<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Attack.t1047 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/attack.t1047/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 30 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/attack.t1047/feed.xml" rel="self" type="application/rss+xml"/><item><title>Service Reconnaissance via WMIC.exe</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-wmic-service-recon/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-wmic-service-recon/</guid><description>Adversaries use WMIC.exe to enumerate running services on remote devices, potentially identifying valuable targets or misconfigured systems.</description><content:encoded><![CDATA[<p>Attackers may leverage the Windows Management Instrumentation Command-line (WMIC) tool for reconnaissance activities within a network. Specifically, WMIC can be used to query and retrieve information about services running on remote systems. By executing WMIC commands with the &lsquo;service&rsquo; parameter, adversaries can identify the presence and status of specific services, potentially revealing vulnerable or misconfigured systems. This information can then be used to guide further exploitation attempts. WMIC is a built-in Windows utility, making its activity blend with legitimate system administration tasks, increasing the difficulty of detection. This activity is a component of the broader T1047 technique (Windows Management Instrumentation).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a compromised system within the target network.</li>
<li>The attacker executes WMIC.exe from the command line.</li>
<li>WMIC.exe is invoked with the <code>service</code> parameter to query service information.</li>
<li>The command includes a target IP address or hostname to query a remote system.</li>
<li>The command attempts to retrieve service names and status information (e.g., <code>wmic /node:&quot;192.168.1.100&quot; service get name, state</code>).</li>
<li>WMIC attempts to connect to the remote host via RPC. An error message is generated if the remote host is unreachable: &ldquo;Node - (provided IP or default) ERROR Description =The RPC server is unavailable&rdquo;.</li>
<li>If the target service is not running, a &ldquo;No instance(s) Available&rdquo; message may be displayed.</li>
<li>The attacker parses the output from WMIC to identify running services of interest for further exploitation or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful service reconnaissance allows attackers to map potential attack vectors within a network. By identifying specific services running on remote systems, attackers can prioritize targets for exploitation based on known vulnerabilities or misconfigurations. This can lead to unauthorized access, data breaches, and system compromise. While the reconnaissance itself does not directly cause harm, it provides crucial information that enables subsequent malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious WMIC Service Enumeration</code> to your SIEM to identify potential service reconnaissance attempts via WMIC (logsource: process_creation, product: windows).</li>
<li>Monitor process creation events for <code>WMIC.exe</code> executions containing the <code>service</code> parameter using endpoint detection and response (EDR) solutions (logsource: process_creation, product: windows).</li>
<li>Implement network segmentation to limit the scope of potential reconnaissance activities.</li>
<li>Review and restrict the use of WMIC in your environment, as it is a common tool for both legitimate administration and malicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.execution</category><category>attack.t1047</category></item><item><title>Service Startup Type Modification via WMIC</title><link>https://feed.craftedsignal.io/briefs/2024-01-wmic-service-startup-change/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wmic-service-startup-change/</guid><description>Adversaries use the Windows Management Instrumentation Command-line (WMIC) utility to modify the startup type of services, setting them to 'Manual' or 'Disabled' to impair defenses or disrupt system operations.</description><content:encoded><![CDATA[<p>Attackers may leverage WMIC, a legitimate Windows command-line utility, to modify the startup type of services. This tactic is often used to disable security products or critical system services, hindering incident response or creating system instability. By setting services to &ldquo;Manual&rdquo; or &ldquo;Disabled&rdquo;, adversaries ensure that these services do not automatically start upon system boot, achieving persistence or impeding detection. While WMIC is a built-in tool, its use for modifying service startup types is often indicative of malicious activity, especially when performed on security-related services. This activity may be part of a larger attack chain aimed at deploying ransomware, exfiltrating data, or establishing a persistent presence on the compromised system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system, potentially through phishing, exploiting a vulnerability, or compromised credentials.</li>
<li>The attacker executes <code>wmic.exe</code> with specific command-line arguments to interact with Windows services.</li>
<li>The <code>service</code> alias is invoked within WMIC to target specific services.</li>
<li>The <code>ChangeStartMode</code> method is used to modify the startup type of the targeted service.</li>
<li>The attacker sets the startup type to either <code>Manual</code> or <code>Disabled</code>, preventing the service from automatically starting on subsequent reboots.</li>
<li>If the targeted service is a security product, this action effectively disables the defense mechanism.</li>
<li>The attacker proceeds with further malicious activities, such as deploying malware or exfiltrating sensitive data, with reduced resistance.</li>
<li>The compromised system experiences degraded security posture and potential operational disruptions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of service startup types can severely impact system security and availability. Disabling security software can lead to undetected malware infections and data breaches. Disabling critical system services can cause system instability, data loss, or complete system failure. While the exact number of victims is unknown, this technique is broadly applicable across Windows environments, potentially affecting organizations of any size and in any sector. The impact ranges from minor operational disruptions to significant financial losses due to data breaches and ransomware attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect suspicious <code>wmic.exe</code> process creations that attempt to change service startup types.</li>
<li>Investigate any instances where <code>wmic.exe</code> is used to modify service startup types, especially when the targeted services are related to security or critical system functions.</li>
<li>Implement endpoint detection and response (EDR) solutions to provide enhanced visibility into process execution and system modifications.</li>
<li>Regularly review and audit service configurations to identify unauthorized changes.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.execution</category><category>attack.t1047</category><category>attack.defense-evasion</category><category>attack.t1562.001</category></item></channel></rss>