<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Application-Shimming — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/application-shimming/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/application-shimming/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Application Shimming via Sdbinst</title><link>https://feed.craftedsignal.io/briefs/2024-01-app-shimming/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-app-shimming/</guid><description>Attackers abuse the Application Shim functionality in Windows by using `sdbinst.exe` with malicious arguments to achieve persistence and execute arbitrary code within legitimate Windows processes.</description><content:encoded><![CDATA[<p>Application shimming is a compatibility mechanism in Windows that allows older applications to run on newer operating systems. However, attackers can abuse this functionality to gain persistence and execute arbitrary code in the context of legitimate Windows processes. This is achieved by using the <code>sdbinst.exe</code> utility to install malicious application compatibility databases (.sdb files). These databases can then be used to inject malicious code into targeted applications. The detection rule focuses on identifying suspicious invocations of <code>sdbinst.exe</code> with arguments that do not include benign flags, indicating potential misuse of the application shimming mechanism. This technique is stealthy because it allows attackers to execute code within trusted processes, making it harder to detect.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker deploys or creates a malicious .sdb file containing code to be injected.</li>
<li>The attacker uses <code>sdbinst.exe</code> to install the malicious .sdb file. The command line arguments often lack common benign flags like &ldquo;-m&rdquo;, &ldquo;-bg&rdquo;, or &ldquo;-mm&rdquo;.</li>
<li>The operating system loads the shim database when the targeted application is launched.</li>
<li>The malicious code within the .sdb file is executed in the context of the targeted application.</li>
<li>The attacker gains persistent access to the system, as the shim is loaded each time the targeted application is executed.</li>
<li>The attacker performs malicious activities, such as data exfiltration, lateral movement, or further exploitation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful application shimming attack can allow an attacker to maintain persistent access to a compromised system. This can lead to data theft, system compromise, and further malicious activities. Because the malicious code executes within a trusted process, detection can be challenging, and the attacker can potentially bypass security controls. While the number of victims is unknown, this technique is particularly effective against organizations that rely on specific applications, as the attacker can target those applications for persistence.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential Application Shimming via Sdbinst&rdquo; to your SIEM to detect suspicious invocations of <code>sdbinst.exe</code>.</li>
<li>Enable Sysmon process creation logging to capture the command-line arguments of <code>sdbinst.exe</code> executions, which is required for the Sigma rule.</li>
<li>Investigate and remove any unauthorized or suspicious application compatibility databases (.sdb files) found on systems.</li>
<li>Implement enhanced monitoring and logging for <code>sdbinst.exe</code> executions across the network to detect and respond to future attempts at application shimming.</li>
<li>Regularly review and update the list of exceptions to ensure that only verified and necessary exclusions are maintained to avoid overlooking genuine threats.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>privilege-escalation</category><category>application-shimming</category><category>windows</category></item></channel></rss>