes a malicious DLL file on the compromised system.</li>
<li>The attacker uses dllhost.exe to host and execute the malicious DLL.</li>
<li>The malicious DLL initiates a network connection to an external IP address, bypassing traditional process-based network monitoring.</li>
<li>The attacker establishes a command and control (C2) channel via the dllhost.exe process.</li>
<li>The attacker uses the C2 channel to send commands and receive data from the compromised system.</li>
<li>The attacker performs lateral movement within the network.</li>
<li>The attacker exfiltrates sensitive data from the compromised network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the establishment of a covert command and control channel, allowing attackers to remotely control the compromised system. This can result in data theft, further compromise of the network, and potential financial loss. The references point to APT29 activity, suggesting sophisticated actors may leverage this technique.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation (Event ID 1) and network connection (Event ID 3) logging to enhance visibility of process execution and network activity (<a href="https://ela.st/sysmon-event-1-setup">https://ela.st/sysmon-event-1-setup</a>, <a href="https://ela.st/sysmon-event-3-setup">https://ela.st/sysmon-event-3-setup</a>).</li>
<li>Deploy the Sigma rule <code>Unusual Network Connection via DllHost</code> to your SIEM to detect suspicious outbound connections from dllhost.exe.</li>
<li>Investigate and whitelist legitimate software updates or enterprise applications that use dllhost.exe for network communications to reduce false positives, as described in the rule&rsquo;s analysis notes.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>command-and-control</category><category>windows</category></item><item><title>Suspicious Execution from a Mounted Device</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-execution-mounted-device/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-execution-mounted-device/</guid><description>Attackers may use mounted devices as a non-standard working directory to execute signed binaries or script interpreters, evading traditional defense mechanisms, particularly when launched via explorer.exe.</description><content:encoded><![CDATA[<p>This detection rule identifies suspicious execution of script interpreters or signed binaries from mounted devices in Windows environments. Attackers attempt to evade defenses by launching processes from non-standard directories, such as mounted devices. This technique can be employed following initial access via phishing or other means. The focus is on processes spawned by <code>explorer.exe</code> with a working directory on removable drives (D, E, F) and named <code>rundll32.exe</code>, <code>mshta.exe</code>, <code>powershell.exe</code>, <code>pwsh.exe</code>, <code>cmd.exe</code>, <code>regsvr32.exe</code>, <code>cscript.exe</code>, <code>wscript.exe</code>, <code>certutil.exe</code>, <code>bitsadmin.exe</code>, <code>msiexec.exe</code>, <code>wmic.exe</code>, <code>schtasks.exe</code>, or <code>msbuild.exe</code>. This behavior is anomalous and indicative of potential malicious activity. The rule originates from Elastic&rsquo;s detection rule set.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>User unknowingly executes a malicious file (T1204.002) or opens a phishing email leading to drive-by compromise.</li>
<li>The malicious file is downloaded onto the system, potentially onto a mounted device such as a USB drive (D:, E:, or F:).</li>
<li>The user interacts with the mounted device via <code>explorer.exe</code>, inadvertently triggering the execution of a malicious script or binary (TA0002).</li>
<li>The script interpreter (e.g., powershell.exe, cmd.exe) or a signed binary (e.g., mshta.exe, regsvr32.exe) is executed from the mounted device (T1059).</li>
<li>The process inherits the working directory from the mounted device, further masking its origin.</li>
<li>The script or binary performs malicious actions, such as downloading additional malware, establishing persistence, or exfiltrating data (TA0005).</li>
<li>The attacker leverages the trusted binary or interpreter to proxy execution of their malicious code (T1127, T1218).</li>
<li>The system is compromised, potentially leading to data theft, ransomware deployment, or lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack of this nature can lead to the compromise of Windows systems. Attackers can evade traditional defenses, making detection more challenging. The impact can range from data theft and system compromise to lateral movement and ransomware deployment. Organizations may experience financial loss, reputational damage, and operational disruption if systems are successfully compromised using this technique.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging (Event ID 1) to capture process execution events, including the working directory and parent process, which is essential for activating the rules below.</li>
<li>Deploy the &ldquo;Suspicious Execution from Mounted Device&rdquo; Sigma rule to your SIEM to detect potentially malicious processes being launched from unusual locations and tune for your environment.</li>
<li>Implement application control policies to restrict the execution of script interpreters and signed binaries from removable drives to mitigate the risk of this attack.</li>
<li>Educate users about the risks of executing files from untrusted sources, particularly from removable media, to prevent initial infection (T1204).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>mounted-device</category><category>windows</category></item><item><title>Suspicious CertUtil Commands Used for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-certutil/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-certutil/</guid><description>Attackers abuse certutil.exe, a native Windows utility, to download/deobfuscate malware for command and control or data exfiltration, evading defenses.</description><content:encoded><![CDATA[<p>CertUtil is a command-line utility included with Windows, designed for managing digital certificates and certificate services. Attackers frequently abuse it to &ldquo;live off the land&rdquo; by downloading malware, deobfuscating files, and establishing command and control channels within compromised environments. This activity leverages certutil.exe to perform actions typically associated with malicious payloads, blending in with legitimate system activity and evading traditional security measures. The tool&rsquo;s capability to encode, decode, and retrieve files from URLs makes it a versatile asset for attackers aiming to maintain a low profile while executing malicious operations. This detection focuses on identifying specific command-line arguments indicative of this abuse, such as those used for encoding, decoding, and URL retrieval.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access through an undisclosed means (e.g., phishing, exploit).</li>
<li>The attacker executes certutil.exe via cmd.exe or PowerShell.</li>
<li>Certutil is used with the <code>urlcache</code> parameter to download a malicious payload from a remote server.</li>
<li>Certutil uses the <code>decode</code> parameter to decode a base64-encoded payload, saving it to disk.</li>
<li>The attacker uses certutil with <code>encodehex</code> to encode a binary into a hexadecimal representation to evade signature-based detection.</li>
<li>The attacker then uses certutil with <code>decodehex</code> to decode the hexadecimal encoded data.</li>
<li>The attacker executes the decoded payload, gaining further control of the system.</li>
<li>The attacker establishes a command and control channel, using certutil to encode/decode communications.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to download and execute arbitrary code, bypass security measures, and maintain persistence within the compromised system. This can lead to data exfiltration, system compromise, and further propagation of the attack within the network. The lack of directly observed IOCs in the originating advisory limits quantification of victim count and impact scope, but the technique is widely applicable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Suspicious CertUtil Usage for Encoding/Decoding&rdquo; to detect abuse of encoding/decoding functions within certutil.exe, focusing on unusual file types or destinations.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious CertUtil URL Download&rdquo; to identify certutil.exe being used to download files from URLs, and tune the rule based on known good software deployment practices.</li>
<li>Enable Sysmon process creation logging to ensure the rules above function correctly by capturing command-line arguments (as referenced in the logsource for each rule).</li>
<li>Review historical process execution logs for instances of certutil.exe using suspicious parameters like <code>decode</code>, <code>encode</code>, <code>urlcache</code>, <code>verifyctl</code>, <code>encodehex</code>, <code>decodehex</code>, or <code>exportPFX</code> to identify potentially compromised systems.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>command-and-control</category><category>credential-access</category><category>windows</category></item><item><title>Detecting Remote Windows Service Installation for Lateral Movement</title><link>https://feed.craftedsignal.io/briefs/2024-01-remote-service-install/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-remote-service-install/</guid><description>This rule detects a network logon followed by Windows service creation with the same LogonId on a Windows host, which could indicate lateral movement or persistence by adversaries.</description><content:encoded><![CDATA[<p>This detection rule identifies a potential lateral movement technique where an attacker establishes a network logon to a Windows system and subsequently installs a service using the same LogonId. This behavior is flagged as suspicious because it deviates from typical administrative practices and can indicate unauthorized access and persistence within the network. The rule is designed to filter out common legitimate services and administrative activities, focusing on anomalies that could signify malicious intent. This detection is crucial for defenders as it can uncover attackers attempting to move laterally and establish persistent access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a network via compromised credentials or exploiting a vulnerability.</li>
<li>The attacker performs network reconnaissance to identify target systems for lateral movement.</li>
<li>Using valid credentials or pass-the-hash techniques, the attacker authenticates to a remote Windows host over the network (e.g., SMB).</li>
<li>The attacker attempts to install a new service on the remote host, potentially using tools like <code>sc.exe</code> or PowerShell.</li>
<li>The service installation event is logged with a specific LogonId that matches the earlier network logon event, indicating a relationship between the two activities.</li>
<li>The newly installed service is configured to execute a malicious payload or establish a reverse shell.</li>
<li>The attacker uses the service to execute commands or deploy further malicious tools on the compromised host.</li>
<li>The attacker achieves persistence and lateral movement within the network, enabling further compromise and data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using this technique can lead to widespread compromise of systems within a network. Attackers can use the newly installed service to execute arbitrary code, install malware, or move laterally to other systems. This can result in data theft, system disruption, or ransomware deployment. The impact can be significant, potentially affecting numerous systems and causing substantial financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Windows Security Event Logs with necessary auditing policies, specifically Audit Logon and Audit Security System Extension, to capture relevant logon and service installation events.</li>
<li>Deploy the provided Sigma rules to your SIEM to detect suspicious remote service installations based on matching LogonIds from network logons.</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on unusual service file paths and user accounts.</li>
<li>Review the list of excluded service file paths in the Sigma rules and customize them based on your environment&rsquo;s known legitimate services.</li>
<li>Monitor network connections for suspicious SMB activity, particularly connections originating from unusual or untrusted sources.</li>
<li>Implement multi-factor authentication (MFA) to reduce the risk of credential theft and unauthorized network access.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>persistence</category><category>windows</category></item><item><title>Windows USN Journal Deletion via Fsutil</title><link>https://feed.craftedsignal.io/briefs/2024-01-usn-journal-deletion/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-usn-journal-deletion/</guid><description>Adversaries may delete the volume USN Journal on Windows systems using `fsutil.exe` to eliminate evidence of post-exploitation file activity.</description><content:encoded><![CDATA[<p>Attackers can use the <code>fsutil.exe</code> utility to delete the volume USN Journal in Windows. The USN Journal tracks changes made to files and directories on a disk volume, including metadata for file creation, deletion, modification, and permission changes. Deleting this journal can hinder forensic analysis by removing evidence of file operations. This technique is used to cover tracks and evade detection after an initial compromise. This activity is often observed during the post-exploitation phase of an attack, where adversaries attempt to remove traces of their presence and actions on the compromised system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system.</li>
<li>The attacker executes <code>fsutil.exe</code> via command line.</li>
<li>The command <code>fsutil usn deletejournal /D [volume]</code> is used to delete the USN Journal on the specified volume.</li>
<li>The operating system processes the command, removing the USN Journal.</li>
<li>Subsequent file system activity is no longer recorded in the USN Journal.</li>
<li>The attacker performs further actions on the system, such as lateral movement or data exfiltration.</li>
<li>Forensic analysis is hampered due to the missing USN Journal entries.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful deletion of the USN Journal impairs forensic investigations and incident response efforts. Without the USN Journal, analysts may struggle to determine the full scope of an intrusion, including files created, modified, or deleted by the attacker. This can lead to incomplete remediation and a higher risk of reinfection.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect USN Journal Deletion via Fsutil&rdquo; to your SIEM to identify this specific behavior.</li>
<li>Monitor process execution events for <code>fsutil.exe</code> with arguments related to &ldquo;deletejournal&rdquo; and &ldquo;usn&rdquo; to detect potential attempts to delete the USN Journal.</li>
<li>Enable Sysmon process creation logging to capture the execution of <code>fsutil.exe</code> with the relevant arguments.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>fsutil</category><category>usn journal</category></item><item><title>Windows System Restore Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-disable-system-restore/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-disable-system-restore/</guid><description>Attackers disable Windows System Restore by modifying specific registry keys to hinder recovery efforts after malicious activity.</description><content:encoded><![CDATA[<p>Attackers may disable the Windows System Restore feature to prevent victims from easily reverting their systems to a clean state after an infection or other malicious activity. This action complicates incident response and remediation efforts, forcing more complex and time-consuming recovery procedures. Disabling system restore is often performed post-compromise to ensure persistence and hinder forensic analysis. This technique can be implemented manually through the registry editor or via automated scripts, making it accessible to a wide range of threat actors.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained through various methods (e.g., phishing, exploitation).</li>
<li>The attacker escalates privileges to Administrator or SYSTEM.</li>
<li>The attacker uses <code>reg.exe</code> or PowerShell to modify registry keys.</li>
<li>The attacker targets the <code>HKLM\Software\Policies\Microsoft\Windows NT\SystemRestore\DisableConfig</code> registry key.</li>
<li>Alternatively, the attacker targets the <code>HKLM\Software\Microsoft\Windows NT\CurrentVersion\SystemRestore\DisableSR</code> registry key.</li>
<li>The attacker sets the value of the targeted registry key to <code>DWORD:00000001</code>.</li>
<li>The attacker confirms the System Restore feature is disabled.</li>
<li>The attacker proceeds with further malicious activities, knowing that recovery is hindered.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling System Restore can significantly impede recovery efforts following a cyber incident. Organizations may face longer downtimes and increased costs associated with manual system reimaging or advanced forensic analysis. The absence of readily available restore points can also lead to data loss if systems are severely damaged or encrypted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Registry Disable System Restore</code> to your SIEM to detect malicious attempts to disable System Restore via registry modification.</li>
<li>Monitor registry modifications related to System Restore configurations, focusing on the keys <code>\Policies\Microsoft\Windows NT\SystemRestore</code> and <code>\Microsoft\Windows NT\CurrentVersion\SystemRestore</code>, and values set to <code>DWORD (0x00000001)</code>.</li>
<li>Implement strict access controls to prevent unauthorized modification of registry settings.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>impact</category><category>t1490</category><category>persistence</category></item><item><title>Windows Scheduled Tasks AT Command Enabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-at-command-enabled/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-at-command-enabled/</guid><description>Attackers may enable the deprecated Windows AT command via registry modification to achieve local persistence or lateral movement.</description><content:encoded><![CDATA[<p>The legacy Windows AT command allows scheduling tasks for execution. While deprecated since Windows 8 and Windows Server 2012, it remains present for backwards compatibility. Attackers may enable the AT command through registry modifications to achieve persistence or lateral movement within a network. This technique bypasses modern security controls and can be difficult to detect without specific monitoring. The detection rule monitors registry changes enabling this command, flagging potential misuse by checking specific registry paths and values indicative of enabling the AT command. The use of this command allows an attacker to execute commands with elevated privileges, potentially compromising the entire system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, possibly through phishing or exploiting a vulnerability.</li>
<li>The attacker attempts to enable the AT command by modifying the registry.</li>
<li>The registry key <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Configuration\EnableAt</code> is modified to a value of &ldquo;1&rdquo; or &ldquo;0x00000001&rdquo;.</li>
<li>The attacker uses the AT command to schedule a malicious task.</li>
<li>The scheduled task executes a command or script, such as downloading and executing malware.</li>
<li>The malware establishes persistence on the system.</li>
<li>The attacker uses the compromised system as a pivot point for lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Enabling the AT command can lead to unauthorized task scheduling, malware execution, persistence, and lateral movement within a network. Successful exploitation can compromise sensitive data, disrupt operations, and grant attackers persistent access to critical systems. The use of a deprecated command makes it harder to detect, increasing the impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor registry events for modifications to <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Configuration\EnableAt</code> as described in the rule overview.</li>
<li>Deploy the Sigma rule &ldquo;Scheduled Tasks AT Command Enabled&rdquo; to your SIEM and tune for your environment.</li>
<li>Enable Sysmon process creation and registry event logging to activate the rule.</li>
<li>Investigate any alerts triggered by the Sigma rule &ldquo;Scheduled Tasks AT Command Enabled&rdquo; for suspicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>lateral-movement</category><category>windows</category></item><item><title>Unusual Scheduled Task Update</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-scheduled-task-update/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-scheduled-task-update/</guid><description>This rule detects modifications to scheduled tasks by user accounts, excluding system activity and machine accounts, which adversaries can exploit for persistence by modifying them to execute malicious code.</description><content:encoded><![CDATA[<p>This detection identifies first-time modifications to scheduled tasks by non-system users on Windows systems. Adversaries frequently abuse scheduled tasks to achieve persistence by modifying existing tasks or creating new ones that execute malicious code at recurring intervals. This rule focuses on detecting unauthorized changes to existing tasks by filtering out known system accounts (SYSTEM, Local Service, Network Service) and machine accounts, thereby highlighting potentially suspicious user activity. The rule leverages Windows Security Event Logs (event code 4702) to monitor task modifications. The goal is to aid in the early detection of threats where attackers are attempting to establish persistence on a compromised system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker enumerates existing scheduled tasks on the system using tools like <code>schtasks.exe</code> or PowerShell cmdlets.</li>
<li>The attacker identifies a suitable scheduled task to modify for persistence.</li>
<li>The attacker modifies the task&rsquo;s settings, such as the trigger time, the executable to run, or the arguments passed to the executable. This modification is logged as event ID 4702.</li>
<li>The scheduled task is updated using <code>schtasks.exe /change</code> or PowerShell&rsquo;s <code>Set-ScheduledTask</code> cmdlet.</li>
<li>The modified scheduled task executes at the specified time, launching the attacker&rsquo;s malicious payload.</li>
<li>The malicious payload establishes a reverse shell to the attacker&rsquo;s command and control (C2) server.</li>
<li>The attacker uses the reverse shell to perform further actions on the compromised system, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack involving the modification of scheduled tasks can lead to persistent access to a compromised system. The attacker can use this access to steal sensitive data, install malware, or perform other malicious activities. While this rule is low severity, it can uncover attackers attempting to persist in a network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Other Object Access Events&rdquo; to generate the required Windows Security Event Logs (event ID 4702) as described in the setup instructions.</li>
<li>Deploy the Sigma rule provided below to your SIEM to detect unusual scheduled task updates.</li>
<li>Investigate any alerts generated by this rule to determine if the scheduled task modification is legitimate or malicious.</li>
<li>Review the references provided to understand the underlying event IDs and attacker techniques related to scheduled tasks.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>scheduled-task</category><category>windows</category></item><item><title>Uncommon Registry Persistence Change Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-uncommon-registry-persistence/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-uncommon-registry-persistence/</guid><description>This rule detects changes to uncommon registry persistence keys on Windows systems that are not commonly used or modified by legitimate programs, which could indicate an adversary's attempt to persist in a stealthy manner by modifying registry keys for persistence, ensuring malicious code executes on startup or during specific events.</description><content:encoded><![CDATA[<p>This detection identifies unusual modifications to less commonly altered registry keys, which may indicate stealthy persistence attempts on Windows systems. Adversaries exploit registry keys for persistence, ensuring malicious code executes on startup or during specific events. The rule filters out benign changes by excluding known legitimate processes and paths, focusing on suspicious alterations. The rule focuses on changes to registry keys such as <code>HKLM\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon\\Shell</code> and <code>HKEY_USERS\\*\\SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Windows\\Run</code>. This rule is designed for data generated by Elastic Defend and also supports third-party data sources such as Sysmon. The rule was last updated on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker executes code on the system, potentially using a dropper or exploit.</li>
<li>The attacker identifies uncommon registry keys suitable for persistence.</li>
<li>The attacker modifies the registry key to point to a malicious executable or script. This may involve adding a new entry or modifying an existing one.</li>
<li>The system restarts, or the user logs in, triggering the execution of the malicious code through the modified registry key.</li>
<li>The malicious code executes with the privileges of the user or system, depending on the registry key modified.</li>
<li>The attacker achieves persistence, allowing them to maintain access to the system even after restarts.</li>
<li>The attacker performs malicious activities such as data exfiltration, lateral movement, or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to persistent access to the compromised system, allowing the attacker to maintain control and execute malicious activities. This can lead to data theft, system disruption, or further compromise of the network. The impact can range from a single workstation being compromised to a widespread enterprise-level breach, depending on the attacker&rsquo;s objectives and the scope of the initial compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Uncommon Registry Persistence Change&rdquo; Sigma rule to your SIEM to detect modifications to uncommon registry persistence keys and tune for your environment.</li>
<li>Enable Sysmon registry event logging to ensure the visibility required for the Sigma rule to function effectively (see references).</li>
<li>Review and tune the filter conditions in the Sigma rule to reduce false positives, specifically excluding legitimate software installations, system maintenance processes, and administrative scripts.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the process responsible for the registry modification and correlating it with other suspicious activities.</li>
<li>Block execution of known malicious executables and scripts identified during the investigation to prevent further compromise.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>registry</category><category>windows</category></item><item><title>Suspicious Script Object Execution via scrobj.dll</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-scrobj-load/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-scrobj-load/</guid><description>Detection of scrobj.dll loaded into unusual Microsoft processes indicates potential malicious scriptlet execution for defense evasion and execution by abusing legitimate system binaries.</description><content:encoded><![CDATA[<p>This detection identifies suspicious usage of <code>scrobj.dll</code>, a legitimate Windows library, when loaded into unusual Microsoft processes. Attackers may exploit <code>scrobj.dll</code> to execute malicious scriptlets within trusted processes, thereby evading detection. This technique allows adversaries to proxy execution through trusted system binaries. The rule focuses on detecting anomalous activity by excluding common executables, and flagging only non-standard processes loading <code>scrobj.dll</code>. The detection logic is based on identifying image load events where <code>scrobj.dll</code> is loaded into unexpected processes, indicating a potential misuse of the library. The rule is designed for data generated by Elastic Defend, Elastic Endgame, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means.</li>
<li>The attacker crafts or deploys a malicious scriptlet designed to execute malicious commands or payloads.</li>
<li>The attacker leverages a non-standard or less common Microsoft process to load <code>scrobj.dll</code>.</li>
<li><code>scrobj.dll</code> is loaded into the target process, enabling the execution of scriptlets.</li>
<li>The malicious scriptlet executes within the context of the trusted Microsoft process, bypassing application whitelisting or other security controls.</li>
<li>The scriptlet performs malicious actions, such as downloading additional payloads, modifying system configurations, or establishing command and control communication.</li>
<li>The attacker achieves their objectives, such as data exfiltration, lateral movement, or persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary code within the context of a trusted process, bypassing security controls and potentially leading to full system compromise. This could result in data theft, system corruption, or further propagation of the attack within the network. The impact is significant because it allows malware to operate under the guise of legitimate system processes.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Suspicious Scrobj.dll Image Load</code> to your SIEM to detect this activity (see rule below).</li>
<li>Enable Sysmon Event ID 7 (Image Loaded) to collect the necessary data for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule <code>Suspicious Scrobj.dll Image Load</code> to determine the legitimacy of the <code>scrobj.dll</code> loading activity.</li>
<li>Implement application whitelisting to prevent unauthorized execution of scripts and binaries, focusing on processes identified in the detection rule.</li>
<li>Continuously audit scheduled tasks and exclude known safe processes from the detection rule to minimize false positives, as described in the rule&rsquo;s Triage and Analysis section.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>windows</category></item><item><title>Suspicious Script Interpreter Execution from Environment Variable Folders</title><link>https://feed.craftedsignal.io/briefs/2024-01-susp-script-exec/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-susp-script-exec/</guid><description>Adversaries may execute script interpreters such as cscript, wscript, mshta, or powershell from suspicious directories accessible via environment variables to evade detection and execute malicious scripts.</description><content:encoded><![CDATA[<p>Attackers often leverage script interpreters like cscript.exe, wscript.exe, mshta.exe, and powershell.exe to execute malicious code. This activity becomes more suspicious when these interpreters are launched from directories referenced by environment variables commonly associated with temporary storage, such as %TEMP%, %PUBLIC%, or within user profile directories like Favorites or Contacts. This behavior is often indicative of malware attempting to evade detection by residing in locations less scrutinized by security tools. Such techniques are employed to execute malicious scripts downloaded from the internet or dropped by other malware components. This behavior has been linked to threat actors such as Shuckworm, known for targeting Ukraine with military-themed lures.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user downloads a malicious file (e.g., a document or executable) from the internet or receives it via email.</li>
<li>The malicious file, upon execution, drops a script file (e.g., VBScript, JavaScript, PowerShell script) into a temporary directory like C:\Users\Public\ or C:\Users&lt;username&gt;\AppData\Local\Temp.</li>
<li>The dropped script uses obfuscation and/or encoding techniques to avoid static analysis.</li>
<li>The attacker executes a script interpreter (cscript.exe, wscript.exe, mshta.exe, powershell.exe) to run the malicious script from the temporary directory. The command line often includes bypass flags such as <code>-ExecutionPolicy Bypass</code> or <code>-w hidden</code> to evade security controls.</li>
<li>The script interpreter executes the malicious code, which may involve downloading additional payloads, establishing persistence, or performing lateral movement.</li>
<li>The malicious script may modify registry keys to establish persistence by adding a run key or scheduled task.</li>
<li>The script may attempt to connect to command-and-control (C2) servers to receive further instructions and exfiltrate sensitive data.</li>
<li>The final objective may include data theft, system compromise, or deployment of ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the execution of arbitrary code, system compromise, and data exfiltration. Depending on the attacker&rsquo;s objectives, the impact can range from data theft to full system control and ransomware deployment. The exploitation of scripting engines can bypass application control policies and other security measures, leading to widespread infection and significant disruption of business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Script Interpreter Execution From Suspicious Folder&rdquo; to your SIEM to detect suspicious script execution from temporary directories.</li>
<li>Review and tune the filters in the Sigma rule for your environment to reduce false positives, especially related to software installation processes.</li>
<li>Enable process creation logging with command-line arguments to provide the necessary data for the Sigma rule to function effectively.</li>
<li>Monitor PowerShell execution policies and restrict script execution to signed scripts only to prevent the execution of unsigned malicious scripts.</li>
<li>Implement application control policies to restrict the execution of script interpreters from untrusted locations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>attack.execution</category><category>attack.t1059</category></item><item><title>Suspicious Network Connection via Registration Utility</title><link>https://feed.craftedsignal.io/briefs/2024-01-regsvr-network-connection/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-regsvr-network-connection/</guid><description>The native Windows tools regsvr32.exe, regsvr64.exe, RegSvcs.exe, or RegAsm.exe making a network connection may indicate an attacker bypassing allowlists or running arbitrary scripts via a signed Microsoft binary.</description><content:encoded><![CDATA[<p>Attackers may abuse native Windows registration utilities such as <code>regsvr32.exe</code>, <code>RegAsm.exe</code>, and <code>RegSvcs.exe</code> to execute malicious code and bypass security controls. These utilities are often used to register and unregister COM objects and .NET assemblies, but can also be leveraged to download and execute arbitrary scripts from remote locations. The behavior is commonly seen in post-exploitation scenarios. This activity can be used to bypass application allow lists and evade defenses. This behavior has been observed across multiple threat actors and attack campaigns, making it a reliable indicator of suspicious or malicious activity. This detection focuses on the network connection initiated by these utilities, highlighting potential misuse.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means, such as exploiting a vulnerability or using stolen credentials.</li>
<li>The attacker uses a registration utility (e.g., <code>regsvr32.exe</code>) to execute a malicious script or download a payload from a remote server.</li>
<li>The registration utility makes an outbound network connection to a malicious server to download the payload.</li>
<li>The downloaded payload is executed, potentially leading to further compromise of the system.</li>
<li>The attacker performs reconnaissance on the compromised system to gather information about the environment.</li>
<li>The attacker moves laterally to other systems on the network, leveraging the compromised system as a pivot point.</li>
<li>The attacker installs persistence mechanisms to maintain access to the compromised environment.</li>
<li>The attacker exfiltrates sensitive data or deploys ransomware, depending on their objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, allowing attackers to install malware, steal sensitive data, or disrupt business operations. The affected systems can be used as a beachhead for further attacks on the internal network, potentially leading to widespread compromise. The use of signed Microsoft binaries makes detection more challenging, as these tools are often trusted by default. While the risk_score is low at 21 and severity low, this is often related to initial access and could lead to high impact down the line.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation (Event ID 1) and network connection (Event ID 3) logging to ensure visibility into the execution of registration utilities and their network activity.</li>
<li>Deploy the Sigma rules in this brief to your SIEM to detect suspicious network connections initiated by <code>regsvr32.exe</code>, <code>RegAsm.exe</code>, and <code>RegSvcs.exe</code>.</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on the command-line arguments used and the destination IP addresses.</li>
<li>Implement network segmentation to limit the potential impact of a compromised system, restricting lateral movement.</li>
<li>Monitor for unexpected registry modifications associated with the execution of registration utilities, as these can indicate persistence mechanisms.</li>
<li>Review and update application allow lists to ensure that only authorized uses of registration utilities are permitted.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>execution</category><category>defense evasion</category><category>windows</category><category>regsvr32</category></item><item><title>Suspicious Copy from or to System Directory</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-susp-copy-system-dir/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-susp-copy-system-dir/</guid><description>This threat involves the suspicious copying of files from or to Windows system directories (System32, SysWOW64, WinSxS) using command-line tools, often employed by attackers to relocate LOLBINs for defense evasion.</description><content:encoded><![CDATA[<p>Attackers often copy legitimate operating system binaries (LOLBINs) from standard system directories to evade detection. This technique involves using command-line tools like <code>cmd.exe</code>, <code>powershell.exe</code>, <code>robocopy.exe</code>, or <code>xcopy.exe</code> to move these binaries to different locations on the disk, frequently with modified names. By relocating and renaming LOLBINs, threat actors attempt to bypass security measures that rely on file path or filename-based detection. This technique has been observed in various attack campaigns, including those involving malware delivery and ransomware deployment. This behavior aims to execute malicious operations under the guise of legitimate system processes, complicating forensic analysis and incident response efforts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is achieved through an undisclosed method (e.g., exploitation, phishing).</li>
<li>The attacker gains command execution on the target system.</li>
<li>The attacker uses <code>cmd.exe</code> or <code>powershell.exe</code> to initiate a copy operation.</li>
<li>The command line includes the <code>copy</code> command, <code>copy-item</code>, <code>cp</code>, or <code>cpi</code> to copy a file.</li>
<li>The source file is located within a Windows system directory such as <code>C:\\Windows\\System32</code>, <code>C:\\Windows\\SysWOW64</code>, or <code>C:\\Windows\\WinSxS</code>.</li>
<li>The destination directory is outside the standard system directories.</li>
<li>The copied binary is then executed from the new location.</li>
<li>The attacker uses the LOLBIN to perform further malicious actions, such as downloading payloads or executing arbitrary code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of this attack allows threat actors to evade traditional security detections by using renamed and relocated LOLBINs. This can lead to the successful execution of malicious payloads, potentially resulting in data theft, system compromise, or ransomware deployment. The impact can range from localized infections to domain-wide ransomware attacks, depending on the attacker&rsquo;s objectives and the scope of the compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Suspicious Copy From or To System Directory&rdquo; to your SIEM to detect this behavior and tune for your environment.</li>
<li>Investigate any <code>process_creation</code> events where <code>cmd.exe</code> or <code>powershell.exe</code> is used to copy files from system directories as indicated by the rule and the details in the Attack Chain section.</li>
<li>Monitor for the execution of LOLBINs such as <code>certutil.exe</code>, <code>robocopy.exe</code>, and <code>xcopy.exe</code> from non-standard locations.</li>
<li>Implement application control policies to restrict the execution of unauthorized or relocated binaries.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>lolbin</category><category>windows</category></item><item><title>Service Startup Type Modification via WMIC</title><link>https://feed.craftedsignal.io/briefs/2024-01-wmic-service-startup-change/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wmic-service-startup-change/</guid><description>Adversaries use the Windows Management Instrumentation Command-line (WMIC) utility to modify the startup type of services, setting them to 'Manual' or 'Disabled' to impair defenses or disrupt system operations.</description><content:encoded><![CDATA[<p>Attackers may leverage WMIC, a legitimate Windows command-line utility, to modify the startup type of services. This tactic is often used to disable security products or critical system services, hindering incident response or creating system instability. By setting services to &ldquo;Manual&rdquo; or &ldquo;Disabled&rdquo;, adversaries ensure that these services do not automatically start upon system boot, achieving persistence or impeding detection. While WMIC is a built-in tool, its use for modifying service startup types is often indicative of malicious activity, especially when performed on security-related services. This activity may be part of a larger attack chain aimed at deploying ransomware, exfiltrating data, or establishing a persistent presence on the compromised system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system, potentially through phishing, exploiting a vulnerability, or compromised credentials.</li>
<li>The attacker executes <code>wmic.exe</code> with specific command-line arguments to interact with Windows services.</li>
<li>The <code>service</code> alias is invoked within WMIC to target specific services.</li>
<li>The <code>ChangeStartMode</code> method is used to modify the startup type of the targeted service.</li>
<li>The attacker sets the startup type to either <code>Manual</code> or <code>Disabled</code>, preventing the service from automatically starting on subsequent reboots.</li>
<li>If the targeted service is a security product, this action effectively disables the defense mechanism.</li>
<li>The attacker proceeds with further malicious activities, such as deploying malware or exfiltrating sensitive data, with reduced resistance.</li>
<li>The compromised system experiences degraded security posture and potential operational disruptions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of service startup types can severely impact system security and availability. Disabling security software can lead to undetected malware infections and data breaches. Disabling critical system services can cause system instability, data loss, or complete system failure. While the exact number of victims is unknown, this technique is broadly applicable across Windows environments, potentially affecting organizations of any size and in any sector. The impact ranges from minor operational disruptions to significant financial losses due to data breaches and ransomware attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect suspicious <code>wmic.exe</code> process creations that attempt to change service startup types.</li>
<li>Investigate any instances where <code>wmic.exe</code> is used to modify service startup types, especially when the targeted services are related to security or critical system functions.</li>
<li>Implement endpoint detection and response (EDR) solutions to provide enhanced visibility into process execution and system modifications.</li>
<li>Regularly review and audit service configurations to identify unauthorized changes.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.execution</category><category>attack.t1047</category><category>attack.defense-evasion</category><category>attack.t1562.001</category></item><item><title>SeDebugPrivilege Enabled by a Suspicious Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-sedebugpriv-enabled/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-sedebugpriv-enabled/</guid><description>The rule identifies a process running with a non-SYSTEM account that enables the SeDebugPrivilege privilege, which can be used by adversaries to debug and modify other processes to escalate privileges and bypass access controls.</description><content:encoded><![CDATA[<p>This detection rule identifies processes running under non-SYSTEM accounts that enable the SeDebugPrivilege. This privilege, typically reserved for system-level tasks, allows a process to debug and modify other processes. Adversaries may enable SeDebugPrivilege to escalate their privileges and bypass access controls, potentially gaining unauthorized access to sensitive data or system resources. The rule aims to detect suspicious processes enabling this privilege, excluding known legitimate processes, to flag potential privilege escalation attempts. This rule was last updated on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means (e.g., phishing, exploiting a vulnerability).</li>
<li>The attacker executes a malicious process on the compromised system.</li>
<li>The malicious process attempts to enable the SeDebugPrivilege.</li>
<li>Windows Security Auditing logs a &ldquo;Token Right Adjusted Events&rdquo; event, indicating that a process has enabled SeDebugPrivilege.</li>
<li>The detection rule identifies the event, filtering out known legitimate processes that may legitimately enable this privilege (e.g., msiexec.exe, taskhostw.exe).</li>
<li>The rule triggers an alert, indicating a potential privilege escalation attempt.</li>
<li>Security analysts investigate the alert to determine the legitimacy of the process enabling SeDebugPrivilege and the context of its execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and enabling of SeDebugPrivilege can allow an attacker to debug and modify other processes, potentially gaining access to sensitive information, escalating privileges to SYSTEM level, and bypassing security controls. This can lead to a complete compromise of the affected system and potentially lateral movement to other systems on the network. The impact is high, especially in environments where sensitive data is processed or stored.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Token Right Adjusted Events to ensure proper logging of SeDebugPrivilege usage as per the <a href="https://ela.st/audit-token-right-adjusted-events">setup instructions</a>.</li>
<li>Deploy the &ldquo;SeDebugPrivilege Enabled by a Suspicious Process&rdquo; Sigma rule to your SIEM to detect potential privilege escalation attempts.</li>
<li>Review and tune the exclusion list in the Sigma rule to minimize false positives, considering legitimate processes in your environment, as described in the <a href="#false-positive-analysis">False positive analysis</a>.</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the process enabling SeDebugPrivilege.</li>
<li>Monitor systems for unauthorized access or lateral movement following the detection of SeDebugPrivilege enabling.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>token-manipulation</category><category>windows</category></item><item><title>Remote Scheduled Task Creation via RPC</title><link>https://feed.craftedsignal.io/briefs/2024-01-remote-task-creation/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-remote-task-creation/</guid><description>The creation of scheduled tasks from a remote source via RPC, where the RpcCallClientLocality and ClientProcessId are 0, indicates potential adversary lateral movement within a Windows environment.</description><content:encoded><![CDATA[<p>This detection identifies the creation of scheduled tasks on Windows systems originating from a remote source using Remote Procedure Call (RPC). The creation of scheduled tasks is a common technique used for persistence and execution. While administrators may legitimately use this functionality for remote management, adversaries also leverage it for lateral movement and executing malicious code on compromised systems. The rule specifically looks for RPC calls where the client locality and process ID are 0, suggesting the task was created remotely. Identifying this activity allows defenders to investigate potentially malicious lateral movement and unauthorized task execution. This activity has been observed across various Windows environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a network, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker identifies a target system within the network accessible via RPC.</li>
<li>The attacker establishes an RPC connection to the target system.</li>
<li>Using the RPC connection, the attacker creates a new scheduled task on the target system. The RpcCallClientLocality and ClientProcessId are set to 0 in the task creation event, indicating remote origin.</li>
<li>The scheduled task is configured to execute a malicious payload or command. This could involve running a script, executable, or PowerShell command.</li>
<li>The scheduled task is triggered based on a defined schedule or event.</li>
<li>The malicious payload executes on the target system, achieving the attacker&rsquo;s objective.</li>
<li>The attacker uses the compromised system to further pivot within the network, repeating the process on other targets.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the establishment of persistence on the target system, allowing the attacker to maintain access even after reboots or credential changes. This can also facilitate lateral movement, enabling the attacker to compromise additional systems within the network. The impact could range from data theft and system disruption to full network compromise. Organizations may experience downtime, data loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Other Object Access Events&rdquo; to generate the Windows Security Event Logs required for detection (reference: Setup section in content).</li>
<li>Deploy the provided Sigma rules to your SIEM to detect remote scheduled task creation events (reference: rules section).</li>
<li>Investigate any alerts generated by the Sigma rules to determine the legitimacy of the scheduled task creation.</li>
<li>Review and restrict permissions for creating scheduled tasks, especially from remote sources, to prevent unauthorized task creation.</li>
<li>Monitor the TaskContent value to investigate the configured action of scheduled tasks created remotely (reference: Triage and analysis section in content).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>execution</category><category>windows</category></item><item><title>Process Created with a Duplicated Token</title><link>https://feed.craftedsignal.io/briefs/2024-01-process-created-with-duplicated-token/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-process-created-with-duplicated-token/</guid><description>This rule identifies the creation of a process impersonating the token of another user logon session on Windows, potentially indicating privilege escalation.</description><content:encoded><![CDATA[<p>This detection rule identifies the creation of a process impersonating the token of another user logon session on Windows. Adversaries may duplicate tokens to create processes with elevated privileges, bypassing security controls. This technique is used for privilege escalation. The rule flags suspicious process creation by examining token usage patterns, process origins, and recent file modifications, while excluding known legitimate behaviors, to flag potential privilege escalation attempts. The rule is designed for data generated by Elastic Endpoint 8.4+.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means, such as exploiting a vulnerability or using compromised credentials.</li>
<li>The attacker identifies a user logon session with higher privileges than their current session.</li>
<li>The attacker duplicates the token of the identified user logon session using API calls like <code>DuplicateTokenEx</code>.</li>
<li>The attacker uses the duplicated token to create a new process using <code>CreateProcessWithTokenW</code>.</li>
<li>The new process inherits the privileges of the duplicated token.</li>
<li>The attacker executes malicious commands or tools within the context of the newly created process.</li>
<li>The attacker gains elevated privileges on the system, allowing them to perform actions they were previously unauthorized to do.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker to escalate privileges on the compromised system, potentially gaining administrative or system-level access. This can lead to unauthorized access to sensitive data, installation of malware, lateral movement to other systems on the network, and ultimately, complete control over the affected environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Elastic Defend to collect the necessary process creation and event data to activate this rule.</li>
<li>Deploy the Sigma rule <code>Detect Process Created with a Duplicated Token</code> to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the rule, focusing on processes with unusual parent-child relationships or unsigned code.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>token-impersonation</category><category>windows</category></item><item><title>Print.exe Used to Dump Sensitive Files for Credential Access</title><link>https://feed.craftedsignal.io/briefs/2024-01-print-exe-credential-dump/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-print-exe-credential-dump/</guid><description>Attackers are abusing the legitimate Windows Print.exe utility to copy sensitive files like NTDS.DIT and SAM in order to extract credentials, enabling local or remote credential access.</description><content:encoded><![CDATA[<p>Attackers are leveraging the <code>Print.exe</code> utility, a legitimate Windows command-line tool, to dump sensitive operating system files for credential harvesting. This technique involves using <code>Print.exe</code> to copy files like <code>ntds.dit</code>, <code>SAM</code>, <code>SECURITY</code>, and <code>SYSTEM</code> from their protected Windows directories. These files contain sensitive credential data that can be extracted offline. This activity was observed in relation to the SolarWinds Web Help Desk exploitation in early 2026. Abuse of <code>Print.exe</code> allows attackers to bypass traditional security measures that focus on blocking known malicious executables. This poses a significant risk because the extracted credentials can be used for lateral movement, privilege escalation, and data exfiltration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a Windows system, potentially through exploitation of a vulnerability in a web application or via compromised credentials.</li>
<li>The attacker executes <code>print.exe</code> with command-line arguments specifying the source file to copy (e.g., <code>\config\SAM</code>, <code>\windows\ntds\ntds.dit</code>) and the destination path. The <code>/D</code> flag is used to designate the destination printer or file.</li>
<li><code>Print.exe</code> copies the targeted sensitive file (e.g., NTDS.DIT, SAM, SECURITY, SYSTEM) from its protected location.</li>
<li>The copied file is typically saved to a location accessible to the attacker, either locally or on a network share.</li>
<li>The attacker uses credential harvesting tools (e.g., <code>secretsdump.py</code> from Impacket) to extract user credentials (hashes) from the dumped files.</li>
<li>The attacker cracks the password hashes or uses them directly for pass-the-hash attacks.</li>
<li>Using the harvested credentials, the attacker moves laterally to other systems within the network, escalating privileges as needed.</li>
<li>The attacker achieves their final objective, such as data exfiltration, deployment of ransomware, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to steal domain or local account credentials. These stolen credentials enable unauthorized access to sensitive resources, including critical systems and data. The impact can range from data breaches and financial loss to complete compromise of the affected organization&rsquo;s network. While the scale of past attacks is not stated in the source, similar credential dumping attacks have led to breaches affecting millions of users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Sensitive File Dump Via Print.EXE</code> to detect abuse of <code>Print.exe</code> for copying sensitive files (logsource: <code>process_creation</code>).</li>
<li>Monitor process creation events for the execution of <code>print.exe</code> with command-line parameters that include sensitive file paths such as <code>\config\SAM</code>, <code>\config\SECURITY</code>, <code>\config\SYSTEM</code>, or <code>\windows\ntds\ntds.dit</code> (logsource: <code>process_creation</code>).</li>
<li>Implement access controls to restrict access to sensitive files like <code>ntds.dit</code>, <code>SAM</code>, <code>SECURITY</code>, and <code>SYSTEM</code> to only authorized accounts and processes.</li>
<li>Investigate any instances of <code>print.exe</code> copying files from the <code>\config</code> or <code>\windows\ntds</code> directories.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-dumping</category><category>credential-access</category><category>windows</category><category>print.exe</category></item><item><title>PowerShell Token Obfuscation via Process Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-powershell-token-obfuscation/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-powershell-token-obfuscation/</guid><description>Adversaries employ token obfuscation techniques within PowerShell commands to evade detection by security tools, leveraging methods such as character insertion, string concatenation, and environment variable manipulation to mask their malicious intent.</description><content:encoded><![CDATA[<p>Attackers are increasingly using PowerShell token obfuscation techniques to bypass security measures. This involves manipulating PowerShell command syntax to make it harder for security tools to identify malicious code. This technique leverages Invoke-Obfuscation, a known framework for obfuscating PowerShell scripts. This method allows malicious actors to disguise commands, such as downloading and executing arbitrary code, making traditional signature-based detections less effective. The use of token obfuscation highlights the need for more sophisticated detection strategies that focus on identifying anomalous behavior rather than relying solely on static code analysis. The scope of this threat is broad, as it can be incorporated into various attack vectors, from initial access to lateral movement.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access through an undisclosed method (e.g., phishing, exploit).</li>
<li>PowerShell Execution: The attacker initiates a PowerShell process (powershell.exe).</li>
<li>Token Obfuscation: The attacker employs token obfuscation techniques, such as inserting backticks (<code>), using string concatenation, or manipulating environment variables, to disguise malicious commands. Examples from the source include </code>IN<code>V</code>o<code>Ke-eXp</code>ResSIOn<code>and</code>${e<code>Nv:pATh}</code>.</li>
<li>Command Obfuscation: The obfuscated PowerShell command is executed, masking the intent of the command.</li>
<li>Payload Download: The obfuscated command may download a malicious payload from a remote server using methods such as <code>(New-Object Net.WebClient).DownloadString</code>.</li>
<li>Code Execution: The downloaded payload is executed, potentially leading to further compromise of the system.</li>
<li>Persistence: The attacker may establish persistence through various methods.</li>
<li>Lateral Movement/Exfiltration: Depending on the attacker&rsquo;s objectives, they may move laterally within the network or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation using PowerShell token obfuscation can lead to complete system compromise, data theft, and disruption of services. The obfuscation techniques make it difficult for traditional security tools to detect and prevent the attack. The number of victims and sectors targeted is currently unknown, but the potential impact is significant due to the widespread use of PowerShell in enterprise environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Powershell Token Obfuscation with Backticks&rdquo; to identify PowerShell commands containing backtick-obfuscated tokens in <code>process_creation</code> logs.</li>
<li>Deploy the Sigma rule &ldquo;Detect Powershell Token Obfuscation with String Concatenation&rdquo; to identify PowerShell commands using string concatenation to obfuscate tokens in <code>process_creation</code> logs.</li>
<li>Monitor <code>process_creation</code> logs for PowerShell processes executing commands with environment variable manipulation, as described in the Sigma rules provided.</li>
<li>Investigate any PowerShell processes that exhibit obfuscation techniques to determine if they are malicious.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>token-obfuscation</category><category>powershell</category></item><item><title>Invoke-Obfuscation Obfuscated IEX Invocation via PowerShell</title><link>https://feed.craftedsignal.io/briefs/2024-01-invoke-obfuscation-iex/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-invoke-obfuscation-iex/</guid><description>Attackers use Invoke-Obfuscation, a PowerShell obfuscation framework, to generate obfuscated IEX (Invoke-Expression) commands, evading detection and executing malicious code.</description><content:encoded><![CDATA[<p>Attackers leverage Invoke-Obfuscation, a popular PowerShell obfuscation framework, to generate highly obfuscated IEX (Invoke-Expression) commands. This technique allows them to bypass traditional signature-based detections and execute malicious payloads on targeted systems. Invoke-Obfuscation is designed to make PowerShell code difficult to read and analyze, thus hindering security analysts and automated detection systems. The obfuscation techniques include string concatenation using environment variables, character code manipulation, and other methods to mask the true intent of the script. This activity has been observed across various campaigns, typically targeting Windows environments where PowerShell is widely used. Defenders should be aware of this technique and implement robust detection mechanisms to identify and block obfuscated PowerShell execution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to the target system through methods such as phishing or exploiting a software vulnerability.</li>
<li>Payload Delivery: The attacker uploads a malicious PowerShell script or downloads it from a remote server.</li>
<li>Obfuscation: The attacker uses Invoke-Obfuscation to obfuscate the PowerShell script, making it difficult to analyze. This can involve techniques like string concatenation using <code>$PSHome</code> or <code>$ShellId</code>, or using complex variable manipulations.</li>
<li>Execution: The attacker executes the obfuscated PowerShell script using <code>powershell.exe</code>.</li>
<li>IEX Invocation: The obfuscated script leverages <code>IEX</code> (Invoke-Expression) to dynamically execute code, further hindering detection. The obfuscated strings are deobfuscated at runtime within the IEX context.</li>
<li>Persistence (Optional): The attacker may establish persistence by creating scheduled tasks or modifying registry keys.</li>
<li>Lateral Movement (Optional): The attacker may use the compromised system as a launching point for lateral movement within the network, using tools like <code>PsExec</code> or <code>WinRM</code>.</li>
<li>Objective: The ultimate objective could be data exfiltration, ransomware deployment, or establishing a long-term foothold for espionage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary code on the compromised system, leading to various malicious activities such as data theft, system compromise, and ransomware deployment. The use of Invoke-Obfuscation makes detection more challenging, potentially allowing attackers to remain undetected for extended periods. This can result in significant financial losses, reputational damage, and operational disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Invoke-Obfuscation Obfuscated IEX Invocation</code> to your SIEM to detect obfuscated IEX commands generated by Invoke-Obfuscation.</li>
<li>Monitor PowerShell execution logs for suspicious command-line arguments that resemble obfuscation patterns described in the Sigma rule.</li>
<li>Implement PowerShell Constrained Language Mode to restrict the capabilities of PowerShell and limit the effectiveness of obfuscation techniques.</li>
<li>Enable and review PowerShell Script Block Logging to capture the content of executed scripts, allowing for more in-depth analysis of malicious activity.</li>
<li>Regularly update your endpoint detection and response (EDR) solutions to ensure they have the latest signatures and behavioral detection capabilities.</li>
<li>Educate users about the risks of phishing and other social engineering attacks that may be used to deliver malicious PowerShell scripts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>powershell</category><category>obfuscation</category></item><item><title>Enumeration of Privileged Local Groups Membership</title><link>https://feed.craftedsignal.io/briefs/2024-01-enumeration-privileged-local-groups/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-enumeration-privileged-local-groups/</guid><description>An unusual process is enumerating built-in Windows privileged local groups membership, such as Administrators or Remote Desktop users, potentially revealing targets for credential compromise and post-exploitation activities.</description><content:encoded><![CDATA[<p>Attackers often perform reconnaissance after compromising a system to plan their next steps. This includes enumerating network resources, users, connections, files, and installed security software. This activity allows attackers to identify high-value targets for lateral movement and credential theft. This detection identifies processes that are unusually enumerating the membership of privileged local groups on Windows systems, such as Administrators or Remote Desktop Users. It is based on Elastic detection rule &ldquo;Enumeration of Privileged Local Groups Membership&rdquo; (rule_id: &ldquo;291a0de9-937a-4189-94c0-3e847c8b13e4&rdquo;). The rule excludes common legitimate utilities to reduce false positives. The presence of such enumeration activity, especially by unknown or untrusted processes, should be investigated immediately to determine the scope and intent of the intrusion.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises a Windows host through an initial access vector like phishing or exploitation.</li>
<li>The attacker executes a reconnaissance command or script to gather information about the system.</li>
<li>The command attempts to enumerate the members of privileged local groups, such as Administrators or Remote Desktop Users, using built-in Windows utilities or custom tools.</li>
<li>Windows Security Event Logs record the event of user-member enumeration with Event ID 4798 or similar events.</li>
<li>The attacker parses the output of the enumeration command to identify potential targets for credential theft or privilege escalation.</li>
<li>The attacker uses the gathered information to move laterally to other systems or escalate privileges on the compromised host.</li>
<li>The attacker compromises additional systems and continues to pursue their objectives, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enumeration of privileged local groups allows attackers to identify accounts with elevated privileges on the compromised system. This information is used to target those accounts for credential theft, enabling lateral movement and further compromise of the network. If successful, the attacker gains access to sensitive data, critical systems, or deploys ransomware, causing significant disruption and financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Security Group Management to generate the necessary Windows Security Event Logs as described in the Elastic setup guide.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Enumeration of Privileged Local Groups Membership&rdquo; to detect unusual processes enumerating group memberships based on <code>CallerProcessName</code> and <code>TargetSid</code>.</li>
<li>Investigate any alerts generated by the Sigma rule, prioritizing those involving unknown or untrusted processes.</li>
<li>Monitor process execution for command-line arguments and tools commonly used for enumeration, such as <code>net.exe</code>, <code>dsquery</code>, or PowerShell scripts.</li>
<li>Implement least privilege principles to minimize the number of accounts with membership in privileged local groups.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>discovery</category><category>windows</category><category>privileged-access</category></item><item><title>Detection of Obfuscated IP Addresses via Command Line Tools</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-obfuscated-ip-cli/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-obfuscated-ip-cli/</guid><description>The use of command-line tools like ping.exe or arp.exe with obfuscated IP addresses (hex, octal, etc.) in the command line can indicate reconnaissance activity or attempts to evade security controls by masking the true destination.</description><content:encoded><![CDATA[<p>Attackers may attempt to obscure their activities by using obfuscated IP addresses within command-line tools. This is done to bypass simple pattern matching or detection rules that rely on standard IP address formats. The Sigma rule &ldquo;Obfuscated IP Via CLI&rdquo; published on 2022-08-03 and modified on 2026-03-16, focuses on detecting this behavior by identifying command lines containing hexadecimal, octal, or other encoded representations of IP addresses used with <code>ping.exe</code> or <code>arp.exe</code>. This activity can indicate reconnaissance, command and control communication, or lateral movement attempts where attackers are trying to hide the true destination of their network traffic.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system.</li>
<li>The attacker opens a command prompt (cmd.exe) or PowerShell.</li>
<li>The attacker uses <code>ping.exe</code> or <code>arp.exe</code> to test network connectivity.</li>
<li>The attacker crafts a command line that includes an obfuscated IP address (e.g., hexadecimal, octal). For example: <code>ping 0121.04.0174.012</code></li>
<li>The command is executed, attempting to resolve or connect to the obfuscated IP address.</li>
<li>If the obfuscation bypasses security controls, the tool resolves the address.</li>
<li>The attacker gathers information about the target system (if ping is successful) or network.</li>
<li>The attacker uses this information for further exploitation or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of obfuscated IPs can lead to undetected reconnaissance, lateral movement, and data exfiltration. By hiding the true destination of network traffic, attackers can bypass traditional security measures and gain a foothold within the network. The impact includes potential data breaches, system compromise, and disruption of services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Obfuscated IP Via CLI&rdquo; Sigma rule to your SIEM to detect command-line execution with obfuscated IP addresses.</li>
<li>Enable process creation logging for <code>ping.exe</code> and <code>arp.exe</code> to ensure the Sigma rule has the necessary data.</li>
<li>Investigate any alerts generated by the Sigma rule to determine if the activity is malicious.</li>
<li>Implement network segmentation to limit the scope of potential lateral movement.</li>
<li>Monitor command-line activity for unusual patterns or arguments.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>reconnaissance</category><category>evasion</category><category>command-line</category></item><item><title>Detection of Important Scheduled Task Deletion or Disablement</title><link>https://feed.craftedsignal.io/briefs/2024-01-scheduled-task-deletion/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-scheduled-task-deletion/</guid><description>Adversaries delete or disable critical scheduled tasks, such as those related to system restore, Windows Defender, BitLocker, Windows Backup, or Windows Update, to disrupt operations and potentially conduct data destructive activities.</description><content:encoded>&lt;p>This brief focuses on the detection of malicious activity related to the deletion or disabling of important scheduled tasks within a Windows environment. Adversaries may target these tasks to disrupt normal system operations, escalate privileges, establish persistence, or facilitate data destruction. The targeted tasks often include critical system functions like System Restore, Windows Defender updates, BitLocker encryption, Windows Backup processes, and Windows Update mechanisms. This…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>attack.execution</category><category>attack.privilege-escalation</category><category>attack.persistence</category><category>attack.t1053.005</category></item><item><title>Deletion of Critical Scheduled Tasks</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-schtasks-deletion/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-schtasks-deletion/</guid><description>Adversaries delete critical scheduled tasks, such as those related to BitLocker, ExploitGuard, System Restore, Windows Defender, and Windows Update, to disrupt security measures and enable data destruction.</description><content:encoded>&lt;p>Attackers may attempt to delete scheduled tasks to disable security mechanisms or prevent system recovery, creating an environment conducive to data destruction. This involves using the &lt;code>schtasks.exe&lt;/code> utility to remove scheduled tasks related to critical system functions. This activity is designed to impair incident response, prevent restoration of systems, and generally increase the impact of an attack. This is done by removing the scheduled tasks, which prevents the execution of security…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>attack.impact</category><category>attack.t1489</category></item><item><title>Windows Proxy Execution of .NET Utilities via Scripts</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-proxy-execution-net-utilities/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-proxy-execution-net-utilities/</guid><description>Detects the execution of .NET utilities by script processes from unusual locations, indicative of signed binary proxy execution for defense evasion and code execution.</description><content:encoded><![CDATA[<p>This threat brief addresses the abuse of trusted Microsoft .NET binaries as proxies for malicious code execution. Attackers leverage script-based execution (e.g., PowerShell, VBScript, batch files) from atypical or user-writable directories to launch .NET utilities like aspnet_compiler.exe, msbuild.exe, regasm.exe, InstallUtil.exe, and vbc.exe. This method allows threat actors to bypass security controls and blend in with legitimate system activity. Observed activity occurs in environments where endpoint detection and response (EDR) agents are deployed. The lack of command-line variation between the utility&rsquo;s image path and its executed process reinforces the suspicion of proxy execution. This technique has been associated with malware campaigns, including the deployment of VIP Keylogger.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (potentially through phishing or exploiting a software vulnerability, although this source does not specify the entry vector).</li>
<li>The attacker drops a malicious script (e.g., a PowerShell script) into a user-writable directory such as C:\Users\Public\ or C:\Temp\.</li>
<li>The malicious script executes, and is often obfuscated to evade detection, from the non-standard location.</li>
<li>The script then calls a legitimate .NET utility (e.g., InstallUtil.exe) to execute malicious code.</li>
<li>The .NET utility executes with minimal command-line arguments, often just the executable path itself, to further blend in with legitimate activity.</li>
<li>The .NET utility loads and executes attacker-controlled code, bypassing application control policies.</li>
<li>The malicious code performs actions such as keylogging (as seen with VIP Keylogger), credential theft, or lateral movement.</li>
<li>The attacker achieves their objective, such as data exfiltration or establishing persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation enables attackers to bypass application control and execute arbitrary code, potentially leading to data theft, system compromise, and persistent access. While the number of victims and specific sectors are not detailed in this brief&rsquo;s source, the use of VIP Keylogger as a payload demonstrates the potential for sensitive data exfiltration. Organizations lacking robust endpoint detection capabilities are at significant risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect .NET Utility Execution from Unusual Script Parents&rdquo; to identify potential proxy execution attempts based on process relationships and file paths (rule provided below).</li>
<li>Investigate any instances of .NET utilities (aspnet_compiler.exe, msbuild.exe, regasm.exe, InstallUtil.exe, vbc.exe) being launched from user-writable directories, especially when the parent process is a script interpreter (batch, CMD, PowerShell, JScript, VBScript, HTML).</li>
<li>Monitor process creation events (Sysmon EventID 1 or Windows Event Log Security 4688) for unusual parent-child process relationships involving script interpreters and .NET utilities.</li>
<li>Implement application control policies to restrict the execution of .NET utilities from untrusted locations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>proxy-execution</category><category>net-utility</category><category>defense-evasion</category><category>execution</category><category>signed-binary-proxy-execution</category></item><item><title>Suspicious Outbound Scheduled Task Activity via PowerShell</title><link>https://feed.craftedsignal.io/briefs/2024-01-scheduled-task-powershell/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-scheduled-task-powershell/</guid><description>This rule detects PowerShell loading the Task Scheduler COM DLL followed by an outbound RPC network connection, potentially indicating lateral movement or remote discovery via scheduled tasks.</description><content:encoded><![CDATA[<p>The detection rule identifies suspicious PowerShell activity related to scheduled tasks. Adversaries exploit Task Scheduler to execute malicious scripts, facilitating lateral movement or remote discovery. The rule monitors for the Task Scheduler DLL load within PowerShell processes (powershell.exe, pwsh.exe, powershell_ise.exe) followed by outbound RPC connections, signaling potential misuse. This activity may be indicative of attackers leveraging scheduled tasks for remote execution or reconnaissance within a compromised network. The detection logic focuses on the sequence of loading <code>taskschd.dll</code> and initiating an RPC connection to port 135, a common port for Distributed Component Object Model (DCOM) communication.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means.</li>
<li>The attacker uses PowerShell to interact with the Task Scheduler service.</li>
<li>PowerShell process (powershell.exe, pwsh.exe, or powershell_ise.exe) loads the <code>taskschd.dll</code> library.</li>
<li>The attacker creates or modifies a scheduled task using PowerShell commands.</li>
<li>The scheduled task is configured to execute a malicious payload.</li>
<li>PowerShell initiates an outbound RPC connection on port 135.</li>
<li>The malicious payload executes, potentially leading to lateral movement or remote discovery.</li>
<li>The attacker achieves their objective, such as gaining control of additional systems or gathering sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized remote code execution, lateral movement within the network, and the potential compromise of sensitive data. The creation or modification of scheduled tasks can provide persistence for attackers, allowing them to maintain access to compromised systems even after reboots. The impact includes potential data breaches, system compromise, and disruption of services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 7 (Image Loaded) and Event ID 3 (Network Connection) logging to detect the specific activity described in the attack chain.</li>
<li>Deploy the Sigma rule &ldquo;Outbound Scheduled Task Activity via PowerShell&rdquo; to your SIEM and tune the <code>maxspan</code> value based on your environment&rsquo;s typical activity patterns.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the specific PowerShell commands used and the scheduled tasks created or modified.</li>
<li>Monitor network connections to port 135 originating from PowerShell processes, and correlate with other security events to identify suspicious patterns.</li>
<li>Implement stricter controls on the creation and modification of scheduled tasks, limiting access to authorized personnel only.</li>
<li>Review and clean up any unauthorized scheduled tasks on systems to prevent persistent malicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>execution</category><category>lateral-movement</category><category>windows</category></item><item><title>Potential Persistence via Time Provider Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-time-provider-modification/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-time-provider-modification/</guid><description>Adversaries may establish persistence by registering and enabling a malicious DLL as a time provider by modifying registry keys associated with the W32Time service.</description><content:encoded><![CDATA[<p>The Windows Time service (W32Time) synchronizes the system clock with other devices on the network, using time providers implemented as DLL files located in the System32 folder. This architecture can be abused by adversaries to establish persistence by registering and enabling a malicious DLL as a time provider. The W32Time service starts during Windows startup and loads w32time.dll. This technique involves modifying specific registry keys associated with the Time Providers, enabling a malicious DLL to be loaded and executed every time the service starts. This can allow an attacker to maintain persistent access to the system, even after a reboot. The Elastic Security team has identified this persistence method and provided a detection rule to identify such modifications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system through an exploit, phishing, or other means.</li>
<li>The attacker obtains administrator privileges on the target system.</li>
<li>The attacker crafts or deploys a malicious DLL to be used as a time provider.</li>
<li>The attacker modifies the registry to register the malicious DLL as a valid time provider. The registry keys under <code>HKLM\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\</code> are targeted.</li>
<li>The attacker enables the newly registered time provider.</li>
<li>The W32Time service is restarted, or the system is rebooted.</li>
<li>The W32Time service loads the malicious DLL, executing the attacker&rsquo;s code.</li>
<li>The attacker maintains persistent access to the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows the attacker to achieve persistence on the compromised system. The attacker can execute arbitrary code every time the W32Time service starts. This may lead to further malicious activities, such as data theft, lateral movement, or the installation of additional malware. The impact is significant, as the attacker can maintain long-term control over the system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Time Provider DLL Registration</code> to detect the registration of new DLL files as Time Providers in the registry.</li>
<li>Enable Sysmon registry event logging to capture registry modifications, as this is a requirement for the provided Sigma rules.</li>
<li>Investigate any registry changes to the <code>HKLM\SYSTEM\CurrentControlSet\Services\W32Time\TimeProviders\</code> path, especially those adding new DLLs, using the provided Sigma rule.</li>
<li>Monitor process execution for <code>msiexec.exe</code> installing DLLs in the <code>Program Files\VMware\VMware Tools</code> directory, which could indicate legitimate activity, but should still be validated.</li>
<li>Regularly audit and validate the list of registered Time Providers on critical systems.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>privilege-escalation</category><category>time-provider</category></item><item><title>Potential Application Shimming via Sdbinst</title><link>https://feed.craftedsignal.io/briefs/2024-01-app-shimming/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-app-shimming/</guid><description>Attackers abuse the Application Shim functionality in Windows by using `sdbinst.exe` with malicious arguments to achieve persistence and execute arbitrary code within legitimate Windows processes.</description><content:encoded><![CDATA[<p>Application shimming is a compatibility mechanism in Windows that allows older applications to run on newer operating systems. However, attackers can abuse this functionality to gain persistence and execute arbitrary code in the context of legitimate Windows processes. This is achieved by using the <code>sdbinst.exe</code> utility to install malicious application compatibility databases (.sdb files). These databases can then be used to inject malicious code into targeted applications. The detection rule focuses on identifying suspicious invocations of <code>sdbinst.exe</code> with arguments that do not include benign flags, indicating potential misuse of the application shimming mechanism. This technique is stealthy because it allows attackers to execute code within trusted processes, making it harder to detect.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker deploys or creates a malicious .sdb file containing code to be injected.</li>
<li>The attacker uses <code>sdbinst.exe</code> to install the malicious .sdb file. The command line arguments often lack common benign flags like &ldquo;-m&rdquo;, &ldquo;-bg&rdquo;, or &ldquo;-mm&rdquo;.</li>
<li>The operating system loads the shim database when the targeted application is launched.</li>
<li>The malicious code within the .sdb file is executed in the context of the targeted application.</li>
<li>The attacker gains persistent access to the system, as the shim is loaded each time the targeted application is executed.</li>
<li>The attacker performs malicious activities, such as data exfiltration, lateral movement, or further exploitation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful application shimming attack can allow an attacker to maintain persistent access to a compromised system. This can lead to data theft, system compromise, and further malicious activities. Because the malicious code executes within a trusted process, detection can be challenging, and the attacker can potentially bypass security controls. While the number of victims is unknown, this technique is particularly effective against organizations that rely on specific applications, as the attacker can target those applications for persistence.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential Application Shimming via Sdbinst&rdquo; to your SIEM to detect suspicious invocations of <code>sdbinst.exe</code>.</li>
<li>Enable Sysmon process creation logging to capture the command-line arguments of <code>sdbinst.exe</code> executions, which is required for the Sigma rule.</li>
<li>Investigate and remove any unauthorized or suspicious application compatibility databases (.sdb files) found on systems.</li>
<li>Implement enhanced monitoring and logging for <code>sdbinst.exe</code> executions across the network to detect and respond to future attempts at application shimming.</li>
<li>Regularly review and update the list of exceptions to ensure that only verified and necessary exclusions are maintained to avoid overlooking genuine threats.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>privilege-escalation</category><category>application-shimming</category><category>windows</category></item><item><title>LSASS Loading Suspicious DLL</title><link>https://feed.craftedsignal.io/briefs/2024-01-lsass-suspicious-dll/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-lsass-suspicious-dll/</guid><description>Detection of LSASS loading an unsigned or untrusted DLL, which can indicate credential access attempts by malicious actors targeting sensitive information stored in the LSASS process.</description><content:encoded><![CDATA[<p>The Local Security Authority Subsystem Service (LSASS) is a critical Windows component that manages security policies and user authentication. Attackers often target LSASS to dump credentials, using techniques like injecting malicious DLLs. This detection focuses on identifying instances where LSASS loads a DLL that is either unsigned or not signed by a trusted vendor. The rule excludes known legitimate signatures and file hashes to reduce false positives. This activity is a strong indicator of credential access attempts, potentially leading to further compromise of the system and network. The signatures identified in the rule contain well-known software vendors like Microsoft, McAfee and Citrix.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through various means (e.g., phishing, exploiting a vulnerability).</li>
<li>The attacker elevates privileges to gain sufficient access to interact with the LSASS process.</li>
<li>The attacker drops a malicious DLL onto the system, often disguised as a legitimate file.</li>
<li>The attacker injects the malicious DLL into the LSASS process using techniques like Reflective DLL Injection.</li>
<li>LSASS loads the injected DLL, granting the attacker access to sensitive credentials stored in memory.</li>
<li>The malicious DLL dumps credentials, such as plaintext passwords or NTLM hashes.</li>
<li>The attacker uses the stolen credentials for lateral movement to other systems on the network.</li>
<li>The attacker achieves their final objective, such as data exfiltration or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to credential compromise, allowing attackers to move laterally within the network, access sensitive data, and potentially achieve complete domain dominance. This can result in data breaches, financial losses, and reputational damage. The impact depends on the level of access associated with the compromised credentials.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the <code>LSASS Loading Untrusted DLL</code> Sigma rule to your SIEM to detect suspicious DLLs loaded by LSASS.</li>
<li>Investigate any alerts generated by the Sigma rule and review the loaded DLL&rsquo;s code signature and hash.</li>
<li>Block the identified SHA256 hashes listed in the IOC table to prevent the execution of known malicious DLLs.</li>
<li>Implement application whitelisting to restrict which DLLs can be loaded into LSASS.</li>
<li>Enable Sysmon process creation and image load logging to provide the necessary data for detection.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>lsass</category><category>dll-injection</category><category>windows</category></item><item><title>Executable or Script Creation in Suspicious Paths</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-executable-creation-suspicious-path/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-executable-creation-suspicious-path/</guid><description>This analytic identifies the creation of executables or scripts in suspicious file paths on Windows systems, where adversaries often use these paths to evade detection and maintain persistence, potentially leading to unauthorized code execution, privilege escalation, or persistence within the environment.</description><content:encoded><![CDATA[<p>This detection identifies the creation of executable or script files in unusual directories on Windows systems. Adversaries often leverage these unconventional locations to evade standard security monitoring and establish persistence. The technique involves placing malicious files with extensions like <code>.exe</code>, <code>.dll</code>, <code>.ps1</code>, and others in directories such as <code>\windows\fonts\</code>, <code>\users\public\</code>, <code>\Windows\debug\</code>, and others deemed atypical for such file types. This activity can bypass traditional signature-based detections and enable the execution of unauthorized code. The scope of this threat covers Windows systems where such file creation events are logged and monitored. This is important for defenders because successful exploitation leads to arbitrary code execution, persistence and further malicious activity within the compromised environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system, potentially through exploitation of a vulnerability or compromised credentials.</li>
<li>The attacker navigates to a suspicious directory, such as <code>C:\Windows\Fonts\</code> or <code>C:\Users\Public\</code>.</li>
<li>The attacker drops a malicious executable file (e.g., <code>evil.exe</code>) or a script (e.g., <code>evil.ps1</code>) into the chosen directory.</li>
<li>The attacker employs techniques to execute the malicious file, such as creating a scheduled task, modifying registry keys, or leveraging other &ldquo;living off the land&rdquo; binaries.</li>
<li>The malicious file executes, performing actions such as establishing persistence, escalating privileges, or deploying additional malware.</li>
<li>The attacker leverages the established persistence to maintain access to the compromised system.</li>
<li>The attacker performs lateral movement to other systems within the network, utilizing tools such as PsExec or PowerShell.</li>
<li>The attacker achieves their ultimate objective, such as data exfiltration, system disruption, or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the installation of malware, unauthorized access to sensitive data, and complete system compromise. The creation of executables in suspicious paths is a common technique used by various threat actors. Multiple analytic stories are tagged, including PlugX, LockBit Ransomware, and Volt Typhoon. This technique is leveraged to evade detection and maintain a persistent presence on the compromised system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon EventID 11 logging to capture file creation events, which is the data source for the analytic.</li>
<li>Deploy the provided Sigma rule to your SIEM to detect the creation of executables or scripts in suspicious paths.</li>
<li>Investigate and validate any alerts generated by the Sigma rule, focusing on the process and user context.</li>
<li>Implement file integrity monitoring (FIM) on critical directories to detect unauthorized file modifications.</li>
<li>Review and harden file system permissions to restrict write access to suspicious directories.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>privilege-escalation</category><category>execution</category><category>windows</category></item><item><title>Detecting Remote Scheduled Task Creation for Lateral Movement</title><link>https://feed.craftedsignal.io/briefs/2024-01-remote-scheduled-task-creation/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-remote-scheduled-task-creation/</guid><description>This rule identifies remote scheduled task creations on a target Windows host, potentially indicating lateral movement by adversaries, by monitoring network connections and registry modifications related to task scheduling.</description><content:encoded><![CDATA[<p>This detection identifies remote scheduled task creations on a target host, which can be indicative of lateral movement. Adversaries often leverage scheduled tasks to execute malicious commands, maintain persistence, or escalate privileges. This technique is particularly effective as it uses native Windows functionality, making it harder to distinguish from legitimate administrative actions. This rule is designed for data generated by Elastic Defend and also supports third-party data sources such as SentinelOne Cloud Funnel and Sysmon. Understanding when and how scheduled tasks are created remotely is crucial for detecting and responding to potential intrusions. The rule focuses on network connections from svchost.exe and registry modifications related to task actions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker uses the compromised system to scan the network for potential targets.</li>
<li>The attacker attempts to authenticate to a target Windows host using stolen credentials or by exploiting a vulnerability in a network service.</li>
<li>The attacker establishes a network connection to the target host&rsquo;s Task Scheduler service, typically using ports in the dynamic port range (49152+). This connection originates from svchost.exe.</li>
<li>The attacker creates a new scheduled task on the target system using the Task Scheduler service.</li>
<li>This creation involves modifying the registry key <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks\{TaskID}\Actions</code> to define the task&rsquo;s actions. The &lsquo;Actions&rsquo; value is often base64 encoded.</li>
<li>The scheduled task executes a malicious payload, granting the attacker further access or control over the target system.</li>
<li>The attacker uses the newly gained access for lateral movement, data exfiltration, or other malicious objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive systems, data breaches, and further lateral movement within the network. The rule is designed to catch this activity, reducing the dwell time of attackers and minimizing potential damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rules to your SIEM and tune for your environment to detect malicious scheduled task creation.</li>
<li>Enable Sysmon Event ID 3 (Network Connection) and Sysmon Registry Events to enhance visibility into network connections and registry modifications (see Setup instructions).</li>
<li>Review the base64 encoded tasks actions registry value to investigate the task configured action (see rule description).</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the scheduled task creation and the intent behind the configured action.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>execution</category><category>windows</category><category>scheduled-task</category></item><item><title>Account Password Reset Remotely</title><link>https://feed.craftedsignal.io/briefs/2024-01-remote-password-reset/</link><pubDate>Tue, 02 Jan 2024 15:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-remote-password-reset/</guid><description>The rule detects attempts to reset potentially privileged account passwords remotely, a tactic used by adversaries to maintain access, evade password policies, and preserve compromised credentials.</description><content:encoded><![CDATA[<p>This detection rule identifies suspicious remote password resets targeting potentially privileged accounts on Windows systems. Attackers may attempt to reset passwords to maintain unauthorized access, evade password duration policies, or preserve compromised credentials. The rule focuses on network logins followed by password reset actions, specifically targeting privileged accounts to reduce false positives. The rule leverages Windows Security Event Logs to detect successful network logins and subsequent password reset events. The goal is to detect anomalous password reset activities that could indicate malicious activity. The rule was last updated on 2026/05/04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the network (e.g., through credential theft or phishing).</li>
<li>The attacker attempts a network login to a Windows system, generating a 4624 event with logon type &ldquo;Network&rdquo;.</li>
<li>The system logs a successful authentication event (event ID 4624) with a network logon type.</li>
<li>The attacker identifies a privileged account, such as an administrator account or a service account with elevated permissions.</li>
<li>The attacker initiates a password reset for the privileged account.</li>
<li>A password reset event (event ID 4724) is triggered, indicating that a password has been reset.</li>
<li>The attacker leverages the reset password to maintain persistent access to the compromised account.</li>
<li>The attacker performs malicious actions using the compromised privileged account, potentially leading to data exfiltration or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful password resets of privileged accounts can lead to significant security breaches. Attackers can maintain persistent access, escalate privileges, and move laterally within the network. This can result in data theft, system compromise, and disruption of services. If successful, attackers can potentially gain control over critical systems and data, leading to significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable the Windows audit policies for &ldquo;Audit Logon&rdquo; and &ldquo;Audit User Account Management&rdquo; to generate the necessary events for this detection.</li>
<li>Deploy the Sigma rule &ldquo;Detect Remote Password Reset of Privileged Account&rdquo; to your SIEM and tune it to your environment, excluding legitimate administrative accounts and processes.</li>
<li>Investigate any alerts generated by the Sigma rule by reviewing the source IP address and the target account to determine if the password reset was authorized.</li>
<li>Monitor for Event ID 4724 (Account Password Reset) in conjunction with network login events to identify suspicious password reset activity.</li>
<li>Review and update access controls and privileged account management policies to prevent similar incidents in the future, as mentioned in the overview section.</li>
<li>Create exceptions for known IT personnel or service accounts that legitimately perform remote password resets, as detailed in the false positive analysis section.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>impact</category><category>windows</category></item><item><title>Suspicious CSC.exe Parent Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-csc-suspicious-parent/</link><pubDate>Tue, 02 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-csc-suspicious-parent/</guid><description>The Csc.exe (C# compiler) process is being launched by unusual parent processes or from suspicious locations, indicating potential malware execution or defense evasion.</description><content:encoded><![CDATA[<p>Attackers are leveraging the legitimate Csc.exe (C# compiler) to execute malicious code, often as a part of defense evasion or payload delivery. This is achieved by spawning Csc.exe from unusual parent processes such as scripting hosts (cscript.exe, wscript.exe), Office applications (excel.exe, winword.exe), or PowerShell, especially when combined with encoded commands. Observed techniques also include launching Csc.exe from temporary or unusual directories. This activity bypasses traditional application whitelisting and can lead to the execution of arbitrary code. This activity has been associated with WarzoneRAT, DarkVNC, and the delivery of IMAPLoader malware.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access, potentially through phishing or exploiting a vulnerability.</li>
<li>A script or Office macro executes, initiating a command-line process.</li>
<li>This process then invokes a scripting host (e.g., cscript.exe) or PowerShell.</li>
<li>The scripting host or PowerShell executes a command that downloads or creates a C# source code file.</li>
<li>Csc.exe is then invoked, often from a temporary directory, to compile the downloaded/created C# code.</li>
<li>The compiled C# code executes, performing malicious actions.</li>
<li>The malicious code may establish persistence, communicate with a C2 server, or perform data exfiltration.</li>
<li>The final objective might be to deploy ransomware, steal sensitive data, or establish a persistent backdoor.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, allowing attackers to compromise systems, steal data, or deploy malware. Depending on the user&rsquo;s permissions, the attacker could gain elevated privileges. The observed techniques have been associated with ransomware deployment, data theft, and remote access trojans (RATs).</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Csc.EXE Execution Form Potentially Suspicious Parent&rdquo; to detect suspicious parent processes of csc.exe.</li>
<li>Monitor process creation events for csc.exe with parent processes like scripting hosts or Office applications.</li>
<li>Investigate any instances of csc.exe being executed from temporary directories or user profile locations by reviewing process_creation logs.</li>
<li>Enable Sysmon process creation logging to capture detailed process information, including parent-child relationships, for effective detection.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>attack.execution</category><category>attack.defense-evasion</category><category>csc.exe</category><category>payload-delivery</category></item><item><title>Suspicious Script Execution from Temporary Directory</title><link>https://feed.craftedsignal.io/briefs/2024-01-script-exec-temp/</link><pubDate>Tue, 02 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-script-exec-temp/</guid><description>This brief covers a detection for suspicious script execution, such as PowerShell, WScript, or MSHTA, originating from common temporary directories, potentially indicating malware activity.</description><content:encoded><![CDATA[<p>This detection identifies suspicious script executions originating from temporary directories. Threat actors often leverage temporary folders to stage and execute malicious scripts, such as PowerShell, VBScript, or even HTML applications (MSHTA) to evade detection or bypass security controls. These scripts can be delivered through various means, including phishing attacks, drive-by downloads, or as part of a multi-stage malware infection. The execution of scripts from temporary directories is generally uncommon for legitimate software, making it a valuable indicator of potentially malicious activity. This detection focuses on identifying processes like powershell.exe, pwsh.exe, mshta.exe, wscript.exe, and cscript.exe executing from or referencing standard temporary paths in their command line.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A malicious script (e.g., PowerShell, VBScript) is downloaded or dropped into a temporary directory such as <code>C:\Windows\Temp</code>, <code>\AppData\Local\Temp</code>, or similar.</li>
<li>The attacker uses a process like <code>cmd.exe</code> or <code>powershell.exe</code> to invoke the downloaded script.</li>
<li>The script executes, potentially performing reconnaissance, privilege escalation, or lateral movement.</li>
<li>The script may download additional payloads from a remote server.</li>
<li>The script establishes persistence through registry modification or scheduled tasks.</li>
<li>The script performs malicious actions such as data exfiltration or ransomware deployment.</li>
<li>The attacker attempts to remove the initial script files to cover their tracks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to a range of consequences, including data theft, system compromise, and ransomware infection. The execution of malicious scripts from temporary directories can provide attackers with a foothold in the network, allowing them to move laterally, escalate privileges, and ultimately achieve their objectives. Depending on the script&rsquo;s capabilities, it could also lead to system instability or denial of service.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Suspicious Script Execution From Temp Folder&rdquo; to your SIEM to detect script execution from temporary directories. Tune the rule&rsquo;s filters for known-good software installers in your environment to reduce false positives.</li>
<li>Enable process creation logging with command line arguments to capture the necessary information for the Sigma rule (logsource: process_creation).</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the parent process and the script&rsquo;s actions.</li>
<li>Implement application control policies to restrict the execution of scripts from temporary directories where possible.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>execution</category><category>script</category><category>temp</category></item><item><title>Windows Delayed Execution via Ping Followed by Malicious Utilities</title><link>https://feed.craftedsignal.io/briefs/2024-01-delayed-execution-via-ping/</link><pubDate>Tue, 02 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-delayed-execution-via-ping/</guid><description>Adversaries may use ping to delay execution of malicious commands, scripts, or binaries to evade detection, often observed during malware installation.</description><content:encoded><![CDATA[<p>Attackers may use ping to introduce pauses, allowing them to execute harmful scripts or binaries stealthily. This delayed execution is often observed during malware installation and is consistent with an attacker attempting to evade detection. The adversary uses <code>ping.exe</code> with the <code>-n</code> argument from within a <code>cmd.exe</code> shell, and the parent process is running under a user context other than SYSTEM. The subsequent process is <code>cmd.exe</code> invoking a known malicious utility, such as <code>powershell.exe</code>, <code>mshta.exe</code>, <code>rundll32.exe</code>, or an executable from the user&rsquo;s AppData directory without a valid code signature. This behavior is often observed during malware installation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attack begins with an initial access vector (not specified in source).</li>
<li>The adversary executes <code>cmd.exe</code>.</li>
<li><code>cmd.exe</code> spawns <code>ping.exe</code> with the <code>-n</code> argument to introduce a delay, typically to evade detection (<code>ping.exe -n [number] 127.0.0.1</code>).</li>
<li>After the delay introduced by <code>ping.exe</code>, the same <code>cmd.exe</code> process executes a potentially malicious utility such as <code>powershell.exe</code>, <code>mshta.exe</code>, <code>rundll32.exe</code>, <code>certutil.exe</code>, or <code>regsvr32.exe</code>.</li>
<li>Alternatively, <code>cmd.exe</code> might execute a binary located within the user&rsquo;s AppData directory that lacks a valid code signature.</li>
<li>The malicious utility executes arbitrary commands or scripts, potentially downloading further payloads or modifying system configurations.</li>
<li>The attacker gains a foothold on the system, enabling further malicious activities such as lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to malware installation, system compromise, and data theft. While the source does not quantify the number of victims or specific sectors targeted, a successful compromise can lead to significant operational disruption and data breaches. The use of delayed execution makes it more difficult for traditional security solutions to detect malicious activity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Delayed Execution via Ping&rdquo; to your SIEM to detect the execution of commonly abused Windows utilities via a delayed Ping execution.</li>
<li>Enable process monitoring with command-line argument logging to capture the execution of <code>ping.exe</code> and subsequent processes for analysis.</li>
<li>Implement application whitelisting to prevent unauthorized execution of scripts and binaries, focusing on the utilities identified in the rule.</li>
<li>Review and tune the provided Sigma rule, including the listed exclusions, to reduce false positives in your specific environment.</li>
<li>Monitor process execution from unusual locations like the AppData directory, especially for unsigned executables, as indicated in the rule&rsquo;s detection logic.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>execution</category><category>defense-evasion</category><category>windows</category><category>ping</category><category>lolbas</category></item><item><title>WScript or CScript Dropper</title><link>https://feed.craftedsignal.io/briefs/2024-01-cscript-wscript-dropper/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-cscript-wscript-dropper/</guid><description>The WScript or CScript Dropper technique involves using cscript.exe or wscript.exe to write malicious script files (js, jse, vba, vbe, vbs, wsf, wsh) to suspicious locations on a Windows system for later execution.</description><content:encoded><![CDATA[<p>The WScript or CScript Dropper technique is a method employed by attackers to introduce malicious script files into a system. It leverages the built-in Windows scripting hosts, <code>cscript.exe</code> and <code>wscript.exe</code>, to write files with extensions commonly associated with scripting languages (e.g., <code>.js</code>, <code>.vbs</code>, <code>.wsf</code>). These scripts are often written to temporary or user-accessible directories, such as <code>\Temp\</code>, <code>\AppData\</code>, or <code>\Startup\</code>, where they can be executed later, either manually or…</p>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>script-dropper</category><category>file-creation</category><category>windows</category></item><item><title>Windows Temporarily Scheduled Task Creation and Deletion</title><link>https://feed.craftedsignal.io/briefs/2024-01-temp-scheduled-task/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-temp-scheduled-task/</guid><description>Detection of rapid creation and deletion of scheduled tasks on Windows, indicating potential malicious activity abusing the task scheduler for execution and cleanup.</description><content:encoded><![CDATA[<p>This detection focuses on identifying the creation and subsequent deletion of scheduled tasks within a short timeframe on Windows systems. Attackers may abuse the scheduled task functionality to execute malicious code, establish persistence, or perform other unauthorized actions. By quickly deleting the task after execution, they attempt to evade detection and remove traces of their activity. This behavior is often associated with attackers trying to proxy malicious execution via the schedule service and then cleaning up to avoid leaving forensic artifacts. The detection logic looks for the sequence of task creation followed by deletion within a five-minute window. This activity is captured via Windows Security Event Logs when the &ldquo;Audit Other Object Access Events&rdquo; setting is enabled.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system. (T1053.005)</li>
<li>The attacker uses legitimate Windows utilities like <code>schtasks.exe</code> or PowerShell cmdlets to create a new scheduled task.</li>
<li>The scheduled task is configured to execute a malicious payload, such as a script or executable. The payload could be staged on disk or downloaded from a remote server.</li>
<li>The scheduled task executes the malicious payload, achieving the attacker&rsquo;s objective (e.g., establishing persistence, executing commands, or deploying malware).</li>
<li>The attacker, or the malicious payload itself, uses <code>schtasks.exe</code> or PowerShell to delete the scheduled task.</li>
<li>The deletion occurs within a short time (less than 5 minutes) after task creation to minimize the window for detection.</li>
<li>The attacker may also delete associated log files or other artifacts to further cover their tracks.</li>
<li>The attacker achieves their objective, such as maintaining persistence, escalating privileges, or exfiltrating data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to persistent access, arbitrary code execution, privilege escalation, and data compromise. While the specific impact varies depending on the attacker&rsquo;s objectives, the ability to execute code via scheduled tasks provides a significant foothold within the compromised system. This can lead to lateral movement, data exfiltration, or further compromise of the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Other Object Access Events&rdquo; in Windows Security Event Logs to generate the necessary events for detection.</li>
<li>Deploy the Sigma rule &ldquo;Temporarily Scheduled Task Creation&rdquo; to your SIEM to detect rapid task creation and deletion.</li>
<li>Investigate any alerts generated by the Sigma rule to determine if the activity is legitimate or malicious.</li>
<li>Monitor scheduled task creation events for unusual task names, command-line arguments, or user accounts.</li>
<li>Implement application control policies to restrict the execution of unauthorized executables and scripts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>execution</category><category>windows</category></item><item><title>Windows Scheduled Task Creation for Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-scheduled-task-creation/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-scheduled-task-creation/</guid><description>Adversaries may create scheduled tasks on Windows systems to establish persistence, move laterally, or escalate privileges, and this detection identifies such activity by monitoring Windows event logs for scheduled task creation events, excluding known benign tasks and those created by system accounts.</description><content:encoded><![CDATA[<p>Adversaries frequently leverage scheduled tasks in Windows to maintain persistence, elevate privileges, or facilitate lateral movement within a compromised network. This technique involves creating or modifying scheduled tasks to execute malicious code at specific times or intervals. The detection rule focuses on identifying the creation of new scheduled tasks logged in Windows event logs, filtering out tasks created by system accounts and those associated with legitimate software to minimize false positives. This detection is crucial because successful exploitation allows attackers to execute arbitrary commands or programs on a recurring basis, maintaining a foothold even after system reboots or user logoffs. Defenders need to monitor for anomalous task creation events to identify potential malicious activity. The rule references Microsoft Event ID 4698 as a key data source for detecting scheduled task creation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access to the system through phishing, exploiting a vulnerability, or using compromised credentials.</li>
<li><strong>Privilege Escalation (if needed):</strong> The attacker escalates privileges using exploits or by abusing misconfigurations to gain the necessary permissions to create scheduled tasks.</li>
<li><strong>Task Creation:</strong> The attacker creates a new scheduled task using tools like <code>schtasks.exe</code> or PowerShell.</li>
<li><strong>Configuration:</strong> The attacker configures the task to execute a malicious script or program at a specific time or event trigger.</li>
<li><strong>Persistence:</strong> The scheduled task is configured to run at regular intervals or upon system startup, ensuring persistent access to the compromised system.</li>
<li><strong>Execution:</strong> When the scheduled task triggers, the malicious payload executes, performing actions such as installing malware, stealing data, or establishing a command and control connection.</li>
<li><strong>Lateral Movement (optional):</strong> The attacker uses the compromised system and scheduled task to move laterally to other systems on the network, repeating the task creation process.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via scheduled task creation can lead to persistent access within the compromised environment. The attacker can maintain a foothold even after system restarts, enabling them to perform data exfiltration, deploy ransomware, or cause other disruptive activities. While the risk score is relatively low, the potential for persistence makes this a critical area to monitor, especially in environments where lateral movement is a significant concern. The number of affected systems depends on the scope of the initial compromise and the attacker&rsquo;s ability to move laterally.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Other Object Access Events&rdquo; to generate the necessary Windows Security Event Logs for detecting scheduled task creation (reference: setup instructions in the original rule).</li>
<li>Deploy the provided Sigma rules to your SIEM to detect suspicious scheduled task creation events, and tune the rules by adding exclusions for known benign tasks in your environment.</li>
<li>Review the investigation steps outlined in the rule&rsquo;s notes to triage alerts related to scheduled task creation, focusing on unfamiliar task names, unusual user accounts, and suspicious scheduled actions.</li>
<li>Use the <code>references</code> URL to understand the specific details of Windows Event ID 4698, which is generated when a scheduled task is created.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>scheduled-task</category><category>windows</category></item><item><title>Suspicious Remote Registry Access via SeBackupPrivilege</title><link>https://feed.craftedsignal.io/briefs/2024-01-sebackup-winreg-access/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-sebackup-winreg-access/</guid><description>Detection of remote registry access by an account with SeBackupPrivilege, potentially indicating credential exfiltration attempts via SAM registry hive dumping.</description><content:encoded><![CDATA[<p>This detection identifies suspicious activity related to credential access on Windows systems. Specifically, it focuses on scenarios where an account with the SeBackupPrivilege (typically associated with the Backup Operators group) remotely accesses the Windows Registry. Attackers can leverage this privilege to bypass access controls and dump the Security Account Manager (SAM) registry hive, which stores password hashes. This activity often precedes credential access and privilege escalation attempts, where the attacker aims to extract sensitive information from the dumped SAM hive to gain unauthorized access to other systems or elevate their privileges within the network. The detection logic looks for a sequence of events: first, a special logon event indicating the use of SeBackupPrivilege, followed by a network share access event targeting the &ldquo;winreg&rdquo; share.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to a system, potentially through phishing, exploiting a vulnerability, or using stolen credentials.</li>
<li><strong>Privilege Escalation:</strong> The attacker attempts to escalate privileges on the compromised system. If the initial access does not grant SeBackupPrivilege, they may exploit vulnerabilities or misconfigurations to gain membership in the Backup Operators group or otherwise acquire the necessary privilege.</li>
<li><strong>Special Logon:</strong> The attacker logs in using an account with the SeBackupPrivilege. This triggers a &ldquo;logged-in-special&rdquo; event (Event ID 4672) with the SeBackupPrivilege listed.</li>
<li><strong>Remote Registry Access:</strong> The attacker uses remote administration tools or scripts to access the registry of a target system remotely, specifically targeting the &ldquo;winreg&rdquo; share. This triggers a file share access event (Event ID 5145).</li>
<li><strong>SAM Hive Dump:</strong> The attacker uses the SeBackupPrivilege to bypass access controls and copies the SAM registry hive (or portions thereof) to a location accessible to them.</li>
<li><strong>Credential Extraction:</strong> The attacker extracts password hashes from the dumped SAM hive using tools like Mimikatz or other offline password cracking utilities.</li>
<li><strong>Lateral Movement:</strong> The attacker uses the extracted credentials to move laterally to other systems within the network, gaining access to additional resources and expanding their foothold.</li>
<li><strong>Goal Completion:</strong> The attacker achieves their final objective, such as data exfiltration, ransomware deployment, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the compromise of domain credentials and widespread lateral movement within the network. This could enable attackers to access sensitive data, disrupt critical services, or deploy ransomware, resulting in significant financial losses and reputational damage. Given the sensitivity of the SAM hive, even a single successful compromise can have far-reaching consequences. The impact is especially high in environments with a large number of systems sharing the same domain, as the attacker can potentially compromise a significant portion of the infrastructure.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable both &ldquo;Audit Detailed File Share&rdquo; and &ldquo;Audit Special Logon&rdquo; Windows audit policies to generate the necessary events for detection, as mentioned in the setup section of the original rule.</li>
<li>Deploy the provided Sigma rules to your SIEM to detect suspicious remote registry access attempts utilizing SeBackupPrivilege, and tune them for your environment.</li>
<li>Review and restrict the use of SeBackupPrivilege to only those accounts that absolutely require it for legitimate backup operations, minimizing the potential attack surface.</li>
<li>Investigate any alerts generated by these detections promptly to determine the scope of the compromise and take appropriate remediation steps.</li>
<li>Monitor for Event ID 5145 with RelativeTargetName containing &ldquo;winreg&rdquo; along with Event ID 4672 with SeBackupPrivilege to identify potential credential access attempts (see the original rule&rsquo;s <code>query</code> field).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>lateral-movement</category><category>windows</category></item><item><title>Suspicious Microsoft HTML Application Child Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-mshta-suspicious-child/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-mshta-suspicious-child/</guid><description>Mshta.exe spawning a suspicious child process, such as cmd.exe or powershell.exe, indicates potential adversarial activity leveraging Mshta to execute malicious scripts and evade detection on Windows systems.</description><content:encoded><![CDATA[<p>Mshta.exe (Microsoft HTML Application Host) is a Windows utility used to execute HTML Applications (.hta files). Adversaries often abuse Mshta to execute malicious scripts and evade detection, as it is a signed Microsoft binary and can bypass application whitelisting. This activity typically involves Mshta spawning other processes like cmd.exe or powershell.exe to perform malicious actions. This behavior has been observed across various attack campaigns and is a common tactic used to deliver payloads, establish persistence, or perform lateral movement within a network. Defenders need to monitor Mshta.exe process creations and child processes to detect and prevent potential threats. The detection logic focuses on identifying specific child processes commonly associated with malicious activities, while excluding legitimate uses of Mshta, such as those related to HP printer software.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access via an unspecified method (e.g., phishing, drive-by download) that delivers a malicious HTA file.</li>
<li>The user executes the HTA file, which launches Mshta.exe to interpret and execute the embedded script.</li>
<li>The script within the HTA file spawns a suspicious child process, such as cmd.exe or powershell.exe, using <code>CreateProcess</code>.</li>
<li>The spawned process executes malicious commands or scripts to download additional payloads or perform reconnaissance.</li>
<li>Certutil.exe may be used to decode encoded payloads.</li>
<li>The attacker may use bitsadmin.exe to download files from remote servers.</li>
<li>PowerShell is used to execute malicious code directly in memory, bypassing file-based detections.</li>
<li>The attacker achieves their objective, such as establishing persistence, stealing credentials, or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to a range of consequences, including malware infection, data theft, and system compromise. The impact can vary depending on the attacker&rsquo;s objectives, but it can result in significant financial losses, reputational damage, and disruption of business operations. While specific numbers of victims are not listed, this technique is widely used and can affect any organization that does not adequately monitor and restrict the use of Mshta.exe. The sectors targeted are broad, as this is a general-purpose technique applicable to various environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging and monitor for Mshta.exe spawning suspicious child processes to enable the &ldquo;Suspicious Microsoft HTML Application Child Process&rdquo; rule.</li>
<li>Implement the provided Sigma rule to detect Mshta.exe spawning cmd.exe, powershell.exe, certutil.exe, bitsadmin.exe, curl.exe, msiexec.exe, schtasks.exe, reg.exe, wscript.exe, or rundll32.exe to detect potential defense evasion.</li>
<li>Examine <code>process.command_line</code> and <code>process.parent.command_line</code> for suspicious arguments and file paths to further investigate potential malicious use of Mshta.</li>
<li>Monitor for executables running from user directories using the Sigma rule provided to identify potentially malicious processes spawned by Mshta.exe.</li>
<li>Investigate the parent process of Mshta.exe to determine the initial source of the HTA execution, focusing on browsers, email clients, and other potential delivery mechanisms.</li>
<li>Tune the provided Sigma rules for your environment to reduce false positives and ensure accurate detection of malicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>mshta</category><category>windows</category><category>process-creation</category></item><item><title>Potential Masquerading as Svchost</title><link>https://feed.craftedsignal.io/briefs/2024-01-svchost-masquerading/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-svchost-masquerading/</guid><description>Attackers may attempt to masquerade as the Service Host process `svchost.exe` by executing from non-standard paths to evade detection and blend in with normal system activity.</description><content:encoded><![CDATA[<p>Attackers may attempt to evade detection by masquerading as legitimate system processes, specifically <code>svchost.exe</code>. The <code>svchost.exe</code> process is a critical component of the Windows operating system, responsible for hosting multiple Windows services. By naming a malicious executable <code>svchost.exe</code> and placing it in a non-standard directory, attackers aim to blend in with normal system activity and bypass security controls that rely on process names or paths. This technique is particularly effective because <code>svchost.exe</code> is a common and trusted process, making it less likely to be scrutinized by users or security software. This detection focuses on identifying processes named <code>svchost.exe</code> that are not running from the legitimate Windows system directories.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, possibly through phishing or exploiting a vulnerability.</li>
<li>The attacker uploads a malicious executable disguised as <code>svchost.exe</code> to a non-standard directory, such as <code>C:\Users\Public\</code>.</li>
<li>The attacker executes the malicious <code>svchost.exe</code> process from the non-standard location.</li>
<li>The masquerading process attempts to mimic legitimate <code>svchost.exe</code> behavior to avoid suspicion.</li>
<li>The malicious <code>svchost.exe</code> process may establish network connections to external command-and-control servers.</li>
<li>The process may execute malicious payloads, such as downloading additional malware or performing lateral movement.</li>
<li>The attacker leverages the compromised system to access sensitive data or perform other malicious activities.</li>
<li>The attacker attempts to maintain persistence on the system to ensure continued access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful masquerading attack can lead to undetected execution of malicious code, allowing attackers to compromise systems, steal data, or establish persistent access. Because the malicious process is disguised as a legitimate system component, it may evade detection by traditional security measures. This can result in significant damage to the affected organization, including data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line details to capture the execution of processes, including their names and paths.</li>
<li>Deploy the Sigma rule &ldquo;Potential Svchost Masquerading&rdquo; to detect <code>svchost.exe</code> processes running from non-standard locations.</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the <code>svchost.exe</code> process and its activities.</li>
<li>Implement file integrity monitoring to detect unauthorized modifications to system files, including the <code>svchost.exe</code> executable in the system directories.</li>
<li>Use application control lists (ACLs) to restrict the execution of executables from non-standard directories.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>masquerading</category><category>windows</category></item><item><title>Potential Credential Access via Renamed COM+ Services DLL</title><link>https://feed.craftedsignal.io/briefs/2024-01-renamed-comsvcs/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-renamed-comsvcs/</guid><description>Detection of renamed COMSVCS.DLL being loaded by rundll32.exe, potentially used to dump LSASS memory for credential access while evading command-line detection.</description><content:encoded><![CDATA[<p>This detection identifies a suspicious technique where an attacker renames the COMSVCS.DLL, a legitimate Windows component, and then loads it using <code>rundll32.exe</code>. COMSVCS.DLL contains the MiniDumpWriteDump function, which can be used to create a memory dump of a running process. Attackers abuse this technique to dump the LSASS process memory, where credentials are often stored, while attempting to bypass traditional command-line monitoring that might detect direct use of MiniDumpWriteDump. The renaming of the DLL is a defense evasion tactic to avoid detection based on the DLL&rsquo;s original name. This activity is a strong indicator of potential credential access and requires immediate investigation. The rule specifically looks for renamed COMSVCS.DLL with a matching original filename or imphash being loaded by <code>rundll32.exe</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system, potentially through phishing or exploitation of a vulnerability.</li>
<li>The attacker copies the legitimate COMSVCS.DLL to a new location on the disk, often a temporary directory.</li>
<li>The attacker renames the copied COMSVCS.DLL to an arbitrary name to evade detection.</li>
<li>The attacker uses <code>rundll32.exe</code> to load the renamed COMSVCS.DLL.</li>
<li>The <code>rundll32.exe</code> process executes the MiniDumpWriteDump function exported by the renamed COMSVCS.DLL.</li>
<li>The MiniDumpWriteDump function targets the LSASS process, creating a memory dump file.</li>
<li>The attacker retrieves the LSASS memory dump file.</li>
<li>The attacker uses credential extraction tools to obtain credentials from the dumped LSASS memory.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of this attack chain can lead to the compromise of sensitive credentials stored in LSASS memory, including domain administrator accounts. This allows the attacker to move laterally within the network, gain access to critical systems, and potentially exfiltrate sensitive data or deploy ransomware. The impact is high due to the potential for widespread compromise and data breach.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon image load logging (Event ID 7) to detect the loading of DLLs, which is essential for this detection.</li>
<li>Deploy the &ldquo;Potential Credential Access via Renamed COM+ Services DLL&rdquo; Sigma rule to your SIEM to identify instances of renamed COMSVCS.DLL being loaded by <code>rundll32.exe</code>.</li>
<li>Monitor for <code>rundll32.exe</code> processes loading DLLs from unusual locations, as this could indicate malicious activity.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the process that loaded the renamed DLL and any subsequent activity.</li>
<li>Use the IOC (MD5 hash of COMSVCS.DLL imphash: EADBCCBB324829ACB5F2BBE87E5549A8) to search for instances of COMSVCS.DLL copies on your systems.</li>
<li>Enforce strict access control policies to prevent unauthorized users from copying and renaming system DLLs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>defense-evasion</category><category>windows</category></item><item><title>Potential Credential Access via MSBuild Loading Credential Management DLLs</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-msbuild-credential-dumping/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-msbuild-credential-dumping/</guid><description>The detection rule identifies a potential credential access attempt via the trusted developer utility MSBuild by detecting instances where it loads DLLs associated with Windows credential management, specifically vaultcli.dll or SAMLib.DLL, which is often used for credential dumping.</description><content:encoded><![CDATA[<p>This detection rule identifies potential credential access attempts leveraging the Microsoft Build Engine (MSBuild). Attackers may abuse MSBuild, a legitimate developer tool, to load malicious DLLs related to Windows credential management, such as <code>vaultcli.dll</code> or <code>SAMLib.dll</code>. This technique enables credential dumping by a trusted Windows utility, making it harder to detect. The rule focuses on detecting the loading of these specific DLLs by MSBuild processes. The rule relies on data from Elastic Defend and Sysmon logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system (e.g., via phishing or exploiting a vulnerability).</li>
<li>Attacker places a malicious <code>.csproj</code> file or a DLL designed to load credential management DLLs on the system.</li>
<li>The attacker executes <code>MSBuild.exe</code> to process the malicious project file.</li>
<li><code>MSBuild.exe</code> loads the attacker-controlled DLL.</li>
<li>The attacker-controlled DLL loads either <code>vaultcli.dll</code> or <code>SAMLib.dll</code>.</li>
<li>The loaded DLLs are used to dump credentials from the system.</li>
<li>The attacker accesses the dumped credentials.</li>
<li>The attacker uses the compromised credentials for lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the compromise of sensitive credentials stored on the affected system. This can allow attackers to move laterally within the network, access confidential data, and potentially compromise entire domains. The impact ranges from data breaches to complete system compromise, depending on the privileges of the compromised accounts.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>MSBuild Loads Credential Management DLL</code> to your SIEM, tuned for your specific environment, to detect instances of MSBuild loading <code>vaultcli.dll</code> or <code>SAMLib.dll</code>.</li>
<li>Enable Sysmon event ID 7 (Image Loaded) logging with the appropriate configurations to capture DLL loading events.</li>
<li>Investigate any instances of MSBuild loading <code>vaultcli.dll</code> or <code>SAMLib.dll</code> from unusual or unexpected locations using the guidance in the rule note.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>defense-evasion</category><category>windows</category></item><item><title>Msiexec Arbitrary DLL Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-msiexec-dll-execution/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-msiexec-dll-execution/</guid><description>Adversaries may abuse the msiexec.exe utility to proxy the execution of malicious DLL payloads, bypassing application control and other defenses.</description><content:encoded><![CDATA[<p>Msiexec.exe is the command-line utility for the Windows Installer, commonly used to execute installation packages (.msi). Attackers are known to abuse msiexec.exe to proxy the execution of arbitrary DLLs, a technique that helps bypass application control and evade detection. This approach leverages the trusted nature of msiexec.exe to execute malicious code, making it harder for security tools to identify and block the activity. The abuse of msiexec.exe has been observed in various attack campaigns, highlighting the need for defenders to monitor its usage closely.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system, often through phishing or exploitation of a vulnerability.</li>
<li>The attacker uploads a malicious DLL to the compromised system.</li>
<li>The attacker uses msiexec.exe with the <code>/Y</code> flag to execute the malicious DLL. This flag is used to trigger DLL execution via msiexec.</li>
<li>Msiexec.exe loads and executes the malicious DLL.</li>
<li>The malicious DLL performs its intended actions, such as establishing persistence, escalating privileges, or deploying additional malware.</li>
<li>The attacker may use the proxy execution through msiexec.exe to evade detection by security tools monitoring process execution.</li>
<li>The attacker pivots to other systems or begins data exfiltration.</li>
<li>The ultimate objective is often data theft, system compromise, or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary code on the targeted system, potentially leading to a full system compromise. This can result in data breaches, financial loss, and reputational damage. The technique is particularly effective at bypassing application control solutions, increasing the likelihood of a successful attack. While specific victim counts are unavailable, the widespread use of Windows Installer makes this a relevant threat across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Suspicious Msiexec Execute Arbitrary DLL</code> to your SIEM to detect the execution of msiexec.exe with the <code>/Y</code> flag, indicative of potential malicious DLL execution.</li>
<li>Investigate any instances of msiexec.exe executing DLLs from unusual or temporary locations.</li>
<li>Implement application control policies to restrict the execution of msiexec.exe to authorized users and legitimate installation processes.</li>
<li>Monitor process creation events for msiexec.exe to identify suspicious command-line arguments and parent processes.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>proxy-execution</category><category>msiexec</category></item><item><title>Modification of WDigest Security Provider</title><link>https://feed.craftedsignal.io/briefs/2024-01-wdigest-modification/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wdigest-modification/</guid><description>The rule detects attempts to modify the WDigest security provider in the registry to force the user's password to be stored in clear text in memory, which could lead to credential dumping.</description><content:encoded><![CDATA[<p>The WDigest security provider is a legacy authentication protocol that, when enabled, stores user passwords in cleartext within LSASS memory. Modern Windows versions (8.1+ and Server 2012 R2+) disable this behavior by default. Attackers can modify the <code>UseLogonCredential</code> registry value under the WDigest configuration to re-enable plaintext credential caching. This manipulation is a common precursor to credential dumping attacks, where tools like Mimikatz are used to extract sensitive information from LSASS. Defenders should monitor for unauthorized modifications to the WDigest configuration to prevent credential theft. The rule provided by Elastic aims to detect these modifications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system via compromised credentials or exploiting a vulnerability (e.g., phishing or RDP).</li>
<li>The attacker executes code (e.g., PowerShell script or executable) with sufficient privileges to modify the registry.</li>
<li>The malicious code modifies the <code>UseLogonCredential</code> registry value under <code>HKLM\SYSTEM\CurrentControlSet\Control\SecurityProviders\WDigest</code> or a similar path.</li>
<li>The attacker sets the <code>UseLogonCredential</code> value to 1 (or 0x00000001), enabling plaintext storage of credentials.</li>
<li>A user logs on to the system, causing their credentials to be stored in cleartext in LSASS memory.</li>
<li>The attacker uses credential dumping tools like Mimikatz to extract the cleartext passwords from LSASS.</li>
<li>The attacker uses the stolen credentials for lateral movement or to access sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the WDigest security provider can lead to widespread credential compromise. Attackers can harvest credentials for privileged accounts, enabling them to move laterally within the network, access sensitive resources, and potentially achieve domain dominance. This can result in data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Modification of WDigest Security Provider&rdquo; to your SIEM to detect malicious registry modifications (rule <code>d703a5af-d5b0-43bd-8ddb-7a5d500b7da5</code>).</li>
<li>Enable Sysmon registry event logging to capture the necessary data for the provided Sigma rule to function.</li>
<li>Monitor process creation events for unexpected processes modifying registry keys related to WDigest.</li>
<li>Review and restrict access control lists (ACLs) on the WDigest registry keys to prevent unauthorized modifications.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the process that made the modification, the user context, and any subsequent activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>registry-modification</category><category>windows</category></item><item><title>LSASS Memory Dump Handle Access Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-lsass-memory-dump/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-lsass-memory-dump/</guid><description>This rule detects handle requests for LSASS object access with specific access masks (0x1fffff, 0x1010, 0x120089, 0x1F3FFF) indicative of memory dumping, commonly employed by tools like SharpDump, Procdump, Mimikatz, and Comsvcs to extract credentials from the LSASS process on Windows systems.</description><content:encoded><![CDATA[<p>The Local Security Authority Subsystem Service (LSASS) is a critical Windows process responsible for enforcing security policy and handling user authentication. Attackers often target LSASS to steal credentials for lateral movement and privilege escalation. This detection identifies attempts to access LSASS memory using specific access masks (0x1fffff, 0x1010, 0x120089, 0x1F3FFF) that are commonly used by tools designed to dump LSASS memory. The rule is designed to be tool-agnostic, detecting the underlying behavior rather than specific tool signatures. It has been validated against various LSASS dumping tools, including SharpDump, Procdump, Mimikatz, and Comsvcs. The rule triggers on Windows systems where handle manipulation is enabled and generates security event logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker elevates privileges to an administrative account or SYSTEM, necessary for accessing LSASS memory.</li>
<li>The attacker executes a credential dumping tool, such as Mimikatz, SharpDump, or Procdump.</li>
<li>The tool attempts to open a handle to the LSASS process (lsass.exe) with a specific access mask (0x1fffff, 0x1010, 0x120089, 0x1F3FFF) required for memory dumping.</li>
<li>Windows Security Event ID 4656 is generated, logging the handle request to the LSASS object.</li>
<li>The tool reads the memory contents of the LSASS process.</li>
<li>The dumped memory is parsed to extract sensitive information, such as passwords, NTLM hashes, and Kerberos tickets.</li>
<li>The attacker uses the stolen credentials to move laterally to other systems or access sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful LSASS memory dumping allows attackers to steal user credentials, enabling lateral movement and privilege escalation within the network. This can lead to widespread compromise, data breaches, and significant disruption of services. Stolen credentials can be used to access sensitive data, control critical systems, and maintain a persistent presence within the environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Handle Manipulation to generate the necessary events for this rule to function, as described in the <a href="https://ela.st/audit-handle-manipulation">setup instructions</a>.</li>
<li>Deploy the Sigma rule <code>LSASS Memory Dump Handle Access</code> to your SIEM and tune the exceptions based on your environment to minimize false positives.</li>
<li>Investigate any alerts generated by this rule, focusing on the process execution chain (parent process tree) to identify the source of the LSASS handle request.</li>
<li>Review the processes excluded in the rule (WmiPrvSE.exe, dllhost.exe, svchost.exe, msiexec.exe, explorer.exe) and ensure these exclusions are valid for your environment.</li>
<li>Implement strong password policies and multi-factor authentication to mitigate the impact of credential theft.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>lsass</category><category>memory-dump</category><category>windows</category></item><item><title>Windows Privilege Escalation via Secondary Logon Service</title><link>https://feed.craftedsignal.io/briefs/2024-01-secondary-logon-privilege-escalation/</link><pubDate>Tue, 02 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-secondary-logon-privilege-escalation/</guid><description>The rule identifies process creation with alternate credentials, which can be used for privilege escalation, by detecting successful logins via the Secondary Logon service (seclogon) from a local source IP address (::1), followed by process creation using the same TargetLogonId.</description><content:encoded><![CDATA[<p>The Secondary Logon service in Windows allows users to run processes with different credentials, which can be abused to escalate privileges and bypass access controls. This technique involves an adversary successfully authenticating via the seclogon service, typically from the local host, then spawning a new process under the context of this newly acquired, potentially elevated, token. The detection focuses on identifying successful seclogon authentications where the source IP is the loopback address (::1), tied to subsequent process creations sharing the same logon ID. This is a common method for local privilege escalation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means.</li>
<li>The attacker attempts to leverage the Secondary Logon service (seclogon) to create a new process with elevated privileges.</li>
<li>A successful logon event is generated, with the LogonProcessName indicating &ldquo;seclogo*&rdquo; and source IP address of &ldquo;::1&rdquo;, and event ID indicating a successful login.</li>
<li>svchost.exe is used as the process responsible for calling seclogon.</li>
<li>The system assigns a TargetLogonId to the new logon session.</li>
<li>The attacker creates a new process, specifying the TargetLogonId obtained from the previous step.</li>
<li>The new process is launched with the security context of the alternate credentials, potentially granting the attacker elevated privileges.</li>
<li>The attacker performs malicious actions using the newly elevated privileges, such as accessing sensitive data or installing malware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to perform actions with elevated privileges, potentially leading to complete system compromise. An attacker can bypass access controls and gain unauthorized access to sensitive resources. If successful, this can lead to data theft, system compromise, or the installation of persistent backdoors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Logon to generate the events required for the rules in this brief (reference: Setup section in the source).</li>
<li>Deploy the &ldquo;Process Creation via Secondary Logon&rdquo; Sigma rule to your SIEM and tune for your environment to detect potential privilege escalation attempts (reference: Sigma rules below).</li>
<li>Monitor for svchost.exe processes initiating secondary logon events from the local loopback address (::1) as an indicator of local privilege escalation.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>windows</category><category>access-token-manipulation</category></item><item><title>PowerShell Obfuscation via Backtick-Escaped Variable Expansion</title><link>https://feed.craftedsignal.io/briefs/2024-01-powershell-backtick-obfuscation/</link><pubDate>Tue, 02 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-powershell-backtick-obfuscation/</guid><description>PowerShell scripts use backtick-escaped characters inside `${}` variable expansion to reconstruct strings at runtime, enabling attackers to split keywords, hide commands, and evade static analysis and AMSI.</description><content:encoded><![CDATA[<p>This rule detects PowerShell scripts employing backtick-escaped characters within <code>${}</code> variable expansion, a technique used to reconstruct strings at runtime. Attackers leverage variable-expansion obfuscation to split keywords, conceal commands, and bypass static analysis and AMSI (Antimalware Scan Interface). This obfuscation method involves inserting multiple backticks between word characters inside <code>${}</code> blocks. Detecting this behavior is crucial as it signifies attempts to evade security measures and potentially execute malicious code on compromised systems. The rule focuses on identifying scripts with a length exceeding 500 characters to minimize false positives and targets PowerShell event code 4104.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, potentially through phishing or exploiting a software vulnerability.</li>
<li>The attacker uploads or creates a PowerShell script on the target system.</li>
<li>The PowerShell script employs backtick-escaped variable expansion (e.g., <code>$env:use``r``na``me</code>) to obfuscate its contents.</li>
<li>The obfuscated script is executed using powershell.exe.</li>
<li>The script dynamically reconstructs commands and strings by evaluating the backtick-escaped variables.</li>
<li>The reconstructed commands perform malicious activities, such as downloading additional payloads or modifying system configurations.</li>
<li>The script attempts to evade detection by AMSI and other security tools.</li>
<li>The attacker achieves persistence and control over the compromised system, potentially leading to data exfiltration or further lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, system compromise, and data theft. While the number of victims is unknown, PowerShell is a common attack vector on Windows environments. The sectors most affected are organizations relying on Windows infrastructure without adequate PowerShell monitoring and security controls. Failure to detect and prevent this technique allows attackers to bypass security measures and gain unauthorized access to sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging to generate event code 4104. (Reference: Setup section)</li>
<li>Deploy the Sigma rule <code>Detect PowerShell Backtick Variable Obfuscation</code> to identify scripts using backtick-escaped variable expansion.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on scripts with a high <code>Esql.script_block_pattern_count</code> value.</li>
<li>Monitor for process creation events where powershell.exe executes obfuscated commands as detected by the Sigma rule <code>Detect Suspicious PowerShell Encoded Commands</code>.</li>
<li>Review PowerShell logs for event code 4104 and examine <code>powershell.file.script_block_text</code> for suspicious patterns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>powershell</category><category>obfuscation</category><category>defense-evasion</category><category>variable-expansion</category><category>windows</category></item></channel></rss>