<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Access-Token-Manipulation — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/access-token-manipulation/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/access-token-manipulation/feed.xml" rel="self" type="application/rss+xml"/><item><title>Unusual Parent-Child Relationship Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-parent-child/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-parent-child/</guid><description>This rule identifies Windows programs run from unexpected parent processes, which could indicate masquerading or other strange activity on a system, potentially indicating process injection, masquerading, access token manipulation, or parent PID spoofing.</description><content:encoded><![CDATA[<p>This detection identifies Windows programs executed with unexpected parent processes, which may indicate masquerading, process injection, or other anomalous behavior. The detection logic focuses on deviations from established parent-child process relationships within the Windows operating system. This rule leverages data from multiple sources, including Elastic Defend, CrowdStrike, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, and Windows Security Event Logs, to enhance detection coverage. This is important for defenders as unusual parent-child process relationships can be indicative of various malicious activities, including privilege escalation and defense evasion techniques employed by threat actors. The rule aims to provide early detection of potentially malicious activities by identifying deviations from the expected process execution patterns.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker executes a malicious payload that attempts to masquerade as a legitimate process.</li>
<li>The malicious process is launched with an unexpected parent process, deviating from normal Windows process relationships. For example, <code>autochk.exe</code> running without <code>smss.exe</code> as its parent.</li>
<li>The malicious process attempts to inject code into other processes for privilege escalation or defense evasion, leveraging techniques like process hollowing.</li>
<li>The injected code gains elevated privileges, allowing the attacker to perform sensitive actions on the system.</li>
<li>The attacker uses the elevated privileges to move laterally within the network, compromising additional systems.</li>
<li>The attacker attempts to maintain persistence by creating scheduled tasks or modifying registry keys.</li>
<li>The attacker achieves their final objective, such as data exfiltration or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack exploiting unusual parent-child relationships can lead to privilege escalation, allowing attackers to gain control of the compromised system. This can result in data breaches, system downtime, and financial losses. The rule aims to mitigate these risks by detecting suspicious process executions early in the attack chain. While the exact number of potential victims and sectors targeted is not explicitly mentioned, the broad applicability of Windows systems makes this a widespread threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rules to your SIEM and tune for your environment to detect unusual parent-child process relationships (see <code>rules</code> section).</li>
<li>Enable process creation logging with command line arguments in your Windows environment using Sysmon or Windows Security Event Logs to ensure the necessary data is available for detection.</li>
<li>Investigate and baseline common parent-child process relationships in your environment to reduce false positives.</li>
<li>Integrate your SIEM with threat intelligence feeds to identify known malicious processes and their associated parent processes.</li>
<li>Configure endpoint detection and response (EDR) solutions like Elastic Defend, CrowdStrike, Microsoft Defender XDR, and SentinelOne to collect and analyze process execution data (see <code>setup</code> section in the source URL).</li>
<li>Refer to the investigation guide linked in the source URL to triage alerts related to unusual parent-child process relationships.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>defense-evasion</category><category>windows</category><category>process-injection</category><category>masquerading</category><category>access-token-manipulation</category><category>parent-pid-spoofing</category></item><item><title>Windows Privilege Escalation via Secondary Logon Service</title><link>https://feed.craftedsignal.io/briefs/2024-01-secondary-logon-privilege-escalation/</link><pubDate>Tue, 02 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-secondary-logon-privilege-escalation/</guid><description>The rule identifies process creation with alternate credentials, which can be used for privilege escalation, by detecting successful logins via the Secondary Logon service (seclogon) from a local source IP address (::1), followed by process creation using the same TargetLogonId.</description><content:encoded><![CDATA[<p>The Secondary Logon service in Windows allows users to run processes with different credentials, which can be abused to escalate privileges and bypass access controls. This technique involves an adversary successfully authenticating via the seclogon service, typically from the local host, then spawning a new process under the context of this newly acquired, potentially elevated, token. The detection focuses on identifying successful seclogon authentications where the source IP is the loopback address (::1), tied to subsequent process creations sharing the same logon ID. This is a common method for local privilege escalation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means.</li>
<li>The attacker attempts to leverage the Secondary Logon service (seclogon) to create a new process with elevated privileges.</li>
<li>A successful logon event is generated, with the LogonProcessName indicating &ldquo;seclogo*&rdquo; and source IP address of &ldquo;::1&rdquo;, and event ID indicating a successful login.</li>
<li>svchost.exe is used as the process responsible for calling seclogon.</li>
<li>The system assigns a TargetLogonId to the new logon session.</li>
<li>The attacker creates a new process, specifying the TargetLogonId obtained from the previous step.</li>
<li>The new process is launched with the security context of the alternate credentials, potentially granting the attacker elevated privileges.</li>
<li>The attacker performs malicious actions using the newly elevated privileges, such as accessing sensitive data or installing malware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to perform actions with elevated privileges, potentially leading to complete system compromise. An attacker can bypass access controls and gain unauthorized access to sensitive resources. If successful, this can lead to data theft, system compromise, or the installation of persistent backdoors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Audit Logon to generate the events required for the rules in this brief (reference: Setup section in the source).</li>
<li>Deploy the &ldquo;Process Creation via Secondary Logon&rdquo; Sigma rule to your SIEM and tune for your environment to detect potential privilege escalation attempts (reference: Sigma rules below).</li>
<li>Monitor for svchost.exe processes initiating secondary logon events from the local loopback address (::1) as an indicator of local privilege escalation.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>windows</category><category>access-token-manipulation</category></item></channel></rss>