<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Asyncrat — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/asyncrat/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 18:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/asyncrat/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious PowerShell Script Using Cryptography Namespace</title><link>https://feed.craftedsignal.io/briefs/2024-01-powershell-cryptography/</link><pubDate>Wed, 03 Jan 2024 18:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-powershell-cryptography/</guid><description>The analytic detects suspicious PowerShell script execution involving the cryptography namespace (excluding SHA and MD5) via EventCode 4104, often associated with malware that decrypts or decodes additional malicious payloads leading to further code execution, privilege escalation, or persistence.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting suspicious PowerShell activity involving the System.Security.Cryptography namespace, excluding common hashing algorithms like SHA and MD5. The detection leverages Windows PowerShell Script Block Logging (EventCode 4104) to identify scripts using cryptographic functions. This is significant because malware often uses cryptography to decrypt or decode additional malicious payloads, which can lead to further code execution, privilege escalation, or persistence within the compromised environment. The technique is commonly used by malware families like AsyncRAT, XWorm, and VIP Keylogger. Defenders should investigate the parent process of such scripts, the decrypted data, network connections established by the script, and the user context in which the script is executed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, possibly through phishing or exploiting a vulnerability.</li>
<li>The attacker executes a PowerShell script on the compromised system.</li>
<li>The PowerShell script utilizes the <code>System.Security.Cryptography</code> namespace to perform cryptographic operations.</li>
<li>The script decrypts or decodes a malicious payload (e.g., a second-stage executable or configuration file).</li>
<li>The decrypted payload is written to disk or loaded directly into memory.</li>
<li>The attacker executes the decrypted payload, potentially establishing persistence via registry keys or scheduled tasks.</li>
<li>The malware leverages the established persistence mechanism for long-term access.</li>
<li>The attacker performs malicious actions such as data exfiltration, lateral movement, or remote command execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass security measures by hiding malicious code within encrypted payloads. This can lead to data theft, system compromise, and further propagation within the network. Malware families like AsyncRAT, XWorm, and VIP Keylogger use this technique to maintain persistence and perform malicious activities undetected. The impact can range from individual workstation compromise to large-scale data breaches depending on the attacker&rsquo;s objectives and the compromised system&rsquo;s role within the organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging on all endpoints to generate the necessary logs (EventCode 4104) for detection.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious PowerShell Cryptography Namespace Usage</code> to your SIEM to detect the described activity.</li>
<li>Investigate any alerts generated by the Sigma rule by examining the parent process, decrypted data, network connections, and the user executing the script.</li>
<li>Review and tune the Sigma rule <code>Detect Suspicious PowerShell Cryptography Namespace Usage</code> based on your environment&rsquo;s specific needs and known-good PowerShell usage to reduce false positives.</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted PowerShell scripts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>powershell</category><category>cryptography</category><category>malware</category><category>asyncrat</category><category>xworm</category><category>vip keylogger</category></item></channel></rss>