<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Binary-Execution — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/binary-execution/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 15:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/binary-execution/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Binary Execution from Archive-Related Paths</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-binary-exec-from-archive/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-binary-exec-from-archive/</guid><description>Detects the execution of a binary from archive-related paths within a user's Temp directory, potentially indicating attempts to bypass Mark-of-the-Web (MOTW) or exploit vulnerabilities like CVE-2025-0411.</description><content:encoded><![CDATA[<p>This detection identifies suspicious execution patterns where Windows binaries are launched from archive-related paths within a user&rsquo;s temporary directory. This technique is often employed by attackers to circumvent security mechanisms like Mark-of-the-Web (MOTW), as seen in instances such as CVE-2025-0411. The detection focuses on binaries executed by trusted processes like <code>explorer.exe</code>, <code>winrar.exe</code>, and <code>7zFM.exe</code>. The targeted process paths include the user&rsquo;s Temp directory and archive markers like RAR, 7z, or ZIP. This behavior allows attackers to execute malicious code without triggering standard security alerts, making it crucial for defenders to monitor for this anomaly.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user receives a malicious archive file (e.g., RAR, ZIP, 7z) via phishing or drive-by download.</li>
<li>The user opens the archive using <code>explorer.exe</code>, <code>winrar.exe</code>, or <code>7zFM.exe</code>.</li>
<li>The archive contains a malicious executable file disguised as a legitimate document or media file.</li>
<li>The executable is extracted to a temporary directory within the user&rsquo;s <code>AppData\Local\Temp\</code> folder.</li>
<li>The user clicks on the extracted file, triggering its execution.</li>
<li>Because the file was extracted from an archive and executed from the Temp directory, it might bypass Mark-of-the-Web (MOTW) protections.</li>
<li>The malicious executable performs its intended actions, such as installing malware, establishing persistence, or exfiltrating data.</li>
<li>The attacker gains unauthorized access to the system or network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the installation of malware, data theft, and complete system compromise. By bypassing MOTW and other security measures, attackers can gain a foothold in the network and move laterally to access sensitive data. The impact can range from individual user compromises to large-scale data breaches, causing significant financial and reputational damage. The exploitation of CVE-2025-0411 and similar vulnerabilities can affect a wide range of users who regularly interact with archive files.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Binary Executed from Archive-Related Temp Path</code> to your SIEM and tune for your environment to detect the execution of binaries from archive-related paths within the user&rsquo;s Temp directory.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the parent process, executed path, and user context.</li>
<li>Implement application control policies to restrict the execution of binaries from temporary directories.</li>
<li>Educate users about the risks of opening suspicious archive files and clicking on extracted executables.</li>
<li>Monitor process execution events (Sysmon EventID 1 or CrowdStrike ProcessRollup2) for unusual parent-child process relationships involving archive extraction tools and executables.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>binary-execution</category><category>archive-bypass</category><category>motw-bypass</category></item></channel></rss>