<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Attrib.exe — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/attrib.exe/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/attrib.exe/feed.xml" rel="self" type="application/rss+xml"/><item><title>Adding Hidden File Attribute via Attrib.exe</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-attrib-hidden-file/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-attrib-hidden-file/</guid><description>Adversaries can use attrib.exe to add the 'hidden' attribute to files to hide them from users and evade detection, which can be detected by monitoring process executions related to attrib.exe.</description><content:encoded><![CDATA[<p>Attackers can add the &lsquo;hidden&rsquo; attribute to files to hide them from the user in an attempt to evade detection. This technique involves using the <code>attrib.exe</code> utility to modify file attributes. By setting the hidden attribute, adversaries can conceal tooling and malware to prevent administrators and users from finding it, even if they are looking specifically for it. This tactic is often employed post-compromise to maintain a stealthy presence within the target environment. Detection focuses on monitoring process executions that involve <code>attrib.exe</code> with command-line arguments indicating the modification of the hidden attribute. The rule is designed for data generated by Elastic Defend, CrowdStrike, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, and Windows Security Event Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a Windows system through various means such as exploiting a vulnerability or using stolen credentials.</li>
<li>Privilege Escalation: The attacker escalates privileges to gain the necessary permissions to execute system utilities.</li>
<li>Defense Evasion: The attacker uses <code>attrib.exe</code> to modify the hidden attribute of a malicious file or directory. For example, <code>attrib.exe +h C:\path\to\malicious\file.exe</code>.</li>
<li>Concealment: The malicious file or directory is now hidden from normal directory listings, making it harder for users and administrators to detect.</li>
<li>Persistence: The attacker establishes persistence by hiding malicious scripts or executables in startup directories or scheduled tasks.</li>
<li>Lateral Movement: The attacker uses the hidden files to move laterally within the network, potentially using them as part of a larger attack campaign.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of this attack includes prolonged attacker presence, increased difficulty in detecting malicious activity, and potential data exfiltration or system compromise. While the risk score is relatively low, the technique contributes to a broader attack chain and can significantly hinder incident response efforts. A successful hiding of artifacts might lead to further compromise, data breaches, or ransomware deployment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Adding Hidden File Attribute via Attrib&rdquo; to your SIEM to detect suspicious usage of <code>attrib.exe</code>.</li>
<li>Enable process creation logging with command line monitoring in Windows environments to ensure the Sigma rule can capture relevant events.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the parent processes and target files to determine if the activity is legitimate.</li>
<li>Correlate detections of <code>attrib.exe</code> with other suspicious activities or alerts on the same host.</li>
<li>Implement file integrity monitoring to detect unauthorized changes to file attributes, including the hidden attribute.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>windows</category><category>attrib.exe</category></item></channel></rss>