<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Azure-Ad-Connect — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/azure-ad-connect/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 02 Nov 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/azure-ad-connect/feed.xml" rel="self" type="application/rss+xml"/><item><title>Untrusted DLL Loaded by Azure AD Connect Authentication Agent</title><link>https://feed.craftedsignal.io/briefs/2024-11-azureadconnect-dll-load/</link><pubDate>Sat, 02 Nov 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-azureadconnect-dll-load/</guid><description>The loading of an untrusted DLL by the Azure AD Connect Authentication Agent, potentially indicating credential access attempts via the Pass-through Authentication service, is detected by this rule.</description><content:encoded><![CDATA[<p>The Azure AD Connect Authentication Agent facilitates pass-through authentication (PTA) in hybrid environments. Attackers may attempt to load malicious DLLs into the <code>AzureADConnectAuthenticationAgentService.exe</code> process to intercept or persist credentials. This involves placing an untrusted DLL in a location where the service will load it, such as a directory with weak permissions or through DLL side-loading. Successful exploitation allows attackers to capture user credentials as they are processed by the PTA service, potentially leading to domain compromise. This activity specifically targets systems utilizing Azure AD Connect with PTA enabled. Defenders should monitor for unexpected DLL loads by the Azure AD Connect Authentication Agent to identify and prevent credential access attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system hosting the Azure AD Connect Authentication Agent.</li>
<li>The attacker identifies a location where they can place a malicious DLL that the <code>AzureADConnectAuthenticationAgentService.exe</code> process will load, such as a directory with weak permissions or a location susceptible to DLL side-loading.</li>
<li>The attacker places a malicious DLL (e.g., <code>evil.dll</code>) into the identified location.</li>
<li>The <code>AzureADConnectAuthenticationAgentService.exe</code> process is started or restarted.</li>
<li>The <code>AzureADConnectAuthenticationAgentService.exe</code> process loads the malicious DLL (<code>evil.dll</code>).</li>
<li>The malicious DLL intercepts or captures credentials as they are processed by the PTA service.</li>
<li>The attacker exfiltrates the captured credentials.</li>
<li>The attacker uses the stolen credentials to gain unauthorized access to other systems or resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to intercept credentials handled by the Azure AD Connect Authentication Agent. This can lead to the compromise of user accounts and the ability to move laterally within the environment. Organizations using Azure AD Connect with Pass-through Authentication are at risk. The impact includes potential data breaches, unauthorized access to sensitive information, and domain compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the Sigma rule <code>Untrusted DLL Loaded by Azure AD Connect Authentication Agent</code> to detect the loading of untrusted DLLs by the Azure AD Connect Authentication Agent service in your environment.</li>
<li>Monitor process creation events for <code>AzureADConnectAuthenticationAgentService.exe</code> loading DLLs outside of the standard Microsoft directories, as defined in the Sigma rule.</li>
<li>Enable Sysmon Event ID 7 (Image Loaded) logging to provide the necessary data for the Sigma rule to function effectively.</li>
<li>Restrict write access to the Azure AD Connect Authentication Agent directories to prevent unauthorized DLL placement.</li>
<li>Review administrative access to the PTA host to prevent unauthorized modifications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>dll-side-loading</category><category>azure-ad-connect</category></item></channel></rss>