<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Archive — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/archive/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 19 Mar 2026 17:31:15 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/archive/feed.xml" rel="self" type="application/rss+xml"/><item><title>MOTW Bypass via CAB, TAR, and 7-Zip Chaining</title><link>https://feed.craftedsignal.io/briefs/2026-03-motw-bypass/</link><pubDate>Thu, 19 Mar 2026 17:31:15 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-motw-bypass/</guid><description>A newly discovered Mark of the Web (MOTW) bypass technique utilizes a chain of CAB, TAR, and 7-Zip archives to circumvent SmartScreen and execute files without security warnings.</description><content:encoded><![CDATA[<p>A new MOTW bypass technique has emerged that chains a CAB file with two TAR archives nested within a 7-Zip archive. This method effectively strips the Zone.Identifier stream from downloaded files, preventing the display of SmartScreen prompts or security warnings. Many organizations rely on MOTW and SmartScreen as a crucial layer of defense against phishing attacks. This bypass, affecting fully patched environments, allows attackers to execute arbitrary code without the usual security checks, potentially leading to malware infection or data compromise. The technique is not a rehash of older 7-Zip MOTW issues but a novel approach to evade detection based on Zone.Identifier.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious payload.</li>
<li>Attacker packages the payload into a TAR archive.</li>
<li>The TAR archive is nested inside another TAR archive.</li>
<li>The nested TAR archives are then compressed into a 7-Zip archive using 7z.exe.</li>
<li>The 7-Zip archive is packaged into a CAB archive using makecab.exe.</li>
<li>The CAB archive is distributed to the victim, potentially via phishing or drive-by download.</li>
<li>The victim opens the CAB archive, extracting the nested 7-Zip, TAR, and payload.</li>
<li>The payload executes without a Zone.Identifier stream, bypassing MOTW and SmartScreen, potentially leading to malware infection or unauthorized access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass security controls that rely on MOTW and SmartScreen. This can lead to malware infections, data breaches, or other malicious activities. The bypass affects fully patched environments, increasing the scope of potential victims. The absence of security warnings makes it more likely that users will execute the malicious payload, increasing the success rate of attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement detections for unusual process chains involving <code>makecab.exe</code>, <code>7z.exe</code>, and <code>tar.exe</code> as these tools are used in the bypass (see Sigma rule &ldquo;Detect Suspicious Archive Chaining&rdquo;).</li>
<li>Monitor for archive extractions from unusual locations, especially those originating from downloaded CAB files, using file event logging and process monitoring (see Sigma rule &ldquo;Detect Archive Extraction from Downloaded CAB&rdquo;).</li>
<li>Analyze network connections from processes spawned from archive extractions, as they may indicate command and control or data exfiltration.</li>
<li>Block the URL <code>https://youtu.be/pQxiPwGTBL8</code> to prevent users from accessing potentially malicious content related to this bypass.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>motw</category><category>bypass</category><category>phishing</category><category>defense-evasion</category><category>archive</category><category>7-zip</category><category>cab</category><category>tar</category></item><item><title>Windows Script Execution from Archive File</title><link>https://feed.craftedsignal.io/briefs/2024-01-script-exec-archive/</link><pubDate>Wed, 24 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-script-exec-archive/</guid><description>This rule identifies attempts to execute Jscript/Vbscript files from an archive file, a common delivery method for malicious scripts on Windows systems.</description><content:encoded><![CDATA[<p>Attackers commonly use archive files (ZIP, RAR, 7z) to deliver malicious scripts, such as JScript and VBScript, to Windows systems. This technique allows them to bypass some initial security checks and deliver payloads that can execute arbitrary code. The &ldquo;Windows Script Execution from Archive&rdquo; detection identifies instances where Windows Script Host (wscript.exe) is launched from temporary directories containing extracted archive contents. This activity can indicate a user has opened a malicious archive, leading to potential malware execution. This detection focuses on the parent-child process relationship, where explorer.exe, winrar.exe, or 7zFM.exe spawns wscript.exe to execute scripts from the temp directory.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user receives a malicious archive file (e.g., ZIP, RAR, 7z) via email or downloads it from a website.</li>
<li>The user opens the archive file using a file archiver tool like Explorer, WinRAR, or 7-Zip.</li>
<li>The archiver extracts the contents, including a malicious JScript (.js) or VBScript (.vbs) file, to a temporary directory, such as <code>\Users\*\AppData\Local\Temp\7z*\</code>.</li>
<li>The user (or the archiver tool) inadvertently executes the extracted script using Windows Script Host (wscript.exe).</li>
<li>Wscript.exe executes the malicious script, which may perform a variety of actions, such as downloading and executing additional payloads.</li>
<li>The script establishes persistence via registry modification, adding a run key to execute upon system startup.</li>
<li>The script connects to a command-and-control server to receive further instructions.</li>
<li>The attacker gains control of the compromised system and begins lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack of this nature can lead to arbitrary code execution on the victim&rsquo;s machine, potentially resulting in data theft, malware installation, or complete system compromise. While the number of affected organizations is not specified, the technique is broadly applicable to any Windows environment where users handle archive files, potentially affecting numerous individuals and organizations across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line arguments to capture the execution of wscript.exe and its arguments.</li>
<li>Deploy the Sigma rule &ldquo;Detect Script Execution from Archive&rdquo; to your SIEM to identify suspicious script execution patterns.</li>
<li>Monitor process activity for wscript.exe and other scripting engines executing from temporary directories.</li>
<li>Configure endpoint security solutions to block execution of scripts from common temporary directories.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>execution</category><category>windows</category><category>scripting</category><category>archive</category></item><item><title>GitHub Repository Archive Status Changed</title><link>https://feed.craftedsignal.io/briefs/2024-01-github-repo-archive-status-changed/</link><pubDate>Thu, 04 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-github-repo-archive-status-changed/</guid><description>Detection of GitHub repository archiving or unarchiving events, which could indicate malicious activity such as persistence, impact, or defense impairment.</description><content:encoded><![CDATA[<p>This threat brief focuses on the detection of unauthorized changes to GitHub repository archive status. Attackers may archive or unarchive repositories as a means of persistence, to impact the availability of resources, or to impair defenses by hiding malicious code. The activity is logged within GitHub&rsquo;s audit logs and can be monitored to identify potentially malicious actions. Monitoring these events can help organizations identify and respond to unauthorized modifications of their GitHub repositories. This is especially relevant for organizations relying heavily on GitHub for code management and collaboration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a GitHub account with repository administration privileges.</li>
<li>The attacker authenticates to the GitHub platform using the compromised credentials or a stolen session token.</li>
<li>The attacker navigates to the settings page of a target repository.</li>
<li>The attacker modifies the repository&rsquo;s archive status, either archiving or unarchiving it depending on their objective.</li>
<li>GitHub logs the &lsquo;repo.archived&rsquo; or &lsquo;repo.unarchived&rsquo; action in the organization&rsquo;s audit logs.</li>
<li>(If archiving) Legitimate users may lose access to the repository and its code, causing disruption.</li>
<li>(If unarchiving) The attacker might reintroduce vulnerable code or malicious content into an active repository.</li>
<li>The attacker may then attempt to exploit the unarchived repository for further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of unauthorized repository archiving or unarchiving can range from temporary disruption of services to the reintroduction of vulnerable code. A successful attack could lead to data breaches, code compromise, or supply chain attacks. The number of affected repositories depends on the scope of the attacker&rsquo;s access and objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;GitHub Repository Archive Status Changed&rdquo; to your SIEM and tune for your environment. This rule detects the <code>repo.archived</code> and <code>repo.unarchived</code> actions in GitHub audit logs (logsource: github, service: audit).</li>
<li>Review GitHub audit logs regularly for unexpected repository archiving or unarchiving events.</li>
<li>Investigate any detected events to determine if the actions were authorized.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>github</category><category>repository</category><category>archive</category><category>unarchive</category><category>persistence</category><category>impact</category><category>defense-impairment</category></item><item><title>Detection of Encrypted Archive Creation with WinRAR or 7-Zip</title><link>https://feed.craftedsignal.io/briefs/2024-01-winrar-7zip-encryption/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-winrar-7zip-encryption/</guid><description>Adversaries use WinRAR or 7-Zip with encryption options to compress and protect stolen data before exfiltration, making detection more challenging.</description><content:encoded><![CDATA[<p>Attackers frequently compress and encrypt data before exfiltration to reduce the amount of data being sent over the network and to obfuscate the contents. This behavior often indicates a later stage of intrusion where the attacker has already collected sensitive data and is preparing to move it out of the environment. The use of archiving tools like WinRAR and 7-Zip with encryption flags can help attackers to hide their activities, making it more difficult for defenders to identify and respond to data theft. This technique has been observed in multiple threat actors including Turla as documented by WeLiveSecurity. This brief focuses on detecting command-line activity indicative of archive creation with encryption using WinRAR or 7-Zip on Windows systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to the system through methods such as phishing, exploiting vulnerabilities, or using stolen credentials.</li>
<li><strong>Credential Access:</strong> The attacker attempts to obtain credentials using techniques such as Mimikatz or credential dumping.</li>
<li><strong>Discovery:</strong> The attacker performs reconnaissance to identify sensitive data and systems of interest.</li>
<li><strong>Data Collection:</strong> The attacker gathers sensitive data from various locations on the compromised system or network.</li>
<li><strong>Archive Creation:</strong> The attacker uses WinRAR or 7-Zip to create an encrypted archive of the collected data using command-line arguments like <code>-hp</code>, <code>-p</code>, <code>/hp</code>, or <code>/p</code> with <code>rar.exe</code> or <code>WinRAR.exe</code> or <code>-p*</code> with <code>7z.exe</code> or <code>7za.exe</code>.</li>
<li><strong>Data Staging:</strong> The encrypted archive is moved to a staging location, such as a temporary directory or removable media.</li>
<li><strong>Exfiltration:</strong> The attacker exfiltrates the encrypted archive from the network using various methods, such as FTP, SCP, or cloud storage services.</li>
<li><strong>Covering Tracks:</strong> The attacker deletes the archive from the staging location to remove evidence of the activity.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the exfiltration of sensitive data, including personally identifiable information (PII), financial records, intellectual property, and other confidential information. This can result in significant financial losses, reputational damage, legal liabilities, and regulatory fines for the victim organization. The number of victims and specific sectors targeted will vary depending on the attacker&rsquo;s objectives and the nature of the compromised data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Encrypting Files with WinRar or 7z - CommandLine&rdquo; to your SIEM to detect the execution of WinRAR or 7-Zip with encryption parameters (rule:Detect Encrypting Files with WinRar or 7z - CommandLine).</li>
<li>Enable process creation logging with command line arguments in Sysmon to ensure the necessary data is available for detection (Data Source: Sysmon).</li>
<li>Investigate any alerts generated by the Sigma rules to determine the scope and impact of the potential data exfiltration attempt (rule:Detect Encrypting Files with WinRar or 7z - CommandLine).</li>
<li>Monitor network traffic for unusual outbound connections, particularly to cloud storage services or other external destinations, that may indicate data exfiltration.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>collection</category><category>archive</category><category>exfiltration</category><category>windows</category></item></channel></rss>