<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cab — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cab/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 19 Mar 2026 17:31:15 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cab/feed.xml" rel="self" type="application/rss+xml"/><item><title>MOTW Bypass via CAB, TAR, and 7-Zip Chaining</title><link>https://feed.craftedsignal.io/briefs/2026-03-motw-bypass/</link><pubDate>Thu, 19 Mar 2026 17:31:15 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-motw-bypass/</guid><description>A newly discovered Mark of the Web (MOTW) bypass technique utilizes a chain of CAB, TAR, and 7-Zip archives to circumvent SmartScreen and execute files without security warnings.</description><content:encoded><![CDATA[<p>A new MOTW bypass technique has emerged that chains a CAB file with two TAR archives nested within a 7-Zip archive. This method effectively strips the Zone.Identifier stream from downloaded files, preventing the display of SmartScreen prompts or security warnings. Many organizations rely on MOTW and SmartScreen as a crucial layer of defense against phishing attacks. This bypass, affecting fully patched environments, allows attackers to execute arbitrary code without the usual security checks, potentially leading to malware infection or data compromise. The technique is not a rehash of older 7-Zip MOTW issues but a novel approach to evade detection based on Zone.Identifier.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious payload.</li>
<li>Attacker packages the payload into a TAR archive.</li>
<li>The TAR archive is nested inside another TAR archive.</li>
<li>The nested TAR archives are then compressed into a 7-Zip archive using 7z.exe.</li>
<li>The 7-Zip archive is packaged into a CAB archive using makecab.exe.</li>
<li>The CAB archive is distributed to the victim, potentially via phishing or drive-by download.</li>
<li>The victim opens the CAB archive, extracting the nested 7-Zip, TAR, and payload.</li>
<li>The payload executes without a Zone.Identifier stream, bypassing MOTW and SmartScreen, potentially leading to malware infection or unauthorized access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass security controls that rely on MOTW and SmartScreen. This can lead to malware infections, data breaches, or other malicious activities. The bypass affects fully patched environments, increasing the scope of potential victims. The absence of security warnings makes it more likely that users will execute the malicious payload, increasing the success rate of attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement detections for unusual process chains involving <code>makecab.exe</code>, <code>7z.exe</code>, and <code>tar.exe</code> as these tools are used in the bypass (see Sigma rule &ldquo;Detect Suspicious Archive Chaining&rdquo;).</li>
<li>Monitor for archive extractions from unusual locations, especially those originating from downloaded CAB files, using file event logging and process monitoring (see Sigma rule &ldquo;Detect Archive Extraction from Downloaded CAB&rdquo;).</li>
<li>Analyze network connections from processes spawned from archive extractions, as they may indicate command and control or data exfiltration.</li>
<li>Block the URL <code>https://youtu.be/pQxiPwGTBL8</code> to prevent users from accessing potentially malicious content related to this bypass.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>motw</category><category>bypass</category><category>phishing</category><category>defense-evasion</category><category>archive</category><category>7-zip</category><category>cab</category><category>tar</category></item></channel></rss>