<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Alternate-Data-Stream — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/alternate-data-stream/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 08 Jul 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/alternate-data-stream/feed.xml" rel="self" type="application/rss+xml"/><item><title>Alternate Data Stream Creation/Execution at Volume Root Directory</title><link>https://feed.craftedsignal.io/briefs/2024-07-root-dir-ads-creation/</link><pubDate>Mon, 08 Jul 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-root-dir-ads-creation/</guid><description>Detection of Alternate Data Stream (ADS) creation at a volume root directory, a technique used to hide malware and tools by exploiting how ADSs in root directories are not readily visible to standard system utilities, indicating a defense evasion attempt.</description><content:encoded><![CDATA[<p>This detection rule identifies the creation or execution of Alternate Data Streams (ADS) within the root directory of a volume on Windows systems. Attackers leverage this technique to conceal malicious tools or data, as ADSs created in this manner are not easily discoverable by standard system utilities. This method allows for the persistence and execution of malware while evading typical detection mechanisms. This rule is designed for data generated by Elastic Defend, Microsoft Defender XDR, and SentinelOne Cloud Funnel, providing broad coverage across different endpoint security solutions. Monitoring for ADS activity at the volume root is crucial to identify potential defense evasion attempts and hidden malicious payloads.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker executes a script or program (e.g., PowerShell) to create a hidden ADS at the root of a volume (e.g., <code>C:\:evil.exe</code>).</li>
<li>The ADS is populated with malicious code, such as a reverse shell or malware payload.</li>
<li>The attacker uses a command-line tool or script to execute the hidden ADS file. For example: <code>wmic process call create &quot;cmd.exe /c start C:\:evil.exe&quot;</code>.</li>
<li>The malicious code within the ADS executes, allowing the attacker to perform unauthorized actions, such as data exfiltration or establishing persistence.</li>
<li>The attacker uses the hidden ADS to maintain persistence on the system, ensuring continued access even after reboots.</li>
<li>The attacker further leverages the compromised system to move laterally within the network, compromising additional systems and escalating privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to hide malicious tools and maintain persistence on compromised systems. The creation of ADSs at the volume root directory makes it difficult for administrators and security tools to detect the presence of malware. This can lead to prolonged compromise, data breaches, and significant disruption of business operations. The rule has a risk score of 47, and a medium severity is applied.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect ADS creation and execution at the volume root directory.</li>
<li>Enable logging for file creation events (Sysmon Event ID 11) and process creation events (Sysmon Event ID 1) for enhanced visibility into ADS activity.</li>
<li>Investigate alerts generated by the Sigma rules to determine the legitimacy of ADS creation or execution, focusing on processes and file paths that match the <code>[A-Z]:\\:.+</code> regex pattern in the rule query.</li>
<li>Regularly scan systems for hidden ADS files using specialized tools to uncover any potential malicious files.</li>
<li>Implement application control policies to restrict the execution of unauthorized applications and prevent the creation of malicious ADSs.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>hide-artifacts</category><category>alternate-data-stream</category></item><item><title>Detecting Execution from Alternate Data Streams</title><link>https://feed.craftedsignal.io/briefs/2024-01-ads-execution/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ads-execution/</guid><description>Adversaries may execute malicious code from Alternate Data Streams (ADS) on Windows to evade defenses by hiding malware within legitimate files, which this detection identifies by monitoring process execution paths and arguments.</description><content:encoded><![CDATA[<p>Alternate Data Streams (ADS) are a feature of the NTFS file system that allows files to contain multiple data streams. Adversaries can exploit this feature to hide malicious code within legitimate files, making detection more difficult. This technique is often used for defense evasion, as security tools may not inspect ADS when scanning for malware. This detection focuses on identifying processes initiated from ADS by monitoring process execution paths and arguments, specifically looking for the pattern &ldquo;?:\<em>:</em>&rdquo;. This activity is uncommon for legitimate processes, making it a valuable indicator of potential malicious activity. The rule is designed for data generated by Elastic Defend, but also supports CrowdStrike, Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker creates an Alternate Data Stream (ADS) within a seemingly benign file (e.g., <code> harmless.txt:malicious.exe</code>).</li>
<li>The attacker copies or moves malicious executable code into the newly created ADS.</li>
<li>The attacker uses a method to execute the code within the ADS, often involving command-line arguments that specify the ADS path (e.g., <code> harmless.txt:malicious.exe</code>).</li>
<li>The operating system executes the code contained within the ADS as if it were a standard executable.</li>
<li>The malicious code performs its intended actions, such as installing malware, establishing persistence, or escalating privileges.</li>
<li>The attacker may attempt to further conceal their activity by deleting the original executable or modifying timestamps.</li>
<li>The final objective is to achieve persistence, exfiltrate data, or perform other malicious activities while evading traditional detection methods.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to hide and execute malicious code, bypassing standard security measures. This can lead to malware infections, data breaches, and system compromise. The number of victims and specific sectors targeted can vary, but the potential impact includes data loss, financial damage, and reputational harm.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Unusual Process Execution from Alternate Data Stream&rdquo; to your SIEM and tune for your environment to detect processes executing from ADS.</li>
<li>Enable Sysmon process creation logging to capture process execution events necessary for the Sigma rule to function correctly.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on processes with command-line arguments matching the <code>?:\\*:\*</code> pattern.</li>
<li>Review process details, including the process name and path, to determine if it is a known legitimate application or potentially malicious, as described in the rule&rsquo;s investigation guide.</li>
<li>Correlate events with other security logs or alerts from data sources like Sysmon, Microsoft Defender XDR, or Crowdstrike to gather additional context.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>alternate data stream</category></item></channel></rss>