<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Attack.t1547.001 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/attack.t1547.001/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 28 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/attack.t1547.001/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Registry Classes Autorun Keys Modification for Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-01-28-classes-autorun-keys-modification/</link><pubDate>Sun, 28 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-28-classes-autorun-keys-modification/</guid><description>Adversaries modify Windows Registry Classes keys to establish persistence by executing malicious code when specific file types are opened or actions are performed, potentially leading to privilege escalation and persistent access.</description><content:encoded><![CDATA[<p>Attackers can manipulate Windows Registry Classes keys, an autostart extensibility point (ASEP), to achieve persistence. This involves modifying registry entries that control how the operating system handles specific file types or shell actions. By modifying these keys, adversaries can ensure their malicious code executes whenever a user interacts with a specific file type (e.g., opening an .exe) or performs a specific action within the shell. This technique, which has been observed since at least 2019, allows malicious actors to maintain a persistent foothold on compromised systems. While legitimate software also utilizes these registry keys, careful filtering and monitoring are crucial for distinguishing malicious modifications from benign software installations. Detection can be noisy due to the legitimate use of these keys, so tuning and review is critical.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access through a separate vector (e.g., phishing, exploit). This stage is not covered by this detection, which focuses on post-exploitation activity.</li>
<li>Privilege Escalation (if needed): The attacker may need elevated privileges to modify certain registry keys. This can involve exploiting vulnerabilities or leveraging existing administrative rights.</li>
<li>Registry Key Modification: The attacker modifies specific keys under <code>\Software\Classes</code> in the Windows Registry. Common targets include <code>\Folder\ShellEx\ExtShellFolderViews</code>, <code>\.exe</code>, and <code>\Directory\Shellex\DragDropHandlers</code>.</li>
<li>Payload植入：攻击者修改注册表项指向一个恶意可执行文件或脚本。这可能涉及替换默认命令或添加新的处理程序。</li>
<li>Execution Trigger: The malicious code is configured to execute when a user interacts with the associated file type or shell action (e.g., opening a .exe file, right-clicking a folder).</li>
<li>Malicious Payload Execution: When the configured trigger occurs, the malicious payload executes, giving the attacker control over the system.</li>
<li>Persistence Maintained: The modified registry keys ensure that the malicious payload will continue to execute whenever the trigger occurs, maintaining persistence across reboots or user logons.</li>
<li>Objective Achieved: The attacker leverages persistent access to achieve their objectives, such as data exfiltration, lateral movement, or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent access to compromised systems, bypassing traditional security measures. This can lead to significant data breaches, financial losses, and reputational damage. The number of potential victims is broad, as any Windows system is potentially vulnerable. The types of damage possible range from credential theft to ransomware deployment, depending on the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Windows Registry auditing and monitor <code>registry_set</code> events for modifications to keys under <code>\Software\Classes</code> to identify suspicious activity.</li>
<li>Deploy the Sigma rule &ldquo;Classes Autorun Keys Modification&rdquo; to your SIEM and tune the filters (filter_main_<em>, filter_optional_</em>) for your specific environment to reduce false positives.</li>
<li>Investigate any registry modifications detected by the Sigma rule, focusing on unusual executables or scripts being launched from these locations.</li>
<li>Regularly review and update the filters in the Sigma rule to account for legitimate software changes in your environment.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.privilege-escalation</category><category>attack.persistence</category><category>attack.t1547.001</category></item><item><title>Office Application Autorun Registry Key Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-office-autorun-registry-modification/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-office-autorun-registry-modification/</guid><description>Adversaries modify Office application autostart extensibility point (ASEP) registry keys to achieve persistence and execute malicious code when Office applications are launched.</description><content:encoded><![CDATA[<p>Attackers may target Microsoft Office applications&rsquo; autostart extensibility points (ASEPs) in the Windows Registry to establish persistence. By modifying specific registry keys, malicious actors can ensure that their code is executed each time an Office application, such as Word, Excel, or Outlook, is launched. This technique is often employed to maintain a foothold on a compromised system. While legitimate add-ins also leverage these registry keys, unauthorized modifications can lead to the execution of arbitrary code, potentially resulting in data theft, system compromise, or further exploitation. Defenders should be aware that many legitimate applications modify these keys. Thorough testing and tuning is required.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system via an unrelated method.</li>
<li>The attacker identifies the relevant Office application ASEP registry keys: <code>\Software\Wow6432Node\Microsoft\Office</code>, <code>\Software\Microsoft\Office</code> and specific application keys like <code>\Word\Addins</code>, <code>\Excel\Addins</code>, etc.</li>
<li>The attacker modifies the registry key to point to a malicious executable or script. This could be achieved using tools like <code>reg.exe</code> or PowerShell.</li>
<li>The registry modification ensures that the malicious code is executed upon the next launch of the targeted Office application.</li>
<li>The user launches the Office application (e.g., Word, Excel, Outlook).</li>
<li>The Office application reads the modified registry key and executes the associated malicious code.</li>
<li>The malicious code performs its intended actions, such as downloading additional payloads, establishing command and control, or stealing data.</li>
<li>The attacker maintains persistence on the system through the modified registry key, ensuring continued access and control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to achieve persistence on compromised systems. This can lead to data exfiltration, deployment of ransomware, or further lateral movement within the network. The modification of these keys is often performed to maintain a persistent presence, allowing attackers to regain access to the system even after reboots or user logoffs. While the number of direct victims is unknown, the potential for widespread impact is significant, especially in organizations heavily reliant on Microsoft Office applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable registry modification logging and deploy the provided Sigma rules to your SIEM to detect suspicious changes to Office application autostart registry keys.</li>
<li>Regularly audit the Office application add-ins installed on systems to identify and remove any unauthorized or malicious extensions (reference: Sigma rules).</li>
<li>Implement application whitelisting to prevent the execution of unauthorized executables and scripts (reference: Attack Chain).</li>
<li>Monitor process execution events for Office applications launching unusual or suspicious child processes (reference: Attack Chain).</li>
<li>Tune and customize the provided Sigma rules based on your environment&rsquo;s baseline of legitimate Office add-in activity to minimize false positives (reference: Sigma rules).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>attack.privilege-escalation</category><category>attack.persistence</category><category>attack.t1547.001</category></item></channel></rss>