<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Defense Evasion — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/defense-evasion/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 20:11:38 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/defense-evasion/feed.xml" rel="self" type="application/rss+xml"/><item><title>Argo Workflows Template Referencing Restriction Bypass</title><link>https://feed.craftedsignal.io/briefs/2026-05-argo-workflow-bypass/</link><pubDate>Mon, 04 May 2026 20:11:38 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-argo-workflow-bypass/</guid><description>Argo Workflows has an incomplete fix for CVE-2026-31892, allowing bypass of templateReferencing restrictions to modify pod specifications, leading to potential privilege escalation and security context overrides.</description><content:encoded><![CDATA[<p>Argo Workflows, a Kubernetes-native workflow engine, contains an incomplete fix for CVE-2026-31892. The initial patch blocked <code>podSpecPatch</code> modifications when <code>templateReferencing: Strict</code> was active. However, other fields within the WorkflowSpec that influence pod creation, such as <code>hostNetwork</code>, <code>serviceAccountName</code>, and <code>securityContext</code>, were not restricted. This allows a malicious user to bypass intended security controls and potentially escalate privileges within the Kubernetes cluster. Versions affected include those supporting the <code>templateReferencing</code> feature, specifically v4.0.2 and v3.7.11, which include the initial fix for CVE-2026-31892 but are still vulnerable to this bypass. This vulnerability exists because the check in <code>setExecWorkflow</code> only validates <code>HasPodSpecPatch()</code>, while other critical fields are applied directly to the pod specification. The bypass affects both <code>Strict</code> and <code>Secure</code> modes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains <code>create Workflow</code> permission within the Argo Workflows environment.</li>
<li>Attacker crafts a Workflow manifest that references a hardened WorkflowTemplate.</li>
<li>Attacker sets <code>hostNetwork: true</code> (or other vulnerable fields like <code>securityContext</code>, <code>serviceAccountName</code>, <code>tolerations</code>, or <code>automountServiceAccountToken</code>) in the Workflow manifest.</li>
<li>The Workflow is submitted, and the <code>setExecWorkflow</code> function in the Argo controller only checks for <code>podSpecPatch</code>.</li>
<li>Due to the missing validation, the user-defined <code>hostNetwork: true</code> (or other vulnerable fields) is merged with the WorkflowTemplate specification.</li>
<li>The <code>createWorkflowPod</code> function reads the merged specification and applies the <code>hostNetwork: true</code> setting directly to the pod specification, bypassing the intended restrictions.</li>
<li>A pod is created with host networking enabled, granting the container access to the host&rsquo;s network namespace.</li>
<li>The attacker can now access sensitive information or perform actions on the network as if they were running directly on the host.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker to bypass the intended security restrictions imposed by Argo Workflows&rsquo; <code>templateReferencing</code> feature. This can lead to privilege escalation, unauthorized access to network resources, and the potential to compromise other containers or nodes within the Kubernetes cluster. The impact is most significant in clusters that rely on Argo&rsquo;s Strict mode as the primary enforcement layer, as other Kubernetes-level controls like PodSecurity admission or OPA/Gatekeeper may not be in place to mitigate these bypasses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Argo Workflow Host Network Bypass</code> to detect workflows attempting to set <code>hostNetwork: true</code>, and tune for your environment.</li>
<li>Deploy the Sigma rule <code>Argo Workflow Service Account Override</code> to detect workflows attempting to override the service account.</li>
<li>Upgrade to a patched version of Argo Workflows that addresses CVE-2026-42296, ensuring that all WorkflowSpec fields that influence pod security posture are validated.</li>
<li>Implement Kubernetes-level controls, such as PodSecurity admission or OPA/Gatekeeper, to provide an additional layer of defense against unauthorized pod specification modifications.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>argo-workflows</category><category>kubernetes</category><category>privilege-escalation</category><category>defense-evasion</category></item><item><title>Potential PowerShell Obfuscated Script via High Entropy</title><link>https://feed.craftedsignal.io/briefs/2026-06-high-entropy-powershell/</link><pubDate>Mon, 04 May 2026 14:49:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-high-entropy-powershell/</guid><description>This detection identifies potentially obfuscated PowerShell scripts based on high entropy and non-uniform character distributions, often used by attackers to evade signature-based detections and hinder analysis.</description><content:encoded><![CDATA[<p>Attackers frequently employ PowerShell obfuscation techniques to evade detection and hinder analysis. These techniques involve encoding, encrypting, or compressing PowerShell scripts to mask their true intent. This detection identifies PowerShell script blocks exhibiting high entropy and non-uniform character distributions, statistical characteristics often associated with obfuscated content. The rule specifically targets script blocks longer than 1000 characters with entropy bits &gt;= 5.5 and surprisal standard deviation &gt; 0.7. This detection is designed to highlight potentially malicious PowerShell activity that warrants further investigation by security analysts and incident responders. This rule was created by Elastic and last updated on May 4, 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system (e.g., via phishing or exploit).</li>
<li>The attacker leverages PowerShell, a built-in Windows scripting language, to execute malicious commands.</li>
<li>The attacker uses obfuscation techniques (encoding, encryption, compression) to disguise the PowerShell script&rsquo;s true intent.</li>
<li>The obfuscated script is executed, bypassing basic signature-based detections.</li>
<li>The script may download and execute additional payloads or establish persistence.</li>
<li>The script performs malicious actions such as data exfiltration, lateral movement, or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using obfuscated PowerShell can lead to various negative impacts, including data breaches, system compromise, and disruption of services. The low severity reflects the need for further analysis to confirm malicious intent, given potential false positives from legitimate encoded scripts. While the exact number of affected systems and sectors is unknown, the widespread use of PowerShell makes this a potentially significant threat across many organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging to generate the necessary events (4104) as outlined in the setup instructions: <a href="https://ela.st/powershell-logging-setup">https://ela.st/powershell-logging-setup</a>.</li>
<li>Deploy the provided Sigma rule to your SIEM and tune the thresholds (<code>powershell.file.script_block_length</code>, <code>powershell.file.script_block_entropy_bits</code>, <code>powershell.file.script_block_surprisal_stdev</code>) based on your environment&rsquo;s baseline.</li>
<li>Investigate alerts generated by the Sigma rule, focusing on execution context (<code>user.name</code>, <code>host.name</code>), script provenance (<code>file.path</code>), and reconstructed script content (<code>powershell.file.script_block_text</code>).</li>
<li>Review the investigation guide within the rule&rsquo;s <code>note</code> section for detailed triage and analysis steps.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>powershell</category><category>obfuscation</category></item><item><title>Windows Port Forwarding Rule Addition via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2026-05-port-forwarding-registry/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-port-forwarding-registry/</guid><description>An adversary may abuse port forwarding to bypass network segmentation restrictions by creating a new port forwarding rule through modification of the Windows registry.</description><content:encoded><![CDATA[<p>Attackers may configure port forwarding rules to bypass network segmentation restrictions, effectively using the compromised host as a jump box to access previously unreachable systems. This involves modifying the registry to redirect incoming TCP connections from a local port to another port or a remote computer. The technique is typically employed post-compromise to facilitate lateral movement and maintain unauthorized access within the network. This activity is detected by monitoring changes to the <code>HKLM\SYSTEM\*ControlSet*\Services\PortProxy\v4tov4\</code> registry subkeys.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system through an exploit or compromised credentials.</li>
<li>The attacker executes a command-line interface (e.g., <code>cmd.exe</code> or <code>powershell.exe</code>) with administrative privileges.</li>
<li>The attacker uses <code>reg.exe</code> or PowerShell&rsquo;s <code>Set-ItemProperty</code> cmdlet to modify the <code>HKLM\SYSTEM\CurrentControlSet\Services\PortProxy\v4tov4\</code> registry key.</li>
<li>The attacker configures a new port forwarding rule by creating a new subkey under <code>v4tov4\</code> with specific settings for the local port, remote address, and remote port.</li>
<li>The attacker sets the <code>ListenAddress</code>, <code>ListenPort</code>, <code>ConnectAddress</code>, and <code>ConnectPort</code> values within the new subkey.</li>
<li>The attacker verifies the successful creation and activation of the port forwarding rule using <code>netsh interface portproxy show v4tov4</code>.</li>
<li>The attacker leverages the newly created port forwarding rule to tunnel traffic through the compromised host, bypassing network segmentation.</li>
<li>The attacker uses the proxied connection to access internal resources and conduct further attacks, such as lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation enables attackers to bypass network segmentation restrictions, leading to unauthorized access to internal systems and data. This can facilitate lateral movement, data exfiltration, and further compromise of the network. The severity of the impact depends on the sensitivity of the accessible resources and the extent of the attacker&rsquo;s lateral movement.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon registry event logging to capture modifications to the <code>HKLM\SYSTEM\*ControlSet*\Services\PortProxy\v4tov4\</code> registry subkeys, enabling detection of malicious port forwarding rule additions.</li>
<li>Deploy the Sigma rule &ldquo;Port Forwarding Rule Addition via Registry Modification&rdquo; to your SIEM to detect suspicious registry modifications related to port forwarding.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the process execution chain and the user account that performed the action.</li>
<li>Regularly review and audit existing port forwarding rules to identify and remove any unauthorized or suspicious configurations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>port-forwarding</category><category>registry-modification</category><category>command-and-control</category><category>defense-evasion</category><category>windows</category></item><item><title>Suspicious Zoom Child Process Execution</title><link>https://feed.craftedsignal.io/briefs/2024-11-suspicious-zoom-child-process/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-suspicious-zoom-child-process/</guid><description>A suspicious Zoom child process was detected, indicating a potential attempt to run unnoticed by masquerading as Zoom.exe or exploiting a vulnerability, resulting in the execution of cmd.exe, powershell.exe, pwsh.exe, or powershell_ise.exe.</description><content:encoded><![CDATA[<p>This detection identifies suspicious child processes spawned by Zoom.exe, potentially indicating an attempt to evade detection or exploit vulnerabilities within the Zoom application. The rule focuses on detecting instances where command interpreters like cmd.exe, PowerShell, or PowerShell ISE are launched as child processes of Zoom. This behavior can be indicative of an attacker attempting to execute malicious commands or scripts within the context of the Zoom application, potentially escalating privileges or gaining unauthorized access to system resources. It&rsquo;s crucial for defenders to investigate such occurrences, as they may signify ongoing exploitation or malicious activity leveraging Zoom as an initial access vector.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>User launches the Zoom application (Zoom.exe).</li>
<li>A vulnerability in Zoom is exploited, or the user is socially engineered into running a malicious command.</li>
<li>Zoom.exe spawns a child process, such as cmd.exe, powershell.exe, pwsh.exe, or powershell_ise.exe.</li>
<li>The spawned process executes commands or scripts, potentially downloading or executing malware.</li>
<li>The malicious script or command performs reconnaissance activities on the system.</li>
<li>The script establishes persistence by creating a scheduled task or modifying registry keys.</li>
<li>The attacker gains remote access to the compromised system.</li>
<li>The attacker performs lateral movement and data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could allow attackers to execute arbitrary commands, escalate privileges, and compromise the affected system. Depending on the user&rsquo;s privileges, attackers could gain access to sensitive data, install malware, or pivot to other systems on the network. The impact ranges from data breaches to complete system compromise, potentially affecting all users within the organization who utilize the Zoom application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Suspicious Zoom Child Process&rdquo; to your SIEM to detect command interpreters spawned by Zoom.exe. Tune the rule for your environment to minimize false positives.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture detailed information about process executions, which is essential for the Sigma rule above.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the command-line arguments and network connections of the spawned processes.</li>
<li>Monitor Windows Security Event Logs for process creation events related to Zoom.exe and its child processes to identify suspicious behavior.</li>
<li>Consider implementing application control policies to restrict the execution of unauthorized processes within the Zoom application context.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>windows</category></item><item><title>Suspicious Execution via Windows Command Debugging Utility</title><link>https://feed.craftedsignal.io/briefs/2024-07-cdb-execution/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-cdb-execution/</guid><description>Adversaries can abuse the Windows command line debugging utility cdb.exe to execute commands or shellcode from non-standard paths, evading traditional security measures.</description><content:encoded><![CDATA[<p>The Windows command line debugging utility, cdb.exe, is a legitimate tool used for debugging applications. However, adversaries can exploit it to execute unauthorized commands or shellcode, bypassing security measures. This can be achieved by running cdb.exe from non-standard installation paths and using specific command-line arguments to execute malicious commands. The LOLBAS project documents this technique, highlighting its potential for defense evasion. This activity has been observed across various environments, necessitating detection strategies that focus on identifying anomalous executions of cdb.exe.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system.</li>
<li>The attacker copies cdb.exe to a non-standard location (outside &ldquo;Program Files&rdquo; and &ldquo;Program Files (x86)&rdquo;).</li>
<li>The attacker executes cdb.exe with the <code>-cf</code>, <code>-c</code>, or <code>-pd</code> command-line arguments.</li>
<li>These arguments are used to specify a command file or execute a direct command.</li>
<li>The command file or command directly executes malicious code, such as shellcode.</li>
<li>The malicious code performs actions such as creating new processes, modifying files, or establishing network connections.</li>
<li>These actions allow the attacker to maintain persistence or escalate privileges.</li>
<li>The ultimate goal is to evade defenses and execute arbitrary code on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows adversaries to execute arbitrary commands and shellcode on the affected system, potentially leading to complete system compromise. This can result in data theft, installation of malware, or further propagation within the network. The technique is effective at bypassing application whitelisting and other security controls that rely on standard execution paths.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Execution via Windows Command Debugging Utility&rdquo; to your SIEM to detect suspicious cdb.exe executions (see rules section).</li>
<li>Enable process creation logging via Sysmon or Windows Security Event Logs to provide the necessary data for the Sigma rule.</li>
<li>Implement application whitelisting to prevent execution of cdb.exe from non-standard paths.</li>
<li>Monitor process command lines for the <code>-cf</code>, <code>-c</code>, and <code>-pd</code> flags when cdb.exe is executed.</li>
<li>Investigate any instances of cdb.exe running from unusual directories to determine legitimacy.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lolbas</category><category>defense-evasion</category><category>windows</category></item><item><title>SIP Provider Modification for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-sip-provider-modification/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-sip-provider-modification/</guid><description>This rule detects modifications to the registered Subject Interface Package (SIP) providers, which are used by the Windows cryptographic system to validate file signatures, potentially indicating an attempt to bypass signature validation or inject code for defense evasion.</description><content:encoded><![CDATA[<p>This detection rule identifies modifications to Subject Interface Package (SIP) providers, a critical component of the Windows cryptographic system responsible for validating file signatures. Attackers may attempt to subvert trust controls by modifying SIP providers, allowing them to bypass signature validation checks and potentially inject malicious code into trusted processes. This activity is a form of defense evasion, allowing unauthorized code execution. The rule focuses on detecting suspicious registry changes associated with SIP providers, while excluding known benign processes to minimize false positives. The rule is designed for data generated by Elastic Defend, but also supports third-party data sources like CrowdStrike, Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon. This activity is related to MITRE ATT&amp;CK technique T1553.003 (SIP and Trust Provider Hijacking).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system through various means (e.g., phishing, exploitation of vulnerabilities).</li>
<li>The attacker escalates privileges to gain necessary permissions to modify the registry.</li>
<li>The attacker modifies the registry keys associated with SIP providers, specifically targeting <code>CryptSIPDllPutSignedDataMsg</code> and <code>Trust\\FinalPolicy</code> locations.</li>
<li>The attacker changes the <code>Dll</code> value within these registry keys to point to a malicious DLL.</li>
<li>The system, upon attempting to validate a file signature, loads the malicious DLL instead of the legitimate SIP provider.</li>
<li>The malicious DLL executes arbitrary code, potentially injecting it into other processes.</li>
<li>The attacker uses the injected code to further compromise the system or network.</li>
<li>The attacker achieves their final objective, such as data exfiltration, ransomware deployment, or establishing persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of SIP providers allows attackers to bypass signature validation checks, leading to the execution of unsigned or malicious code. This can compromise the integrity of the system, leading to data breaches, system instability, or further propagation of malware within the network. The impact can range from individual workstation compromise to widespread organizational damage, depending on the scope of the attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect SIP Provider Modification via Registry</code> to your SIEM and tune it for your environment to detect suspicious registry modifications related to SIP providers.</li>
<li>Enable Sysmon registry event logging to collect the necessary data for the Sigma rules above.</li>
<li>Investigate any alerts generated by the rules, focusing on the process responsible for the registry change and the DLL being loaded, as described in the rule&rsquo;s triage section.</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted code.</li>
<li>Monitor the registry paths listed in the Sigma rules for unexpected changes.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>registry-modification</category></item><item><title>Service DACL Modification via sc.exe</title><link>https://feed.craftedsignal.io/briefs/2024-07-service-dacl-modification/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-service-dacl-modification/</guid><description>Detection of service DACL modifications via `sc.exe` using the `sdset` command, potentially leading to defense evasion by denying service access to legitimate users or system accounts.</description><content:encoded><![CDATA[<p>This detection identifies the modification of Discretionary Access Control Lists (DACLs) for Windows services using the <code>sc.exe</code> utility. Attackers can leverage this technique to deny access to a service, making it unmanageable or hiding it from system administrators and users. The detection rule focuses on identifying instances where <code>sc.exe</code> is used with the <code>sdset</code> argument, specifically targeting the denial of access for key user groups such as IU, SU, BA, SY, and WD. This activity is indicative of a defense evasion attempt aimed at hindering security tools or preventing remediation. The rule is designed for data generated by Elastic Defend, but also supports integrations with third-party data sources like CrowdStrike, Microsoft Defender XDR, and SentinelOne Cloud Funnel, offering broad coverage for detecting this malicious behavior across diverse environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system through various means (e.g., compromised credentials, phishing).</li>
<li>The attacker elevates privileges to gain necessary permissions to modify service configurations.</li>
<li>The attacker executes <code>sc.exe</code> with the <code>sdset</code> command to modify the DACL of a targeted service.</li>
<li>The <code>sdset</code> command arguments specify the new security descriptor, denying access to specific user groups (e.g., IU, SU, BA, SY, WD).</li>
<li>The service becomes inaccessible to the targeted user groups, potentially disrupting legitimate operations or security tools.</li>
<li>The attacker may repeat this process for multiple services to further impair system functionality or evade detection.</li>
<li>The attacker leverages the disabled or hidden services to maintain persistence or carry out other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of service DACLs can lead to a denial-of-service condition for legitimate users and system administrators. This can impair the functionality of critical security tools, hinder incident response efforts, and provide attackers with a persistent foothold on the compromised system. The hiding of services can also prevent users from identifying and removing malicious services. While the number of victims is not specified in the source, organizations across various sectors are potentially vulnerable to this type of attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Service DACL Modification via sc.exe</code> to your SIEM to detect this specific behavior.</li>
<li>Enable Sysmon process creation logging to provide the necessary data for the Sigma rule to function effectively.</li>
<li>Investigate any instances where <code>sc.exe</code> is used with the <code>sdset</code> argument and access denial flags, focusing on the targeted user groups (IU, SU, BA, SY, WD).</li>
<li>Implement strict access controls and monitor for unauthorized attempts to modify service configurations.</li>
<li>Regularly audit service permissions to identify and remediate any unauthorized changes.</li>
<li>Review and update endpoint protection policies to prevent similar threats in the future, ensuring that all systems are equipped with the latest security patches and configurations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>windows</category></item><item><title>Potential Secure File Deletion via SDelete Utility</title><link>https://feed.craftedsignal.io/briefs/2024-01-28-sdelete-filename-rename/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-28-sdelete-filename-rename/</guid><description>This rule detects file name patterns generated by the use of Sysinternals SDelete utility, potentially used by attackers to delete forensic indicators and hinder data recovery efforts.</description><content:encoded><![CDATA[<p>The Sysinternals SDelete utility is a legitimate tool developed by Microsoft for securely deleting files by overwriting and renaming them multiple times. While intended for secure data disposal, adversaries can abuse SDelete to remove forensic artifacts, destroy evidence of their activities, and impede data recovery efforts after a successful ransomware attack or data theft. This activity can be used as a post-exploitation technique. This detection rule focuses on identifying file name patterns indicative of SDelete&rsquo;s operation, specifically detecting files with names resembling &ldquo;*AAA.AAA&rdquo;. The rule is designed to work with various endpoint detection and response solutions, including Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, and CrowdStrike.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker escalates privileges to gain the necessary permissions to delete files.</li>
<li>The attacker deploys or utilizes an existing copy of the SDelete utility.</li>
<li>The attacker executes SDelete against targeted files or directories.</li>
<li>SDelete overwrites the targeted file(s) multiple times with random data.</li>
<li>SDelete renames the file(s) multiple times, often with patterns such as &ldquo;*AAA.AAA&rdquo;.</li>
<li>SDelete deletes the file(s) making recovery difficult.</li>
<li>The attacker removes SDelete or any associated tools to further cover their tracks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this technique can result in the permanent deletion of crucial forensic artifacts, log files, or even critical data. This can severely hinder incident response efforts, making it challenging to identify the scope of the attack, the attacker&rsquo;s methods, and the compromised assets. The number of victims and affected sectors depends on the scale of the initial breach and the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Potential Secure File Deletion via SDelete Utility&rdquo; detection rule to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the detection rule, focusing on the process execution chain and identifying the user account involved.</li>
<li>Review the privileges assigned to the user account to ensure the least privilege principle is followed.</li>
<li>Enable Sysmon Event ID 11 (File Create) logging to enhance visibility into file creation events.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense evasion</category><category>impact</category><category>windows</category></item><item><title>Potential Remote File Execution via MSIEXEC</title><link>https://feed.craftedsignal.io/briefs/2026-05-msiexec-remote-install/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-msiexec-remote-install/</guid><description>The rule detects the execution of the built-in Windows Installer, msiexec.exe, to install a remote package potentially abused by adversaries for initial access and defense evasion.</description><content:encoded><![CDATA[<p>The Windows Installer (msiexec.exe) is a built-in Windows component used for installing, modifying, and removing software. Adversaries may abuse msiexec.exe to launch local or network accessible MSI files, bypassing security controls and potentially leading to initial access or defense evasion. This activity is often part of a broader attack chain, used to deliver and execute malicious payloads. The detection rule provided by Elastic identifies suspicious msiexec.exe activity by monitoring process starts, network connections, and child processes. It filters out known benign signatures and paths to highlight potential misuse. This detection is designed to work with Elastic Defend data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access via phishing (T1566) or other means to execute commands on the target system.</li>
<li>The attacker uses msiexec.exe with the <code>/V</code> parameter to initiate the installation of a remote MSI package. This allows the attacker to bypass typical execution restrictions.</li>
<li>Msiexec.exe attempts a network connection (T1105) to retrieve the remote MSI package from a malicious server.</li>
<li>Msiexec.exe spawns a child process to handle the installation of the downloaded MSI package.</li>
<li>The spawned child process executes malicious code embedded within the MSI package.</li>
<li>The malicious code performs actions such as installing malware, modifying system settings, or establishing persistence.</li>
<li>The attacker leverages the compromised system for further lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the installation of malware, unauthorized access to sensitive data, and further compromise of the affected system and network. While this specific rule has a low risk score, it can be an early indicator of more serious attacks. It is crucial to investigate any alerts generated by this rule to determine the full scope and impact of the potential compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule provided below to your SIEM to detect suspicious usage of <code>msiexec.exe</code> to install remote packages. Tune the rule for your environment by adding exceptions for legitimate software installation processes.</li>
<li>Enable process monitoring and network connection logging on Windows endpoints to provide the necessary data for the Sigma rule to function effectively (Data Source: Elastic Defend).</li>
<li>Review the &ldquo;Possible investigation steps&rdquo; section in the Elastic rule&rsquo;s documentation to investigate potential false positives and legitimate uses of <code>msiexec.exe</code>.</li>
<li>Implement application control policies to restrict the execution of unauthorized applications, including potentially malicious MSI packages.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>msiexec</category><category>remote-file-execution</category><category>initial-access</category><category>defense-evasion</category><category>windows</category></item><item><title>Potential NetNTLMv1 Downgrade Attack via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2026-05-netntlmv1-downgrade/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-netntlmv1-downgrade/</guid><description>This brief details a registry modification attack that downgrades the system to NTLMv1 authentication, enabling NetNTLMv1 downgrade attacks, typically performed with local administrator privileges on Windows systems.</description><content:encoded><![CDATA[<p>This rule detects a specific defense evasion technique where an attacker modifies the Windows registry to force a system to use the less secure NTLMv1 authentication protocol. This is known as a NetNTLMv1 downgrade attack. The registry modification involves changing the <code>LmCompatibilityLevel</code> value, which controls the authentication level. Attackers with local administrator privileges can perform this modification to weaken the authentication mechanism, making it easier to intercept and crack credentials. The rule is designed to detect this activity by monitoring registry events from various sources, including Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, and Crowdstrike. It is important to monitor for this activity as it can lead to credential theft and further compromise of the system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains local administrator privileges on a Windows system.</li>
<li>The attacker uses a registry editor or command-line tool (e.g., <code>reg.exe</code>, PowerShell) to modify the <code>LmCompatibilityLevel</code> value in the registry.</li>
<li>The attacker navigates to one of the following registry paths: <code>HKLM\System\CurrentControlSet\Control\Lsa\LmCompatibilityLevel</code> or <code>HKLM\SYSTEM\CurrentControlSet\Control\Lsa</code>.</li>
<li>The attacker sets the <code>LmCompatibilityLevel</code> value to &ldquo;0&rdquo;, &ldquo;1&rdquo;, or &ldquo;2&rdquo; (or their hexadecimal equivalents &ldquo;0x00000000&rdquo;, &ldquo;0x00000001&rdquo;, &ldquo;0x00000002&rdquo;). These values force the system to use NTLMv1.</li>
<li>The system now uses NTLMv1 for authentication attempts.</li>
<li>The attacker initiates a man-in-the-middle attack to capture NTLMv1 authentication traffic using tools like Responder or Inveigh.</li>
<li>The captured NTLMv1 hashes are cracked using brute-force or dictionary attacks, revealing the user&rsquo;s credentials.</li>
<li>The attacker uses the compromised credentials to gain unauthorized access to network resources or other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful NetNTLMv1 downgrade attack can lead to the compromise of user credentials, enabling attackers to move laterally within the network, access sensitive data, and potentially escalate privileges. The impact can range from data breaches to complete system compromise, depending on the attacker&rsquo;s objectives and the compromised user&rsquo;s privileges.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential NetNTLMv1 Downgrade Attack&rdquo; to detect registry modifications setting <code>LmCompatibilityLevel</code> to insecure values (0, 1, 2) within the specified registry paths.</li>
<li>Enable Sysmon registry event logging to ensure the necessary data is available for the Sigma rule to function correctly.</li>
<li>Review registry event logs for unauthorized modifications of <code>LmCompatibilityLevel</code> to confirm legitimate administrative actions.</li>
<li>Implement strict access control policies to limit local administrator privileges and reduce the attack surface.</li>
<li>Monitor the references URL for updates on recommended security configurations related to NTLM authentication.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>ntlm</category><category>registry-modification</category><category>windows</category></item><item><title>Potential Evasion via Windows Filtering Platform Blocking Security Software</title><link>https://feed.craftedsignal.io/briefs/2026-05-wfp-evasion/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wfp-evasion/</guid><description>Adversaries may add malicious Windows Filtering Platform (WFP) rules to prevent endpoint security solutions from sending telemetry data, impairing defenses, which this rule detects by identifying multiple WFP block events where the process name is associated with endpoint security software.</description><content:encoded><![CDATA[<p>The Windows Filtering Platform (WFP) provides APIs and system services for network filtering and packet processing. Attackers can abuse WFP by creating malicious rules to block endpoint security processes, hindering their ability to send telemetry. This can be achieved by tools like Shutter, EDRSilencer, and Nighthawk. This detection rule identifies patterns of blocked network events linked to security software processes, signaling potential evasion tactics. The rule specifically looks for blocked network events linked to processes associated with known security software, aiming to detect and alert on attempts to disable or modify security tools. This behavior is especially concerning as it allows attackers to operate with reduced visibility.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system (e.g., via compromised credentials or exploiting a vulnerability).</li>
<li>The attacker escalates privileges to gain administrative rights, necessary to interact with the Windows Filtering Platform.</li>
<li>The attacker uses a tool or script (e.g., leveraging the <code>netsh</code> command or custom WFP API calls) to create a new WFP filter.</li>
<li>The WFP filter is configured to block network traffic originating from specific processes associated with endpoint security software (e.g., <code>elastic-agent.exe</code>, <code>sysmon.exe</code>).</li>
<li>The system begins blocking network communication from the targeted security software.</li>
<li>The attacker executes malicious commands or malware on the system, knowing that security telemetry will be suppressed.</li>
<li>The attacker moves laterally within the network, repeating the WFP filter deployment on other systems to further impair defenses.</li>
<li>The attacker achieves their final objective, such as data exfiltration or ransomware deployment, with reduced risk of detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using WFP to impair defenses can lead to a significant reduction in the effectiveness of endpoint security solutions. This can result in delayed detection of malicious activities, increased dwell time for attackers, and ultimately, a higher likelihood of successful data breaches or ransomware attacks. With endpoint telemetry blocked, organizations may remain unaware of the ongoing compromise until significant damage has occurred. The number of affected systems can vary depending on the attacker&rsquo;s scope and objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable and review Windows Audit Filtering Platform Connection and Packet Drop events to populate the logs required for the provided EQL rule (logs-system.security*, logs-windows.forwarded*, winlogbeat-*).</li>
<li>Deploy the provided EQL rule to your SIEM to detect suspicious WFP modifications and tune for your environment.</li>
<li>Investigate any alerts generated by the EQL rule, focusing on identifying the specific processes being blocked and the source of the WFP rule modifications.</li>
<li>Regularly review and audit WFP rules to identify any unauthorized or suspicious entries.</li>
<li>Implement strict access controls and monitoring for systems authorized to modify WFP rules.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows-filtering-platform</category><category>endpoint-security</category></item><item><title>Potential DLL Side-Loading via Trusted Microsoft Programs</title><link>https://feed.craftedsignal.io/briefs/2026-05-dll-side-loading/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-dll-side-loading/</guid><description>This rule detects potential DLL side-loading attempts by identifying instances of Windows trusted programs (WinWord.exe, EXPLORER.EXE, w3wp.exe, DISM.EXE) being started after being renamed or from a non-standard path, which is a common technique to evade defenses by side-loading a malicious DLL into the memory space of a trusted process.</description><content:encoded><![CDATA[<p>This detection rule identifies instances of Windows trusted programs such as WinWord.exe, EXPLORER.EXE, w3wp.exe, and DISM.EXE executing from unusual paths or after being renamed, which may indicate DLL side-loading. DLL side-loading is a defense evasion technique where a malicious DLL is placed in the same directory as a legitimate executable. When the executable runs, it may load the malicious DLL instead of the legitimate one, allowing the attacker to execute arbitrary code within the context of the trusted process. The detection logic focuses on process executions that deviate from standard installation paths. The targeted processes are commonly used and often whitelisted, making this a potent technique for adversaries to bypass security controls.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., through phishing or exploitation of a vulnerability).</li>
<li>The attacker identifies a trusted Windows program vulnerable to DLL side-loading (WinWord.exe, EXPLORER.EXE, w3wp.exe, or DISM.EXE).</li>
<li>The attacker drops a malicious DLL into a directory where the trusted program is expected to load DLLs from, often alongside a renamed or copied version of the legitimate executable.</li>
<li>Alternatively, the attacker renames the trusted program and places it in a non-standard path.</li>
<li>The attacker executes the renamed or moved trusted program from the non-standard path.</li>
<li>The trusted program loads the malicious DLL due to DLL search order hijacking.</li>
<li>The malicious DLL executes arbitrary code within the context of the trusted process.</li>
<li>The attacker achieves persistence, elevates privileges, or performs other malicious activities, potentially evading detection due to the trusted process context.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful DLL side-loading attack allows the attacker to execute arbitrary code within the context of a trusted Microsoft process. This can lead to privilege escalation, persistence, and further compromise of the system. Since the malicious code is running within a trusted process, it can bypass application whitelisting and other security controls, making it difficult to detect. This can lead to data theft, system disruption, or the installation of malware.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential DLL Side-Loading via Trusted Microsoft Programs&rdquo; to your SIEM to detect suspicious executions of trusted programs from non-standard paths or with modifications.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to provide the necessary data for the Sigma rule to function correctly.</li>
<li>Review and tune the exclusion paths in the Sigma rule to avoid false positives from legitimate software updates, custom enterprise applications, or virtual environments.</li>
<li>Monitor process execution paths using the Sigma rule &ldquo;Potential DLL Side-Loading via Trusted Microsoft Programs&rdquo; and investigate any deviations from standard installation paths.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>dll-side-loading</category><category>windows</category></item><item><title>Local Account TokenFilter Policy Modification for Defense Evasion and Lateral Movement</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-local-account-token-filter-policy-disabled/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-local-account-token-filter-policy-disabled/</guid><description>Adversaries may modify the LocalAccountTokenFilterPolicy registry key to bypass User Account Control (UAC) and gain elevated privileges remotely by granting high-integrity tokens to remote connections from local administrators, facilitating lateral movement and defense evasion.</description><content:encoded><![CDATA[<p>The LocalAccountTokenFilterPolicy is a Windows registry setting that, when enabled (set to 1), allows remote connections from local members of the Administrators group to be granted full high-integrity tokens during negotiation. This bypasses User Account Control (UAC) restrictions, allowing for elevated privileges remotely. Attackers may modify this registry setting to facilitate lateral movement within a network. This rule detects modifications to this specific registry setting, alerting on potential unauthorized changes that could lead to defense evasion and privilege escalation. The modification of this policy has been observed being leveraged in conjunction with pass-the-hash attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system through an exploit, such as phishing or exploiting a vulnerability.</li>
<li>The attacker obtains local administrator credentials on the compromised system.</li>
<li>The attacker modifies the LocalAccountTokenFilterPolicy registry key to a value of 1. This is done to allow remote connections from local administrator accounts to receive high-integrity tokens. The registry key is typically located at <code>HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy</code>.</li>
<li>The attacker leverages a &ldquo;pass the hash&rdquo; attack (T1550.002) using the compromised local administrator credentials.</li>
<li>The attacker attempts to move laterally to other systems within the network using the &ldquo;pass the hash&rdquo; technique and the modified LocalAccountTokenFilterPolicy.</li>
<li>Due to the LocalAccountTokenFilterPolicy being enabled, the remote connection from the local administrator account receives a full high-integrity token.</li>
<li>The attacker bypasses UAC on the remote system, gaining elevated privileges.</li>
<li>The attacker performs malicious activities on the remote system, such as data exfiltration or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the LocalAccountTokenFilterPolicy allows attackers to bypass User Account Control (UAC) and gain elevated privileges on remote systems, potentially leading to unauthorized access to sensitive data, lateral movement across the network, and the deployment of ransomware. The overall impact can include data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Local Account TokenFilter Policy Enabled</code> to your SIEM and tune for your environment to detect unauthorized modifications to the LocalAccountTokenFilterPolicy registry key.</li>
<li>Enable Sysmon registry event logging to capture modifications to the registry, which is required for the <code>Local Account TokenFilter Policy Enabled</code> Sigma rule.</li>
<li>Review the processes excluded in the rule query and ensure they are legitimate and necessary to prevent false positives.</li>
<li>Monitor registry events for changes to the <code>HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy</code> path, specifically looking for changes to the value data.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>lateral-movement</category><category>persistence</category><category>registry-modification</category></item><item><title>Code Signing Policy Modification Through Built-in Tools</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-code-signing-policy-modification/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-code-signing-policy-modification/</guid><description>Attackers may attempt to disable or modify code signing policies on Windows systems by using built-in tools like bcdedit.exe in order to execute unsigned or self-signed malicious code.</description><content:encoded><![CDATA[<p>Attackers may attempt to subvert trust controls by disabling or modifying the code signing policy. This allows them to execute unsigned or self-signed malicious code. This can be achieved by modifying boot configuration data (BCD) settings using the built-in bcdedit.exe utility on Windows. Disabling Driver Signature Enforcement (DSE) allows the loading of untrusted drivers, which can compromise system integrity. The rule identifies commands that can disable the Driver Signature Enforcement feature. The scope of the targeting is broad, as it can affect any Windows system where an attacker gains sufficient privileges to modify the BCD settings. This activity is detected by analyzing process execution events for specific command-line arguments used with bcdedit.exe. The detection rule was last updated on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains administrative privileges on a Windows system.</li>
<li>The attacker executes <code>bcdedit.exe</code> with arguments to disable driver signature enforcement. Example: <code>bcdedit.exe /set testsigning on</code> or <code>bcdedit.exe /set nointegritychecks on</code>.</li>
<li>The <code>bcdedit.exe</code> modifies the Boot Configuration Data (BCD) store.</li>
<li>The system is restarted to apply the changes made to the BCD.</li>
<li>The attacker loads an unsigned or self-signed malicious driver.</li>
<li>The malicious driver executes with kernel-level privileges.</li>
<li>The attacker performs malicious activities such as installing rootkits, bypassing security controls, or stealing sensitive data.</li>
<li>The attacker maintains persistence by ensuring the malicious driver is loaded on subsequent system reboots.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the code signing policy can lead to the execution of unsigned or self-signed malicious code, which can compromise the integrity and security of the system. Attackers can install rootkits, bypass security controls, or steal sensitive data. The impact can range from individual system compromise to broader network-wide attacks, depending on the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Code Signing Policy Modification Through Built-in Tools&rdquo; to your SIEM to detect the execution of <code>bcdedit.exe</code> with arguments used to disable code signing (process.args).</li>
<li>Enable process creation logging with command line arguments on Windows systems to ensure the Sigma rule can capture the relevant events (logsource).</li>
<li>Investigate any detected instances of code signing policy modification, as this activity is typically not legitimate and can indicate malicious activity. The rule <code>First Time Seen Driver Loaded - df0fd41e-5590-4965-ad5e-cd079ec22fa9</code> can be used to detect suspicious drivers loaded into the system after the command was executed.</li>
<li>Ensure that Driver Signature Enforcement is enabled on all systems.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>code-signing</category><category>windows</category></item><item><title>Multiple Vulnerabilities in Progress Software MOVEit Automation</title><link>https://feed.craftedsignal.io/briefs/2026-05-moveit-automation-vulns/</link><pubDate>Mon, 04 May 2026 10:24:10 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-moveit-automation-vulns/</guid><description>Multiple vulnerabilities in Progress Software MOVEit Automation can be exploited by an attacker to bypass security measures or gain elevated privileges.</description><content:encoded><![CDATA[<p>Progress Software&rsquo;s MOVEit Automation is susceptible to multiple vulnerabilities that, if exploited, could allow an attacker to circumvent existing security measures and escalate privileges within the system. While specific details on the vulnerabilities are lacking, the advisory indicates a potential for significant impact on the confidentiality, integrity, and availability of systems utilizing the affected software. This is especially concerning given the role of MOVEit Automation in managing and transferring sensitive files, making it a high-value target for malicious actors seeking to exfiltrate data or disrupt business operations. Defenders should prioritize identifying and patching vulnerable instances of MOVEit Automation to mitigate the risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable MOVEit Automation instance.</li>
<li>Attacker exploits a vulnerability to gain initial access to the system. Due to lack of specifics, it is unknown how initial access occurs.</li>
<li>Attacker bypasses security measures using an unspecified exploit.</li>
<li>Attacker escalates privileges within the MOVEit Automation environment.</li>
<li>Attacker leverages escalated privileges to access sensitive data or system configurations.</li>
<li>Attacker moves laterally within the network, exploiting the compromised MOVEit Automation instance as a pivot point.</li>
<li>Attacker exfiltrates sensitive data or deploys malicious payloads to other systems on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could lead to unauthorized access to sensitive data, system compromise, and potential disruption of business operations. The lack of specific details makes it difficult to quantify the exact number of victims or sectors targeted. However, given the widespread use of MOVEit Automation in various industries, a successful attack could have far-reaching consequences, including financial losses, reputational damage, and regulatory penalties.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the latest security patches provided by Progress Software for MOVEit Automation to remediate the vulnerabilities.</li>
<li>Monitor MOVEit Automation logs for suspicious activity indicative of exploitation attempts.</li>
<li>Implement network segmentation to limit the potential impact of a successful attack on MOVEit Automation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>vulnerability</category><category>privilege-escalation</category><category>defense-evasion</category></item><item><title>Libssh Denial-of-Service Vulnerability via Inefficient Regular Expression Processing (CVE-2026-0967)</title><link>https://feed.craftedsignal.io/briefs/2024-01-libssh-dos/</link><pubDate>Fri, 01 May 2026 07:16:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-libssh-dos/</guid><description>CVE-2026-0967 is a denial-of-service vulnerability in libssh, stemming from inefficient regular expression processing that could lead to defense evasion and impact availability on affected systems.</description><content:encoded><![CDATA[<p>CVE-2026-0967 is a denial-of-service (DoS) vulnerability affecting libssh, a library implementing the SSH protocol. The root cause lies in the inefficient processing of regular expressions within the library&rsquo;s code. An attacker could exploit this vulnerability by sending specially crafted input that triggers excessive resource consumption during regular expression matching, leading to a denial of service. Successful exploitation could potentially enable defense evasion by overwhelming security controls and negatively impacting the availability of systems relying on the vulnerable libssh library. The vulnerability affects both Linux and Windows platforms where libssh is used.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a service or application utilizing a vulnerable version of libssh.</li>
<li>The attacker crafts a malicious input string designed to trigger inefficient regular expression processing within libssh.</li>
<li>The attacker sends the crafted input to the vulnerable service via a network connection (e.g., SSH).</li>
<li>The libssh library attempts to process the malicious input using its regular expression engine.</li>
<li>The inefficient regular expression causes excessive CPU consumption or memory allocation.</li>
<li>The vulnerable service becomes unresponsive due to resource exhaustion, leading to a denial-of-service condition.</li>
<li>Subsequent legitimate requests to the service are blocked or delayed, further exacerbating the impact.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-0967 can result in a denial-of-service condition, rendering affected services or applications unavailable. The impact scope depends on the role of the affected system. For example, a critical server becoming unavailable could disrupt business operations. While the number of potential victims is unknown, any system utilizing a vulnerable version of libssh is susceptible. The defense evasion aspect could allow attackers to bypass security controls during the DoS.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Identify systems using libssh and determine the installed version.</li>
<li>Apply available patches or updates for libssh to remediate CVE-2026-0967 as released by Microsoft.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious Libssh Regex Processing&rdquo; to monitor for potential exploitation attempts.</li>
<li>Monitor CPU and memory usage on systems running libssh for unusual spikes, which may indicate a DoS attack.</li>
<li>Implement rate limiting on services using libssh to mitigate the impact of DoS attacks.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>denial-of-service</category><category>libssh</category><category>CVE-2026-0967</category><category>defense-evasion</category></item><item><title>Multiple Vulnerabilities in Google Chrome</title><link>https://feed.craftedsignal.io/briefs/2026-05-chrome-vulns/</link><pubDate>Thu, 30 Apr 2026 09:09:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-chrome-vulns/</guid><description>Multiple vulnerabilities in Google Chrome could allow an attacker to execute arbitrary code, bypass security mechanisms, disclose and manipulate data, and cause a denial-of-service condition.</description><content:encoded><![CDATA[<p>Multiple unspecified vulnerabilities have been identified in Google Chrome. An attacker exploiting these vulnerabilities could potentially execute arbitrary code, circumvent security measures, expose and manipulate sensitive information, and trigger a denial-of-service condition. The specifics of these vulnerabilities, including CVE identifiers, are not detailed in the source document. The lack of detail makes it difficult to determine the scope of the attack, but successful exploitation could lead to significant compromise of systems running Chrome. Defenders should prioritize monitoring for suspicious activity within Chrome processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable version of Google Chrome.</li>
<li>The attacker crafts a malicious web page or injects malicious code into a legitimate website.</li>
<li>A user visits the malicious web page or a compromised legitimate website using Google Chrome.</li>
<li>The attacker exploits a vulnerability in Chrome, such as a use-after-free or buffer overflow.</li>
<li>Successful exploitation allows the attacker to execute arbitrary code within the context of the Chrome process.</li>
<li>The attacker leverages the code execution to bypass security mechanisms like sandboxing.</li>
<li>The attacker gains access to sensitive data, such as cookies, browsing history, or credentials.</li>
<li>The attacker manipulates data or causes a denial-of-service condition by crashing the browser or consuming excessive resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code, bypass security mechanisms, disclose and manipulate data, and cause a denial-of-service condition. The impact ranges from data theft and credential compromise to complete system takeover, depending on the specific vulnerability and the attacker&rsquo;s objectives. While the exact number of potential victims is unknown, the widespread use of Chrome makes this a high-impact threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for suspicious child processes spawned by chrome.exe, especially those involving command-line interpreters or scripting engines. Use the &ldquo;Detect Suspicious Child Process of Chrome&rdquo; Sigma rule.</li>
<li>Inspect network connections originating from chrome.exe for unusual destinations or protocols. Deploy the &ldquo;Detect Outbound Connection from Chrome without User Interaction&rdquo; Sigma rule.</li>
<li>Implement web content filtering to block access to known malicious websites that might attempt to exploit Chrome vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>chrome</category><category>vulnerability</category><category>code-execution</category><category>defense-evasion</category><category>information-disclosure</category><category>denial-of-service</category></item><item><title>OpenClaw Execution Approval Bypass Vulnerability (CVE-2026-41380)</title><link>https://feed.craftedsignal.io/briefs/2026-04-openclaw-exec-approval-bypass/</link><pubDate>Wed, 29 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-openclaw-exec-approval-bypass/</guid><description>OpenClaw before 2026.3.28 contains an execution approval vulnerability in exec-approvals-allowlist.ts that allows attackers to bypass intended execution restrictions by exploiting trust relationships with wrapper carrier executables, leading to privilege escalation and defense evasion.</description><content:encoded><![CDATA[<p>OpenClaw, a software of undetermined function, is vulnerable to an execution approval bypass (CVE-2026-41380) affecting versions prior to 2026.3.28. The vulnerability resides in <code>exec-approvals-allowlist.ts</code>, where the system incorrectly trusts wrapper carrier executables instead of the actual invoked targets. This flaw allows attackers to manipulate positional carrier executable routing through dispatch wrappers. By exploiting this, attackers can establish overly broad allowlist entries, effectively weakening the intended execution approval boundaries. This vulnerability was reported on April 28, 2026, and poses a significant risk by allowing unauthorized code execution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a system with OpenClaw installed, potentially through social engineering or exploiting other vulnerabilities.</li>
<li>The attacker identifies a dispatch wrapper executable that is already on the allowlist.</li>
<li>The attacker crafts a malicious payload to be executed through the identified wrapper.</li>
<li>The attacker leverages positional carrier executable routing to pass the malicious payload to the wrapper.</li>
<li>OpenClaw&rsquo;s <code>exec-approvals-allowlist.ts</code> incorrectly trusts the wrapper, adding it to the allow-always list.</li>
<li>The attacker executes arbitrary commands using the allowlisted wrapper with the malicious payload, bypassing intended restrictions.</li>
<li>The attacker escalates privileges by executing privileged commands through the bypassed execution approval mechanism.</li>
<li>The attacker achieves persistence by utilizing the now-trusted wrapper to execute malicious code repeatedly.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-41380 allows attackers to bypass intended execution restrictions within OpenClaw. This can lead to arbitrary code execution, privilege escalation, and persistent malicious activity. The vulnerability allows attackers to effectively weaken the security posture of systems relying on OpenClaw&rsquo;s execution approval mechanisms, potentially leading to complete system compromise. The precise number of affected installations is unknown, but any system running a vulnerable version of OpenClaw is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenClaw to version 2026.3.28 or later to remediate CVE-2026-41380.</li>
<li>Implement the Sigma rule &ldquo;Detect Suspicious OpenClaw Wrapper Execution&rdquo; to identify potential exploitation attempts.</li>
<li>Review existing allowlist entries within OpenClaw to identify and remove any overly broad or suspicious entries that may have been created through exploitation of CVE-2026-41380.</li>
<li>Monitor OpenClaw&rsquo;s logs for unexpected or unauthorized execution events related to wrapper executables as described in the vulnerability details.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-41380</category><category>execution-approval-bypass</category><category>privilege-escalation</category><category>defense-evasion</category></item><item><title>Multiple Vulnerabilities in Dell PowerProtect Data Domain OS</title><link>https://feed.craftedsignal.io/briefs/2026-04-dell-powerprotect-vulns/</link><pubDate>Tue, 21 Apr 2026 08:05:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dell-powerprotect-vulns/</guid><description>Multiple vulnerabilities in Dell PowerProtect Data Domain OS allow an attacker to execute arbitrary code with root privileges, escalate privileges to administrator, bypass security measures, manipulate data, disclose sensitive information, or conduct unspecified attacks.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities exist within Dell PowerProtect Data Domain OS, potentially enabling a malicious actor to compromise systems. Successful exploitation could lead to arbitrary code execution with root privileges, privilege escalation to administrator level, circumvention of security mechanisms, data manipulation, sensitive information disclosure, and the execution of other unspecified malicious activities. The vulnerabilities could be exploited to gain complete control over the affected systems, leading to significant data loss, disruption of services, or other severe consequences. The full scope of affected versions and the specific vulnerabilities involved are not detailed in the source information.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Given the broad nature of the advisory, the following attack chain is constructed based on the potential capabilities granted by exploiting the vulnerabilities:</p>
<ol>
<li><strong>Initial Access:</strong> An attacker exploits a remote code execution vulnerability in Dell PowerProtect Data Domain OS, potentially through a network service or web interface.</li>
<li><strong>Privilege Escalation:</strong> The attacker leverages an additional vulnerability to escalate privileges from an initial low-privilege shell to root access.</li>
<li><strong>Defense Evasion:</strong> With root privileges, the attacker disables or bypasses security measures, such as intrusion detection systems or anti-malware software.</li>
<li><strong>Credential Access:</strong> The attacker gains access to stored credentials, such as those used for backups or system administration, by dumping the system&rsquo;s credential store.</li>
<li><strong>Data Manipulation:</strong> The attacker modifies data stored within the Dell PowerProtect Data Domain system, potentially corrupting backups or injecting malicious code into stored files.</li>
<li><strong>Information Disclosure:</strong> The attacker extracts sensitive information, such as customer data, internal documents, or system configurations.</li>
<li><strong>Lateral Movement:</strong> Using the compromised Data Domain OS, the attacker can pivot to other systems within the network leveraging the credentials obtained or the trust relationships established.</li>
<li><strong>Impact:</strong> The attacker achieves their final objective, which may include data exfiltration, system disruption, or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could result in significant damage to organizations utilizing Dell PowerProtect Data Domain OS. This could include data loss due to corruption or deletion, financial losses from service disruption, reputational damage, and legal repercussions from the disclosure of sensitive information. The absence of specific victim counts or sector targeting makes quantifying the impact difficult, but the potential for widespread disruption and data compromise is high.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Investigate Dell&rsquo;s security advisories and apply the necessary patches to address the vulnerabilities in PowerProtect Data Domain OS as soon as they become available.</li>
<li>Implement network segmentation to limit the potential impact of a compromised Data Domain OS on other systems.</li>
<li>Enable logging on Dell PowerProtect Data Domain OS, including process creation and network connection logs, to detect potential exploitation attempts and investigate suspicious activity, allowing the deployment of the Sigma rules below.</li>
<li>Monitor for unauthorized access attempts to Dell PowerProtect Data Domain OS through webserver logs, specifically looking for suspicious cs-uri-query strings (see rule &ldquo;Detect Web Request for Potential Dell PowerProtect Exploit&rdquo;).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>dell</category><category>powerprotect</category><category>datadomain</category><category>vulnerability</category><category>privilege-escalation</category><category>defense-evasion</category><category>credential-access</category><category>impact</category></item><item><title>Payouts King Ransomware Abusing QEMU VMs for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2026-04-payouts-king-qemu/</link><pubDate>Sat, 18 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-payouts-king-qemu/</guid><description>The Payouts King ransomware is leveraging QEMU VMs as a reverse SSH backdoor to execute payloads, store malicious files, and establish covert remote access tunnels, bypassing endpoint security measures.</description><content:encoded><![CDATA[<p>The Payouts King ransomware, associated with the GOLD ENCOUNTER threat group, is utilizing QEMU, an open-source CPU emulator, to run hidden Alpine Linux virtual machines (VMs) on compromised Windows systems, effectively bypassing endpoint security solutions. This technique allows attackers to execute malicious payloads, store sensitive data, and create covert remote access tunnels over SSH without being detected by host-based security tools. Observed since November 2025 (tracked as STAC4713), this campaign initially exploited exposed SonicWall VPNs and the SolarWinds Web Help Desk vulnerability (CVE-2025-26399). More recent attacks have leveraged exposed Cisco SSL VPNs and Microsoft Teams phishing campaigns to deliver payloads. The attackers are likely tied to former BlackBasta affiliates based on similar initial access methods. This tactic enables persistence, elevated privileges, and data exfiltration while evading detection.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> Attackers gain initial access through exposed SonicWall VPNs, Cisco SSL VPNs, or by exploiting the SolarWinds Web Help Desk vulnerability (CVE-2025-26399). Alternatively, they use Microsoft Teams phishing, tricking employees into downloading and executing malicious files via QuickAssist.</li>
<li><strong>Payload Delivery:</strong> In some instances, a legitimate ADNotificationManager.exe binary is used to sideload a Havoc C2 payload (vcruntime140_1.dll).</li>
<li><strong>QEMU Deployment:</strong> A scheduled task named ‘TPMProfiler’ is created to launch a hidden QEMU VM as SYSTEM, utilizing virtual disk files disguised as databases and DLL files.</li>
<li><strong>VM Configuration:</strong> The QEMU VM runs Alpine Linux (version 3.22.0), containing attacker tools such as AdaptixC2, Chisel, BusyBox, and Rclone.</li>
<li><strong>Reverse SSH Tunnel:</strong> Port forwarding is set up to establish a reverse SSH tunnel, providing covert access to the infected host.</li>
<li><strong>Credential Access:</strong> Attackers use VSS (vssuirun.exe) to create a shadow copy, then use the print command over SMB to copy NTDS.dit, SAM, and SYSTEM hives to temp directories.</li>
<li><strong>Data Exfiltration:</strong> Rclone is leveraged to exfiltrate data to a remote SFTP location or other exfiltration methods, such as FTP, are used.</li>
<li><strong>Encryption and Extortion:</strong> The Payouts King ransomware encrypts systems using AES-256 (CTR) with RSA-4096 with intermittent encryption for larger files. Ransom notes are dropped, directing victims to leak sites on the dark web.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful Payouts King ransomware attacks can result in significant data loss, system downtime, and financial repercussions for victim organizations. The use of QEMU VMs provides an additional layer of stealth, making detection and remediation more challenging. Targeted sectors are not specified in this report, but the use of exposed VPNs and phishing suggests a broad targeting scope. The ransom demands and potential data leaks on the dark web further compound the damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for unauthorized QEMU installations and suspicious scheduled tasks running with SYSTEM privileges, as these are key indicators of compromise (see Overview).</li>
<li>Implement network monitoring to detect unusual SSH port forwarding and outbound SSH tunnels on non-standard ports, which could indicate a reverse SSH tunnel (see Attack Chain).</li>
<li>Deploy the Sigma rule &ldquo;Detect ADNotificationManager Sideloading Havoc C2&rdquo; to identify instances where ADNotificationManager.exe is used to sideload the Havoc C2 payload (vcruntime140_1.dll) (see Rules).</li>
<li>Review and patch CVE-2025-26399 in SolarWinds Web Help Desk and apply necessary security measures for exposed SonicWall and Cisco SSL VPNs to prevent initial access (see Attack Chain).</li>
<li>Monitor for processes creating shadow copies (vssuirun.exe) followed by unusual file access patterns (NTDS.dit, SAM, SYSTEM hives) via SMB, indicative of credential theft (see Attack Chain).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>payouts-king</category><category>ransomware</category><category>qemu</category><category>vm</category><category>defense-evasion</category></item><item><title>Better Auth OAuth Provider Authorization Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-better-auth-oauth-bypass/</link><pubDate>Fri, 17 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-better-auth-oauth-bypass/</guid><description>An authorization bypass vulnerability exists in Better Auth's OAuth provider, allowing low-privilege users to create OAuth clients despite configured clientPrivileges, potentially leading to unauthorized client registration and increased phishing risks.</description><content:encoded><![CDATA[<p>An authorization bypass vulnerability affects the OAuth provider component of Better Auth, specifically versions 1.4.8-beta.7 through 1.6.4 and 1.7.0-beta.0 through 1.7.0-beta.1. This flaw allows any authenticated, low-privilege user to create OAuth clients, bypassing the intended restrictions set by the <code>clientPrivileges</code> configuration. The vulnerability stems from the client creation endpoints (<code>adminCreateOAuthClient</code> and <code>createOAuthClient</code>) not enforcing the <code>clientPrivileges</code> check before creating new OAuth clients. This bypass allows attackers to register OAuth clients with attacker-controlled redirect URIs and metadata, potentially leading to phishing attacks and abuse of trust assumptions in OAuth/OIDC flows. Defenders should implement detections to identify unauthorized OAuth client creation attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Better Auth application with a low-privilege account.</li>
<li>The attacker crafts a POST request to either <code>/api/auth/oauth2/create-client</code> or a custom endpoint that routes to <code>adminCreateOAuthClient</code>.</li>
<li>The attacker includes parameters for <code>client_name</code>, <code>redirect_uris</code>, and other client metadata within the POST request body.</li>
<li>The <code>createOAuthClientEndpoint</code> function is called without first performing a <code>clientPrivileges</code> authorization check.</li>
<li>A new OAuth client is created and persisted in the system.</li>
<li>The attacker now controls a registered OAuth client with attacker-defined redirect URIs.</li>
<li>The attacker can potentially use this client for phishing attacks or to bypass consent flows if <code>skip_consent</code> is enabled (if <code>adminCreateOAuthClient</code> is exposed).</li>
<li>The attacker exploits the newly created OAuth client to gain unauthorized access to resources or user data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability allows unauthorized users to create OAuth clients, potentially leading to several negative consequences. Attackers can register clients with malicious redirect URIs, which can be used in phishing campaigns to steal user credentials or OAuth tokens. In scenarios where the <code>adminCreateOAuthClient</code> endpoint is exposed, attackers can create clients that bypass user consent, further increasing the risk of successful attacks. The impact is significant because it breaks the intended access control mechanism of the <code>clientPrivileges</code> configuration, affecting applications that rely on it to restrict client registration. Successful exploitation can lead to unauthorized access to user data, compromised accounts, and damaged trust in the application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for POST requests to the <code>/api/auth/oauth2/create-client</code> endpoint, especially from users who should not have client creation privileges. Implement the &ldquo;Detect Unauthorized OAuth Client Creation Attempt&rdquo; Sigma rule below, using webserver logs (category: &ldquo;webserver&rdquo;, product: &ldquo;linux&rdquo;).</li>
<li>Apply the necessary patches to upgrade <code>@better-auth/oauth-provider</code> to a version that addresses this vulnerability (&gt;= 1.6.5 or &gt;= 1.7.0-beta.2).</li>
<li>Audit your application&rsquo;s OAuth client registration process to ensure that the <code>clientPrivileges</code> check is enforced correctly.</li>
<li>If using <code>adminCreateOAuthClient</code>, ensure it is not exposed to low-privilege authenticated users to prevent the <code>skip_consent</code> bypass.</li>
<li>Deploy the &ldquo;Detect OAuth Client Creation with Skip Consent&rdquo; Sigma rule if your deployment exposes the admin client creation endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>oauth</category><category>authorization</category><category>bypass</category><category>privilege-escalation</category><category>defense-evasion</category></item><item><title>@fastify/middie Middleware Bypass Vulnerability (CVE-2026-33804)</title><link>https://feed.craftedsignal.io/briefs/2026-04-fastify-middie-bypass/</link><pubDate>Thu, 16 Apr 2026 15:17:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-fastify-middie-bypass/</guid><description>A middleware bypass vulnerability (CVE-2026-33804) exists in @fastify/middie versions 9.3.1 and earlier when the deprecated Fastify ignoreDuplicateSlashes option is enabled, potentially allowing unauthorized access.</description><content:encoded><![CDATA[<p>@fastify/middie, a Fastify middleware engine, is vulnerable to a significant security bypass. Specifically, versions 9.3.1 and earlier are susceptible when the deprecated Fastify <code>ignoreDuplicateSlashes</code> option is enabled. This vulnerability, identified as CVE-2026-33804, arises because the middleware&rsquo;s path matching logic fails to account for the duplicate slash normalization performed by Fastify&rsquo;s router. Consequently, crafted HTTP requests containing duplicate slashes can circumvent middleware authentication and authorization checks, potentially granting unauthorized access to protected resources. This vulnerability only affects applications that are actively using the deprecated <code>ignoreDuplicateSlashes</code> option. The recommended remediation is to upgrade to @fastify/middie version 9.3.2, which addresses this issue. Alternatively, disabling the <code>ignoreDuplicateSlashes</code> option can serve as a mitigation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Fastify application using @fastify/middie version 9.3.1 or earlier with the <code>ignoreDuplicateSlashes</code> option enabled.</li>
<li>The attacker crafts a malicious HTTP request targeting a protected resource. The request URI includes duplicate slashes (e.g., <code>/api//resource</code>).</li>
<li>The request is received by the Fastify server.</li>
<li>Fastify&rsquo;s router normalizes the duplicate slashes in the URI before passing it to the middleware.</li>
<li>The middleware&rsquo;s path matching logic fails to correctly handle the normalized URI due to the <code>ignoreDuplicateSlashes</code> setting.</li>
<li>As a result, the request bypasses the intended authentication and/or authorization checks implemented by the middleware.</li>
<li>The request reaches the targeted resource, which is processed by the application.</li>
<li>The attacker gains unauthorized access to the resource, potentially leading to data breaches, privilege escalation, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to bypass authentication and authorization controls, potentially gaining unauthorized access to sensitive data or functionality within the Fastify application. The severity of the impact depends on the nature of the protected resources and the extent of the attacker&rsquo;s access. This could lead to data breaches, privilege escalation, or other malicious activities. The number of potential victims is dependent on the number of applications using the vulnerable version of @fastify/middie with the <code>ignoreDuplicateSlashes</code> option enabled.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade @fastify/middie to version 9.3.2 or later to patch the vulnerability described in CVE-2026-33804.</li>
<li>Disable the <code>ignoreDuplicateSlashes</code> option in Fastify configurations as an alternative mitigation.</li>
<li>Deploy the Sigma rule <code>DetectFastifyMiddieBypassAttempt</code> to identify potential exploitation attempts based on duplicate slashes in the request URI.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>fastify</category><category>middie</category><category>middleware</category><category>bypass</category><category>cve-2026-33804</category><category>defense-evasion</category></item><item><title>Suspicious Registry Modifications by Scripting Engines</title><link>https://feed.craftedsignal.io/briefs/2026-04-susp-reg-mod/</link><pubDate>Tue, 14 Apr 2026 12:50:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-susp-reg-mod/</guid><description>Scripting engines such as WScript, CScript, and MSHTA are being used to make registry modifications, potentially for persistence or defense evasion.</description><content:encoded><![CDATA[<p>This brief covers suspicious registry modifications made by scripting engine processes like WScript, CScript, and MSHTA. These processes are often abused by attackers to modify the registry without using standard tools like regedit.exe or reg.exe, potentially for evasion and persistence. Legitimate use of these scripting engines to modify the registry is uncommon, making this behavior a good indicator of potential malicious activity. Defenders should monitor for these processes interacting with sensitive registry keys. This activity was observed as of 2025 and continues to be a relevant technique for persistence and defense evasion in 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system via an exploit or social engineering.</li>
<li>The attacker uses MSHTA.exe to execute malicious HTML Application code.</li>
<li>MSHTA.exe is used to launch a PowerShell script.</li>
<li>The PowerShell script uses the Registry module to add a new registry key.</li>
<li>The registry key is configured to execute a payload upon system startup.</li>
<li>The attacker uses wscript.exe or cscript.exe to execute VBScript or JScript.</li>
<li>The script modifies registry values to disable security features.</li>
<li>The compromised system restarts, executing the payload defined in the registry, granting the attacker persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to establish persistence on the targeted system, enabling them to maintain access even after a reboot. This can lead to data theft, further malware deployment, or complete system compromise. The impact ranges from minor data breaches to significant operational disruptions. The scope of the impact depends on the attacker&rsquo;s objectives and the compromised system&rsquo;s role within the organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Registry Tampering by Potentially Suspicious Processes&rdquo; to your SIEM to detect this specific activity, and tune for your environment (rules).</li>
<li>Investigate any instances of wscript.exe, cscript.exe or mshta.exe modifying registry keys outside of known-good paths (rules).</li>
<li>Monitor registry events for unexpected modifications by scripting engines, focusing on persistence-related keys (rules).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>registry-modification</category><category>persistence</category><category>defense-evasion</category><category>scripting-engine</category></item><item><title>VMware Tanzu Spring Cloud Gateway Security Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-spring-cloud-gateway-bypass/</link><pubDate>Mon, 13 Apr 2026 10:12:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-spring-cloud-gateway-bypass/</guid><description>An anonymous, remote attacker can exploit a vulnerability in VMware Tanzu Spring Cloud Gateway to bypass security measures, potentially gaining unauthorized access or control.</description><content:encoded><![CDATA[<p>A vulnerability exists in VMware Tanzu Spring Cloud Gateway that allows a remote, anonymous attacker to bypass security precautions. This vulnerability could potentially permit unauthorized access to protected resources, manipulation of data, or disruption of services. The advisory, released in April 2026, highlights the risk associated with unpatched instances of Spring Cloud Gateway. Organizations using this software should immediately investigate and apply necessary updates or mitigations to prevent exploitation. The lack of specific CVE or version information in the initial report necessitates a proactive approach to identify and address potential vulnerabilities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable VMware Tanzu Spring Cloud Gateway instance accessible over the network.</li>
<li>The attacker crafts a malicious request specifically designed to exploit the security bypass vulnerability.</li>
<li>The crafted request is sent to the vulnerable Spring Cloud Gateway instance.</li>
<li>The vulnerability allows the attacker to bypass authentication or authorization checks implemented by the gateway.</li>
<li>The attacker gains unauthorized access to backend services or resources normally protected by the gateway.</li>
<li>The attacker performs unauthorized actions, such as accessing sensitive data, modifying configurations, or executing commands on backend systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to bypass intended security controls, potentially leading to data breaches, service disruption, or unauthorized control of backend systems. The lack of specific victim numbers or sector targeting data in the initial advisory suggests a broad potential impact across various industries utilizing VMware Tanzu Spring Cloud Gateway. The severity of the impact depends on the scope of access gained and the sensitivity of the compromised data or systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Audit all instances of VMware Tanzu Spring Cloud Gateway within your environment to identify potentially vulnerable deployments.</li>
<li>Monitor web server logs (category: webserver, product: linux) for suspicious requests targeting Spring Cloud Gateway instances, looking for unusual URI patterns or HTTP status codes.</li>
<li>Implement the provided Sigma rule to detect suspicious HTTP requests indicative of security bypass attempts.</li>
<li>Continuously monitor for updated advisories and security patches from VMware regarding Spring Cloud Gateway.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>spring-cloud-gateway</category><category>security-bypass</category><category>defense-evasion</category></item><item><title>Electron VideoFrame Context Isolation Bypass Vulnerability (CVE-2026-34780)</title><link>https://feed.craftedsignal.io/briefs/2026-04-electron-videoframes/</link><pubDate>Sat, 04 Apr 2026 01:16:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-electron-videoframes/</guid><description>A context isolation bypass vulnerability exists in Electron applications that bridge VideoFrame objects via contextBridge, potentially allowing an attacker with JavaScript execution in the main world to access the isolated world and Node.js APIs.</description><content:encoded><![CDATA[<p>Electron, a framework for building cross-platform desktop applications using web technologies, is vulnerable to a context isolation bypass (CVE-2026-34780) when handling VideoFrame objects. This vulnerability affects Electron versions 39.0.0-alpha.1 to before 39.8.0, 40.0.0-alpha.1 to before 40.7.0, and 41.0.0-alpha.1 to before 41.0.0-beta.8. Specifically, applications are at risk if they utilize <code>contextBridge.exposeInMainWorld()</code> to pass a VideoFrame object from a preload script to the main world. An attacker who achieves JavaScript execution in the main world, for example, through a cross-site scripting (XSS) vulnerability, can leverage a bridged VideoFrame to bypass context isolation and gain access to the isolated world, including Node.js APIs exposed to the preload script. This access enables further malicious activities, potentially leading to arbitrary code execution on the host system. Patches are available in versions 39.8.0, 40.7.0, and 41.0.0-beta.8.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an Electron application using a vulnerable version of Electron (39.0.0-alpha.1 to 39.7.x, 40.0.0-alpha.1 to 40.6.x, or 41.0.0-alpha.1 to 41.0.0-beta.7) that also uses <code>contextBridge.exposeInMainWorld()</code> to expose a <code>VideoFrame</code> object.</li>
<li>The attacker injects malicious JavaScript code into the application&rsquo;s main world. This can be achieved through various means, such as exploiting a cross-site scripting (XSS) vulnerability.</li>
<li>The injected JavaScript code interacts with the bridged <code>VideoFrame</code> object.</li>
<li>The <code>VideoFrame</code> object, due to the vulnerability, allows the attacker to bypass context isolation and gain access to the isolated world.</li>
<li>The attacker leverages the access to the isolated world to access Node.js APIs that are exposed to the preload script.</li>
<li>The attacker utilizes the exposed Node.js APIs to perform malicious actions, such as reading sensitive data, modifying application settings, or executing arbitrary code on the host system.</li>
<li>The attacker may escalate privileges by exploiting further vulnerabilities or misconfigurations within the application or the underlying operating system.</li>
<li>The final objective is to achieve arbitrary code execution on the host system, allowing the attacker to perform any desired actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-34780) allows an attacker to bypass context isolation in affected Electron applications, potentially leading to arbitrary code execution. The number of victims depends on the popularity and security posture of Electron applications that bridge VideoFrame objects. If the attack succeeds, an attacker could steal sensitive data, install malware, or completely compromise the user&rsquo;s system. Sectors heavily reliant on Electron-based desktop applications, such as communication, development, and productivity tools, are at higher risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Electron applications to patched versions (39.8.0, 40.7.0, or 41.0.0-beta.8) to address CVE-2026-34780.</li>
<li>Review and sanitize all user-supplied input to prevent XSS vulnerabilities that can be leveraged to exploit CVE-2026-34780.</li>
<li>Implement strict Content Security Policy (CSP) to mitigate the risk of XSS attacks.</li>
<li>Monitor application logs for suspicious JavaScript execution, especially related to <code>VideoFrame</code> objects and <code>contextBridge.exposeInMainWorld()</code>, to detect potential exploitation attempts.</li>
<li>Deploy the Sigma rule for suspicious process execution via Node.js APIs to detect malicious behavior following a successful context isolation bypass.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>electron</category><category>context-isolation</category><category>javascript</category><category>xss</category><category>CVE-2026-34780</category><category>defense-evasion</category><category>privilege-escalation</category></item><item><title>Spike in Successful Logon Events from a Source IP</title><link>https://feed.craftedsignal.io/briefs/2026-04-auth-spike/</link><pubDate>Thu, 02 Apr 2026 13:25:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-auth-spike/</guid><description>A machine learning job detected a spike in successful authentication events from a source IP address, which can indicate password spraying, user enumeration, or brute force activity, potentially leading to credential access.</description><content:encoded><![CDATA[<p>This alert triggers when an Elastic machine learning job identifies a significant spike in successful authentication events originating from a specific source IP address. The underlying cause may range from legitimate administrative activity to malicious attempts at credential compromise, such as password spraying, user enumeration, or brute force attacks. The rule requires a minimum Elastic Stack version of 9.4.0 and relies on data ingested via Elastic Defend, Auditd Manager, or the System integration. The machine learning job associated with this rule is named &ldquo;auth_high_count_logon_events_for_a_source_ip_ea&rdquo;. While build servers and CI systems can trigger this alert as false positives, its presence should always prompt investigation to rule out credential compromise attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a network or system (not explicitly described in source).</li>
<li>Credential Harvesting: The attacker attempts to gather valid credentials through password spraying or brute-force attacks (T1110, T1110.003).</li>
<li>Account Discovery: The attacker enumerates user accounts to identify potential targets, often performed in conjunction with password attacks.</li>
<li>Successful Authentication: Using compromised credentials, the attacker successfully authenticates to a system or service (T1078, T1078.002, T1078.003).</li>
<li>Lateral Movement: After successful authentication, the attacker potentially moves laterally within the network using valid accounts (not explicitly described in source).</li>
<li>Privilege Escalation: The attacker may attempt to escalate privileges to gain higher-level access (not explicitly described in source).</li>
<li>Data Exfiltration/Impact: After gaining sufficient access, the attacker may exfiltrate sensitive data or cause damage to the system or network (not explicitly described in source).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data, systems, and services. The number of affected users and the extent of the damage depend on the scope of the compromised credentials and the attacker&rsquo;s objectives. This can impact any sector, as credential compromise is a common attack vector across various industries.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable and configure the Elastic Defend, Auditd Manager, or System integrations to provide the necessary data for the machine learning job (see Setup section).</li>
<li>Install the associated Machine Learning job &ldquo;auth_high_count_logon_events_for_a_source_ip_ea&rdquo; to enable the detection (see Setup section).</li>
<li>Tune the anomaly threshold of the machine learning job based on your environment to reduce false positives (anomaly_threshold metadata).</li>
<li>Investigate alerts triggered by this rule, focusing on identifying the involved assets, users, and source IP addresses (see Note section).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>credential-access</category><category>defense-evasion</category><category>brute-force</category><category>password-spraying</category></item><item><title>Qilin Ransomware EDR Killer Infection Chain</title><link>https://feed.craftedsignal.io/briefs/2026-04-qilin-edr-killer/</link><pubDate>Thu, 02 Apr 2026 10:00:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-qilin-edr-killer/</guid><description>Qilin ransomware employs a malicious msimg32.dll in a multi-stage infection chain to disable endpoint detection and response (EDR) solutions by evading detection and terminating EDR processes.</description><content:encoded><![CDATA[<p>The Qilin ransomware group is actively deploying a sophisticated EDR killer as part of their attack chain. The initial stage involves a malicious &ldquo;msimg32.dll&rdquo; that is likely side-loaded by a legitimate application. This DLL version triggers its malicious logic from within its DllMain function, leading to immediate execution upon loading. The EDR killer employs advanced evasion techniques, including neutralizing user-mode hooks, suppressing Event Tracing for Windows (ETW) event generation, and utilizing structured exception handling (SEH) and vectored exception handling (VEH) to obfuscate control flow. Once active, the EDR killer component loads helper drivers to access physical memory and terminate EDR processes. This allows the malware to disable over 300 different EDR drivers across a wide range of vendors, hindering incident response and enabling further malicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A legitimate application loads the malicious &ldquo;msimg32.dll&rdquo;, likely through DLL side-loading, triggering execution from within the DllMain function.</li>
<li>The DLL allocates a heap buffer in process memory acting as a slot-policy table based on ntdll.dll&rsquo;s OptionalHeader.SizeOfCode, dividing the code region into 16-byte slots.</li>
<li>The malware iterates over the export table of &ldquo;ntdll.dll&rdquo; to resolve virtual addresses of syscall stubs, specifically targeting those starting with &ldquo;Nt&rdquo;.</li>
<li>Based on resolved addresses, the malware marks corresponding entries in the slot-policy table with default or special policies, specifically targeting NtTraceEvent, NtTraceControl, and NtAlpcSendWaitReceivePort.</li>
<li>The malware dynamically resolves ntdll!LdrProtectMrdata and invokes it to change the protection of the .mrdata section to writable.</li>
<li>The loader overwrites the dispatcher slot within the .mrdata section with its own custom exception handler to intercept and modify exception handling.</li>
<li>The custom exception handler manages breakpoint exceptions (0xCC), potentially as an anti-emulation technique.</li>
<li>The EDR killer component loads helper drivers, &ldquo;rwdrv.sys&rdquo; for physical memory access and &ldquo;hlpdrv.sys&rdquo; to terminate EDR processes, after unregistering monitoring callbacks to prevent interference.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of the Qilin EDR killer can disable over 300 different EDR drivers, severely impairing the ability of security teams to detect and respond to threats. This can lead to increased dwell time for ransomware and other malicious activities, resulting in significant data breaches, financial losses, and reputational damage. With telemetry collection disabled, defenders lose visibility into process, memory, and network activity, making it difficult to investigate and contain the attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for DLLs loaded from non-standard locations, specifically &ldquo;msimg32.dll,&rdquo; using process creation logs to detect potential DLL side-loading attempts (rules in this brief).</li>
<li>Implement the Sigma rules provided in this brief to detect the modification of exception handler dispatchers, which is a key component of the EDR killer&rsquo;s evasion techniques.</li>
<li>Monitor for the loading of unsigned or untrusted drivers like &ldquo;rwdrv.sys&rdquo; and &ldquo;hlpdrv.sys&rdquo; using driver load events, as these are used to gain system privileges and terminate EDR processes.</li>
<li>Enable Sysmon process creation logging to capture detailed information about process execution, including command-line arguments and parent processes, to aid in the detection of malicious DLL loading.</li>
<li>Analyze process memory for evidence of user-mode hooks being neutralized or ETW event generation being suppressed. This requires more advanced memory forensics capabilities.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>qilin</category><category>edr-killer</category><category>ransomware</category><category>defense-evasion</category><category>windows</category></item><item><title>WebServer Access Logs Deleted</title><link>https://feed.craftedsignal.io/briefs/2026-04-websvr-log-deletion/</link><pubDate>Wed, 01 Apr 2026 14:12:42 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-websvr-log-deletion/</guid><description>Detection of web server access log deletion across Windows, Linux, and macOS systems indicates potential defense evasion and destruction of forensic evidence by threat actors.</description><content:encoded><![CDATA[<p>This rule detects the deletion of web server access logs, a common tactic used by attackers to cover their tracks and hinder forensic investigations. The deletion of these logs may indicate an attempt to evade detection or destroy forensic evidence on a system. This detection rule focuses on identifying deletion events in directories commonly used for web server logs, such as those used by Apache and IIS. The rule covers multiple operating systems, providing a broad detection capability. This is important for defenders because web server logs are critical for monitoring web traffic and identifying malicious activity. The rule is designed to detect activity on &ldquo;auditbeat-<em>&rdquo;, &ldquo;winlogbeat-</em>&rdquo;, &ldquo;logs-endpoint.events.<em>&rdquo;, &ldquo;logs-windows.sysmon_operational-</em>&rdquo; indices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a system hosting a web server, potentially through exploiting a vulnerability or using stolen credentials.</li>
<li>The attacker identifies the location of the web server&rsquo;s access logs. Common locations include <code>/var/log/apache*/access.log</code> and <code>C:\\inetpub\\logs\\LogFiles\\*.log</code>.</li>
<li>The attacker uses a privileged account or escalates privileges to obtain the necessary permissions to delete the log files.</li>
<li>The attacker executes a command to delete the web server access logs. This could be done using <code>rm</code> on Linux or <code>del</code> on Windows.</li>
<li>The operating system records the file deletion event in its audit logs, which are monitored by security tools.</li>
<li>The detection rule identifies the deletion event based on the file path and event type.</li>
<li>The security team is alerted to the potential intrusion and begins investigating the incident.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The deletion of web server access logs can significantly impede incident response and forensic investigations. Without these logs, it becomes difficult to determine the scope and impact of an attack, including identifying compromised accounts, exploited vulnerabilities, and stolen data. This can lead to delayed or ineffective remediation efforts, potentially resulting in further damage to the organization. The impact is particularly severe if the logs are deleted before suspicious activity is detected, as it removes valuable evidence needed for analysis.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>WebServer Access Logs Deleted</code> to your SIEM and tune for your environment to detect malicious log deletion attempts.</li>
<li>Enable file integrity monitoring (FIM) on web server log directories to detect unauthorized modifications or deletions.</li>
<li>Review and tighten access controls on web server log files to ensure only authorized personnel can modify or delete them.</li>
<li>Implement a robust log backup and retention policy to ensure that logs are available for forensic analysis even if they are deleted from the primary system.</li>
<li>Investigate any alerts generated by the <code>WebServer Access Logs Deleted</code> rule promptly to determine the root cause and extent of the compromise.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>indicator-removal</category><category>file-deletion</category></item><item><title>Right-to-Left Override Character Used for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2026-04-right-to-left-override/</link><pubDate>Wed, 01 Apr 2026 11:57:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-right-to-left-override/</guid><description>Adversaries are using the Right-to-Left Override (RTLO) character (U+202E) in command-line arguments to obfuscate malicious file names and trick users into executing them, achieving defense evasion.</description><content:encoded><![CDATA[<p>The Right-to-Left Override (RTLO) character (U+202E) is a Unicode character that causes text to be rendered from right to left. Adversaries are leveraging this character in Windows command-line arguments to obfuscate malicious file names and extensions. By embedding the RTLO character within a file name or command, attackers can visually reverse the order of characters, making a malicious file appear to be harmless. For example, a file named &ldquo;evil.exe&rdquo; might be renamed to &ldquo;evil[U+202E]exe.pdf&rdquo;, which would display as &ldquo;evilpdf.exe&rdquo; to a user, potentially tricking them into executing the malicious file. This technique is used to bypass security controls and social engineering. The use of RTLO is not new, but it continues to be an effective method of tricking end users.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious executable file (e.g., <code>trojan.exe</code>).</li>
<li>The attacker renames the malicious file, embedding the RTLO character (U+202E) within the file name to reverse the visual presentation (e.g., <code>trojan[U+202E]exe.scr</code>).</li>
<li>The renamed file (e.g., <code>trojanscr.exe</code>) is distributed to the target, often via phishing or other social engineering methods.</li>
<li>The user, seeing the reversed file extension, mistakes the file for a screensaver file (<code>.scr</code>) and executes it.</li>
<li>Upon execution, the malicious executable runs with the privileges of the user.</li>
<li>The malware may then perform malicious activities such as installing additional malware, establishing persistence, or exfiltrating data.</li>
<li>The attacker may use the initial foothold to escalate privileges and move laterally within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the execution of arbitrary code, potentially compromising the entire system. This can result in data theft, system damage, or further propagation of malware within the network. The obfuscation technique makes it harder for users to identify malicious files, increasing the likelihood of successful attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Process Creation with Right-to-Left Override Character</code> to your SIEM to detect processes spawned with the RTLO character in the command line.</li>
<li>Educate users about the risks of the RTLO character and how it can be used to disguise malicious files.</li>
<li>Implement file extension filtering to block execution of suspicious file types (e.g., <code>.exe</code>, <code>.scr</code>) from untrusted locations.</li>
<li>Monitor process creation events for unusual file names or command-line arguments containing the RTLO character.</li>
<li>Enable Sysmon process creation logging to capture command-line arguments, which is essential for detecting this technique.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>obfuscation</category></item><item><title>Potential Abuse of msDS-ManagedAccountPrecededByLink for Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-dmsa-link-mod/</link><pubDate>Mon, 30 Mar 2026 10:27:13 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-dmsa-link-mod/</guid><description>Detection of PowerShell scripts modifying the msDS-ManagedAccountPrecededByLink attribute, potentially indicating exploitation of the BadSuccessor privilege escalation vulnerability in Windows Server 2025.</description><content:encoded><![CDATA[<p>This threat brief focuses on the modification of the <code>msDS-ManagedAccountPrecededByLink</code> attribute within Active Directory via PowerShell scripts. This activity is flagged as potentially malicious because it could be indicative of an attempt to exploit the &lsquo;BadSuccessor&rsquo; privilege escalation vulnerability in Windows Server 2025. The vulnerability, as outlined in Akamai&rsquo;s research, allows attackers to manipulate managed service account (dMSA) links to gain elevated privileges. The detection is based on identifying specific PowerShell script patterns that include <code>.Put(&quot;msDS-ManagedAccountPrecededByLink'</code> and <code>CN=</code>, which are used to modify these critical AD attributes. Defenders should be aware that legitimate administrative tasks might also trigger this detection, so careful tuning and validation are necessary.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access to a system with sufficient privileges to execute PowerShell scripts, possibly through compromised credentials or other initial access vectors (T1078.002).</li>
<li><strong>Discovery:</strong> The attacker uses PowerShell to enumerate existing dMSAs and their associated <code>msDS-ManagedAccountPrecededByLink</code> attributes.</li>
<li><strong>Attribute Modification:</strong> The attacker crafts a PowerShell script to modify the <code>msDS-ManagedAccountPrecededByLink</code> attribute of a target dMSA. This involves using the <code>.Put(&quot;msDS-ManagedAccountPrecededByLink&quot;</code> command and specifying a new distinguished name (<code>CN=</code>) for the preceding account.</li>
<li><strong>Persistence:</strong> The attacker leverages the modified dMSA link to establish a persistent foothold in the environment by gaining control over the targeted dMSA.</li>
<li><strong>Privilege Escalation:</strong> By manipulating the dMSA links, the attacker effectively inherits the permissions and privileges associated with the compromised dMSA, thereby escalating their own privileges.</li>
<li><strong>Defense Evasion:</strong> The attacker may attempt to evade detection by obfuscating the PowerShell script or using other techniques to hide their activity.</li>
<li><strong>Lateral Movement:</strong> With elevated privileges, the attacker can move laterally within the network, accessing sensitive resources and systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of the &lsquo;BadSuccessor&rsquo; vulnerability through modification of the <code>msDS-ManagedAccountPrecededByLink</code> attribute can lead to complete domain compromise. An attacker can gain control over critical services and data, potentially resulting in data breaches, service disruptions, and significant financial losses. The impact is amplified in environments heavily reliant on Active Directory for authentication and authorization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM and tune for your environment to detect potentially malicious modifications to dMSA link attributes via PowerShell (logsource: ps_script, product: windows).</li>
<li>Investigate any alerts triggered by the Sigma rule to determine if the activity is legitimate or indicative of an attempted exploitation of the &lsquo;BadSuccessor&rsquo; vulnerability.</li>
<li>Implement strict access controls and monitoring for systems and accounts with the ability to modify Active Directory attributes.</li>
<li>Review and harden Active Directory security configurations to prevent unauthorized modification of sensitive attributes.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>defense-evasion</category><category>persistence</category><category>initial-access</category><category>active-directory</category></item><item><title>LIBPNG Out-of-Bounds Read/Write Vulnerability in Neon Optimization (CVE-2026-33636)</title><link>https://feed.craftedsignal.io/briefs/2026-03-libpng-oob-r-w/</link><pubDate>Fri, 27 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-libpng-oob-r-w/</guid><description>An out-of-bounds read and write vulnerability in LIBPNG's ARM/AArch64 Neon-optimized palette expansion path (CVE-2026-33636) allows attackers to potentially achieve denial-of-service or arbitrary code execution by crafting malicious PNG images.</description><content:encoded>&lt;p>CVE-2026-33636 describes an out-of-bounds read and write vulnerability within the LIBPNG library, specifically affecting versions 1.6.36 through 1.6.55. The vulnerability resides in the ARM/AArch64 Neon-optimized palette expansion path. This flaw occurs when expanding 8-bit paletted rows to RGB or RGBA formats. The Neon loop processes a final partial chunk of data without properly validating that sufficient input pixels remain. This lack of validation leads to out-of-bounds memory access during…&lt;/p>
</content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>libpng</category><category>png</category><category>oob</category><category>CVE-2026-33636</category><category>vulnerability</category><category>defense-evasion</category><category>privilege-escalation</category></item><item><title>IBM WebSphere Application Server Liberty Multiple Vulnerabilities</title><link>https://feed.craftedsignal.io/briefs/2026-03-websphere-vulns/</link><pubDate>Wed, 25 Mar 2026 11:50:50 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-websphere-vulns/</guid><description>A remote, authenticated attacker can exploit multiple vulnerabilities in IBM WebSphere Application Server Liberty to escalate privileges, bypass security measures, and disclose information.</description><content:encoded><![CDATA[<p>IBM WebSphere Application Server Liberty is affected by multiple vulnerabilities that could be exploited by a remote, authenticated attacker. According to the BSI advisory published on March 25, 2026, successful exploitation can lead to privilege escalation, circumvention of security measures, and sensitive information disclosure. While the specific CVEs and techniques are not detailed in the source material, the broad impact across multiple security domains makes this a significant risk for organizations using the affected software. Defenders should prioritize identifying WebSphere Liberty instances and implementing mitigations as they become available.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker authenticates to the IBM WebSphere Application Server Liberty instance using existing credentials or compromised credentials.</li>
<li>The attacker leverages a vulnerability in the application server to bypass access controls.</li>
<li>Using the bypassed access, the attacker gains access to administrative functions or APIs.</li>
<li>The attacker exploits a privilege escalation vulnerability to gain higher-level privileges within the application server.</li>
<li>With elevated privileges, the attacker accesses sensitive configuration files and data stored within the application server.</li>
<li>The attacker exploits a vulnerability that allows the reading of arbitrary files on the system.</li>
<li>The attacker exfiltrates sensitive information such as user credentials, API keys, or proprietary data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities can have severe consequences. An attacker could gain complete control over the WebSphere Application Server Liberty instance, leading to data breaches, service disruption, and potential lateral movement within the network. The number of victims and sectors targeted are currently unknown, but any organization using IBM WebSphere Application Server Liberty is potentially at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor WebSphere Liberty server logs for suspicious activity following authentication to detect potential privilege escalation attempts (reference: Attack Chain step 4).</li>
<li>Implement the generic privilege escalation detection rule to identify unauthorized attempts to elevate privileges (reference: rules).</li>
<li>Implement the security measure bypass detection rule to identify possible vulnerability abuse (reference: rules).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>websphere</category><category>vulnerability</category><category>privilege-escalation</category><category>defense-evasion</category><category>information-disclosure</category></item><item><title>Lucky Pasta Shellcode Loader for Windows</title><link>https://feed.craftedsignal.io/briefs/2026-03-lucky-pasta-shellcode-loader/</link><pubDate>Tue, 24 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-lucky-pasta-shellcode-loader/</guid><description>A shellcode loader dubbed 'Lucky Pasta' employs JIT decryption, string obfuscation, dynamic library loading, fiber-based execution, and AES instruction patching to evade AV detection, retrieving shellcode via HTTP/HTTPS and executing it on Windows systems.</description><content:encoded><![CDATA[<p>A newly developed shellcode loader, referred to as &ldquo;Lucky Pasta&rdquo;, has been published online, showcasing advanced evasion techniques targeting Windows systems. The loader, written in C and utilizing the Windows API, is designed to bypass traditional antivirus (AV) solutions through a combination of runtime shellcode decryption using a Just-In-Time (JIT) approach, obfuscation of strings indicative of malicious intent, dynamic loading of libraries commonly flagged as suspicious, execution of shellcode within fibers for stealth, and runtime patching of Advanced Encryption Standard (AES) CPU instructions to thwart static analysis. The loader is capable of retrieving shellcode payloads via standard HTTP or encrypted HTTPS channels, indicating its potential use in various attack scenarios to deliver secondary payloads.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The shellcode loader is initially executed on a Windows system, likely through social engineering or exploitation of a software vulnerability.</li>
<li>The loader dynamically resolves API calls required for its operation, such as those related to memory allocation and network communication (e.g., <code>VirtualAlloc</code>, <code>LoadLibrary</code>, <code>GetProcAddress</code>).</li>
<li>The loader retrieves the encrypted shellcode from a remote server using HTTP or HTTPS protocols, potentially from a hardcoded URL.</li>
<li>The encrypted shellcode is decrypted in memory using the JIT decryption routine, converting it into executable code.</li>
<li>The loader creates a new fiber and transfers control to the decrypted shellcode within the fiber.</li>
<li>The shellcode performs its intended malicious actions, such as establishing a reverse shell or injecting into another process.</li>
<li>The loader cleans up any traces of its presence, such as zeroing out allocated memory regions.</li>
<li>The final objective is to gain unauthorized access to the compromised system, exfiltrate sensitive data, or deploy additional malware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of the &ldquo;Lucky Pasta&rdquo; shellcode loader can lead to complete compromise of the target Windows system. Due to its evasion techniques, it can bypass standard AV detection. The use of HTTP/HTTPS for payload delivery allows it to operate from almost anywhere. Exploitation may lead to data theft, ransomware deployment, or use of the compromised system as a bot in a larger network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for processes making outbound HTTP/HTTPS requests to unusual or suspicious domains, as this is how the shellcode is retrieved (IOC table, network_connection log source).</li>
<li>Implement a process creation monitoring rule to detect processes that load suspicious libraries dynamically (e.g., <code>LoadLibrary</code> calls from unknown executables) to identify potential malicious loaders. (process_creation log source, Sigma rule)</li>
<li>Deploy the Sigma rules provided to detect shellcode execution via fibers and obfuscated strings. (process_creation log source, Sigma rule).</li>
<li>Inspect processes that perform memory allocation with execute permissions (<code>VirtualAlloc</code> with <code>PAGE_EXECUTE_READWRITE</code>), especially if followed by network activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>shellcode</category><category>windows</category><category>jit</category><category>defense-evasion</category></item><item><title>MOTW Bypass via CAB, TAR, and 7-Zip Chaining</title><link>https://feed.craftedsignal.io/briefs/2026-03-motw-bypass/</link><pubDate>Thu, 19 Mar 2026 17:31:15 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-motw-bypass/</guid><description>A newly discovered Mark of the Web (MOTW) bypass technique utilizes a chain of CAB, TAR, and 7-Zip archives to circumvent SmartScreen and execute files without security warnings.</description><content:encoded><![CDATA[<p>A new MOTW bypass technique has emerged that chains a CAB file with two TAR archives nested within a 7-Zip archive. This method effectively strips the Zone.Identifier stream from downloaded files, preventing the display of SmartScreen prompts or security warnings. Many organizations rely on MOTW and SmartScreen as a crucial layer of defense against phishing attacks. This bypass, affecting fully patched environments, allows attackers to execute arbitrary code without the usual security checks, potentially leading to malware infection or data compromise. The technique is not a rehash of older 7-Zip MOTW issues but a novel approach to evade detection based on Zone.Identifier.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious payload.</li>
<li>Attacker packages the payload into a TAR archive.</li>
<li>The TAR archive is nested inside another TAR archive.</li>
<li>The nested TAR archives are then compressed into a 7-Zip archive using 7z.exe.</li>
<li>The 7-Zip archive is packaged into a CAB archive using makecab.exe.</li>
<li>The CAB archive is distributed to the victim, potentially via phishing or drive-by download.</li>
<li>The victim opens the CAB archive, extracting the nested 7-Zip, TAR, and payload.</li>
<li>The payload executes without a Zone.Identifier stream, bypassing MOTW and SmartScreen, potentially leading to malware infection or unauthorized access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass security controls that rely on MOTW and SmartScreen. This can lead to malware infections, data breaches, or other malicious activities. The bypass affects fully patched environments, increasing the scope of potential victims. The absence of security warnings makes it more likely that users will execute the malicious payload, increasing the success rate of attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement detections for unusual process chains involving <code>makecab.exe</code>, <code>7z.exe</code>, and <code>tar.exe</code> as these tools are used in the bypass (see Sigma rule &ldquo;Detect Suspicious Archive Chaining&rdquo;).</li>
<li>Monitor for archive extractions from unusual locations, especially those originating from downloaded CAB files, using file event logging and process monitoring (see Sigma rule &ldquo;Detect Archive Extraction from Downloaded CAB&rdquo;).</li>
<li>Analyze network connections from processes spawned from archive extractions, as they may indicate command and control or data exfiltration.</li>
<li>Block the URL <code>https://youtu.be/pQxiPwGTBL8</code> to prevent users from accessing potentially malicious content related to this bypass.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>motw</category><category>bypass</category><category>phishing</category><category>defense-evasion</category><category>archive</category><category>7-zip</category><category>cab</category><category>tar</category></item><item><title>WDAC Policy File Creation by Unusual Process</title><link>https://feed.craftedsignal.io/briefs/2024-11-wdac-policy-evasion/</link><pubDate>Sat, 02 Nov 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-wdac-policy-evasion/</guid><description>Adversaries may use a specially crafted Windows Defender Application Control (WDAC) policy to restrict the execution of security products, detected by unusual process creation of WDAC policy files.</description><content:encoded><![CDATA[<p>Attackers are increasingly targeting Windows Defender Application Control (WDAC) to disable or weaken endpoint defenses. By crafting malicious WDAC policies, adversaries can block legitimate security software and evade detection. This technique involves creating WDAC policy files (.p7b or .cip) in protected system directories using unauthorized processes. The activity often occurs when attackers have already gained a foothold in the system and are attempting to solidify their position. Successful deployment of a malicious WDAC policy can significantly hinder incident response and allow malware to operate undetected. This tactic has gained traction since late 2024, with offensive tools like Krueger demonstrating the potential for weaponizing WDAC against EDR solutions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to the system through methods such as phishing or exploiting a software vulnerability.</li>
<li><strong>Privilege Escalation:</strong> The attacker escalates privileges to gain administrative access, which is required to modify WDAC policies.</li>
<li><strong>Policy Creation:</strong> The attacker crafts a malicious WDAC policy using tools or scripts. This policy is designed to block specific security products or processes.</li>
<li><strong>Staging:</strong> The malicious policy is staged in a temporary location on the system, often within user-writable directories.</li>
<li><strong>Policy Placement:</strong> The attacker moves the malicious WDAC policy file (.p7b or .cip) to a protected system directory, such as <code>C:\Windows\System32\CodeIntegrity\</code> or <code>C:\Windows\System32\CodeIntegrity\CiPolicies\Active\</code>. The tool used may be a Living-off-the-Land Binary (LOLBin) or a custom .NET assembly.</li>
<li><strong>Activation:</strong> The attacker triggers the activation of the new WDAC policy, which often requires a system reboot or the use of a service control utility.</li>
<li><strong>Defense Evasion:</strong> Once the policy is active, the targeted security products are blocked, allowing the attacker to operate with reduced risk of detection.</li>
<li><strong>Lateral Movement/Objectives:</strong> With defenses weakened, the attacker can move laterally within the network, exfiltrate data, or achieve other objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack targeting WDAC can severely impair an organization&rsquo;s ability to detect and respond to threats. By blocking security software, attackers can operate with impunity, leading to data breaches, financial losses, and reputational damage. Observed damage includes disabled endpoint detection and response (EDR) solutions, allowing ransomware and other malware to execute without interference. The scope of impact can range from individual workstations to entire domains, depending on the breadth of the WDAC policy deployment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;WDAC Policy File by an Unusual Process&rdquo; Sigma rule to your SIEM to detect unauthorized WDAC policy modifications.</li>
<li>Monitor file creation events with extensions .p7b and .cip in <code>C:\Windows\System32\CodeIntegrity\</code> and <code>C:\Windows\System32\CodeIntegrity\CiPolicies\Active\</code> directories, specifically filtering for processes other than <code>poqexec.exe</code>, <code>TiWorker.exe</code>, and <code>omadmclient.exe</code>.</li>
<li>Enable Sysmon Event ID 11 (File Create) logging to capture file creation events and provide the necessary data for the Sigma rule to function effectively.</li>
<li>Implement strict access control policies on WDAC policy directories to prevent unauthorized modification.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wdac</category><category>defense-evasion</category><category>windows</category></item><item><title>Potential Privilege Escalation via SUID/SGID on Linux</title><link>https://feed.craftedsignal.io/briefs/2024-11-suid-sgid-privilege-escalation/</link><pubDate>Sat, 02 Nov 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-suid-sgid-privilege-escalation/</guid><description>Attackers may leverage misconfigured SUID/SGID permissions on Linux systems to escalate privileges to root or establish persistence by executing processes with root privileges initiated by non-root users.</description><content:encoded><![CDATA[<p>The SUID (Set User ID) and SGID (Set Group ID) bits are file permission mechanisms in Unix-like operating systems that allow a program to be executed with the privileges of the file&rsquo;s owner or group, respectively. While intended for legitimate purposes, such as allowing users to perform specific administrative tasks, they can be abused by attackers to escalate privileges. Attackers can exploit misconfigured SUID/SGID binaries to gain elevated access or persistence. This detection focuses on identifying processes running with root privileges (UID/GID 0) but initiated by non-root users, flagging potential misuse of SUID/SGID permissions on Linux systems monitored by Elastic Defend. This can indicate an attacker attempting to exploit a misconfiguration in order to escalate their privileges to root, or establish a backdoor for persistence.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Linux system via some vulnerability or compromised credentials.</li>
<li>The attacker identifies binaries with SUID/SGID bits set.</li>
<li>The attacker executes a vulnerable SUID/SGID binary, such as <code>find</code> or <code>nmap</code>.</li>
<li>The binary executes with root privileges, even though the attacker is a non-root user.</li>
<li>The attacker leverages the elevated privileges to read sensitive files, modify system configurations, or install malicious software.</li>
<li>The attacker escalates privileges to root.</li>
<li>The attacker establishes persistence by creating a new SUID/SGID binary or modifying an existing one.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of SUID/SGID misconfigurations can lead to complete system compromise, as attackers gain root privileges. Attackers can install malware, steal sensitive data, or disrupt critical services. The impact can range from data breaches to denial-of-service attacks. Given the broad range of binaries potentially affected, this vulnerability can impact various sectors and potentially affect a large number of Linux systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule <code>Privilege Escalation via SUID/SGID</code> to your SIEM to detect potential privilege escalation attempts.</li>
<li>Enable Elastic Defend integration to ensure the necessary process execution data is available.</li>
<li>Regularly audit SUID/SGID permissions across your Linux systems and remove unnecessary SUID/SGID bits.</li>
<li>Investigate any alerts generated by the Sigma rule by checking <code>process.real_user.id</code> and <code>process.real_group.id</code> to determine if non-root users initiated the process.</li>
<li>Review the process details, including <code>process.name</code> and <code>process.args</code>, to understand the nature of the executed command and its intended function.</li>
<li>Monitor system logs for suspicious activity around the time of the alert to identify any related actions.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>persistence</category><category>defense-evasion</category><category>suid</category><category>sgid</category></item><item><title>GitHub Security Feature Disablement</title><link>https://feed.craftedsignal.io/briefs/2024-11-github-security-disabled/</link><pubDate>Thu, 31 Oct 2024 18:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-github-security-disabled/</guid><description>An administrator or privileged user disables critical security features within a GitHub organization or repository, potentially leading to increased risk of unauthorized access, data breaches, and persistent compromise.</description><content:encoded><![CDATA[<p>This brief addresses the threat of unauthorized or malicious disabling of security features within GitHub organizations and repositories. Attackers or malicious insiders might disable features like Advanced Security, OAuth application restrictions, or two-factor authentication to weaken the security posture, gain unauthorized access, and establish persistence. The affected features span across advanced security, OAuth application management, and two-factor authentication enforcement. These actions can be performed by users with administrative or owner privileges within the GitHub organization. Defenders need to monitor for these configuration changes to ensure security best practices are maintained and to quickly identify potential malicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains unauthorized access to a GitHub account with organization owner or administrator privileges through compromised credentials or insider access.</li>
<li>The attacker authenticates to the GitHub organization or repository using the compromised account.</li>
<li>The attacker navigates to the organization settings or repository settings, depending on the scope of the targeted security feature.</li>
<li>The attacker disables advanced security features (e.g., <code>business_advanced_security.disabled_for_new_repos</code>, <code>repo.advanced_security_disabled</code>) through the GitHub web interface or API.</li>
<li>Alternatively, the attacker disables OAuth application restrictions (<code>org.disable_oauth_app_restrictions</code>) to allow potentially malicious applications to access organizational data.</li>
<li>Or, the attacker disables the two-factor authentication requirement (<code>org.disable_two_factor_requirement</code>) for the organization, weakening account security.</li>
<li>The attacker may then proceed to exploit the weakened security posture to access sensitive repositories, modify code, or exfiltrate data.</li>
<li>The attacker establishes persistent access by creating rogue OAuth applications or adding unauthorized users to the organization.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Disabling security features in GitHub can lead to severe consequences. A successful attack can result in unauthorized access to sensitive code repositories, intellectual property theft, and data breaches. Disabling two-factor authentication makes accounts more vulnerable to credential stuffing and phishing attacks. The scope can range from a single repository to an entire organization, impacting hundreds or thousands of users and projects. The financial and reputational damage to the organization can be significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Github High Risk Configuration Disabled</code> to detect the disabling of critical security features by monitoring GitHub audit logs.</li>
<li>Enable audit log streaming as documented in the rule definition to ensure that the necessary logs are captured for detection.</li>
<li>Investigate any detected instances of security feature disabling to determine if they are legitimate administrator actions or malicious activity.</li>
<li>Enforce multi-factor authentication (MFA) for all users, especially those with administrative privileges, and monitor for attempts to disable MFA.</li>
<li>Regularly review and validate GitHub organization and repository settings to ensure that security features are enabled and configured correctly.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>github</category><category>security-configuration</category><category>defense-evasion</category></item><item><title>MsiExec Child Process Spawning Network Connections for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-10-msiexec-network-connection/</link><pubDate>Sat, 26 Oct 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-10-msiexec-network-connection/</guid><description>Detection of MsiExec spawning child processes that initiate network connections, potentially indicating abuse of Windows Installers for malware delivery and defense evasion.</description><content:encoded><![CDATA[<p>Adversaries may abuse the Windows Installer service (msiexec.exe) to proxy the execution of malicious payloads, effectively bypassing application control and other security mechanisms. This technique, known as &ldquo;Msiexec&rdquo; proxy execution (T1218.007), involves using msiexec.exe to execute malicious DLLs or scripts. The detection focuses on identifying child processes spawned by MsiExec, particularly those exhibiting network activity. This behavior is atypical for legitimate software installations and updates, making it a strong indicator of potential malicious use. Defenders should be aware of this technique as it allows attackers to blend in with legitimate system processes. The Elastic detection rule, updated on 2026-05-04, aims to identify this suspicious activity across multiple data sources including Elastic Defend, Sysmon, and SentinelOne.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system through an exploit or social engineering.</li>
<li>Attacker leverages msiexec.exe to execute a malicious MSI package with a <code>/v</code> parameter, commonly used to pass verbose logging options, potentially hiding malicious commands.</li>
<li>The malicious MSI package contains custom actions that execute arbitrary code.</li>
<li>Msiexec.exe spawns a child process (e.g., powershell.exe, cmd.exe, or another executable) to carry out malicious actions.</li>
<li>The child process establishes a network connection to an external server or performs DNS lookups, possibly for command and control (C2) communication or to download additional payloads.</li>
<li>The attacker uses the network connection to download and execute further tools or scripts.</li>
<li>The attacker performs lateral movement within the network.</li>
<li>The final objective could be data exfiltration, ransomware deployment, or persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass application control and execute arbitrary code on the system. This can lead to malware installation, data theft, or complete system compromise. While the exact number of victims is not specified in the provided source, the technique can be applied across various sectors. The impact can range from individual workstation compromises to large-scale breaches affecting entire organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>MsiExec Child Process with Unusual Executable and Network Connection</code> to detect suspicious msiexec.exe child processes initiating network connections based on unusual executable paths.</li>
<li>Enable Sysmon process creation logging (Event ID 1) and network connection logging (Event ID 3) to provide the necessary data for the Sigma rule.</li>
<li>Investigate any alerts triggered by the Sigma rules, focusing on the process tree, command-line arguments, and network destinations.</li>
<li>Review and whitelist legitimate software installations and automated deployment tools that use MsiExec and require network access to minimize false positives, as detailed in the &ldquo;False positive analysis&rdquo; section of the source material.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>msiexec</category></item><item><title>Persistence via Windows Installer (Msiexec)</title><link>https://feed.craftedsignal.io/briefs/2024-09-msiexec-persistence/</link><pubDate>Thu, 05 Sep 2024 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-09-msiexec-persistence/</guid><description>Adversaries may establish persistence by abusing the Windows Installer (msiexec.exe) to create scheduled tasks or modify registry run keys, allowing for malicious code execution upon system startup or user logon.</description><content:encoded><![CDATA[<p>The Windows Installer (msiexec.exe) is a legitimate system tool used for installing, updating, and removing software on Windows systems. Adversaries can abuse msiexec.exe to establish persistence mechanisms by creating malicious scheduled tasks or modifying registry run keys. This allows them to execute arbitrary code during system startup or user logon. This technique is attractive to attackers due to msiexec.exe being a trusted Windows binary, potentially evading detection by security solutions that focus on flagging unknown or suspicious processes. The use of msiexec.exe for persistence can be difficult to detect without specific monitoring rules, as it is a common and legitimate system process. This activity can be observed across various Windows versions and is frequently integrated into automated attack frameworks and scripts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised system, potentially through phishing, exploitation of a vulnerability, or stolen credentials.</li>
<li>The attacker leverages msiexec.exe to create a new scheduled task using the <code>schtasks.exe</code> command, setting it to execute a malicious script or binary.</li>
<li>Alternatively, the attacker uses msiexec.exe in conjunction with <code>reg.exe</code> or PowerShell to modify registry keys under <code>HKLM\Software\Microsoft\Windows\CurrentVersion\Run</code> or <code>HKCU\Software\Microsoft\Windows\CurrentVersion\Run</code>, adding a pointer to their malicious executable.</li>
<li>The created scheduled task or registry entry points to a malicious payload, such as a reverse shell or a downloader.</li>
<li>The system is restarted, or the user logs on, triggering the execution of the newly created scheduled task or the malicious binary through the modified registry run key.</li>
<li>The malicious payload executes, establishing a persistent foothold for the attacker on the compromised system.</li>
<li>The attacker can now perform further actions, such as data exfiltration, lateral movement, or deployment of ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows the adversary to maintain persistent access to the compromised system. This can lead to data theft, system compromise, deployment of ransomware, or use of the system as a staging point for further attacks within the network. A single compromised system can be used to pivot and compromise additional systems, leading to a widespread security breach. The impact can include financial losses, reputational damage, and disruption of business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for msiexec.exe spawning <code>schtasks.exe</code> or <code>reg.exe</code> to create scheduled tasks or modify registry run keys (reference: rules in this brief).</li>
<li>Implement and tune the Sigma rules provided in this brief to detect suspicious msiexec.exe activity related to persistence mechanisms.</li>
<li>Review and audit existing scheduled tasks and registry run keys for any suspicious entries or anomalies.</li>
<li>Enable file integrity monitoring (FIM) on critical system directories, including the Windows Task Scheduler directory and registry run key locations (reference: event.category == &ldquo;file&rdquo; and file.path &hellip; and event.category == &ldquo;registry&rdquo; and registry.path &hellip; in the rule query).</li>
<li>Implement application control policies to restrict the execution of unauthorized or unknown executables (reference: rule query).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>defense-evasion</category><category>windows</category></item><item><title>Alternate Data Stream Creation/Execution at Volume Root Directory</title><link>https://feed.craftedsignal.io/briefs/2024-07-root-dir-ads-creation/</link><pubDate>Mon, 08 Jul 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-root-dir-ads-creation/</guid><description>Detection of Alternate Data Stream (ADS) creation at a volume root directory, a technique used to hide malware and tools by exploiting how ADSs in root directories are not readily visible to standard system utilities, indicating a defense evasion attempt.</description><content:encoded><![CDATA[<p>This detection rule identifies the creation or execution of Alternate Data Streams (ADS) within the root directory of a volume on Windows systems. Attackers leverage this technique to conceal malicious tools or data, as ADSs created in this manner are not easily discoverable by standard system utilities. This method allows for the persistence and execution of malware while evading typical detection mechanisms. This rule is designed for data generated by Elastic Defend, Microsoft Defender XDR, and SentinelOne Cloud Funnel, providing broad coverage across different endpoint security solutions. Monitoring for ADS activity at the volume root is crucial to identify potential defense evasion attempts and hidden malicious payloads.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker executes a script or program (e.g., PowerShell) to create a hidden ADS at the root of a volume (e.g., <code>C:\:evil.exe</code>).</li>
<li>The ADS is populated with malicious code, such as a reverse shell or malware payload.</li>
<li>The attacker uses a command-line tool or script to execute the hidden ADS file. For example: <code>wmic process call create &quot;cmd.exe /c start C:\:evil.exe&quot;</code>.</li>
<li>The malicious code within the ADS executes, allowing the attacker to perform unauthorized actions, such as data exfiltration or establishing persistence.</li>
<li>The attacker uses the hidden ADS to maintain persistence on the system, ensuring continued access even after reboots.</li>
<li>The attacker further leverages the compromised system to move laterally within the network, compromising additional systems and escalating privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to hide malicious tools and maintain persistence on compromised systems. The creation of ADSs at the volume root directory makes it difficult for administrators and security tools to detect the presence of malware. This can lead to prolonged compromise, data breaches, and significant disruption of business operations. The rule has a risk score of 47, and a medium severity is applied.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect ADS creation and execution at the volume root directory.</li>
<li>Enable logging for file creation events (Sysmon Event ID 11) and process creation events (Sysmon Event ID 1) for enhanced visibility into ADS activity.</li>
<li>Investigate alerts generated by the Sigma rules to determine the legitimacy of ADS creation or execution, focusing on processes and file paths that match the <code>[A-Z]:\\:.+</code> regex pattern in the rule query.</li>
<li>Regularly scan systems for hidden ADS files using specialized tools to uncover any potential malicious files.</li>
<li>Implement application control policies to restrict the execution of unauthorized applications and prevent the creation of malicious ADSs.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>hide-artifacts</category><category>alternate-data-stream</category></item><item><title>Potential Windows Session Hijacking via CcmExec</title><link>https://feed.craftedsignal.io/briefs/2024-07-sccm-dll-hijacking/</link><pubDate>Wed, 03 Jul 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-sccm-dll-hijacking/</guid><description>Adversaries may exploit Microsoft's System Center Configuration Manager by loading malicious DLLs into SCNotification.exe, a process associated with user notifications, potentially leading to Windows session hijacking.</description><content:encoded><![CDATA[<p>Attackers may attempt to hijack Windows user sessions by exploiting Microsoft&rsquo;s System Center Configuration Manager (SCCM). This involves loading malicious DLLs into <code>SCNotification.exe</code>, a process responsible for user notifications within the SCCM framework. The vulnerability arises when <code>SCNotification.exe</code> loads untrusted DLLs, potentially impersonating a user session. This activity is often characterized by recent DLL file creation or modification, coupled with the DLL lacking a trusted code signature. The references indicate this technique has been discussed publicly, raising awareness and the potential for increased exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system.</li>
<li>Attacker places a malicious DLL on the system. This DLL may be disguised to appear legitimate.</li>
<li>The attacker manipulates the system to cause <code>SCNotification.exe</code> to load the malicious DLL. This may involve modifying registry keys or file paths.</li>
<li><code>SCNotification.exe</code> loads the attacker-controlled DLL.</li>
<li>The malicious DLL executes within the context of the <code>SCNotification.exe</code> process.</li>
<li>The attacker leverages the hijacked process to impersonate a user session.</li>
<li>Attacker gains unauthorized access to user accounts and data.</li>
<li>Attacker performs malicious actions under the guise of the compromised user, such as data exfiltration or privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack could lead to unauthorized access to sensitive data, privilege escalation, and further compromise of the network. Victims could experience data breaches, financial loss, or reputational damage. The impact depends on the extent of access gained by the attacker and the sensitivity of the data accessed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential Windows Session Hijacking via CcmExec&rdquo; to your SIEM to detect suspicious DLL loads by <code>SCNotification.exe</code>.</li>
<li>Investigate alerts triggered by the Sigma rule, focusing on DLLs with recent file creation times or modifications (DLL timestamps) and untrusted signatures.</li>
<li>Implement application whitelisting to prevent unauthorized DLLs from being loaded by <code>SCNotification.exe</code> as described in the remediation steps in the note section.</li>
<li>Monitor process creation events for <code>SCNotification.exe</code> and related processes.</li>
<li>Enable Sysmon process creation logging to enhance visibility into process execution events, which activates the Sigma rules above.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>dll-hijacking</category><category>sccm</category></item><item><title>Microsoft Management Console File Execution from Unusual Path</title><link>https://feed.craftedsignal.io/briefs/2024-07-mmc-untrusted-path/</link><pubDate>Wed, 03 Jul 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-mmc-untrusted-path/</guid><description>Adversaries may use Microsoft Management Console (MMC) files from untrusted paths to bypass security controls for initial access and execution on Windows systems.</description><content:encoded><![CDATA[<p>Attackers may exploit Microsoft Management Console (MMC) by executing .msc files from non-standard directories to bypass security controls. This technique can be used for initial access and execution. This detection focuses on identifying the execution of <code>mmc.exe</code> with <code>.msc</code> files from paths outside the typical system directories, which are generally considered trusted. By monitoring process executions and filtering out known legitimate paths, analysts can identify potentially malicious activity related to the misuse of MMC. The rule aims to detect deviations from standard administrative practices that could indicate unauthorized access or command execution via malicious or compromised <code>.msc</code> files. The detection logic specifically excludes executions from common directories like <code>System32</code>, <code>SysWOW64</code>, and <code>Program Files</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through an unspecified method.</li>
<li>The attacker places a malicious <code>.msc</code> file in an unusual or untrusted directory (e.g., <code>C:\Users\Public</code>).</li>
<li>The attacker executes <code>mmc.exe</code> with the malicious <code>.msc</code> file as an argument from the untrusted path.</li>
<li><code>mmc.exe</code> processes the <code>.msc</code> file, potentially executing embedded commands or scripts.</li>
<li>The malicious <code>.msc</code> file performs unauthorized actions on the system, such as modifying system settings or executing arbitrary code.</li>
<li>The attacker leverages the execution context of <code>mmc.exe</code> to bypass security controls and escalate privileges.</li>
<li>The attacker may establish persistence by creating a scheduled task or modifying registry keys to execute the malicious <code>.msc</code> file automatically.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access, command execution, and privilege escalation, potentially compromising the entire system. While specific victim counts or sector targeting are not available, the technique is applicable across various Windows environments. The use of a trusted system binary like <code>mmc.exe</code> for malicious purposes can evade traditional security measures, making detection more challenging.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the Sigma rule <code>Microsoft Management Console File from Unusual Path</code> to detect the execution of <code>mmc.exe</code> with <code>.msc</code> files from untrusted paths.</li>
<li>Enable process creation logging with command-line arguments to provide the necessary data for the Sigma rule to function effectively.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the origin and content of the <code>.msc</code> file.</li>
<li>Consider implementing application control policies to restrict the execution of <code>.msc</code> files to authorized directories only.</li>
<li>Review and audit the use of MMC in the environment to identify any legitimate use cases that might trigger false positives.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>execution</category><category>defense-evasion</category><category>windows</category></item><item><title>DNS Global Query Block List Modified or Disabled</title><link>https://feed.craftedsignal.io/briefs/2024-07-dns-gqbl-modified/</link><pubDate>Wed, 03 Jul 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-dns-gqbl-modified/</guid><description>Attackers with DNSAdmin privileges can modify or disable the DNS Global Query Block List (GQBL) in Windows, allowing exploitation of hosts running WPAD with default settings for privilege escalation and lateral movement.</description><content:encoded><![CDATA[<p>The DNS Global Query Block List (GQBL) is a Windows security feature designed to prevent the resolution of specific DNS names, commonly exploited in attacks like WPAD spoofing. Attackers who have obtained elevated privileges, such as DNSAdmin, can modify or disable this list to bypass security controls. This allows exploitation of hosts running WPAD with default settings. The modification of the GQBL can be used for privilege escalation and lateral movement within a network. This rule detects changes to the registry values associated with the GQBL, specifically &ldquo;EnableGlobalQueryBlockList&rdquo; and &ldquo;GlobalQueryBlockList.&rdquo; This activity could indicate an attacker attempting to weaken defenses to facilitate further malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, possibly through compromised credentials or exploiting a vulnerability.</li>
<li>The attacker escalates privileges to obtain DNSAdmin rights.</li>
<li>The attacker modifies the &ldquo;EnableGlobalQueryBlockList&rdquo; registry value to &ldquo;0&rdquo; or &ldquo;0x00000000,&rdquo; effectively disabling the GQBL.</li>
<li>Alternatively, the attacker modifies the &ldquo;GlobalQueryBlockList&rdquo; registry value to remove &ldquo;wpad&rdquo; from the list.</li>
<li>The attacker leverages the disabled GQBL to conduct WPAD spoofing attacks, redirecting network traffic to attacker-controlled servers.</li>
<li>The attacker captures user credentials transmitted during WPAD authentication.</li>
<li>The attacker uses the captured credentials to move laterally to other systems on the network.</li>
<li>The attacker achieves their final objective, such as data exfiltration or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification or disabling of the DNS Global Query Block List can lead to WPAD spoofing attacks, credential theft, lateral movement, and ultimately, complete compromise of the network. Attackers can leverage this technique to gain unauthorized access to sensitive data or systems. The impact includes potential data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Registry Modification of DNS Global Query Block List</code> to your SIEM to detect unauthorized changes to the GQBL configuration.</li>
<li>Enable Sysmon registry event logging to capture the necessary events for the Sigma rule to function (reference the logsource in the rule).</li>
<li>Review and restrict DNSAdmin privileges to only necessary accounts to minimize the attack surface (reference: Overview section).</li>
<li>Monitor network traffic for unusual DNS queries or WPAD-related activity, correlating with registry modification events (reference: Attack Chain step 5).</li>
<li>Regularly audit registry settings related to DNS configuration, including the GQBL, to identify unauthorized modifications (reference: Attack Chain steps 3 &amp; 4).</li>
<li>Update security policies and procedures to include specific measures for monitoring and protecting the DNS Global Query Block List (reference: Impact section).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>registry-modification</category><category>windows</category></item><item><title>Otter Blocks Plugin Purchase Verification Bypass Vulnerability (CVE-2026-2892)</title><link>https://feed.craftedsignal.io/briefs/2026-06-otter-blocks-bypass/</link><pubDate>Mon, 24 Jun 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-otter-blocks-bypass/</guid><description>CVE-2026-2892 is a purchase verification bypass vulnerability in the Otter Blocks plugin for WordPress, affecting versions up to 3.1.4, that allows unauthenticated attackers to access restricted content by forging a cookie used for purchase validation.</description><content:encoded><![CDATA[<p>The Otter Blocks plugin, a popular WordPress extension, is susceptible to a purchase verification bypass vulnerability identified as CVE-2026-2892. This flaw affects all versions up to and including 3.1.4. The vulnerability stems from the plugin&rsquo;s reliance on an unsigned cookie, &lsquo;o_stripe_data&rsquo;, to determine Stripe product ownership for unauthenticated users. The &lsquo;get_customer_data&rsquo; method uses this cookie, and the subsequent &lsquo;check_purchase&rsquo; method trusts its contents without proper server-side validation against the Stripe API. This lack of verification enables attackers to gain unauthorized access to purchase-gated content. The target product ID is often exposed in the checkout block&rsquo;s HTML source, further simplifying the exploit. Successful exploitation allows attackers to bypass payment requirements, potentially impacting content creators and businesses relying on the plugin for revenue generation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable Otter Blocks plugin (version &lt;= 3.1.4).</li>
<li>The attacker examines the HTML source code of a checkout block on the target site to identify the target product ID.</li>
<li>The attacker crafts a malicious &lsquo;o_stripe_data&rsquo; cookie containing the target product ID.</li>
<li>The attacker sets the forged &lsquo;o_stripe_data&rsquo; cookie in their browser.</li>
<li>The attacker navigates to the purchase-gated content on the WordPress site.</li>
<li>The &lsquo;get_customer_data&rsquo; method reads the forged &lsquo;o_stripe_data&rsquo; cookie.</li>
<li>The &lsquo;check_purchase&rsquo; method incorrectly validates the forged purchase data without server-side verification against the Stripe API.</li>
<li>The attacker gains unauthorized access to the purchase-gated content, bypassing the intended payment requirement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-2892 allows unauthenticated attackers to bypass purchase verification mechanisms implemented by the Otter Blocks plugin. This can lead to unauthorized access to premium content, resulting in revenue loss for content creators and businesses using the plugin. The number of potentially affected websites is significant, given the popularity of WordPress and the Otter Blocks plugin. The CVSS v3.1 base score is 7.5, indicating a high severity vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Otter Blocks plugin to a version greater than 3.1.4 to patch CVE-2026-2892.</li>
<li>Deploy the provided Sigma rules to detect potential exploitation attempts targeting the vulnerable plugin.</li>
<li>Monitor web server logs (category <code>webserver</code>, product <code>linux</code>) for suspicious cookie manipulation activity, specifically targeting the &lsquo;o_stripe_data&rsquo; cookie.</li>
<li>Implement server-side validation of purchase data against the Stripe API to prevent cookie forgery attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wordpress</category><category>plugin</category><category>purchase-bypass</category><category>CVE-2026-2892</category><category>defense-evasion</category></item><item><title>Suspicious ScreenConnect Client Child Process Activity</title><link>https://feed.craftedsignal.io/briefs/2024-05-screenconnect-child-process/</link><pubDate>Thu, 16 May 2024 16:10:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-screenconnect-child-process/</guid><description>This rule identifies suspicious child processes spawned by ScreenConnect client processes, potentially indicating unauthorized access and command execution abusing ScreenConnect remote access software to perform malicious activities such as data exfiltration or establishing persistence.</description><content:encoded><![CDATA[<p>This threat brief focuses on the detection of suspicious activities related to the ScreenConnect remote access tool. ScreenConnect is a legitimate remote support software, but adversaries can exploit it to execute unauthorized commands on compromised systems. This detection identifies suspicious child processes spawned by ScreenConnect client processes, such as <code>ScreenConnect.ClientService.exe</code> or <code>ScreenConnect.WindowsClient.exe</code>, which can indicate malicious activities such as spawning PowerShell or cmd.exe with unusual arguments. This activity can indicate potential abuse of remote access capabilities, leading to data exfiltration, command and control communication, or the establishment of persistence mechanisms. Recent exploitation of CVE-2024-1709 and CVE-2024-1708 have highlighted the risk associated with ScreenConnect exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains unauthorized access to a system with ScreenConnect installed. This could be achieved through exploiting vulnerabilities like CVE-2024-1709 and CVE-2024-1708, or through credential compromise.</li>
<li>The attacker uses ScreenConnect to connect to the compromised system remotely.</li>
<li>The attacker uses the ScreenConnect interface to execute commands on the remote system.</li>
<li>The attacker spawns a command interpreter, such as <code>cmd.exe</code>, using ScreenConnect. This process is a child process of the ScreenConnect client process.</li>
<li>The attacker uses <code>cmd.exe</code> to execute malicious commands, such as downloading and executing a malicious payload.</li>
<li>Alternatively, the attacker spawns <code>powershell.exe</code> with encoded commands or commands to download and execute malicious payloads from a remote server.</li>
<li>The attacker establishes persistence by creating a scheduled task using <code>schtasks.exe</code> or creates a new service using <code>sc.exe</code>.</li>
<li>The attacker uses tools like <code>net.exe</code> to modify user accounts or privileges to maintain access to the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data, installation of malware, and establishment of persistent access to the compromised system. This can result in data theft, disruption of services, and further lateral movement within the network. The number of victims and specific sectors targeted varies depending on the attacker&rsquo;s objectives, but the impact can be significant for organizations relying on ScreenConnect for remote support.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect suspicious child processes spawned by ScreenConnect and tune for your environment.</li>
<li>Monitor process creation events for ScreenConnect client processes spawning suspicious child processes like <code>powershell.exe</code>, <code>cmd.exe</code>, <code>net.exe</code>, <code>schtasks.exe</code>, <code>sc.exe</code>, <code>rundll32.exe</code>, <code>mshta.exe</code>, <code>certutil.exe</code>, <code>wscript.exe</code>, <code>cscript.exe</code>, <code>curl.exe</code>, <code>ssh.exe</code>, <code>scp.exe</code>, <code>wevtutil.exe</code>, <code>wget.exe</code>, or <code>wmic.exe</code> as detailed in the Sigma rules.</li>
<li>Enable Sysmon process-creation logging to capture the necessary process execution data to activate the rules above.</li>
<li>Review and revoke any unauthorized user accounts or privileges that may have been created or modified using tools like <code>net.exe</code> as described in the attack chain.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>defense-evasion</category><category>execution</category><category>persistence</category><category>screenconnect</category></item><item><title>Windows Parent Process PID Spoofing Detection</title><link>https://feed.craftedsignal.io/briefs/2024-05-parent-process-spoofing/</link><pubDate>Thu, 09 May 2024 14:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-parent-process-spoofing/</guid><description>Adversaries use parent process PID spoofing to evade detection by creating processes with mismatched parent-child relationships, hindering process monitoring and potentially elevating privileges on Windows systems.</description><content:encoded><![CDATA[<p>Parent process PID spoofing is a defense evasion technique where a process is created with a parent process ID (PPID) that differs from its actual creator. This can be used to circumvent process monitoring tools that rely on accurate parent-child relationships. Adversaries may leverage this technique to disguise malicious processes as legitimate system processes or to elevate privileges by associating malicious activities with trusted processes. The technique involves manipulating process creation APIs to set an arbitrary PPID. The Elastic Defend integration is designed to capture the necessary process telemetry to detect these discrepancies. This activity matters because it can allow attackers to hide their actions and persist on compromised systems undetected. The referenced Elastic detection rule was last updated on 2026/04/30, demonstrating continued relevance.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the Windows system (e.g., via phishing or exploit).</li>
<li>Attacker executes a malicious process, such as a script or executable.</li>
<li>The malicious process uses API calls (e.g., <code>CreateProcess</code>, <code>NtCreateProcessEx</code>) to spawn a new process.</li>
<li>During process creation, the attacker modifies the PPID parameter to spoof a legitimate parent process.</li>
<li>The new process is launched with the spoofed PPID, appearing as a child of the chosen parent.</li>
<li>The spoofed process executes malicious code, potentially downloading additional payloads or establishing command and control.</li>
<li>The adversary leverages the trusted appearance of the spoofed process to evade detection by security tools.</li>
<li>The attacker achieves their final objective, such as data exfiltration, lateral movement, or persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful parent process PID spoofing can allow attackers to evade detection and maintain persistence on a compromised system. This can lead to data breaches, system compromise, and financial loss. While the number of victims and specific sectors targeted are not specified in the provided source material, the technique is applicable across various sectors and organizations utilizing Windows-based systems. The lack of detection can lead to prolonged dwell time, increasing the potential for significant damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious Process Creation with PPID Spoofing</code> to your SIEM to identify potential parent process PID spoofing attempts based on process telemetry data.</li>
<li>Enable and monitor process creation events with parent-child relationships using Elastic Defend to capture the necessary data for the provided rule.</li>
<li>Investigate alerts generated by the Sigma rule by examining the process tree and verifying the legitimacy of parent-child relationships as outlined in the rule&rsquo;s description.</li>
<li>Configure endpoint detection and response (EDR) solutions to identify and block suspicious processes spawned by common exploitation vectors like Office applications and script hosts, as these are often associated with PPID spoofing.</li>
<li>Review and tune the Sigma rule, specifically the <code>process.pe.original_file_name</code> and <code>process.executable</code> lists, to match your organization&rsquo;s baseline and reduce false positives.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>process-injection</category><category>windows</category></item><item><title>Kubernetes Event Deletion for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-05-kubernetes-events-deleted/</link><pubDate>Thu, 02 May 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-kubernetes-events-deleted/</guid><description>An adversary may delete Kubernetes events to evade detection and hide malicious activity within a Kubernetes environment by removing audit logs.</description><content:encoded><![CDATA[<p>Attackers targeting Kubernetes environments may attempt to delete Kubernetes events as a means of covering their tracks. This technique, often employed after successful exploitation or lateral movement, aims to eliminate audit logs and other traces of malicious activity. By removing these logs, attackers can significantly hinder incident response efforts and prolong the duration of their access. While the specifics of initial access will vary, this action will typically be performed using kubectl or similar tools with sufficient privileges within the Kubernetes cluster. Defenders need to monitor for unexpected deletion of event logs to identify potentially compromised systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of a container or node within the Kubernetes cluster using an exploit (e.g., exploiting a vulnerability in a containerized application).</li>
<li>Establish persistence by creating a malicious pod or modifying existing deployments to include backdoors.</li>
<li>Escalate privileges within the cluster, potentially by exploiting misconfigured RBAC policies or vulnerable service accounts.</li>
<li>Identify Kubernetes event logs that contain evidence of the attacker&rsquo;s activities, such as pod deployments, privilege escalation attempts, or network connections.</li>
<li>Use <code>kubectl delete events</code> command with appropriate privileges to remove targeted event logs from the Kubernetes audit logs.</li>
<li>Verify that the targeted event logs have been successfully removed from the cluster&rsquo;s audit trail.</li>
<li>Continue lateral movement and data exfiltration, now with reduced risk of detection due to the deleted event logs.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful deletion of Kubernetes events allows attackers to operate within the cluster undetected for extended periods. This can lead to significant data breaches, system compromise, and disruption of services. The absence of event logs makes forensic investigation and incident response extremely challenging, potentially leading to inaccurate assessments of the scope and impact of the attack. While the exact number of victims is unknown, this technique, if successful, significantly amplifies the damage caused by any initial intrusion.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Kubernetes Events Deleted&rdquo; to your SIEM to detect event deletion attempts in your Kubernetes environment (logsource: application, product: kubernetes, service: audit).</li>
<li>Review and harden RBAC policies to minimize the risk of unauthorized event deletion.</li>
<li>Implement strong audit logging practices and ensure that audit logs are securely stored and protected from tampering.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>stealth</category><category>defense-evasion</category><category>kubernetes</category></item><item><title>Okta Admin Console Unusual Behavior Detection</title><link>https://feed.craftedsignal.io/briefs/2024-05-okta-admin-console-behaviors/</link><pubDate>Thu, 02 May 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-okta-admin-console-behaviors/</guid><description>This brief details detection of anomalous activity within the Okta Admin Console, potentially indicating privilege escalation, persistence, defense evasion, or initial access attempts by malicious actors.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting unusual behaviors within the Okta Admin Console, as identified by Okta&rsquo;s heuristics. While the specific campaign details are unknown, identifying anomalous access patterns to the Admin Console is crucial for detecting various malicious activities. This includes potential privilege escalation by compromised accounts or insider threats attempting to gain elevated permissions, establishing persistence through unauthorized modifications, evading existing security controls, or gaining initial access through account compromise. The detection relies on Okta&rsquo;s system logs which can signal unusual administrative activity. Defenders should prioritize monitoring and alerting on these events to quickly identify and respond to potential security breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to an Okta account, possibly through credential phishing or brute-force attacks.</li>
<li>The attacker attempts to log in to the Okta Admin Console.</li>
<li>Okta&rsquo;s behavior detection engine analyzes the login attempt, considering factors like the user&rsquo;s location, device, and time of day.</li>
<li>The system logs record a <code>policy.evaluate_sign_on</code> event when a sign-on policy is evaluated.</li>
<li>The <code>target.displayName</code> field within the log specifies &ldquo;Okta Admin Console&rdquo; indicating the user is attempting to access the administrative interface.</li>
<li>If Okta identifies the behavior as unusual, the <code>debugContext.debugData.behaviors</code> or <code>debugContext.debugData.logOnlySecurityData</code> fields will contain &ldquo;POSITIVE&rdquo;.</li>
<li>An alert is triggered based on the identified unusual behavior.</li>
<li>The attacker, if successful in bypassing initial checks, may proceed to create new admin accounts, modify existing policies, or exfiltrate sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromise of the Okta Admin Console can lead to significant damage, including unauthorized access to sensitive data, modification of security policies, creation of rogue administrator accounts, and ultimately, a complete takeover of the Okta environment. This can impact all applications and services integrated with Okta, potentially affecting thousands of users and causing significant financial and reputational damage. Early detection is crucial to limiting the scope and impact of such attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule <code>Okta Admin Console Unusual Behavior</code> to your SIEM to detect suspicious Okta Admin Console access based on Okta&rsquo;s internal behavior analysis.</li>
<li>Investigate any alerts generated by the Sigma rule to determine if the unusual behavior is legitimate or indicative of malicious activity.</li>
<li>Review Okta&rsquo;s System Log API documentation to understand the various event types and data fields available for monitoring and detection.</li>
<li>Implement multi-factor authentication (MFA) for all Okta accounts, especially administrator accounts, to mitigate the risk of account compromise (related to initial access).</li>
<li>Monitor Okta&rsquo;s security advisories and announcements for updates on emerging threats and recommended security practices (references).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>okta</category><category>identity</category><category>privilege-escalation</category><category>persistence</category><category>defense-evasion</category><category>initial-access</category></item><item><title>Suspicious Child Processes from Communication Applications</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-comm-app-child-process/</link><pubDate>Wed, 31 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-comm-app-child-process/</guid><description>The detection rule identifies suspicious child processes spawned from communication applications on Windows systems, potentially indicating masquerading or exploitation of vulnerabilities within these applications.</description><content:encoded><![CDATA[<p>This detection rule focuses on identifying suspicious child processes of communication applications such as Slack, Cisco Webex, Microsoft Teams, Discord, WhatsApp, Zoom, and Thunderbird on Windows operating systems. Attackers may attempt to masquerade as legitimate processes or exploit vulnerabilities in these applications to execute malicious code. The rule monitors for the creation of child processes by these communication apps and checks if those child processes are unexpected, untrusted, or lack a valid code signature. This detection is crucial because successful exploitation can lead to unauthorized access, data exfiltration, or further compromise of the system. The rule has been actively maintained since August 2023, with updates as recent as May 2026, indicating its relevance and ongoing refinement to address emerging threats.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>User launches a communication application (e.g., Slack, Teams, Webex).</li>
<li>The communication application executes a vulnerable or compromised component.</li>
<li>The compromised component spawns a child process (e.g., powershell.exe, cmd.exe).</li>
<li>The child process executes a malicious command or script.</li>
<li>The script attempts to download additional payloads from an external source.</li>
<li>The payload executes, establishing persistence through registry modification or scheduled tasks.</li>
<li>The attacker gains remote access to the system.</li>
<li>Data exfiltration or lateral movement within the network occurs.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the compromise of sensitive data, installation of malware, and potential lateral movement within the organization&rsquo;s network. By exploiting communication applications, attackers can gain access to internal communications, confidential documents, and user credentials. The number of affected users and the extent of the damage depend on the compromised application and the attacker&rsquo;s objectives. If successful, this attack may lead to significant financial loss, reputational damage, and disruption of business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Suspicious Communication App Child Process</code> to your SIEM to detect anomalous child processes spawned by communication applications and tune for your environment.</li>
<li>Enable process creation logging with command line arguments in Windows to ensure that the Sigma rule has the necessary data to function correctly (logsource: <code>process_creation</code>, product: <code>windows</code>).</li>
<li>Investigate any alerts generated by the rule and review the command line arguments of the spawned processes to identify potential malicious activity.</li>
<li>Implement application whitelisting to restrict the execution of unauthorized applications and reduce the attack surface.</li>
<li>Ensure that all communication applications are updated to the latest versions to patch known vulnerabilities and reduce the risk of exploitation.</li>
<li>Examine the network activity of the affected system to identify any suspicious outbound connections that may indicate data exfiltration or communication with a command and control server, referencing the setup guide.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>windows</category></item><item><title>Network-Level Authentication (NLA) Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-nla/</link><pubDate>Wed, 31 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-nla/</guid><description>Adversaries may disable Network-Level Authentication (NLA) by modifying specific registry keys to bypass authentication requirements for Remote Desktop Protocol (RDP) and enable persistence mechanisms.</description><content:encoded><![CDATA[<p>Network Level Authentication (NLA) is a security feature in Windows that requires users to authenticate before establishing a full RDP session, adding an extra layer of protection against unauthorized access. Attackers might attempt to disable NLA to gain access to the Windows sign-in screen without proper authentication. This tactic can facilitate the deployment of persistence mechanisms, such as leveraging Accessibility Features like Sticky Keys, or enable unauthorized remote access. This brief addresses the registry modifications associated with disabling NLA and provides detection strategies to identify such attempts. The references indicate that this technique is used in conjunction with other attacks for lateral movement within a compromised network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access to the system is gained (potentially via compromised credentials or vulnerability exploitation).</li>
<li>The attacker elevates privileges to modify system-level settings.</li>
<li>The attacker modifies the registry key <code>HKLM\SYSTEM\ControlSet*\Control\Terminal Server\WinStations\RDP-Tcp\UserAuthentication</code> to disable NLA.</li>
<li>The <code>UserAuthentication</code> value is set to &ldquo;0&rdquo; or &ldquo;0x00000000&rdquo;.</li>
<li>The attacker attempts to establish an RDP connection to the compromised system.</li>
<li>Due to the disabled NLA, the attacker bypasses the initial authentication screen.</li>
<li>The attacker leverages accessibility features (e.g., Sticky Keys) for persistence or further exploitation.</li>
<li>The attacker gains unauthorized access to the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of NLA allows attackers to bypass authentication and gain unauthorized access to systems via RDP. This can lead to data theft, malware installation, or further lateral movement within the network. While the exact number of victims and sectors targeted are unspecified, the potential impact includes significant data breaches and system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process-creation and registry event logging to detect the registry modifications (Elastic Defend, Elastic Endgame, Microsoft Defender XDR, SentinelOne, Sysmon).</li>
<li>Deploy the Sigma rule provided to detect attempts to modify the <code>UserAuthentication</code> registry key (Sysmon Registry Events).</li>
<li>Review and harden RDP configurations across the environment to prevent unauthorized access (Microsoft documentation).</li>
<li>Monitor endpoint security policies to detect unauthorized registry modifications (Endpoint Security Policies).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>lateral-movement</category><category>registry-modification</category><category>windows</category></item><item><title>Windows Console History Clearing</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-clearing-console-history/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-clearing-console-history/</guid><description>Adversaries may clear the command history of a compromised account to conceal the actions undertaken during an intrusion on a Windows system.</description><content:encoded><![CDATA[<p>Attackers can try to cover their tracks by clearing the PowerShell console history on Windows systems. PowerShell offers multiple ways to log commands, including the built-in history and the command history managed by the PSReadLine module. This activity is often part of post-compromise behavior aimed at evading detection and forensic analysis. This rule detects the execution of specific commands that clear the built-in PowerShell logs or delete the <code>ConsoleHost_history.txt</code> file. The rule focuses on PowerShell activity and covers scenarios where commands like Clear-History, Remove-Item, rm, and Set-PSReadlineOption are used to manipulate command history.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained through an unspecified method, potentially exploiting a vulnerability or using stolen credentials.</li>
<li>The attacker executes PowerShell (powershell.exe, pwsh.exe, or powershell_ise.exe) to perform reconnaissance and other malicious activities.</li>
<li>The attacker attempts to clear the PowerShell command history using the <code>Clear-History</code> cmdlet.</li>
<li>Alternatively, the attacker attempts to remove the <code>ConsoleHost_history.txt</code> file using <code>Remove-Item</code> or <code>rm</code>, which stores the PSReadLine command history.</li>
<li>Another method involves using the <code>Set-PSReadlineOption</code> cmdlet with the <code>SaveNothing</code> parameter to prevent the saving of future command history.</li>
<li>The attacker may leverage other tools and techniques to further obscure their activities and maintain persistence on the compromised system.</li>
<li>The attacker attempts to move laterally to other systems within the network to increase their impact.</li>
<li>The final objective is data exfiltration, deployment of ransomware, or other malicious activities, all while attempting to evade detection by clearing logs and command history.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful clearing of console history hinders forensic investigations and incident response efforts. If command history is cleared, administrators will have difficulty reconstructing the attacker&rsquo;s actions and identifying the extent of the compromise. This can lead to prolonged incident response times, increased damage, and potential for further exploitation of the compromised systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Clearing PowerShell History</code> to your SIEM to detect the use of <code>Clear-History</code> cmdlet, potentially indicating an attempt to remove command history.</li>
<li>Deploy the Sigma rule <code>Detect Removal of PowerShell History File</code> to detect the use of <code>Remove-Item</code> or <code>rm</code> command against the PowerShell history file.</li>
<li>Enable PowerShell logging and auditing policies to ensure adequate visibility into PowerShell activity as described in the <a href="https://ela.st/audit-process-creation">setup instructions</a> to improve detection capabilities.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>powershell</category><category>windows</category></item><item><title>System File Ownership Change for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-system-file-ownership-change/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-system-file-ownership-change/</guid><description>Adversaries may modify file or directory ownership to evade access control lists (ACLs) and access protected files, often using icacls.exe or takeown.exe to reset permissions on system files.</description><content:encoded><![CDATA[<p>Attackers often attempt to modify file or directory ownership to bypass access controls and gain unauthorized access to sensitive data or system resources. This involves altering permissions associated with critical files or directories, granting broader access to accounts under attacker control or resetting permissions to default values which might be more permissive. This defense evasion technique can be used to establish persistence, escalate privileges, or exfiltrate data without triggering standard security alerts. The common tools used include <code>icacls.exe</code> and <code>takeown.exe</code>, typically targeting files within the <code>C:\Windows\</code> directory.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is achieved through an existing compromised account or vulnerability.</li>
<li>The attacker uses <code>takeown.exe /f &lt;file&gt;</code> to take ownership of a target file or directory.</li>
<li>The attacker uses <code>icacls.exe &lt;file&gt; /reset</code> to reset the ACL of the file or directory.</li>
<li>Alternatively, the attacker uses <code>icacls.exe &lt;file&gt; /grant Everyone:F</code> to grant full control to everyone, weakening security.</li>
<li>The attacker modifies the contents of the file, such as injecting malicious code or configuration changes.</li>
<li>The attacker leverages the modified file for persistence, such as a modified system DLL loaded at boot.</li>
<li>The system executes the malicious code when the compromised file is accessed or executed.</li>
<li>The attacker achieves their objective, such as maintaining persistence, escalating privileges, or executing arbitrary commands.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromising file and directory permissions can lead to significant security breaches. Successful attacks can allow unauthorized access to sensitive data, system instability, or the execution of malicious code with elevated privileges. This can affect any Windows environment where file permissions are improperly managed, with potential for widespread system compromise and data exfiltration. The impact is most severe on systems containing sensitive data or critical infrastructure components.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process execution for <code>icacls.exe</code> and <code>takeown.exe</code> with suspicious arguments targeting system files (e.g., <code>C:\Windows\*</code>) to detect potential permission modification attempts using the provided Sigma rules.</li>
<li>Enable Windows Security Auditing for file system changes to capture events related to permission modifications and ownership changes.</li>
<li>Deploy the provided Sigma rules to your SIEM and tune for your environment, specifically focusing on processes modifying permissions on files within the <code>C:\Windows\</code> directory.</li>
<li>Investigate any alerts triggered by the Sigma rules, focusing on the process execution chain and the target files being modified.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>windows</category></item><item><title>Suspicious Windows Process Cluster from Parent Process via Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-parent-process/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-parent-process/</guid><description>A machine learning model detected a parent process spawning a cluster of suspicious Windows processes with high malicious probability scores, potentially indicating LOLBins usage and defense evasion.</description><content:encoded><![CDATA[<p>This alert leverages Elastic&rsquo;s ProblemChild integration to detect potential Living off the Land (LotL) attacks on Windows systems. The rule utilizes a combination of supervised and unsupervised machine learning models to identify parent processes spawning clusters of suspicious child processes. These child processes are flagged as having unusually high malicious probability scores, suggesting the use of LOLBins or other defense evasion techniques. The detection focuses on identifying groups of processes with the same parent process name where the aggregated malicious score for the cluster is unusually high, as determined by an unsupervised machine learning model. The rule is active as of October 2023, with updates through April 2026 and requires Elastic Stack version 9.4.0 or later.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means.</li>
<li>The attacker leverages a legitimate, signed Windows binary (LOLBin) such as <code>powershell.exe</code> or <code>cmd.exe</code>.</li>
<li>The LOLBin is used to execute malicious code or commands.</li>
<li>The LOLBin spawns one or more child processes that perform malicious actions like reconnaissance or lateral movement.</li>
<li>The ProblemChild supervised ML model flags the child processes as having a high malicious probability score.</li>
<li>The unsupervised ML model calculates an unusually high aggregate score for the cluster of child processes originating from the same parent process.</li>
<li>The detection rule triggers, identifying the suspicious parent-child process relationship.</li>
<li>The attacker achieves their objective, such as data exfiltration or persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using LOLBins can allow adversaries to bypass traditional signature-based detections and operate undetected within a network. The masquerading of malicious activity as legitimate system processes makes it difficult for security teams to identify and respond to threats effectively. The impact can range from data theft and system compromise to ransomware deployment, depending on the attacker&rsquo;s objectives. The machine learning detection helps analysts to prioritize alerts which may otherwise be missed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure the Living off the Land (LotL) Attack Detection integration assets are installed within Elastic Security, as described in the &ldquo;Setup&rdquo; section of this brief.</li>
<li>Investigate any alerts generated by the &ldquo;Parent Process Detected with Suspicious Windows Process(es)&rdquo; rule, focusing on the parent process name and the command-line arguments of the suspicious child processes (reference: Investigation Guide in the rule&rsquo;s <code>note</code> field).</li>
<li>Tune the <code>anomaly_threshold</code> value (currently 75) in the rule configuration based on your environment&rsquo;s baseline activity to reduce false positives.</li>
<li>Whitelisting parent process names can mitigate false positives generated by legitimate administrative tools. (reference: False positive analysis in the rule&rsquo;s <code>note</code> field)</li>
<li>Enable Windows process creation logging via Elastic Defend or Winlogbeat to ensure the rule has the necessary data to function (reference: Setup section).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>lolbin</category><category>windows</category></item><item><title>Expired or Revoked Driver Loaded</title><link>https://feed.craftedsignal.io/briefs/2024-01-expired-driver-load/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-expired-driver-load/</guid><description>An expired or revoked driver being loaded on a Windows system may indicate an attempt to gain code execution in kernel mode or abuse revoked certificates for malicious purposes, potentially leading to privilege escalation or defense evasion.</description><content:encoded><![CDATA[<p>Attackers may attempt to load expired or revoked drivers to bypass security controls and execute code in kernel mode. This technique can be used for privilege escalation or defense evasion. The loading of such drivers, especially by the System process (PID 4), is a strong indicator of malicious activity. The referenced Elastic detection rule, last updated on May 4, 2026, aims to identify such attempts by monitoring the code signature status of loaded drivers on Windows systems. The rule focuses on identifying drivers with &ldquo;errorExpired&rdquo; or &ldquo;errorRevoked&rdquo; status, providing defenders with a means to detect potentially malicious activity related to driver manipulation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., through social engineering or exploiting a vulnerability).</li>
<li>The attacker obtains or creates a malicious driver signed with an expired or revoked certificate, or an outdated driver with known vulnerabilities.</li>
<li>The attacker attempts to load the malicious driver onto the targeted Windows system.</li>
<li>The Windows operating system attempts to verify the driver&rsquo;s code signature.</li>
<li>The code signature verification fails due to the driver&rsquo;s expired or revoked certificate.</li>
<li>Despite the signature failure, the attacker attempts to force the system to load the driver, possibly by exploiting a bypass or misconfiguration.</li>
<li>The driver is loaded into kernel mode, granting the attacker elevated privileges and control over the system.</li>
<li>The attacker leverages the compromised driver to execute malicious code, escalate privileges, or evade security defenses.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack involving the loading of an expired or revoked driver can lead to complete system compromise. An attacker could gain unauthorized access to sensitive data, install malware, or disrupt critical services. The consequences range from data breaches to system instability and loss of integrity. The Elastic detection rule aims to detect these attempts before significant damage can occur.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule provided below to detect instances of expired or revoked drivers being loaded (reference: Sigma rule).</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy and potential risk associated with the loaded driver (reference: Sigma rule).</li>
<li>Enable endpoint detection and response (EDR) solutions like Elastic Defend to enhance visibility into driver loading events (reference: Elastic Defend).</li>
<li>Regularly update driver blocklists to prevent the loading of known malicious or vulnerable drivers (reference: References URL).</li>
<li>Monitor process creation events for unusual driver loading activity, particularly by the System process (PID 4) (reference: Sigma rule, process.pid == 4).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>defense-evasion</category><category>windows</category></item><item><title>MsXsl.exe Network Connection for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-msxsl-network-connection/</link><pubDate>Tue, 30 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-msxsl-network-connection/</guid><description>Msxsl.exe, a legitimate Windows utility, is being abused by adversaries to make network connections to non-local IPs for command and control or data exfiltration, potentially bypassing security measures.</description><content:encoded><![CDATA[<p>MsXsl.exe is a Windows utility designed to transform XML data using XSLT stylesheets. Adversaries are known to abuse this utility to execute malicious scripts, bypassing application control and other security measures. This behavior is often used as a defense evasion technique to download or execute malicious payloads. This activity has been observed since at least March 2020. The abuse of msxsl.exe allows attackers to establish command and control or exfiltrate sensitive data without being easily detected, as the tool is a signed Microsoft binary. This matters for defenders because it highlights the need to monitor legitimate system utilities for anomalous behavior, specifically network connections to external IP addresses.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through unspecified means.</li>
<li>The attacker leverages msxsl.exe to execute a malicious script.</li>
<li>Msxsl.exe initiates a network connection to an external IP address.</li>
<li>The script downloads a malicious payload from the external server.</li>
<li>The downloaded payload is executed on the compromised system.</li>
<li>The attacker establishes a command and control channel through the network connection.</li>
<li>The attacker performs data exfiltration via the established C2 channel.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised systems can be used for further malicious activities, including data theft, lateral movement, and deployment of additional malware. Successful exploitation can lead to sensitive data exfiltration, disruption of services, or complete system compromise. The low risk score does not represent impact, but instead reflects that the behavior is not always malicious, and may be a feature of normal software operation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon network connection logging to monitor msxsl.exe network activity.</li>
<li>Deploy the Sigma rule &ldquo;Network Connection via MsXsl&rdquo; to your SIEM and tune for your environment to detect suspicious network connections originating from msxsl.exe.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the destination IP address and the parent process of msxsl.exe.</li>
<li>Whitelist legitimate uses of msxsl.exe in your environment based on known good processes or applications to reduce false positives.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>command-and-control</category><category>windows</category><category>msxsl</category></item><item><title>Suspicious Registry Modifications by Scripting Engines</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-susp-reg-mod/</link><pubDate>Mon, 29 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-susp-reg-mod/</guid><description>The use of scripting engines like WScript and CScript to modify the Windows registry can indicate an attempt to bypass standard tools and evade defenses, potentially for persistence or other malicious activities.</description><content:encoded><![CDATA[<p>Attackers may leverage scripting engines, such as <code>wscript.exe</code> and <code>cscript.exe</code>, to directly modify the Windows Registry. These scripting engines are often abused for malicious purposes, including establishing persistence, escalating privileges, or disabling security controls. These scripting engines can modify the registry without using standard tools like <code>regedit.exe</code> or <code>reg.exe</code>, making it harder to detect malicious registry changes. Defenders should be aware of processes using these engines to modify the registry, as this behavior is uncommon in legitimate software installations or administrative tasks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system, potentially through social engineering or exploiting a software vulnerability.</li>
<li>The attacker executes a script (VBScript, JScript) via <code>wscript.exe</code> or <code>cscript.exe</code>.</li>
<li>The script contains commands to modify specific registry keys, such as the Run key for persistence (T1547.001).</li>
<li>The scripting engine process (e.g., <code>wscript.exe</code>) directly interacts with the Windows Registry to set the new values.</li>
<li>Upon system restart or user logon, the modified registry key triggers the execution of a malicious payload.</li>
<li>The attacker achieves persistence on the compromised system, allowing for continued access and control.</li>
<li>The attacker leverages the persistent access to perform lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to persistent access on compromised systems, enabling attackers to execute malicious code, steal sensitive information, or disrupt critical services. The registry modifications performed by scripting engines can bypass traditional security measures and make it difficult to detect and remediate the attack. This can result in significant data loss, financial damage, and reputational harm to affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Registry Tampering by Potentially Suspicious Processes&rdquo; to your SIEM to detect suspicious registry modifications made by scripting engines.</li>
<li>Investigate any alerts generated by the Sigma rule &ldquo;Registry Tampering by Potentially Suspicious Processes&rdquo; for unusual or unauthorized registry changes.</li>
<li>Monitor registry events for modifications made by processes such as <code>wscript.exe</code> and <code>cscript.exe</code> (logsource: registry_event).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>execution</category><category>registry-modification</category></item><item><title>Suspicious Managed Code Hosting Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-suspicious-managedcode-hosting/</link><pubDate>Mon, 29 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-suspicious-managedcode-hosting/</guid><description>This rule detects suspicious managed code hosting processes on Windows systems, potentially indicating code injection or defense evasion tactics by monitoring file events associated with processes commonly used to host managed code, such as wscript.exe, cscript.exe, and mshta.exe.</description><content:encoded><![CDATA[<p>This detection identifies suspicious managed code hosting processes on Windows systems. Attackers may leverage processes like <code>wscript.exe</code>, <code>cscript.exe</code>, <code>mshta.exe</code>, <code>wmic.exe</code>, <code>svchost.exe</code>, <code>dllhost.exe</code>, <code>cmstp.exe</code>, and <code>regsvr32.exe</code> to execute malicious code, often bypassing traditional security controls. These processes can be abused to load and execute .NET assemblies or other managed code components. The detection focuses on identifying unusual file creation events associated with these processes which could indicate an attacker is attempting to leverage these processes for malicious purposes. This activity might be indicative of code injection, defense evasion, or other suspicious code execution techniques. The rule uses EQL to search for file events associated with specific processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through a phishing email or compromised software.</li>
<li>The attacker uses a LOLBin such as <code>mshta.exe</code> or <code>regsvr32.exe</code> to bypass application control.</li>
<li>The LOLBin executes a malicious script or loads a malicious DLL from a user-writable location.</li>
<li>The malicious script or DLL performs reconnaissance activities, such as gathering system information or enumerating network resources.</li>
<li>The attacker then attempts to escalate privileges by exploiting a vulnerability or using stolen credentials.</li>
<li>The attacker uses the compromised process to download and execute additional malware.</li>
<li>The malware establishes persistence on the system through scheduled tasks or registry modifications.</li>
<li>The attacker performs lateral movement within the network, compromising additional systems and exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, allowing attackers to compromise systems, steal sensitive data, and establish persistence. The use of LOLBins can bypass application control, making detection more challenging. Depending on the scope of the attack, this could result in significant financial losses, reputational damage, and disruption of business operations. This is a high-severity finding due to the potential for attackers to gain full control over affected systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon file creation logging (Event ID 11) to collect the necessary data for this detection.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Managed Code Hosting Process&rdquo; to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by this rule, focusing on the file paths, process command lines, and parent processes involved.</li>
<li>Monitor for unexpected file creation events associated with processes like <code>wscript.exe</code>, <code>cscript.exe</code>, and <code>mshta.exe</code> in user-writable directories.</li>
<li>Implement application control policies to restrict the execution of LOLBins and other potentially malicious processes.</li>
<li>Correlate the detection with other security events to identify related malicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>managed code</category><category>lolbin</category></item><item><title>Program Files Directory Masquerading</title><link>https://feed.craftedsignal.io/briefs/2024-01-program-files-masquerading/</link><pubDate>Mon, 29 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-program-files-masquerading/</guid><description>Adversaries may masquerade malicious executables within directories mimicking the legitimate Windows Program Files directory to evade defenses and execute untrusted code.</description><content:encoded><![CDATA[<p>This detection identifies processes executing from directories that masquerade as the legitimate Windows Program Files directories. Attackers may create directories with similar names (e.g., &ldquo;C:\Program Files Bad&rdquo; or &ldquo;C:\Program Files(x86) Malicious&rdquo;) to host and execute malicious executables, bypassing security measures that trust the standard Program Files locations. This technique is particularly effective when combined with low-privilege accounts, as it allows attackers to evade detections that whitelist only the standard, trusted Program Files paths. The timeframe for this rule is the last 9 months. This matters to defenders because it highlights a common tactic used to bypass established trust relationships within the Windows operating system, requiring more granular inspection of process execution paths.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker creates a new directory that mimics the &ldquo;Program Files&rdquo; or &ldquo;Program Files (x86)&rdquo; directory (e.g., &ldquo;C:\Program Files Bad&rdquo;).</li>
<li>The attacker copies or downloads malicious executable files into the newly created masquerading directory.</li>
<li>The attacker executes the malicious executable from the masquerading directory.</li>
<li>The operating system loads the executable and begins its execution, potentially bypassing any allowlisting rules that only check the standard &ldquo;Program Files&rdquo; locations.</li>
<li>The malicious executable performs its intended actions, such as installing malware, establishing persistence, or exfiltrating data.</li>
<li>The attacker leverages the compromised system to move laterally within the network, repeating the masquerading technique on other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to malware infection, data theft, or complete system compromise. The impact is significant, as it undermines the trust placed in the &ldquo;Program Files&rdquo; directory and allows attackers to operate undetected for extended periods. While no specific victim counts are given, the technique is broadly applicable to any Windows environment, especially those relying on simple path-based allowlisting for security.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Program Files Directory Masquerading Detection</code> to your SIEM to detect suspicious process executions from masquerading directories.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to collect the necessary process execution data for the Sigma rule.</li>
<li>Regularly review and update allowlisting rules to include more specific criteria beyond just the &ldquo;Program Files&rdquo; directory, such as file hashes or digital signatures.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the parent processes and user accounts associated with the suspicious executions.</li>
<li>Monitor file creation events in the root directory to detect suspicious folders being created (file_event category)</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>masquerading</category><category>windows</category></item><item><title>Potential Remote Install via MsiExec</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-msiexec-remote-payload/</link><pubDate>Mon, 29 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-msiexec-remote-payload/</guid><description>This rule detects attempts to install a file from a remote server using MsiExec, which adversaries may abuse to deliver malware, by identifying msiexec.exe processes running with arguments indicative of remote installations and executed from suspicious parent processes.</description><content:encoded><![CDATA[<p>Adversaries may abuse Windows Installer (msiexec.exe) to perform remote installations of malicious payloads. This technique is used for initial access, defense evasion, and execution of arbitrary code. The detection rule identifies attempts to install a file from a remote server using MsiExec. The rule looks for msiexec.exe processes running with arguments such as <code>-i</code>, <code>/i</code>, <code>-p</code>, or <code>/p</code>, indicative of remote installations, and executed from suspicious parent processes like <code>sihost.exe</code>, <code>explorer.exe</code>, <code>cmd.exe</code>, <code>wscript.exe</code>, <code>mshta.exe</code>, <code>powershell.exe</code>, <code>wmiprvse.exe</code>, <code>pcalua.exe</code>, <code>forfiles.exe</code>, and <code>conhost.exe</code>. The rule includes exceptions to reduce false positives from legitimate software installations, specifically excluding command lines containing <code>--set-server</code>, <code>UPGRADEADD</code>, <code>--url</code>, <code>USESERVERCONFIG</code>, <code>RCTENTERPRISESERVER</code>, <code>app.ninjarmm.com</code>, <code>zoom.us/client</code>, <code>SUPPORTSERVERSTSURI</code>, <code>START_URL</code>, <code>AUTOCONFIG</code>, <code>awscli.amazonaws.com</code>, <code>*/i \&quot;C:*</code>, and <code>*/i C:\\*</code>. This technique can lead to complete system compromise and data exfiltration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access via an unspecified method (e.g., phishing, exploit).</li>
<li>The attacker uses a script or command-line interpreter (e.g., <code>cmd.exe</code>, <code>powershell.exe</code>) to initiate the <code>msiexec.exe</code> process.</li>
<li>The <code>msiexec.exe</code> process is launched with arguments that specify a remote MSI package (<code>-i</code>, <code>/i</code>, <code>-p</code>, <code>/p</code>) and enable silent installation (<code>/qn</code>, <code>-qn</code>, <code>-q</code>, <code>/q</code>, <code>/quiet</code>).</li>
<li>The <code>msiexec.exe</code> process downloads the MSI package from a remote server over HTTP or HTTPS.</li>
<li><code>msiexec.exe</code> executes the downloaded MSI package, which may contain malicious payloads.</li>
<li>The malicious payload executes, potentially performing actions such as installing malware, establishing persistence, or escalating privileges.</li>
<li>The attacker gains control over the compromised system.</li>
<li>The attacker performs further actions, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, allowing attackers to install malware, steal sensitive data, or disrupt system operations. A compromised system can be used as a pivot point to access other systems on the network. The impact can range from data breaches and financial losses to reputational damage and disruption of critical services. The number of potential victims depends on the scope of the initial access and the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect suspicious MsiExec invocations with remote payloads.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to ensure the required data is available for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the parent process, command-line arguments, and network connections associated with the <code>msiexec.exe</code> process.</li>
<li>Monitor process execution events for child processes spawned by <code>msiexec.exe</code> for anomalous activity.</li>
<li>Implement application control policies to restrict the execution of <code>msiexec.exe</code> to authorized users and processes only.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>msiexec</category><category>remote-install</category></item><item><title>AMSI Enable Registry Key Modification for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-amsi-registry-disable/</link><pubDate>Sat, 27 Jan 2024 18:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-amsi-registry-disable/</guid><description>Adversaries modify the AmsiEnable registry key to 0 to disable Windows Script AMSI scanning, bypassing AMSI protections for Windows Script Host or JScript execution.</description><content:encoded><![CDATA[<p>Attackers can disable the Antimalware Scan Interface (AMSI) to evade detection by modifying the <code>AmsiEnable</code> registry key. This technique is commonly employed to execute malicious scripts without triggering security warnings or blocks. The AMSI, a Windows feature, allows applications and services to request the scanning of potentially malicious content (e.g., PowerShell scripts, JScript) before execution. By setting the <code>AmsiEnable</code> value to 0, an attacker can disable AMSI for the current user, effectively bypassing real-time script scanning. This action is often a precursor to deploying further malicious payloads or establishing persistence on a compromised system. This behavior has been observed since at least 2019 and continues to be a relevant defense evasion technique.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system, possibly through phishing or exploiting a vulnerability.</li>
<li>The attacker executes a script or binary that attempts to modify the <code>AmsiEnable</code> registry key.</li>
<li>The script or binary uses <code>reg.exe</code>, PowerShell, or another tool to set the <code>AmsiEnable</code> registry value to 0. The registry key location is typically <code>HKEY_USERS\&lt;SID&gt;\Software\Microsoft\Windows Script\Settings\AmsiEnable</code>.</li>
<li>After successfully disabling AMSI, the attacker proceeds to execute malicious scripts or code. These scripts may use <code>powershell.exe</code>, <code>wscript.exe</code>, or <code>cscript.exe</code>.</li>
<li>The malicious scripts download and execute additional payloads, such as malware or remote access tools (RATs).</li>
<li>The attacker performs lateral movement within the network using the compromised system as a pivot.</li>
<li>The attacker attempts to establish persistence, ensuring continued access to the system even after reboots.</li>
<li>The attacker exfiltrates sensitive data or deploys ransomware to achieve their objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the <code>AmsiEnable</code> registry key allows attackers to execute malicious scripts without triggering AMSI alerts, leading to potential malware infections, data breaches, and system compromise. Disabling AMSI significantly reduces the effectiveness of endpoint security solutions, making the system more vulnerable to attack. The impact can range from individual workstation compromise to widespread network infections, depending on the attacker&rsquo;s objectives and the organization&rsquo;s security posture.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect AmsiEnable Registry Modification via Registry Events</code> to your SIEM to detect modifications to the <code>AmsiEnable</code> registry key.</li>
<li>Enable Sysmon registry event logging to provide the necessary data for the Sigma rule to function.</li>
<li>Monitor process creation events for processes modifying registry keys, especially <code>reg.exe</code> and PowerShell, using the rule <code>Detect AmsiEnable Registry Modification via Process Creation</code>.</li>
<li>Investigate any alerts generated by these rules promptly to determine if the activity is malicious or legitimate.</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted scripts and binaries.</li>
<li>Harden systems by restricting user permissions to modify critical registry keys.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>amsi</category><category>registry</category><category>windows</category></item><item><title>Suspicious Alternate Data Stream (ADS) File Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-ads-file-creation/</link><pubDate>Fri, 26 Jan 2024 18:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ads-file-creation/</guid><description>Detects suspicious creation of Alternate Data Streams (ADS) on targeted files using script or command interpreters, indicative of malware hiding in ADS for defense evasion.</description><content:encoded><![CDATA[<p>This detection focuses on identifying the creation of Alternate Data Streams (ADS) on Windows systems, a technique often employed by adversaries to conceal malicious code or data within seemingly benign files. Attackers leverage scripting engines and command interpreters to write ADS to various file types, including executables, documents, and media files. This activity is uncommon in legitimate workflows, making it a valuable indicator of potential compromise. The rule is designed to trigger on file creation events where the process creating the file is a known script or command interpreter (cmd.exe, powershell.exe, etc.) and the target file has a suspicious extension. The detection excludes common legitimate ADS usage patterns. This technique is used for defense evasion, allowing malware to persist without being easily detected by traditional security measures.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker uses a command interpreter (cmd.exe, powershell.exe, etc.) or scripting engine (wscript.exe, cscript.exe) to execute malicious code.</li>
<li>The malicious code creates an Alternate Data Stream (ADS) on a targeted file (e.g., an executable, document, or image). The targeted file&rsquo;s extension could be pdf, dll, exe, dat, etc.</li>
<li>The attacker hides malicious code or data within the ADS, making it less visible to standard file system scans and security tools. The ADS is written to a file path using the <code>C:\\*:\*</code> syntax.</li>
<li>The attacker may rename or clean up any staging files to further conceal their activity.</li>
<li>The attacker can then execute the hidden code within the ADS, or use the ADS to store configuration data for later use.</li>
<li>The attacker maintains persistence by using the ADS to store and execute malicious code, bypassing typical file-based security measures.</li>
<li>The ultimate goal is to maintain unauthorized access to the system, potentially leading to data exfiltration, lateral movement, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to hide malicious code within legitimate files, evading detection by traditional security measures. This can lead to prolonged persistence on compromised systems, enabling data theft, ransomware deployment, or other malicious activities. While the specific number of victims is unknown, this technique is broadly applicable across Windows environments, potentially affecting a wide range of organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Suspicious ADS File Creation via Cmd</code> to detect ADS creation events initiated by cmd.exe.</li>
<li>Deploy the Sigma rule <code>Suspicious ADS File Creation via PowerShell</code> to detect ADS creation events initiated by powershell.exe.</li>
<li>Enable Sysmon Event ID 15 (FileCreateStreamHash) to provide detailed information about ADS creation events, as referenced in the rule&rsquo;s setup instructions.</li>
<li>Investigate any alerts generated by these rules, focusing on the file paths, creating processes, and command-line arguments involved, as detailed in the rule&rsquo;s triage and analysis notes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>ads</category><category>file-creation</category><category>windows</category></item><item><title>Unusual Network Connection via RunDLL32</title><link>https://feed.craftedsignal.io/briefs/2024-01-rundll32-network-connection/</link><pubDate>Fri, 26 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rundll32-network-connection/</guid><description>The rule detects unusual outbound network connections made by rundll32.exe, specifically when executed with minimal arguments, which may indicate command and control activity or defense evasion tactics on Windows systems.</description><content:encoded><![CDATA[<p>Attackers often abuse the <code>rundll32.exe</code> utility to execute malicious Dynamic Link Libraries (DLLs), blending their activity with legitimate system operations. This detection identifies instances where <code>rundll32.exe</code> establishes outbound network connections, particularly when executed without command-line arguments. Such behavior deviates from typical usage and may indicate command and control (C2) activity or other malicious actions. The rule is designed to detect command and control activity where adversaries are using <code>rundll32.exe</code> without arguments to make external network connections. The rule uses data from Elastic Defend, Sysmon, and SentinelOne to detect this behavior. The rule specifically excludes connections to well-known private and reserved IP ranges to reduce false positives.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, possibly through phishing or exploiting a software vulnerability.</li>
<li>The attacker attempts to execute a malicious DLL using <code>rundll32.exe</code> without specifying arguments, which is an anomaly.</li>
<li><code>rundll32.exe</code> is invoked with a command line resembling: <code>rundll32.exe &lt;path_to_dll&gt;</code>.</li>
<li>The malicious DLL initiates an outbound network connection to an external IP address.</li>
<li>The network connection attempts to bypass firewall rules by masquerading as a legitimate system process.</li>
<li>The attacker uses this connection to establish a command and control channel.</li>
<li>Data exfiltration or further exploitation activities occur over the established C2 channel.</li>
<li>The attacker achieves their final objective, such as data theft, ransomware deployment, or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to establish command and control channels on compromised systems, leading to potential data exfiltration, lateral movement within the network, and deployment of ransomware. This can result in significant financial losses, reputational damage, and disruption of business operations. The impact is broad, affecting any Windows environment where <code>rundll32.exe</code> is used.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Unusual Network Connection via RunDLL32</code> to your SIEM and tune for your environment to detect unusual network connections made by <code>rundll32.exe</code>.</li>
<li>Enable Sysmon process creation and network connection logging to capture necessary events for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the parent processes of <code>rundll32.exe</code> and the destination IP addresses of the network connections.</li>
<li>Review and harden firewall rules to prevent unauthorized outbound connections from system processes like <code>rundll32.exe</code>.</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted DLLs via <code>rundll32.exe</code>.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>command-and-control</category><category>windows</category></item><item><title>Google Workspace Suspicious Login Activity</title><link>https://feed.craftedsignal.io/briefs/2024-01-26-gworkspace-suspicious-login/</link><pubDate>Fri, 26 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-26-gworkspace-suspicious-login/</guid><description>Detect Google Workspace login activity that Google has classified as suspicious, potentially indicating initial access, privilege escalation, defense evasion, or persistence attempts.</description><content:encoded><![CDATA[<p>This brief focuses on detecting suspicious login activity within Google Workspace environments, as flagged by Google&rsquo;s internal risk assessment mechanisms. Google Workspace logs login events and classifies them based on various risk factors, including the use of less secure applications, programmatic logins, and other anomalies. This detection capability is crucial for identifying potential compromises, unauthorized access attempts, and malicious activities within the Google Workspace ecosystem. Analyzing these flagged events allows security teams to proactively respond to threats before they escalate, preventing data breaches and maintaining the integrity of sensitive information. This alert focuses on logins classified as &lsquo;suspicious_login_less_secure_app&rsquo;, &lsquo;suspicious_login&rsquo;, and &lsquo;suspicious_programmatic_login&rsquo;.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access using compromised credentials or brute-force techniques targeting Google Workspace accounts.</li>
<li><strong>Login Attempt:</strong> The attacker attempts to log in to a Google Workspace account using a less secure application (e.g., an older email client without modern authentication) or via programmatic login.</li>
<li><strong>Suspicious Activity Detection:</strong> Google&rsquo;s internal systems analyze the login attempt and flag it as suspicious based on various risk factors, such as unusual location, time of day, or login method.</li>
<li><strong>Event Logging:</strong> Google Workspace logs the suspicious login event, including the reason for the classification (e.g., &lsquo;suspicious_login_less_secure_app&rsquo;).</li>
<li><strong>Potential Privilege Escalation:</strong> Upon successful login, the attacker may attempt to escalate privileges within the Google Workspace environment to gain broader access.</li>
<li><strong>Defense Evasion:</strong> The attacker might use techniques to evade detection, such as disabling security features or modifying audit logs.</li>
<li><strong>Persistence:</strong> The attacker establishes persistence by creating new accounts, modifying existing ones, or installing malicious apps.</li>
<li><strong>Data Exfiltration/Malicious Activity:</strong> The attacker uses the compromised account to exfiltrate sensitive data or perform other malicious activities, such as sending phishing emails.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data stored within Google Workspace, including emails, documents, and other files. This can result in data breaches, financial loss, and reputational damage. The number of affected users depends on the scope of the compromised account and the attacker&rsquo;s ability to escalate privileges. Targeted sectors are broad, affecting any organization relying on Google Workspace for collaboration and data storage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect suspicious login activity classified by Google Workspace (logsource: <code>gcp</code>, service: <code>google_workspace.login</code>).</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the login attempt and take appropriate action, such as resetting passwords or disabling compromised accounts.</li>
<li>Enforce multi-factor authentication (MFA) for all Google Workspace accounts to mitigate the risk of credential compromise.</li>
<li>Disable or restrict the use of less secure apps within Google Workspace to reduce the attack surface.</li>
<li>Monitor Google Workspace audit logs for other suspicious activities, such as unusual file access or data exfiltration attempts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>initial-access</category><category>privilege-escalation</category><category>defense-evasion</category><category>persistence</category><category>gworkspace</category></item><item><title>Suspicious Microsoft Diagnostics Wizard Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-25-msdt-abuse/</link><pubDate>Thu, 25 Jan 2024 14:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-25-msdt-abuse/</guid><description>This rule detects potential abuse of the Microsoft Diagnostics Troubleshooting Wizard (MSDT) to proxy malicious command or binary execution via malicious process arguments on Windows systems.</description><content:encoded><![CDATA[<p>The Microsoft Diagnostics Troubleshooting Wizard (MSDT) is a built-in Windows tool used for troubleshooting various system issues. Attackers can abuse MSDT to proxy malicious command or binary execution through carefully crafted process arguments, evading traditional defense mechanisms. This technique leverages the trust associated with a signed Microsoft binary (msdt.exe) to execute arbitrary commands. The detection rule identifies suspicious MSDT executions based on command-line arguments, filename discrepancies, and unusual process relationships. This activity has been observed since at least May 2022 and continues to be a relevant defense evasion technique. Defenders should monitor for unusual invocations of MSDT, especially when launched from untrusted sources or with suspicious arguments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access via an unspecified vector (e.g., phishing, drive-by download).</li>
<li>The attacker uses a malicious document or script to invoke <code>msdt.exe</code> with specific arguments.</li>
<li>MSDT is executed with a crafted <code>IT_RebrowseForFile</code> or <code>IT_BrowseForFile</code> parameter containing a malicious payload.</li>
<li>Alternatively, MSDT is executed with <code>-af /skip</code> and a path to a malicious <code>PCWDiagnostic.xml</code> file.</li>
<li>MSDT processes the malicious input, leading to the execution of attacker-controlled code.</li>
<li>The attacker&rsquo;s code executes, potentially downloading or executing further payloads.</li>
<li>The attacker achieves persistence by modifying registry keys or creating scheduled tasks.</li>
<li>The attacker moves laterally through the network, compromising additional systems and data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass security controls and execute arbitrary code on compromised systems. This can lead to data theft, system compromise, and further propagation of the attack within the network. The defense evasion tactic can obscure malicious activities, making it more difficult to detect and respond to incidents. Depending on the user&rsquo;s privileges, the attacker might gain elevated privileges on the system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rules to detect suspicious MSDT executions based on process arguments, filename discrepancies, and unusual parent-child relationships.</li>
<li>Monitor process creation events for <code>msdt.exe</code> with arguments containing <code>IT_RebrowseForFile=*</code>, <code>*FromBase64*</code>, or <code>*/../../../*</code> using the provided Sigma rule.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture the necessary process execution details for the provided Sigma rules.</li>
<li>Investigate any alerts generated by these rules, focusing on the process command line, parent process, and any spawned child processes.</li>
<li>Block execution of <code>msdt.exe</code> from non-standard paths as highlighted in the detection rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>defense-evasion</category><category>msdt</category><category>windows</category></item><item><title>Unusual Executable File Creation by a System Critical Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-25-unusual-executable-file-creation/</link><pubDate>Thu, 25 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-25-unusual-executable-file-creation/</guid><description>The rule identifies unexpected executable file creation or modification by critical Windows processes, potentially indicating remote code execution or exploitation attempts.</description><content:encoded><![CDATA[<p>This detection rule identifies anomalous creation or modification of executable files by critical Windows system processes, like <code>smss.exe</code>, <code>csrss.exe</code>, and <code>lsass.exe</code>. Attackers may attempt to leverage these processes to evade detection, and the rule is designed to detect such activities. The rule leverages data from Elastic Defend, Microsoft Defender XDR, SentinelOne, CrowdStrike, and Sysmon. It provides investigation steps to help analysts triage and analyze potential incidents, focusing on the identity of the writing process, its lineage, and the characteristics of the written file. This rule is designed to detect potential remote code execution or other forms of exploitation targeting Windows systems. The rule logic excludes specific legitimate file paths to minimize false positives.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through methods such as phishing or exploiting a vulnerability.</li>
<li>The attacker executes code on the system.</li>
<li>The attacker attempts to escalate privileges.</li>
<li>The attacker leverages a system critical process to create or modify an executable file.</li>
<li>The created/modified file may be a backdoor, malware component, or a tool for further exploitation.</li>
<li>The attacker uses the created executable to establish persistence.</li>
<li>The attacker uses the newly created executable to perform lateral movement.</li>
<li>The attacker achieves their objective, such as data exfiltration or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution with elevated privileges. The number of victims is dependent on the scope of the initial compromise. The targeted sectors include any organization running vulnerable Windows systems. If the attack succeeds, the adversary can gain full control over the system, leading to data theft, system disruption, or further propagation of malware.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Unusual Executable File Creation by a System Critical Process&rdquo; detection rule to your SIEM and tune for your environment.</li>
<li>Enable Sysmon file creation logging (Event ID 11) to enhance detection capabilities (see setup instructions in the rule source).</li>
<li>Investigate any alerts generated by this rule, paying close attention to the writing process&rsquo;s identity, lineage, and the characteristics of the written file as detailed in the rule&rsquo;s triage and analysis section.</li>
<li>Correlate alerts from this rule with other endpoint and network activity to identify the scope of the potential compromise.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>windows</category></item><item><title>Executable File Creation with Multiple Extensions</title><link>https://feed.craftedsignal.io/briefs/2024-01-executable-file-creation-multiple-extensions/</link><pubDate>Wed, 24 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-executable-file-creation-multiple-extensions/</guid><description>Detection of executable files created with multiple extensions, a masquerading technique to evade defenses.</description><content:encoded><![CDATA[<p>Adversaries may use masquerading techniques to evade defenses and blend into the environment by manipulating the name or location of a file, tricking users into executing malicious code disguised as a benign file type. This rule detects the creation of executable files with multiple extensions, a common method of masquerading. The rule focuses on identifying suspicious file creations that use misleading extensions, specifically targeting files with an &ldquo;.exe&rdquo; extension preceded by common benign extensions. It excludes known legitimate processes to minimize false positives. This activity is relevant for defenders to identify potential threats where adversaries attempt to bypass security measures by disguising malicious files.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious executable file with a double extension (e.g., &ldquo;document.pdf.exe&rdquo;).</li>
<li>The attacker delivers the malicious file to the target system via phishing or other means.</li>
<li>The user downloads or receives the file and attempts to open it.</li>
<li>Windows displays the file with the first extension (&ldquo;document.pdf&rdquo;) by default, misleading the user.</li>
<li>Upon execution, Windows recognizes the &ldquo;.exe&rdquo; extension and executes the file.</li>
<li>The malicious executable runs, potentially deploying malware or performing other unauthorized actions.</li>
<li>The malware establishes persistence or attempts lateral movement within the network.</li>
<li>The attacker achieves their objective, such as data theft or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to malware infection, data breaches, and system compromise. This technique bypasses common file type restrictions and user awareness, potentially affecting a wide range of users and systems. While the number of victims is not specified, the impact can be significant, particularly in organizations where users handle sensitive data. The affected sectors are broad, encompassing any organization where users are susceptible to social engineering attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Executable File Creation with Multiple Extensions&rdquo; to your SIEM and tune for your environment to detect the creation of suspicious files with multiple extensions.</li>
<li>Enable Sysmon Event ID 11 (File Create) for comprehensive file creation monitoring to improve the effectiveness of the detection rule.</li>
<li>Implement enhanced monitoring and logging for similar file creation activities to improve detection and response capabilities.</li>
<li>Educate users on the risks associated with double file extensions and encourage caution when opening attachments from unknown sources.</li>
<li>Review and whitelist legitimate software installations that may create executables with multiple extensions to reduce false positives, as described in the rule&rsquo;s triage notes.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>masquerading</category><category>windows</category></item><item><title>Potential Process Injection via PowerShell</title><link>https://feed.craftedsignal.io/briefs/2024-01-24-posh-process-injection/</link><pubDate>Wed, 24 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-24-posh-process-injection/</guid><description>This detection identifies PowerShell scripts leveraging Win32 APIs for memory allocation, process access, and thread creation, indicative of potential process injection or in-memory payload execution on Windows systems.</description><content:encoded><![CDATA[<p>This detection focuses on identifying PowerShell scripts that combine specific Win32 API calls, often used in process injection and in-memory payload execution techniques. Attackers use PowerShell, a ubiquitous scripting language in Windows environments, to inject malicious code into other processes, bypassing traditional security controls. The rule specifically targets API combinations related to memory allocation (VirtualAlloc, VirtualAllocEx), memory protection (VirtualProtect), process access (OpenProcess), dynamic library loading (LdrLoadDll, LoadLibrary), and thread manipulation (CreateRemoteThread, NtCreateThreadEx). The rule excludes script activity originating from within Microsoft Defender Advanced Threat Protection directories, reducing false positives. This technique is valuable to attackers seeking to evade detection and execute malicious code stealthily. The detection logic is based on observing specific API combinations, commonly seen in tools like Empire.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, possibly through phishing or exploiting a vulnerability.</li>
<li>The attacker uses PowerShell to execute a malicious script.</li>
<li>The PowerShell script uses <code>OpenProcess</code> to gain access to a target process.</li>
<li>The script then uses <code>VirtualAllocEx</code> to allocate memory within the target process.</li>
<li><code>WriteProcessMemory</code> is used to write malicious code into the allocated memory.</li>
<li>The script uses <code>CreateRemoteThread</code> or <code>NtCreateThreadEx</code> to create a new thread within the target process, pointing to the injected code.</li>
<li>The injected code executes within the context of the target process.</li>
<li>The attacker achieves their objective, such as credential dumping or establishing persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful process injection allows attackers to execute arbitrary code within the context of another process, often a legitimate one. This can lead to credential theft, privilege escalation, data exfiltration, or the deployment of ransomware. The impact is significant, as it allows attackers to bypass security controls and operate stealthily. While the number of victims is unknown, the widespread use of PowerShell makes this a potentially widespread threat. Successful attacks can compromise sensitive data, disrupt business operations, and damage an organization&rsquo;s reputation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging to capture the necessary events (4104) for this detection to function as described in the setup instructions <a href="https://ela.st/powershell-logging-setup">https://ela.st/powershell-logging-setup</a>.</li>
<li>Deploy the provided Sigma rules to your SIEM to detect suspicious PowerShell scripts indicative of process injection. Tune the rules based on your environment&rsquo;s baseline activity.</li>
<li>Investigate any alerts generated by these rules, focusing on the reconstructed script content, target process, and execution context. Refer to the investigation guide section for triage steps.</li>
<li>Implement application control policies to restrict the execution of unauthorized PowerShell scripts.</li>
<li>Monitor PowerShell execution for suspicious API calls related to process injection, as described in the rule&rsquo;s <code>query</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>process injection</category><category>powershell</category><category>defense evasion</category></item><item><title>Windows Defender Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-defender-registry-disable/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-defender-registry-disable/</guid><description>Attackers modify the Windows Defender registry settings to disable the service or set the service to be started manually, evading defenses.</description><content:encoded><![CDATA[<p>Attackers commonly disable Windows Defender to evade detection and facilitate malicious activities. This involves modifying specific registry settings to either disable the service entirely or prevent it from starting automatically. The rule specifically identifies modifications to the <code>DisableAntiSpyware</code> and <code>WinDefend\\Start</code> registry keys. The DFIR Report has documented this technique in real-world incidents, highlighting its effectiveness in bypassing built-in security measures. This allows threat actors to operate with reduced risk of detection, enabling them to deploy malware, exfiltrate data, or perform other malicious actions without immediate interference from the endpoint security solution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system, potentially through phishing or exploiting a software vulnerability.</li>
<li>The attacker elevates privileges to obtain the necessary permissions to modify the registry.</li>
<li>The attacker modifies the <code>HKLM\\SOFTWARE\\Policies\\Microsoft\\Windows Defender\\DisableAntiSpyware</code> registry key to disable Windows Defender, setting its value to &ldquo;1&rdquo; or &ldquo;0x00000001&rdquo;.</li>
<li>Alternatively, the attacker modifies the <code>HKLM\\System\\*ControlSet*\\Services\\WinDefend\\Start</code> registry key to prevent the Windows Defender service from starting automatically. The attacker sets the value to &ldquo;3&rdquo; or &ldquo;4&rdquo; (or their hexadecimal equivalents &ldquo;0x00000003&rdquo;, &ldquo;0x00000004&rdquo;).</li>
<li>The attacker verifies that Windows Defender is disabled by checking the Security Center or attempting to run a scan.</li>
<li>With Windows Defender disabled, the attacker proceeds to deploy malware or execute malicious commands without interference from the antivirus software.</li>
<li>The attacker may further disable security settings and block security-related indicators.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>If successful, this attack can lead to a complete compromise of the affected system. With Windows Defender disabled, the system becomes vulnerable to malware infections, data exfiltration, and other malicious activities. This can result in financial losses, data breaches, and reputational damage for the targeted organization. The lack of immediate detection allows attackers to establish persistence and expand their foothold within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Registry Modification to Disable Windows Defender&rdquo; to your SIEM and tune for your environment to detect unauthorized changes to Windows Defender registry settings.</li>
<li>Monitor registry events for changes to the <code>HKLM\\SOFTWARE\\Policies\\Microsoft\\Windows Defender\\DisableAntiSpyware</code> and <code>HKLM\\System\\*ControlSet*\\Services\\WinDefend\\Start</code> registry keys using the provided log sources.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the process and user account responsible for the registry modifications.</li>
<li>Enable Sysmon registry event logging to capture the necessary data for the Sigma rule to function effectively.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>registry modification</category></item><item><title>Unusual Process Spawned by a Parent Process via Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-process-spawn/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-process-spawn/</guid><description>A machine learning job detected a suspicious Windows process, predicted malicious by the ProblemChild model and flagged as an unusual child process name for its parent, potentially indicating LOLbins usage and evading traditional detection.</description><content:encoded><![CDATA[<p>This alert originates from an Elastic machine learning job named <code>problem_child_rare_process_by_parent_ea</code> designed to detect Living off the Land (LotL) attacks on Windows systems. The model identifies processes spawned by parent processes that are statistically rare and have a high probability of being malicious based on the &ldquo;ProblemChild&rdquo; supervised learning model. This approach aims to uncover malicious activities that utilize legitimate system binaries (LOLbins) for nefarious purposes, effectively bypassing traditional signature-based detections. The alert relies on Windows process events collected by Elastic Defend or Winlogbeat with the LotL Attack Detection integration. This detection method becomes particularly important as attackers increasingly rely on existing tools to blend in with normal system activity and avoid raising suspicion.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access via unspecified means (e.g., phishing, compromised credentials).</li>
<li>Attacker leverages a legitimate system binary (LOLbin) such as <code>powershell.exe</code> or <code>cmd.exe</code>.</li>
<li>The LOLbin is used to execute a malicious payload or script.</li>
<li>The malicious process is spawned as a child process of the LOLbin.</li>
<li>Elastic&rsquo;s machine learning model identifies the child process as rare and potentially malicious based on its parent-child relationship and other features.</li>
<li>The rare process executes malicious commands, possibly downloading further payloads.</li>
<li>The attacker achieves their objective, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack utilizing LOLbins can lead to significant compromise, including data theft, system disruption, and further propagation within the network. The reliance on trusted system binaries makes these attacks difficult to detect with traditional methods, potentially allowing attackers to operate undetected for extended periods. The impact is directly correlated to the privileges of the initial compromised account and the effectiveness of lateral movement techniques employed by the attacker.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure that the Living off the Land (LotL) Attack Detection integration is installed and configured correctly, along with either Elastic Defend or Winlogbeat, as described in the rule&rsquo;s <code>setup</code> section.</li>
<li>Review the parent and child process names identified in the alert to determine if they are legitimate applications or associated with LOLbins, as detailed in the investigation guide within the rule&rsquo;s <code>note</code> section.</li>
<li>Investigate the command-line arguments used by the suspicious process for potentially malicious commands or scripts as described in the rule <code>note</code> section.</li>
<li>Tune the <code>anomaly_threshold</code> setting in the machine learning job configuration based on your environment&rsquo;s baseline activity to reduce false positives, as described in the rule documentation.</li>
<li>Implement exceptions for legitimate administrative tools and software updates to reduce false positives, as mentioned in the rule&rsquo;s <code>note</code> section.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>lolbins</category><category>windows</category><category>machine-learning</category></item><item><title>Uncommon Svchost Command Line Parameters Indicate Potential Masquerading or Injection</title><link>https://feed.craftedsignal.io/briefs/2024-01-23-svchost-uncommon-params/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-23-svchost-uncommon-params/</guid><description>Detection of svchost.exe executing with uncommon command-line parameters, excluding known legitimate patterns, which may indicate file masquerading, process injection, or process hollowing.</description><content:encoded><![CDATA[<p>Svchost.exe (Service Host) is a critical Windows process responsible for hosting various Windows services. Attackers frequently target svchost.exe to disguise malicious activity, using techniques like process injection or file masquerading. By injecting malicious code into a legitimate svchost.exe process or creating a fake svchost.exe executable, attackers can evade detection and escalate privileges. This can be done by spawning the process with unusual arguments to trick the OS or a user. Detecting these anomalies is crucial for identifying potentially compromised systems. The attacks documented leveraging this technique started to gain prominence around 2018 and are still relevant in 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker uploads a malicious executable or script to the compromised system.</li>
<li>The attacker injects malicious code into a legitimate svchost.exe process. Alternatively, the attacker may copy the svchost.exe executable and rename it, placing it in a different directory.</li>
<li>The injected code or masqueraded executable executes with unusual command-line arguments, deviating from the standard &ldquo;-k <servicegroup>&rdquo; parameter.</li>
<li>The malicious svchost process performs unauthorized actions, such as establishing network connections, modifying files, or creating new processes.</li>
<li>The attacker leverages the elevated privileges of the svchost process to further compromise the system.</li>
<li>The attacker attempts to maintain persistence by modifying registry keys or scheduling tasks.</li>
<li>The ultimate goal is data exfiltration, lateral movement, or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised svchost.exe processes can lead to significant system instability and data breaches. Attackers may leverage these processes to gain complete control over affected systems, potentially impacting hundreds or thousands of machines in a network. The consequences can include data theft, financial losses, and reputational damage. Ransomware groups, such as BlackByte/Exbyte, and APT groups, like APT41, have been observed using similar techniques to evade detection and achieve their objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Uncommon Svchost Command Line Parameter&rdquo; to your SIEM to detect anomalous svchost.exe processes based on command-line arguments.</li>
<li>Investigate any alerts triggered by the Sigma rule to determine if they are indicative of malicious activity.</li>
<li>Enable process creation logging, specifically capturing command-line arguments, to provide the necessary data for detection.</li>
<li>Implement application control policies to restrict the execution of unauthorized executables, including masqueraded svchost.exe instances.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>privilege-escalation</category><category>process-injection</category></item><item><title>Renamed Automation Script Interpreter</title><link>https://feed.craftedsignal.io/briefs/2024-01-renamed-autoit/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-renamed-autoit/</guid><description>Detects the renaming of automation script interpreter processes like AutoIt, AutoHotkey, and KIX32, a tactic used by malware operators to evade detection by obscuring the true nature of the executable.</description><content:encoded><![CDATA[<p>Malware operators often rename legitimate system and scripting tools to blend in with normal system processes and bypass security measures. This rule specifically detects instances where automation script interpreters like AutoIt, AutoHotkey, and KIX32 have been renamed. By comparing the process name against the original file name embedded in the executable, this detection identifies potential attempts to masquerade malicious scripts as legitimate software. This technique is employed to bypass application whitelisting and other security controls that rely on file names or process names for identification and authorization. This detection is relevant for any Windows environment where these scripting tools are used, as it can highlight potentially malicious activity masked by a common evasion technique.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system, often through phishing or exploiting a software vulnerability.</li>
<li>The attacker uploads or drops a malicious script (e.g., AutoIt, AutoHotkey, or KIX32 script) onto the target machine.</li>
<li>The attacker renames the legitimate AutoIt, AutoHotkey, or KIX32 interpreter executable to a non-standard name (e.g., &ldquo;svchost.exe&rdquo; or &ldquo;wininit.exe&rdquo;) to masquerade as a legitimate process.</li>
<li>The attacker executes the renamed interpreter, which in turn executes the malicious script.</li>
<li>The script performs malicious actions, such as downloading additional malware, modifying system settings, or establishing persistence.</li>
<li>The attacker uses the compromised system for lateral movement within the network or for data exfiltration.</li>
<li>The attacker attempts to maintain persistence on the system to ensure continued access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful renaming of script interpreters allows attackers to execute malicious scripts undetected, potentially leading to data theft, system compromise, or further propagation within the network. The impact can range from minor disruption to significant financial loss and reputational damage, depending on the attacker&rsquo;s objectives and the sensitivity of the compromised data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Renamed AutoIt Interpreter&rdquo; to your SIEM to detect when AutoIt executables are renamed, focusing on <code>process.pe.original_file_name</code> and <code>process.name</code>.</li>
<li>Deploy the Sigma rule &ldquo;Renamed AutoHotkey Interpreter&rdquo; to your SIEM to detect when AutoHotkey executables are renamed, focusing on <code>process.pe.original_file_name</code> and <code>process.name</code>.</li>
<li>Enable Sysmon process creation logging to capture the necessary process metadata, as referenced in the rule <code>logsource</code>.</li>
<li>Investigate any alerts generated by these rules to determine the legitimacy of the renamed executable and its associated activity as described in the <code>note</code> section.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>masquerading</category><category>autoit</category><category>autohotkey</category><category>kix32</category><category>windows</category></item><item><title>AWS KMS Key Policy Updated via PutKeyPolicy</title><link>https://feed.craftedsignal.io/briefs/2024-01-aws-kms-key-policy-put/</link><pubDate>Mon, 22 Jan 2024 18:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-aws-kms-key-policy-put/</guid><description>Detection of successful PutKeyPolicy calls on AWS KMS keys to identify potential privilege escalation or unauthorized access by adversaries modifying key policies to decrypt or exfiltrate data.</description><content:encoded><![CDATA[<p>This rule detects the successful execution of the <code>PutKeyPolicy</code> API call within Amazon Web Services Key Management Service (AWS KMS). The <code>PutKeyPolicy</code> action replaces the entire key policy associated with a KMS key, potentially granting new or expanded permissions to principals. An adversary who gains the ability to modify KMS key policies (<code>kms:PutKeyPolicy</code>) can escalate privileges by adding external accounts or roles, allowing them to decrypt data protected by the key or maintain persistent access even after credential rotation. This activity is crucial to monitor, as it can lead to significant data breaches and unauthorized access to sensitive information. The rule focuses on identifying deviations from expected KMS key policy management practices to detect potentially malicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises an AWS account or obtains IAM credentials with sufficient permissions, including <code>kms:PutKeyPolicy</code> on a target KMS key.</li>
<li>The attacker uses the compromised credentials to call the <code>PutKeyPolicy</code> API, replacing the existing key policy with a modified version.</li>
<li>The modified key policy grants the attacker&rsquo;s AWS account, or an external account, permissions to perform cryptographic operations on the key, such as <code>kms:Decrypt</code> or <code>kms:GenerateDataKey</code>.</li>
<li>The attacker utilizes the newly granted permissions to decrypt data encrypted with the KMS key, such as data stored in S3 buckets or EBS volumes.</li>
<li>The attacker may also grant administrative actions to new identities.</li>
<li>The attacker exfiltrates the decrypted data to an external location.</li>
<li>The attacker attempts to cover their tracks by deleting CloudTrail logs or modifying other security configurations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data encrypted with the KMS key, potentially resulting in data breaches, financial loss, and reputational damage. The severity depends on the sensitivity of the data protected by the key and the scope of access granted to the attacker. This can impact organizations across various sectors that rely on AWS KMS for data encryption, potentially affecting millions of records and causing significant operational disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;AWS KMS Key Policy Updated via PutKeyPolicy&rdquo; to your SIEM and tune for your environment to detect unauthorized modifications to KMS key policies.</li>
<li>Review the policy document diff in <code>aws.cloudtrail.request_parameters</code> and <code>aws.cloudtrail.response_elements</code> to identify unauthorized changes to principals.</li>
<li>Restrict the <code>kms:PutKeyPolicy</code> permission to break-glass roles only, limiting the potential for unauthorized modifications.</li>
<li>Monitor <code>iam:AttachRolePolicy</code> and <code>sts:AssumeRole</code> events to correlate with potential privilege escalation attempts related to KMS key access.</li>
<li>Restore a known-good KMS policy from backup or IAM/KMS change history to remediate unauthorized modifications.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud</category><category>aws</category><category>kms</category><category>privilege-escalation</category><category>defense-evasion</category></item><item><title>Suspicious WMIC XSL Script Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-22-wmic-xsl-script-execution/</link><pubDate>Mon, 22 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-22-wmic-xsl-script-execution/</guid><description>This rule detects suspicious execution of scripts via WMIC, potentially used for allowlist bypass, by identifying WMIC executions with atypical arguments and the loading of specific libraries like jscript.dll or vbscript.dll for defense evasion and execution.</description><content:encoded><![CDATA[<p>This detection identifies WMIC allowlist bypass techniques by alerting on suspicious execution of scripts. When WMIC loads scripting libraries, such as jscript.dll or vbscript.dll, it may be indicative of an allowlist bypass. Adversaries exploit WMIC to bypass security measures by executing scripts via XSL files. This technique is often used for defense evasion and execution of malicious code. The detection logic focuses on monitoring WMIC executions with atypical arguments (format*:<em>, /format</em>:<em>, <em>-format</em>:</em>) in conjunction with the loading of scripting libraries, indicating potential misuse. The rule is designed for data generated by Elastic Defend and also supports Sysmon data sources.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through various means (e.g., phishing, exploit).</li>
<li>The attacker executes WMIC.exe or wmic.exe with suspicious arguments such as &ldquo;format*:<em>&rdquo;, &ldquo;/format</em>:<em>&rdquo;, or &ldquo;</em>-format*:*&rdquo; to leverage XSL script processing.</li>
<li>WMIC attempts to load scripting libraries like jscript.dll or vbscript.dll to enable script execution.</li>
<li>The attacker uses the loaded scripting libraries to execute malicious code embedded in an XSL file.</li>
<li>The script performs various malicious actions, such as downloading additional payloads, modifying system configurations, or escalating privileges.</li>
<li>The attacker leverages the WMI functionality for lateral movement or persistence within the network.</li>
<li>The attacker evades detection by abusing trusted system binaries (WMIC) and allowlisted scripting engines.</li>
<li>The final objective is to achieve code execution and maintain control over the compromised system for data exfiltration or further malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass security measures and execute malicious code on compromised systems. This can lead to a range of adverse effects, including data theft, system compromise, and further propagation of malware within the network. The use of WMIC for defense evasion can make it difficult to detect malicious activity, increasing the risk of successful attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious WMIC XSL Script Execution</code> to your SIEM and tune for your environment.</li>
<li>Enable Sysmon Event ID 1 (Process Creation) and Event ID 7 (Image Loaded) logging to activate the Sigma rule above.</li>
<li>Investigate any alerts triggered by the Sigma rule by reviewing process execution details and command-line arguments.</li>
<li>Review the parent process of suspicious WMIC executions to understand the context and origin of the activity.</li>
<li>Correlate the process.entity_id with other related events within a 2-minute window to identify any additional suspicious activities.</li>
<li>Implement application control policies to restrict the execution of unauthorized or suspicious XSL files and scripts.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>windows</category></item><item><title>ProblemChild ML Detection of Suspicious Windows Processes</title><link>https://feed.craftedsignal.io/briefs/2024-01-problemchild-suspicious-windows-processes/</link><pubDate>Mon, 22 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-problemchild-suspicious-windows-processes/</guid><description>The ProblemChild machine learning model has detected a user with suspicious Windows processes exhibiting unusually high malicious probability scores, potentially indicating defense evasion via masquerading or LOLbins.</description><content:encoded><![CDATA[<p>The Elastic ProblemChild integration leverages machine learning to identify suspicious Windows process clusters associated with specific users. This detection focuses on processes flagged as malicious by a supervised ML model, further refined by an unsupervised ML model that identifies unusually high aggregate scores within process clusters. This combination aims to detect activity that may evade traditional signature-based detections, such as the use of Living-off-the-Land Binaries (LOLbins) for masquerading. The models are trained to identify processes exhibiting characteristics indicative of malicious intent, making it possible to expose attackers using legitimate system tools for malicious purposes. The integration requires Windows process events collected by Elastic Defend or Winlogbeat and the Living off the Land (LotL) Attack Detection integration assets to be installed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system.</li>
<li>The attacker attempts to execute malicious commands using LOLbins (e.g., PowerShell, cmd.exe, mshta.exe).</li>
<li>These processes are spawned with potentially obfuscated or unusual command-line arguments to evade basic detection.</li>
<li>The ProblemChild supervised ML model analyzes process characteristics and assigns a malicious probability score.</li>
<li>An unsupervised ML model aggregates the scores of related processes associated with the same user, identifying unusually high clusters.</li>
<li>The rule triggers based on the combined supervised and unsupervised ML scores, indicating a high likelihood of malicious activity.</li>
<li>The attacker may attempt to use masquerading techniques to further disguise their actions by renaming files or using legitimate process names.</li>
<li>The ultimate goal could be data exfiltration, lateral movement, or establishing persistence on the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leveraging LOLbins and masquerading techniques can lead to significant damage, including data breaches, system compromise, and disruption of services. The use of legitimate tools makes detection challenging, potentially allowing attackers to operate undetected for extended periods. While the number of victims and specific sectors are unknown, any organization running Windows systems is potentially vulnerable. The impact of a successful attack depends on the attacker&rsquo;s objectives but can range from minor data theft to complete system takeover.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure the Living off the Land (LotL) Attack Detection integration assets are installed and properly configured as described in the setup instructions of the rule.</li>
<li>Deploy the &ldquo;User Detected with Suspicious Windows Process(es)&rdquo; ML job (machine_learning_job_id: <code>problem_child_high_sum_by_user_ea</code>) and tune the anomaly threshold for your environment.</li>
<li>Enable Windows process event collection via Elastic Defend or Winlogbeat (Rule Setup) to provide the necessary data for the ML models.</li>
<li>Review and whitelist legitimate administrative tools and software updates that may trigger false positives, as described in the False Positive Analysis section of the rule note.</li>
<li>Implement enhanced monitoring and detection rules to identify similar patterns of behavior in the future, focusing on the specific tactics and techniques used in this incident (Rule Note).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>machine-learning</category></item><item><title>Windows Sandbox Abuse with Sensitive Configuration</title><link>https://feed.craftedsignal.io/briefs/2024-01-windows-sandbox-abuse/</link><pubDate>Wed, 10 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-windows-sandbox-abuse/</guid><description>This rule detects the abuse of Windows Sandbox with sensitive configurations to evade detection, where malware may abuse the sandbox feature to gain write access to the host file system, enable network connections, and automatically execute commands via logon, identifying the start of a new container with these sensitive configurations.</description><content:encoded><![CDATA[<p>Attackers may abuse the Windows Sandbox feature to evade detection by running malicious code within the isolated environment. This involves configuring the sandbox with sensitive options such as granting write access to the host file system, enabling network connections, and setting up automatic command execution via logon. By running within the sandbox with these configurations, malware can potentially interact with the host system, while making detection more difficult. This technique is used for defense evasion, hiding artifacts, and executing malicious activities within a virtualized environment to avoid direct exposure on the host. The rule identifies the start of a new container with sensitive configurations like write access to the host file system, network connection and automatic execution via logon command.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through an exploit or social engineering.</li>
<li>The attacker leverages Windows Sandbox by executing <code>wsb.exe</code> or <code>WindowsSandboxClient.exe</code>.</li>
<li>The attacker configures the sandbox to enable networking using <code>&lt;Networking&gt;Enable&lt;/Networking&gt;</code> or <code>&lt;NetworkingEnabled&gt;true&lt;/NetworkingEnabled&gt;</code>.</li>
<li>The attacker grants the sandbox write access to the host file system using <code>&lt;HostFolder&gt;C:\\&lt;ReadOnly&gt;false</code>.</li>
<li>The attacker sets up a logon command to automatically execute malicious code when the sandbox starts using <code>&lt;LogonCommand&gt;</code>.</li>
<li>The sandbox initializes and executes the configured logon command.</li>
<li>The malicious code interacts with the host file system and network, performing actions such as data exfiltration or lateral movement.</li>
<li>The attacker achieves their objective, such as deploying ransomware or stealing sensitive information, while operating from within the isolated sandbox environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using Windows Sandbox abuse can lead to a range of negative impacts. Attackers may gain unauthorized access to sensitive data, compromise system integrity, or disrupt business operations. The use of the sandbox environment helps to conceal malicious activity, making detection and remediation more challenging. The damage can include data breaches, financial losses, reputational damage, and regulatory penalties. Successful exploitation allows malware to interact with the host system, potentially affecting multiple systems on the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Windows Sandbox with Sensitive Configuration&rdquo; detection rule to your SIEM to identify potential sandbox abuse attempts.</li>
<li>Monitor process creation events for <code>wsb.exe</code> and <code>WindowsSandboxClient.exe</code> with command-line arguments that enable networking (<code>&lt;Networking&gt;Enable&lt;/Networking&gt;</code>, <code>&lt;NetworkingEnabled&gt;true&lt;/NetworkingEnabled&gt;</code>).</li>
<li>Monitor process creation events for <code>wsb.exe</code> and <code>WindowsSandboxClient.exe</code> with command-line arguments that enable write access to the host file system (<code>&lt;HostFolder&gt;C:\\&lt;ReadOnly&gt;false</code>).</li>
<li>Monitor process creation events for <code>wsb.exe</code> and <code>WindowsSandboxClient.exe</code> with command-line arguments that define logon commands (<code>&lt;LogonCommand&gt;</code>).</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture the necessary command-line arguments.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows-sandbox</category><category>windows</category></item><item><title>Unsigned DLL Loaded by Svchost for Persistence and Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2024-01-unsigned-dll-svchost/</link><pubDate>Tue, 09 Jan 2024 18:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unsigned-dll-svchost/</guid><description>Adversaries may load unsigned DLLs into svchost.exe to establish persistence or escalate privileges, leveraging a shared Windows service to execute malicious code with elevated permissions.</description><content:encoded><![CDATA[<p>Attackers may attempt to load malicious, unsigned DLLs into <code>svchost.exe</code>, a legitimate Windows service host process, to maintain persistence or escalate privileges. This technique abuses the shared service host process to execute arbitrary code with SYSTEM privileges. The <code>svchost.exe</code> process, which typically hosts multiple Windows services, can be targeted to load malicious DLLs from unusual file paths, potentially bypassing security measures that rely on code signing validation. This is especially concerning because <code>svchost.exe</code> is a trusted process, making detection more challenging. The loading of unsigned DLLs by <code>svchost.exe</code> from atypical directories is a strong indicator of potential malicious activity, as legitimate Windows services rarely load unsigned libraries from such locations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An adversary gains initial access to the system through an undisclosed method (e.g., exploitation of a vulnerability or social engineering).</li>
<li>The attacker creates a malicious, unsigned DLL on the compromised system in a non-standard directory like <code>C:\ProgramData\</code>.</li>
<li>The attacker modifies the Windows Registry to configure a service hosted by <code>svchost.exe</code> to load the malicious DLL. This often involves manipulating service dependencies or service parameters.</li>
<li>The system is restarted, or the targeted service is manually restarted, causing <code>svchost.exe</code> to load the specified DLL.</li>
<li><code>svchost.exe</code> executes the code within the malicious DLL, now running with the privileges of the hosted service (typically SYSTEM).</li>
<li>The malicious DLL performs actions such as installing backdoors, escalating privileges further, or establishing command and control (C2) communication.</li>
<li>The attacker uses the established C2 channel to remotely control the compromised system, exfiltrate data, or perform other malicious activities.</li>
<li>The attacker maintains persistence on the system by ensuring the malicious DLL is loaded each time the service or system starts.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to gain persistent access to the compromised system with elevated (SYSTEM) privileges. This can lead to complete system compromise, data theft, installation of backdoors, and lateral movement within the network. The use of <code>svchost.exe</code> as a host for malicious DLLs makes detection more difficult, allowing attackers to operate undetected for extended periods.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the provided Sigma rule to detect unsigned DLLs loaded by <code>svchost.exe</code>, focusing on the specified file paths and code signature status.</li>
<li>Examine <code>dll.Ext.relative_file_creation_time</code> to identify DLLs created shortly before being loaded to catch newly created malicious files.</li>
<li>Review and validate the legitimacy of all DLLs loaded by <code>svchost.exe</code>, focusing on those located in unusual paths.</li>
<li>Update endpoint detection and response (EDR) systems to specifically monitor for the loading of unsigned DLLs by system processes like <code>svchost.exe</code>.</li>
<li>Continuously update the exclusion list of known good DLL hashes to reduce false positives.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>defense-evasion</category><category>execution</category><category>windows</category><category>dll-injection</category></item><item><title>Azure Kubernetes Events Deleted</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-kubernetes-events-deleted/</link><pubDate>Tue, 09 Jan 2024 18:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-kubernetes-events-deleted/</guid><description>Adversaries may delete events in Azure Kubernetes to evade detection, which this rule detects via the MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/EVENTS.K8S.IO/EVENTS/DELETE operation.</description><content:encoded><![CDATA[<p>Attackers targeting Azure Kubernetes Service (AKS) environments may attempt to remove event logs to cover their tracks and hinder forensic investigations. This activity, which involves deleting Kubernetes events, directly impairs a defender&rsquo;s ability to detect malicious behavior within the cluster. By removing evidence of their actions, attackers can prolong their presence within the environment and increase the potential for further compromise. This technique is relevant for defenders monitoring AKS environments for intrusion activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the Azure environment, potentially through compromised credentials or exploiting a vulnerability.</li>
<li>The attacker authenticates to the Azure Kubernetes Service (AKS) cluster with sufficient privileges.</li>
<li>The attacker enumerates existing Kubernetes event logs to identify those they wish to remove.</li>
<li>The attacker executes a command to delete specific Kubernetes events using kubectl or the Azure CLI. The API call used for the deletion is MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/EVENTS.K8S.IO/EVENTS/DELETE.</li>
<li>The Azure Activity Logs record the event deletion, which is the source of the detection.</li>
<li>The attacker repeats steps 3-4 to remove additional event logs, further obscuring their activities.</li>
<li>The attacker continues with their primary objective, such as deploying malicious containers, exfiltrating data, or establishing persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful deletion of Kubernetes events can significantly hinder incident response efforts. Without access to event logs, defenders may struggle to identify the scope and timeline of an attack, potentially leading to incomplete remediation and prolonged exposure. The impact includes increased dwell time for attackers within the compromised environment, as well as a greater likelihood of successful data breaches or system disruptions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect event deletion activity within AKS environments.</li>
<li>Investigate any detected instances of the MICROSOFT.KUBERNETES/CONNECTEDCLUSTERS/EVENTS.K8S.IO/EVENTS/DELETE operation in Azure Activity Logs, as indicated in the rule definition.</li>
<li>Implement robust RBAC policies within AKS to minimize the number of users and service accounts with permissions to delete Kubernetes events.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>kubernetes</category><category>defense-evasion</category></item><item><title>Microsoft Build Engine Started by an Office Application</title><link>https://feed.craftedsignal.io/briefs/2024-01-msbuild-office-app/</link><pubDate>Tue, 09 Jan 2024 18:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-msbuild-office-app/</guid><description>The Microsoft Build Engine (MSBuild) being started by an Office application is unusual behavior and could indicate a malicious document executing a script payload for defense evasion.</description><content:encoded><![CDATA[<p>The Microsoft Build Engine (MSBuild) is a software build platform commonly used by Windows developers. When MSBuild is started by an Office application like Word or Excel, it deviates from typical usage patterns. This behavior can be indicative of a malicious document executing a script payload as part of a defense evasion tactic. Attackers may leverage MSBuild to execute code or perform actions that would otherwise be blocked or detected. This activity is particularly concerning because it can bypass traditional security measures that focus on blocking suspicious executables or scripts directly launched by Office applications. The rule was created in March 2020, and last updated in April 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user opens a malicious Office document (e.g., Word, Excel, PowerPoint).</li>
<li>The Office document contains an embedded macro or exploit that triggers the execution of MSBuild.exe.</li>
<li>MSBuild.exe is launched as a child process of the Office application (e.g., winword.exe, excel.exe, powerpnt.exe).</li>
<li>MSBuild executes a project file or inline task specified in the command line. This can involve compiling code, executing scripts, or performing other actions.</li>
<li>The executed code or script performs malicious activities, such as downloading additional payloads, modifying system settings, or establishing persistence.</li>
<li>MSBuild may spawn child processes, such as cmd.exe, powershell.exe, or other utilities, to further execute malicious commands.</li>
<li>The attacker achieves their objective, which could include data exfiltration, installing malware, or gaining unauthorized access to the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the execution of arbitrary code on the victim&rsquo;s machine, potentially resulting in data theft, malware installation, or complete system compromise. Since MSBuild is a legitimate Microsoft tool, its use by malicious actors can make detection more challenging. The impact is high because it leverages a trusted process to carry out malicious activities, evading standard security measures.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Microsoft Build Engine Started by an Office Application&rdquo; to your SIEM to detect this specific behavior based on process creation events.</li>
<li>Enable Sysmon process creation logging with the appropriate configuration to capture the necessary process start events for the Sigma rule to function correctly.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the command-line arguments of MSBuild.exe and the parent process information, including the executable name and command line.</li>
<li>Monitor process execution events for MSBuild.exe with parent processes being Office applications as a high priority indicator of potential compromise.</li>
<li>Review and harden Office macro settings to prevent execution of malicious macros.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>msbuild</category><category>windows</category></item><item><title>Potential Antimalware Scan Interface Bypass via PowerShell</title><link>https://feed.craftedsignal.io/briefs/2024-01-amsi-bypass-powershell/</link><pubDate>Tue, 09 Jan 2024 16:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-amsi-bypass-powershell/</guid><description>This rule detects PowerShell scripts that attempt to bypass the Antimalware Scan Interface (AMSI) in order to disable scanning and execute malicious PowerShell code undetected.</description><content:encoded><![CDATA[<p>This detection identifies PowerShell scripts that attempt to circumvent the Antimalware Scan Interface (AMSI), a security feature in Windows designed to prevent the execution of malicious scripts and code. Attackers use AMSI bypass techniques to disable real-time scanning and execute malicious PowerShell code without detection. The bypasses often involve manipulating AMSI&rsquo;s internal state or patching its scanning routines. This allows attackers to deliver and execute payloads undetected, leading to potential system compromise. This technique is actively used by various threat actors to evade defenses.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system, typically through phishing or exploiting a vulnerability.</li>
<li>The attacker executes a PowerShell script.</li>
<li>The PowerShell script contains code designed to bypass AMSI, such as manipulating the AmsiScanBuffer function or unmanaged code injection.</li>
<li>The AMSI bypass is executed, disabling real-time scanning of PowerShell scripts.</li>
<li>The attacker then executes a malicious payload within the same PowerShell session, which is no longer subject to AMSI scanning.</li>
<li>The malicious payload performs actions such as downloading additional malware, establishing persistence, or exfiltrating data.</li>
<li>The attacker leverages the compromised system for further lateral movement or to achieve their objectives, such as data theft or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful AMSI bypass can lead to the execution of arbitrary code on the affected system, potentially resulting in data breaches, system compromise, and the installation of malware. Because AMSI is a core component of Windows security, its bypass represents a significant security risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging to capture the contents of PowerShell scripts, which is essential for this detection to function effectively (reference: Setup section).</li>
<li>Deploy the Sigma rule &ldquo;Potential Antimalware Scan Interface Bypass via PowerShell&rdquo; to detect scripts containing known AMSI bypass techniques (reference: rules section below).</li>
<li>Investigate alerts generated by the Sigma rule, focusing on the script content and the context in which it was executed to identify potential malicious activity (reference: note section).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>amsi</category><category>powershell</category><category>windows</category></item><item><title>MSBuild Making Network Connections Indicating Potential Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-msbuild-network-connections/</link><pubDate>Tue, 09 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-msbuild-network-connections/</guid><description>MsBuild.exe making outbound network connections may indicate adversarial activity as attackers leverage MsBuild to execute code and evade detection.</description><content:encoded><![CDATA[<p>Attackers may abuse the Microsoft Build Engine (MSBuild) to execute malicious files or masquerade as legitimate utilities to bypass detections and evade defenses. MSBuild is a platform for building applications using an XML schema for project files that controls how the build platform processes and builds software. The observed behavior involves MsBuild.exe initiating outbound network connections, which is not typical for its intended use and may indicate unauthorized code execution or command and control activity. This activity can be used to download malicious payloads, exfiltrate data, or establish a reverse shell. Detecting this behavior is crucial as it can be an early indicator of compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access through an external vector (e.g., phishing, software vulnerability).</li>
<li>Attacker executes MsBuild.exe.</li>
<li>MSBuild executes a malicious project file (.csproj, .vbproj).</li>
<li>The project file contains embedded or referenced code (e.g., C#, VB.NET) designed to perform malicious actions.</li>
<li>The malicious code executes, initiating a network connection.</li>
<li>The network connection is established to an external command and control (C2) server or a resource hosting a malicious payload.</li>
<li>Data exfiltration or payload download occurs via the network connection.</li>
<li>The attacker gains further control over the compromised system, potentially leading to lateral movement or data theft.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised systems can lead to data breaches, system instability, and further propagation of malware within the network. Successful exploitation can result in sensitive information being stolen, disruption of services, and potential financial losses. This activity can be difficult to detect without specific monitoring rules and can lead to extended dwell time for attackers within the compromised environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>MSBuild Making Outbound Network Connection</code> to your SIEM to detect suspicious network connections initiated by MsBuild.exe.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the destination IP addresses and the content of the network traffic.</li>
<li>Monitor process execution events for instances of MsBuild.exe executing unusual or suspicious project files.</li>
<li>Enable process monitoring with command-line argument logging to identify potential malicious project files being passed to MsBuild.exe.</li>
<li>Consider implementing application control policies to restrict the execution of MsBuild.exe to authorized users and processes only.</li>
<li>Block known malicious domains and IP addresses associated with command and control activity at the firewall or DNS resolver.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>command-and-control</category><category>msbuild</category></item><item><title>Linux Log Clearing Attempts via Common Utilities</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-linux-log-clearing/</link><pubDate>Tue, 09 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-linux-log-clearing/</guid><description>Adversaries attempt to clear Linux system logs using utilities like rm, rmdir, shred, and unlink to conceal malicious activity and evade detection.</description><content:encoded><![CDATA[<p>Attackers often remove or modify system logs to hide their actions and hinder forensic investigations. This activity involves the use of common Linux utilities to delete or overwrite log files, making it difficult to trace the attacker&rsquo;s entry point, lateral movement, and actions performed on the system. Log clearing is a common post-exploitation technique used by a wide range of threat actors across various campaigns. This brief focuses on detecting the usage of common utilities like <code>rm</code>…</p>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>log-clearing</category><category>linux</category></item><item><title>Suspicious WerFault Child Process Abuse</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-werfault-child-process/</link><pubDate>Tue, 09 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-werfault-child-process/</guid><description>This rule detects suspicious child processes of WerFault.exe, a Windows error reporting tool, indicating potential abuse of the SilentProcessExit registry key to execute malicious processes stealthily for defense evasion, persistence, and privilege escalation.</description><content:encoded><![CDATA[<p>This detection identifies suspicious child processes spawned by WerFault.exe, the Windows Error Reporting tool. Attackers can abuse WerFault by manipulating the <code>SilentProcessExit</code> registry key to execute malicious processes. This technique allows for defense evasion, persistence, and privilege escalation. The detection focuses on WerFault processes with specific command-line arguments (<code>-s</code>, <code>-t</code>, and <code>-c</code>) known to be used in SilentProcessExit exploitation, while excluding legitimate executables like <code>Initcrypt.exe</code> and <code>Heimdal.Guard.exe</code>. The rule helps defenders identify potential attempts to hijack the error reporting mechanism for malicious purposes. The monitored data sources include Windows Event Logs, Sysmon, Elastic Defend, Microsoft Defender XDR, and SentinelOne.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker modifies the <code>SilentProcessExit</code> registry key to specify a malicious process to be executed when a target application crashes. This involves setting the <code>ReportingMode</code> and <code>Debugger</code> values under the <code>SilentProcessExit</code> key for the target application.</li>
<li>The attacker triggers a crash in the target application or waits for a legitimate crash to occur.</li>
<li>WerFault.exe is invoked to handle the application crash.</li>
<li>Due to the registry modification, WerFault.exe spawns the attacker-controlled process, passing command-line arguments such as <code>-s</code>, <code>-t</code>, and <code>-c</code>.</li>
<li>The attacker-controlled process executes with the privileges of WerFault.exe, potentially achieving privilege escalation.</li>
<li>The malicious process performs actions such as injecting code into other processes, establishing persistence, or exfiltrating data.</li>
<li>The attacker achieves their objectives, such as maintaining persistence, escalating privileges, or evading detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to persistence, privilege escalation, and defense evasion. Attackers can use this technique to execute malicious code with elevated privileges, potentially bypassing security controls and gaining unauthorized access to sensitive data and system resources. The number of victims and affected sectors can vary depending on the attacker&rsquo;s objectives and the scope of the initial compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging to capture WerFault.exe child processes (Data Source: Sysmon).</li>
<li>Deploy the Sigma rule &ldquo;WerFault Child Process Masquerading&rdquo; to your SIEM and tune for your environment.</li>
<li>Review the <code>SilentProcessExit</code> registry key for unauthorized modifications (registry_set event).</li>
<li>Investigate any WerFault.exe processes with command-line arguments <code>-s</code>, <code>-t</code>, and <code>-c</code> (process_creation event).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>privilege-escalation</category><category>masquerading</category></item><item><title>PowerShell Script Block Logging Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-disable-powershell-scriptblock-logging/</link><pubDate>Tue, 09 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-disable-powershell-scriptblock-logging/</guid><description>Attackers may disable PowerShell Script Block Logging by modifying the registry to conceal their activities on the host and evade detection by setting the `EnableScriptBlockLogging` registry value to 0, impacting security monitoring and incident response capabilities.</description><content:encoded><![CDATA[<p>Attackers frequently disable PowerShell Script Block Logging to evade detection and hide malicious activities on compromised systems. By modifying the <code>EnableScriptBlockLogging</code> registry value to &lsquo;0&rsquo; or &lsquo;0x00000000&rsquo;, adversaries can significantly reduce the visibility into their PowerShell-based attacks. This technique is particularly effective when followed by script-driven activity, making it harder for security teams to identify and respond to threats. This behavior has been observed across multiple environments, including those utilizing endpoint detection and response solutions such as Elastic Defend, Microsoft Defender XDR, SentinelOne, and CrowdStrike. The rule was last updated on 2026-05-04 and is designed to detect these specific registry modifications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> An attacker gains initial access to a Windows system, possibly through phishing or exploitation of a vulnerability.</li>
<li><strong>Privilege Escalation:</strong> The attacker may attempt to escalate privileges to gain necessary permissions to modify the registry.</li>
<li><strong>Defense Evasion:</strong> The attacker modifies the registry to disable PowerShell Script Block Logging by setting <code>HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging\EnableScriptBlockLogging</code> to 0 or 0x00000000 using <code>reg.exe</code> or PowerShell itself.</li>
<li><strong>Execution:</strong> The attacker executes malicious PowerShell scripts, leveraging the disabled logging to avoid detection. These scripts may be used for reconnaissance, lateral movement, or data exfiltration.</li>
<li><strong>Persistence:</strong> The attacker establishes persistence using various techniques, such as creating scheduled tasks or modifying registry keys to ensure continued access to the system.</li>
<li><strong>Command and Control:</strong> The attacker establishes a command and control channel to communicate with the compromised system and issue further instructions.</li>
<li><strong>Lateral Movement:</strong> The attacker moves laterally to other systems on the network, compromising additional assets.</li>
<li><strong>Impact:</strong> The attacker achieves their final objective, such as data theft, ransomware deployment, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of PowerShell Script Block Logging can severely hinder incident response efforts, allowing attackers to operate undetected for extended periods. Organizations may experience data breaches, financial losses, and reputational damage. The impact can be widespread as attackers leverage compromised systems for lateral movement and further exploitation. The loss of PowerShell logging can blind security teams, making it difficult to reconstruct attacker actions and contain the breach.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>PowerShell_Script_Block_Logging_Disabled</code> to your SIEM to detect registry modifications that disable PowerShell Script Block Logging.</li>
<li>Monitor registry events for changes to the <code>EnableScriptBlockLogging</code> value, focusing on events with <code>registry.data.strings</code> set to &ldquo;0&rdquo; or &ldquo;0x00000000&rdquo; (see rule <code>PowerShell_Script_Block_Logging_Disabled</code>).</li>
<li>Enable Sysmon registry event logging to capture the necessary data for the Sigma rules to function effectively (see references).</li>
<li>Review and harden PowerShell execution policies to prevent unauthorized script execution (related to tactic TA0005).</li>
<li>Implement strict access controls to limit who can modify registry settings related to PowerShell logging (related to tactic TA0005).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>powershell</category><category>registry</category></item><item><title>Potential Timestomping of Executable Files on Windows</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-timestomp/</link><pubDate>Tue, 09 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-timestomp/</guid><description>This rule identifies potential timestomping behavior on Windows systems where the creation time of executable files in sensitive system directories is modified, potentially to blend malicious executables with legitimate system files and evade detection.</description><content:encoded><![CDATA[<p>This detection identifies attempts to modify the timestamps of executable files within sensitive directories on Windows systems, a technique known as timestomping. Timestomping is employed by adversaries to disguise malicious files as legitimate system components, making them harder to detect. The rule focuses on changes to file creation timestamps in directories like <code>System32</code>, <code>SysWOW64</code>, <code>ProgramData</code>, and common startup locations. It excludes known legitimate processes to reduce false positives. The goal of this technique is to evade detection and maintain persistence within the compromised system. This behavior is typically associated with post-exploitation activity after initial access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means (e.g., exploiting a vulnerability).</li>
<li>The attacker uploads a malicious executable (e.g., a backdoor or malware dropper) to a location on the filesystem.</li>
<li>The attacker uses a tool or script (e.g., PowerShell, built-in Windows utilities) to modify the creation timestamp of the malicious executable.</li>
<li>The timestamp is set to match that of a legitimate system file in the same directory, such as a DLL in <code>C:\Windows\System32</code>.</li>
<li>The attacker may then configure persistence for the timestomped executable, such as creating a registry entry in <code>HKLM\Software\Microsoft\Windows\CurrentVersion\Run</code>.</li>
<li>The malicious executable remains dormant, blending in with other legitimate files and evading initial detection.</li>
<li>The attacker triggers the execution of the timestomped executable, either manually or through scheduled tasks, registry entries or other persistence mechanisms.</li>
<li>The malicious executable performs its intended function, such as establishing a reverse shell or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful timestomping can allow attackers to maintain a persistent presence on a compromised system while evading detection by security tools and administrators. This can lead to prolonged data theft, system compromise, and other malicious activities. The technique is often used in conjunction with other evasion methods to further obscure malicious activity. A successful attack could lead to data exfiltration, ransomware deployment, or long-term espionage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 2 (File creation time changed) logging to capture timestomping activity as described in the setup instructions.</li>
<li>Deploy the Sigma rule &ldquo;Potential Timestomp in Executable Files&rdquo; to your SIEM to detect suspicious file timestamp modifications.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on processes modifying file creation times in sensitive system directories.</li>
<li>Review the process ancestry of processes modifying file timestamps to identify potentially malicious parent processes.</li>
<li>Monitor for execution of files with recently modified timestamps using process creation logs.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>timestomp</category><category>windows</category></item><item><title>MSBuild Making Network Connections</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-msbuild-network/</link><pubDate>Tue, 09 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-msbuild-network/</guid><description>Detection of MsBuild.exe making outbound network connections which may indicate adversarial activity used to execute code and evade detection.</description><content:encoded><![CDATA[<p>The Microsoft Build Engine (MSBuild) is a platform for building applications that uses an XML schema for project files to control the build process. Attackers can abuse MSBuild to execute malicious code, proxy code execution, and masquerade as legitimate utilities to evade defenses. This behavior is often used in defense evasion tactics. This detection identifies instances of <code>MsBuild.exe</code> executing and subsequently establishing network connections to external addresses. This activity warrants further investigation as it deviates from expected usage patterns and might signify malicious exploitation of MSBuild.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Adversary gains initial access to the system via unspecified means.</li>
<li>Adversary executes <code>MsBuild.exe</code>.</li>
<li>MSBuild process loads and executes a malicious project file, potentially containing embedded code or instructions to download and execute further payloads.</li>
<li>The project file instructs MSBuild to initiate a network connection to a remote server.</li>
<li>MSBuild establishes an outbound network connection to the attacker-controlled server.</li>
<li>The attacker can use the established connection for command and control (C2) or data exfiltration.</li>
<li>The compromised host may download additional malicious tools or payloads from the C2 server using MSBuild&rsquo;s network capabilities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leveraging MSBuild can lead to code execution, defense evasion, and potentially command and control. Although the number of affected organizations is not specified, any Windows environment where developers use MSBuild is potentially at risk. If successful, attackers can bypass traditional security measures, gain unauthorized access, and exfiltrate sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging and network connection logging on Windows endpoints to capture the necessary events for detection.</li>
<li>Deploy the Sigma rule &ldquo;MSBuild Making Network Connections&rdquo; to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule by examining the process execution chain and network connections for suspicious activity.</li>
<li>Consider adding exceptions for legitimate MSBuild network activity, based on destination IP addresses and command-line arguments.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>msbuild</category><category>windows</category></item><item><title>Disabling Windows Defender Security Settings via PowerShell</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-disable-defender-powershell/</link><pubDate>Tue, 09 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-disable-defender-powershell/</guid><description>Attackers use PowerShell commands, including base64-encoded variants, to disable or weaken Windows Defender settings, impairing defenses on compromised systems.</description><content:encoded><![CDATA[<p>Attackers commonly attempt to disable or weaken Windows Defender to evade detection and facilitate malicious activities. This involves using PowerShell commands like <code>Set-MpPreference</code> or <code>Add-MpPreference</code> to modify Defender&rsquo;s configuration. Adversaries may also utilize base64 encoding to obfuscate these commands, bypassing simple command-line inspection. This activity typically occurs post-compromise, as part of a broader attack chain, and allows for the deployment of malware or other malicious tools without interference from the built-in antivirus. Detection of these techniques is crucial for maintaining the integrity of the system and preventing further damage. The scope of this threat includes any Windows environment where PowerShell is enabled and Windows Defender is used as the primary antivirus solution.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is achieved through an existing compromise (e.g., phishing, exploit).</li>
<li>The attacker gains a foothold on the system and escalates privileges if necessary.</li>
<li>PowerShell is launched, either directly or through a parent process like <code>cmd.exe</code>.</li>
<li>The attacker uses <code>Set-MpPreference</code> or <code>Add-MpPreference</code> with parameters like <code>-DisableRealtimeMonitoring</code>, <code>-DisableIOAVProtection</code>, <code>-DisableBehaviorMonitoring</code>, or <code>-DisableBlockAtFirstSeen</code> to weaken Defender.</li>
<li>Alternatively, the attacker crafts a base64-encoded PowerShell command that performs the same actions.</li>
<li>The encoded command is executed using the <code>-EncodedCommand</code> or <code>-enc</code> parameter.</li>
<li>Windows Defender&rsquo;s security settings are modified, reducing its effectiveness.</li>
<li>The attacker proceeds with deploying malware, exfiltrating data, or other malicious objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of these commands results in a weakened or disabled Windows Defender, leaving the system vulnerable to malware infections and other threats. This can lead to data breaches, system compromise, and financial loss. The impact is especially significant in environments where Windows Defender is the primary security solution. While the number of victims is unknown, the technique is widely applicable across Windows environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for PowerShell executions (<code>powershell.exe</code>, <code>pwsh.exe</code>) with command-line arguments related to disabling Windows Defender using the Sigma rule &ldquo;Detect Suspicious PowerShell Encoded Commands&rdquo;.</li>
<li>Enable PowerShell script block logging to capture the full content of executed scripts, which can reveal base64-encoded commands (reference: references - <a href="https://docs.microsoft.com/en-us/powershell/module/defender/set-mppreference?view=windowsserver2019-ps)">https://docs.microsoft.com/en-us/powershell/module/defender/set-mppreference?view=windowsserver2019-ps)</a>.</li>
<li>Deploy the Sigma rule &ldquo;Disabling Windows Defender Security Settings via PowerShell&rdquo; to your SIEM and tune for your environment.</li>
<li>Investigate any instances of <code>Set-MpPreference</code> or <code>Add-MpPreference</code> commands with arguments disabling real-time monitoring, IOAV protection, behavior monitoring, or block-at-first-seen features.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>powershell</category><category>windows</category></item><item><title>Rundll32 Execution with DLL Stored in Alternate Data Stream (ADS)</title><link>https://feed.craftedsignal.io/briefs/2024-01-08-rundll32-ads/</link><pubDate>Mon, 08 Jan 2024 15:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-08-rundll32-ads/</guid><description>Adversaries may use rundll32.exe to execute DLLs stored within alternate data streams (ADS) to bypass security controls and conceal malicious code.</description><content:encoded><![CDATA[<p>Rundll32 is a legitimate Windows utility used to execute DLLs. However, adversaries can abuse this functionality to execute malicious code while evading detection. This technique involves storing a malicious DLL within an Alternate Data Stream (ADS) of a file. ADS allows hiding data within existing files, making it less likely to be discovered by standard file system scans. When rundll32.exe is then used to execute the DLL from the ADS, it can bypass application whitelisting and other security measures, as the execution appears to originate from the trusted rundll32.exe process. This technique has been observed across various threat actors seeking to establish persistence or execute arbitrary code.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through methods like phishing or exploiting a vulnerability.</li>
<li>The attacker uploads a malicious DLL to the target system.</li>
<li>The attacker uses a command-line utility to write the DLL into an Alternate Data Stream (ADS) of an existing file, such as a text file or image. For example: <code>echo &quot;DLL content&quot; &gt; legitimate_file.txt:malicious.dll</code>.</li>
<li>The attacker uses <code>rundll32.exe</code> to execute the DLL stored in the ADS. The command typically looks like: <code>rundll32.exe &quot;C:\ads\file.txt:ADSDLL.dll&quot;,DllMain</code>.</li>
<li>Rundll32.exe loads and executes the malicious DLL from the ADS.</li>
<li>The malicious DLL performs its intended actions, such as establishing persistence, downloading additional payloads, or exfiltrating data.</li>
<li>The attacker may use additional techniques to further conceal their activity, such as obfuscating the command line or using process injection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows arbitrary code execution on the targeted system. Attackers can use this technique to establish persistence, escalate privileges, bypass security controls, and deploy further malware. The use of ADS makes detection more challenging, as the malicious DLL is hidden within a seemingly benign file. This can lead to data breaches, system compromise, and potential financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging to capture the command-line arguments used with <code>rundll32.exe</code> (as used in the Sigma rules below).</li>
<li>Deploy the Sigma rules in this brief to your SIEM to detect suspicious <code>rundll32.exe</code> executions from ADS.</li>
<li>Monitor for unusual file modifications that involve writing data to alternate data streams.</li>
<li>Implement application whitelisting to restrict the execution of unauthorized executables.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>ads</category><category>rundll32</category><category>windows</category></item><item><title>Suspicious PDF Reader Child Process Activity</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-pdf-child-process/</link><pubDate>Thu, 04 Jan 2024 18:45:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-pdf-child-process/</guid><description>Adversaries may exploit PDF reader applications to execute arbitrary commands and establish a foothold within a system, often launching built-in utilities for reconnaissance and privilege escalation.</description><content:encoded><![CDATA[<p>Attackers are increasingly leveraging PDF reader applications as an initial access vector, exploiting vulnerabilities within these programs or using social engineering to trick users into opening malicious PDF documents. Upon successful exploitation, adversaries often spawn built-in Windows utilities from the compromised PDF reader process to perform reconnaissance, escalate privileges, or establish persistence. This activity is designed to blend in with normal system operations, making it difficult to detect without specific monitoring and detection rules. The targeted software commonly includes Adobe Acrobat, Adobe Reader, and Foxit Reader. Defenders should be vigilant for unexpected child processes of PDF readers, especially command-line interpreters and system administration tools.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user receives a malicious PDF document via phishing or other means.</li>
<li>The user opens the PDF document using a vulnerable PDF reader application (e.g., Adobe Acrobat, Foxit Reader).</li>
<li>The PDF document exploits a vulnerability or uses a malicious script to execute an arbitrary command.</li>
<li>The PDF reader application spawns a command-line interpreter (e.g., cmd.exe, powershell.exe) or a system administration tool (e.g., reg.exe, net.exe).</li>
<li>The spawned process executes commands to gather system information (e.g., ipconfig.exe, systeminfo.exe, whoami.exe).</li>
<li>The attacker may attempt to discover network configuration, user accounts, or running processes.</li>
<li>The attacker could leverage the spawned process to download and execute further payloads.</li>
<li>The attacker gains a foothold on the system and can proceed with lateral movement, data exfiltration, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of PDF reader applications can lead to initial access, privilege escalation, and further compromise of the affected system. While individual incidents may have a low risk score, widespread exploitation can lead to significant data breaches, system downtime, and reputational damage. The use of legitimate system utilities for malicious purposes can make detection challenging, allowing attackers to operate undetected for extended periods.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line arguments to capture the execution of suspicious child processes (Sysmon Event ID 1, Windows Security Event Logs).</li>
<li>Deploy the Sigma rule &ldquo;Suspicious PDF Reader Child Process&rdquo; to your SIEM and tune for your environment to detect the execution of suspicious processes spawned by PDF reader applications.</li>
<li>Monitor for network connections originating from PDF reader applications to unusual or external IP addresses.</li>
<li>Implement application control policies to restrict the execution of unauthorized or unknown executables.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>execution</category><category>initial-access</category><category>defense-evasion</category><category>discovery</category></item><item><title>Detection of Wevtutil.exe Used to Disable Event Logs</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-logs-wevtutil/</link><pubDate>Thu, 04 Jan 2024 16:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-logs-wevtutil/</guid><description>The execution of `wevtutil.exe` with parameters to disable event logs is a tactic commonly employed by ransomware to evade detection and hinder forensic investigations, leading to a significant reduction in visibility for defenders.</description><content:encoded><![CDATA[<p>Attackers, particularly ransomware groups, often disable or manipulate event logs to cover their tracks and hinder forensic investigations. This activity typically occurs post-compromise as part of an attacker&rsquo;s defense evasion strategy. The use of <code>wevtutil.exe</code>, a legitimate Windows command-line utility, makes this technique challenging to detect without specific monitoring. Ransomware actors disable logging to operate undetected, making it difficult for security teams to trace malicious activities and respond effectively. This can prolong the dwell time of the attacker within the environment and increase the potential for widespread damage, data exfiltration, or system encryption.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained through typical methods like phishing or exploiting public-facing vulnerabilities.</li>
<li>The attacker executes code on the compromised system, achieving initial foothold.</li>
<li>Privilege escalation techniques are employed to gain elevated permissions (e.g., using exploits, token manipulation).</li>
<li>The attacker uses <code>wevtutil.exe</code> with specific commands to disable or clear event logs. Example commands include <code>wevtutil.exe sl &lt;logname&gt; false</code> or <code>wevtutil.exe set-log &lt;logname&gt; /enabled:false</code>.</li>
<li>The attacker disables specific event channels to remove evidence of their activity.</li>
<li>Persistence mechanisms are established to maintain access across reboots (e.g., creating scheduled tasks, modifying registry keys).</li>
<li>Lateral movement is initiated to compromise additional systems within the network using tools like PsExec or SMB shares.</li>
<li>The final objective, such as ransomware deployment or data exfiltration, is executed, with logging disabled to minimize the chances of detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of event logs allows attackers to operate undetected, hindering forensic investigations and incident response efforts. This can lead to delayed detection of breaches, prolonged dwell time for attackers, and increased damage to affected organizations. Ransomware groups frequently use this technique to maximize the impact of their attacks, resulting in data encryption, exfiltration, and significant financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging (Event ID 1) to detect the execution of <code>wevtutil.exe</code> with suspicious parameters.</li>
<li>Deploy the Sigma rules provided below to your SIEM to detect specific command-line arguments used to disable event logs.</li>
<li>Monitor Windows Event Log Security (4688) for process creation events of <code>wevtutil.exe</code> with arguments related to disabling or clearing logs.</li>
<li>Investigate any instances where <code>wevtutil.exe</code> is executed with parameters like <code>sl</code> or <code>set-log</code> and <code>/e:false</code> or <code>/enabled:false</code> in the command line, as highlighted in the provided Sigma rules.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>ransomware</category><category>windows</category></item><item><title>Process Execution from Suspicious Windows Directories</title><link>https://feed.craftedsignal.io/briefs/2024-01-process-execution-from-unusual-directory/</link><pubDate>Thu, 04 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-process-execution-from-unusual-directory/</guid><description>Adversaries may execute processes from unusual default Windows directories to masquerade malware and evade defenses by blending in with trusted paths, making malicious activity harder to detect.</description><content:encoded><![CDATA[<p>This detection identifies process execution from suspicious default Windows directories. Attackers may hide malware in trusted paths to evade defenses, making it difficult for analysts to distinguish between legitimate and malicious activity. The detection focuses on identifying processes running from directories like C:\PerfLogs, C:\Users\Public, and various Windows subdirectories (e.g., C:\Windows\Tasks, C:\Windows\AppReadiness), where executable files are not typically expected to reside. The detection excludes known legitimate processes like SpeechUXWiz.exe, SystemSettings.exe, TrustedInstaller.exe and other Intel and IBM executables to reduce false positives. This technique is often used to bypass security controls or take advantage of existing exceptions applied to these directories. This activity was observed being used by threat actors in the Siestagraph campaign.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker drops a malicious executable into a suspicious directory like C:\Users\Public or C:\Windows\Tasks.</li>
<li>The attacker executes the malware from the unusual directory. This might be achieved using <code>cmd.exe</code> or <code>powershell.exe</code>.</li>
<li>The executed malware establishes persistence by creating a scheduled task or modifying registry keys.</li>
<li>The malware connects to a command-and-control (C2) server to receive further instructions.</li>
<li>The C2 server instructs the malware to perform reconnaissance on the network.</li>
<li>The malware attempts to move laterally to other systems on the network using techniques like pass-the-hash or exploiting vulnerabilities.</li>
<li>The attacker achieves their objective, such as data exfiltration, ransomware deployment, or establishing long-term access to the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the execution of arbitrary code, persistence on the system, and further compromise of the network. Attackers can use this technique to bypass security controls and evade detection, potentially leading to data breaches, financial loss, or disruption of services. While the rule itself has a medium severity, the impact of a successful attack using this technique can be severe, depending on the attacker&rsquo;s objectives and the compromised data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Process Execution from Unusual Directory&rdquo; to your SIEM and tune for your environment to detect suspicious process execution.</li>
<li>Investigate any alerts generated by the Sigma rule to determine if the process execution is legitimate or malicious.</li>
<li>Enable process creation logging, specifically Event ID 4688 with command line process auditing, to ensure the Sigma rule has the necessary data to function effectively.</li>
<li>Review and harden permissions on the listed suspicious directories to prevent unauthorized file creation and execution.</li>
<li>Block execution of unsigned or untrusted executables from these directories using application control solutions.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>masquerading</category></item><item><title>Abuse of Windows Update Client for DLL Loading</title><link>https://feed.craftedsignal.io/briefs/2024-01-wuauclt-dll-load/</link><pubDate>Thu, 04 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wuauclt-dll-load/</guid><description>The Windows Update Auto Update Client (wuauclt.exe) is being abused to load arbitrary DLLs, a defense evasion technique where malicious activity blends with legitimate Windows software by using specific process arguments and placing DLLs in writable paths.</description><content:encoded><![CDATA[<p>Attackers are abusing the Windows Update Auto Update Client (wuauclt.exe) to execute arbitrary code by loading malicious DLLs. This technique allows malicious actors to evade defenses by masquerading their activity as legitimate Windows processes. The abuse involves using specific command-line arguments with wuauclt.exe to load a DLL from a user-writable directory. This behavior has been observed in various attacks aimed at evading traditional security measures. This is an effective defense evasion and execution technique, allowing attackers to execute code while blending in with normal system processes, potentially bypassing application control and other security mechanisms.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through an unrelated method.</li>
<li>The attacker places a malicious DLL in a directory writable by standard users, such as <code>C:\Users\&lt;username&gt;\</code>, <code>C:\ProgramData\</code>, <code>C:\Windows\Temp\</code>, or <code>C:\Windows\Tasks\</code>.</li>
<li>The attacker executes <code>wuauclt.exe</code> with the arguments <code>/RunHandlerComServer</code> and <code>/UpdateDeploymentProvider</code> along with the path to the malicious DLL. For example: <code>wuauclt.exe /RunHandlerComServer /UpdateDeploymentProvider /dll:&lt;path_to_malicious_dll&gt;</code>.</li>
<li><code>wuauclt.exe</code> loads the specified malicious DLL.</li>
<li>The malicious DLL executes arbitrary code within the context of the <code>wuauclt.exe</code> process.</li>
<li>The malicious code performs its intended actions, such as establishing persistence, communicating with a C2 server, or escalating privileges.</li>
<li>The attacker may then use the compromised system as a foothold for lateral movement within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary code within a trusted Windows process, potentially bypassing security controls and making detection more difficult. While specific victim counts are unavailable, this technique can be used in targeted attacks against organizations where defense evasion is a priority for the adversary. Successful execution can lead to complete system compromise, data theft, or further malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>ImageLoad via Windows Update Auto Update Client</code> to detect the execution of <code>wuauclt.exe</code> with suspicious arguments.</li>
<li>Monitor process creation events for <code>wuauclt.exe</code> with the arguments <code>/RunHandlerComServer</code> and <code>/UpdateDeploymentProvider</code>, focusing on DLL paths in user-writable directories.</li>
<li>Enable Sysmon process-creation and image-load logging to improve visibility into this type of attack.</li>
<li>Audit DLLs loaded by <code>wuauclt.exe</code> and investigate any unsigned or unexpected DLLs.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>lolbas</category><category>windows</category></item><item><title>Disable Windows Event and Security Logs Using Built-in Tools</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-windows-logs/</link><pubDate>Thu, 04 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-windows-logs/</guid><description>Attackers attempt to disable Windows Event and Security Logs using logman, PowerShell, or auditpol to evade detection and cover their tracks.</description><content:encoded><![CDATA[<p>Attackers often disable Windows Event and Security Logs to evade detection on compromised systems. This activity involves tampering with, clearing, and deleting event log data to break SIEM detections, cover their tracks, and slow down incident response. The methods employed include using the <code>logman</code> utility, PowerShell commands to disable the EventLog service, or <code>auditpol</code> to disable auditing. These actions are typically performed after initial access and privilege escalation to hinder forensic investigations and maintain persistence within the environment. Defenders should monitor for these specific tools and command-line arguments to identify potential attempts to disable logging.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system, possibly through phishing or exploiting a vulnerability.</li>
<li>The attacker escalates privileges to administrator level to gain the necessary permissions to modify event logging settings.</li>
<li>The attacker uses <code>logman.exe</code> with arguments to stop or delete EventLog traces (e.g., <code>logman.exe stop EventLog-*</code>, <code>logman.exe delete EventLog-*</code>).</li>
<li>Alternatively, the attacker uses PowerShell with <code>Set-Service</code> cmdlet to disable the EventLog service (e.g., <code>powershell.exe Set-Service EventLog -StartupType Disabled</code>).</li>
<li>The attacker can also use <code>auditpol.exe</code> to disable auditing policies, preventing future events from being logged (e.g., <code>auditpol.exe /success:disable</code>).</li>
<li>After disabling logging, the attacker performs malicious activities such as lateral movement, data exfiltration, or malware deployment, with a reduced risk of detection.</li>
<li>The attacker removes traces of their activity from other logs if possible.</li>
<li>The attacker maintains persistence and continues to exploit the compromised environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of Windows Event and Security Logs can severely hinder incident response and forensic investigations. The absence of log data makes it difficult to detect ongoing malicious activity, understand the scope of the compromise, and attribute the attack. This can lead to prolonged dwell time for attackers, increased data exfiltration, and greater overall damage to the organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Disable Windows Event and Security Logs Using Built-in Tools&rdquo; to your SIEM to detect the execution of <code>logman.exe</code>, PowerShell, and <code>auditpol.exe</code> with specific arguments related to disabling event logs.</li>
<li>Monitor process creation events for <code>logman.exe</code>, <code>powershell.exe</code>, <code>pwsh.exe</code>, <code>powershell_ise.exe</code>, and <code>auditpol.exe</code> with command-line arguments that indicate an attempt to disable event logging.</li>
<li>Enable Sysmon process creation logging to capture detailed command-line arguments for process monitoring.</li>
<li>Regularly review and audit Group Policy settings related to event logging to prevent unauthorized modifications.</li>
<li>Monitor for changes to the EventLog service configuration, including startup type and status, using system monitoring tools.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>eventlog</category></item><item><title>Process Activity via Compiled HTML File Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-compiled-html-execution/</link><pubDate>Wed, 03 Jan 2024 18:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-compiled-html-execution/</guid><description>Adversaries may conceal malicious code in compiled HTML files (.chm) and deliver them to a victim for execution, using the HTML Help executable (hh.exe) to proxy the execution of scripting interpreters and bypass security controls.</description><content:encoded><![CDATA[<p>Attackers are known to deliver malicious payloads within compiled HTML files (.chm) to bypass security measures and gain initial access to systems. This technique leverages the Microsoft HTML Help system and its associated executable, hh.exe, to proxy the execution of malicious code. Compiled HTML files can contain various types of content, including HTML documents, images, and scripting languages like VBA, JScript, Java, and ActiveX. By embedding malicious scripts or executables within a .chm file, attackers can trick users into executing them when they open the file. This is particularly effective because hh.exe is a signed binary, which may allow it to bypass certain security controls. The scope of this technique affects Windows systems where the HTML Help system is installed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious .chm file containing embedded malicious code, such as a PowerShell script or executable.</li>
<li>The attacker delivers the .chm file to the victim via social engineering, such as phishing or malicious websites.</li>
<li>The victim opens the .chm file, causing hh.exe to launch.</li>
<li>hh.exe processes the .chm file, rendering its content, which includes the embedded malicious script or executable.</li>
<li>The malicious code executes, often spawning a scripting interpreter like <code>powershell.exe</code> or <code>cmd.exe</code>.</li>
<li>The scripting interpreter executes commands to download additional payloads or perform malicious actions on the system.</li>
<li>The attacker gains initial access to the victim&rsquo;s system.</li>
<li>The attacker escalates privileges and moves laterally within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to initial access, code execution, and potentially full system compromise. This can result in data theft, malware installation, and further lateral movement within the network. The severity and impact depend on the permissions of the user running hh.exe and the nature of the malicious payload.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Compiled HTML File Spawning Suspicious Processes&rdquo; to your SIEM to detect instances where <code>hh.exe</code> is the parent process of scripting interpreters.</li>
<li>Enable Sysmon process creation logging to provide the necessary data for the Sigma rule to function correctly.</li>
<li>Monitor process execution chains for unknown processes originating from <code>hh.exe</code>, as mentioned in the investigation guide.</li>
<li>Implement email filtering and security awareness training to prevent users from opening malicious .chm files delivered via phishing.</li>
<li>Block the execution of unsigned or untrusted executables in the environment to reduce the risk of malicious code execution.</li>
<li>Use endpoint detection and response (EDR) solutions like Elastic Defend, CrowdStrike, Microsoft Defender XDR, and SentinelOne to detect and respond to malicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>execution</category><category>defense-evasion</category><category>compiled-html</category><category>windows</category><category>proxy-execution</category></item><item><title>Azure Firewall Modification or Deletion Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-azure-firewall-modified-or-deleted/</link><pubDate>Wed, 03 Jan 2024 18:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-azure-firewall-modified-or-deleted/</guid><description>An Azure firewall was created, modified, or deleted, potentially indicating malicious activity aimed at impairing network defenses.</description><content:encoded><![CDATA[<p>This alert identifies potentially malicious modifications or deletions of Azure firewalls. Azure firewalls are critical components for network security, controlling inbound and outbound traffic based on defined rules. An attacker who gains sufficient privileges within an Azure environment may attempt to disable or modify these firewalls to facilitate lateral movement, data exfiltration, or other malicious activities. This activity is particularly concerning as it represents a direct attempt to weaken the victim&rsquo;s security posture. The activity is detected via Azure Activity Logs. While legitimate administrative actions can trigger this alert, any unexpected or unauthorized changes to firewall configurations should be investigated promptly.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to an Azure environment, possibly through compromised credentials or exploiting a vulnerability in an application.</li>
<li>Attacker escalates privileges within the Azure subscription to gain permissions to manage network resources, including firewalls.</li>
<li>Attacker identifies the Azure firewalls in the target environment using Azure Resource Manager APIs or the Azure portal.</li>
<li>Attacker modifies firewall rules to allow unauthorized traffic, such as opening ports for command and control communication or disabling security rules. This is achieved via the <code>MICROSOFT.NETWORK/AZUREFIREWALLS/WRITE</code> operation.</li>
<li>Alternatively, the attacker deletes the Azure firewall using the <code>MICROSOFT.NETWORK/AZUREFIREWALLS/DELETE</code> operation, effectively removing network protections.</li>
<li>Attacker validates that their changes have been successfully applied by testing network connectivity or by reviewing the firewall configuration.</li>
<li>Attacker performs malicious activities such as lateral movement, data exfiltration, or deploying additional resources without firewall restrictions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification or deletion of Azure firewalls can have severe consequences. An attacker can bypass network security controls, leading to data breaches, unauthorized access to sensitive resources, and the potential for widespread disruption. This can result in financial losses, reputational damage, and regulatory penalties.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect unauthorized firewall modifications or deletions in Azure Activity Logs.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on unfamiliar user identities and user agents.</li>
<li>Review Azure RBAC roles and permissions to ensure the principle of least privilege is enforced, limiting the ability of users and service principals to modify or delete firewalls.</li>
<li>Monitor Azure Activity Logs for other suspicious activities, such as unusual resource deployments or changes to security settings.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>azure</category><category>firewall</category><category>defense-evasion</category></item><item><title>PowerShell P/Invoke Process Injection API Chain Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-powershell-pinvoke-process-injection/</link><pubDate>Wed, 03 Jan 2024 18:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-powershell-pinvoke-process-injection/</guid><description>This analytic detects PowerShell code that uses P/Invoke to call Windows API functions associated with process injection, such as VirtualAlloc, WriteProcessMemory, and CreateRemoteThread, indicating potential malicious activity.</description><content:encoded><![CDATA[<p>This detection identifies PowerShell scripts leveraging the P/Invoke (Platform Invoke) technology to perform process injection. P/Invoke allows managed code (like PowerShell) to call unmanaged functions exported from DLLs, including critical Windows API functions. Attackers use this to inject malicious code into legitimate processes for evasion and persistence. The detection focuses on identifying specific API chains commonly used in process injection techniques, such as allocating memory in a target process (VirtualAlloc), writing malicious code into the allocated memory (WriteProcessMemory), and executing the injected code (CreateRemoteThread). This activity is often associated with malware deployment, privilege escalation, and defense evasion. The detection logic is designed to identify these API chains either at the compile phase using Add-Type or during the execution phase, alerting on suspicious PowerShell behavior.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system, potentially through phishing or exploiting a vulnerability.</li>
<li>PowerShell is invoked to execute a malicious script.</li>
<li>The PowerShell script uses Add-Type and DllImport to declare external functions from Windows DLLs, including kernel32.dll and ntdll.dll.</li>
<li>The script uses functions such as OpenProcess to gain a handle to a target process.</li>
<li>VirtualAllocEx is called to allocate memory within the target process.</li>
<li>WriteProcessMemory is used to write malicious code into the allocated memory region of the target process.</li>
<li>CreateRemoteThread is called to create a new thread within the target process, pointing to the injected code.</li>
<li>The injected code executes within the context of the target process, achieving code execution and potential privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful process injection allows attackers to execute arbitrary code within the context of a trusted process, bypassing security controls and potentially gaining elevated privileges. This can lead to data theft, system compromise, or further propagation within the network. The use of PowerShell and P/Invoke makes detection more challenging, as the activity can blend in with legitimate system administration tasks. A successful attack could lead to the deployment of a VIP Keylogger or other malware, as noted in the provided references.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging (Event ID 4104) to provide the necessary data for detection (data_source).</li>
<li>Deploy the Sigma rule <code>PowerShell PInvoke Process Injection</code> to your SIEM and tune the rule to your environment (rules).</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the specific API chains identified in the <code>detection</code> section of the rule.</li>
<li>Review PowerShell execution policies and restrict the execution of unsigned scripts to reduce the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>process-injection</category><category>powershell</category><category>pinvoke</category><category>defense-evasion</category></item><item><title>Symbolic Link Creation to Shadow Copies for Credential Access</title><link>https://feed.craftedsignal.io/briefs/2024-01-shadow-copy-symlink/</link><pubDate>Wed, 03 Jan 2024 18:15:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-shadow-copy-symlink/</guid><description>Adversaries may create symbolic links to shadow copies to access sensitive files such as ntds.dit and browser credentials, enabling credential dumping using cmd.exe or powershell.exe.</description><content:encoded><![CDATA[<p>This rule identifies the creation of symbolic links to shadow copies on Windows systems. Attackers use this technique to gain access to sensitive files stored within shadow copies, including the ntds.dit file (containing password hashes), system boot keys, and browser offline credentials. This approach allows them to bypass normal file access controls and extract credentials for lateral movement or privilege escalation. The detection rule is designed to ingest data from various sources, including Elastic Defend, CrowdStrike, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, and Windows Security Event Logs, providing broad coverage across different endpoint security solutions. The activity is typically initiated by command-line tools like cmd.exe or powershell.exe, making detection through process monitoring feasible. This technique is particularly relevant as it targets credential dumping, a critical stage in many attack campaigns.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, possibly through phishing or exploitation of a vulnerability.</li>
<li>The attacker elevates privileges to gain administrative rights, which are required to create shadow copies and symbolic links.</li>
<li>The attacker creates a volume shadow copy using <code>vssadmin.exe</code> or similar tools.</li>
<li>The attacker uses <code>mklink</code> command or PowerShell <code>New-Item -ItemType SymbolicLink</code> to create a symbolic link to the shadow copy path.</li>
<li>The symbolic link points to a directory within the shadow copy containing sensitive files like <code>ntds.dit</code> or browser credential stores.</li>
<li>The attacker copies the targeted sensitive files (e.g., <code>ntds.dit</code>) from the shadow copy using the symbolic link.</li>
<li>The attacker removes the shadow copy to cover their tracks, although the symbolic link creation remains as evidence.</li>
<li>The attacker extracts credentials from the copied <code>ntds.dit</code> file offline for use in lateral movement or further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to gain unauthorized access to sensitive credentials stored on the compromised system. This can lead to lateral movement within the network, privilege escalation, and ultimately, the compromise of critical assets. If the <code>ntds.dit</code> file is accessed, the entire Active Directory domain could be at risk, potentially affecting thousands of users and systems. This type of attack is particularly damaging as it allows attackers to operate undetected for extended periods while they harvest credentials.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule &ldquo;Symbolic Link to Shadow Copy Created via Cmd&rdquo; to detect the creation of symbolic links to shadow copies via <code>cmd.exe</code> (rules).</li>
<li>Deploy the provided Sigma rule &ldquo;Symbolic Link to Shadow Copy Created via PowerShell&rdquo; to detect the creation of symbolic links to shadow copies via <code>powershell.exe</code> (rules).</li>
<li>Enable Sysmon Event ID 1 (Process Creation) logging to provide necessary data for the Sigma rules to function correctly (setup).</li>
<li>Review the &ldquo;Investigating Symbolic Link to Shadow Copy Created&rdquo; section in the rule&rsquo;s notes for triage and analysis steps when the rule triggers.</li>
<li>Monitor for the usage of <code>mklink</code> command with the <code>HarddiskVolumeShadowCopy</code> argument in process command lines.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>defense-evasion</category><category>windows</category></item><item><title>InstallUtil Process Making Network Connections for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-installutil-network-connection/</link><pubDate>Wed, 03 Jan 2024 18:15:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-installutil-network-connection/</guid><description>Detection of InstallUtil.exe making outbound network connections, which can indicate adversaries leveraging it to execute code and evade detection by proxying execution through a trusted system binary.</description><content:encoded><![CDATA[<p>InstallUtil.exe is a legitimate Windows utility used for installing and uninstalling server resources. Adversaries abuse InstallUtil.exe to execute malicious code under the guise of legitimate processes, often to evade detection. This technique allows attackers to proxy execution through a trusted system binary, potentially bypassing application control and security monitoring. The detection rule identifies suspicious network activity by monitoring InstallUtil.exe&rsquo;s outbound connections, flagging potential misuse by alerting on the initial network connection attempt. This activity is detected via the Elastic EQL rule &ldquo;InstallUtil Process Making Network Connections.&rdquo;</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access through an undisclosed method.</li>
<li>The attacker uses InstallUtil.exe to execute a malicious .NET assembly.</li>
<li>InstallUtil.exe loads the malicious assembly into its process.</li>
<li>The malicious assembly executes code that establishes an outbound network connection.</li>
<li>The connection is used for command and control (C2) or data exfiltration.</li>
<li>The attacker may use the C2 channel to download and execute further payloads.</li>
<li>The attacker performs lateral movement within the network.</li>
<li>The attacker achieves their objective, such as data theft or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution within the context of a trusted Windows process (InstallUtil.exe), bypassing application control and potentially evading detection. This could result in a compromised system, data exfiltration, or further malicious activities within the network. The scope of impact depends on the attacker&rsquo;s objectives and the level of access gained, potentially affecting entire organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging and network connection logging via Sysmon or Elastic Defend to provide the data needed for the rules below.</li>
<li>Deploy the Sigma rule &ldquo;InstallUtil Network Connection&rdquo; to your SIEM and tune for your environment to detect suspicious outbound network connections from InstallUtil.exe.</li>
<li>Investigate any alerts triggered by the Sigma rule by examining the parent process of InstallUtil.exe, destination IP addresses, and associated activities.</li>
<li>Implement network monitoring and alerting for unusual outbound connections from critical systems to enhance detection of similar threats in the future.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>proxy-execution</category><category>windows</category></item><item><title>Suspicious Windows Process Cluster Detection via Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-windows-process/</link><pubDate>Wed, 03 Jan 2024 18:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-windows-process/</guid><description>A machine learning job combination has identified a host with one or more suspicious Windows processes that exhibit unusually high malicious probability scores, potentially indicating masquerading and defense evasion tactics.</description><content:encoded><![CDATA[<p>This detection identifies suspicious Windows processes exhibiting high malicious probability scores. The rule leverages machine learning to detect clusters of processes that may be indicative of defense evasion tactics, such as masquerading or the use of LOLbins (Living Off The Land Binaries). Specifically, a supervised ML model (ProblemChild) predicts whether a process is malicious, and an unsupervised ML model assesses the aggregate score of process clusters on a single host. The rule focuses on identifying unusual process clusters on a single host, indicating potential masquerading tactics for defense evasion. The rule requires the Living off the Land (LotL) Attack Detection integration assets to be installed, as well as Windows process events collected by integrations such as Elastic Defend or Winlogbeat. It was last updated on 2026/04/01 and requires Elastic Stack version 9.4.0 or later.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to the Windows host through various methods, such as exploiting vulnerabilities or using compromised credentials (not detailed in source).</li>
<li>Execution: The attacker executes a LOLBin (e.g., PowerShell, cmd.exe, mshta.exe) on the compromised host.</li>
<li>Masquerading: The attacker attempts to masquerade the malicious activity by naming or placing the LOLBin within a legitimate system folder.</li>
<li>Defense Evasion: The attacker utilizes the LOLBin with specific command-line arguments designed to evade detection by traditional signature-based security solutions.</li>
<li>Privilege Escalation (Optional): The attacker may attempt to escalate privileges using further LOLBINS or other techniques.</li>
<li>Lateral Movement (Optional): The attacker may use the compromised host to move laterally to other systems within the network.</li>
<li>Command and Control (Optional): The attacker may establish command and control (C2) communication with an external server to receive further instructions.</li>
<li>Impact: The attacker achieves their objective, such as data exfiltration, ransomware deployment, or system disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to various negative impacts, including data breaches, financial loss, and reputational damage. The rule is assigned a low severity, due to it likely being a supplemental detection to other rules. Lateral movement and exfiltration can also be accomplished. There is no information available on the number of victims and specific sectors targeted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure the Living off the Land (LotL) Attack Detection integration is installed and configured correctly, along with either Elastic Defend or Winlogbeat, to collect Windows process events as outlined in the <a href="https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html">setup instructions</a>.</li>
<li>Review the host name associated with the suspicious process cluster to determine if it is a critical asset or has a history of similar alerts as suggested in the investigation guide.</li>
<li>Examine the specific processes flagged by the ProblemChild supervised ML model to identify any known LOLbins or unusual command-line arguments that may indicate masquerading, per the investigation guide.</li>
<li>Implement application whitelisting to prevent unauthorized or suspicious processes from executing in the future, as advised in the remediation steps.</li>
<li>Tune the anomaly threshold of the machine learning job (<code>problem_child_high_sum_by_host_ea</code>) to reduce false positives based on your environment&rsquo;s specific characteristics and activity patterns.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>masquerading</category><category>LOLbins</category><category>windows</category></item><item><title>PowerShell Suspicious Payload Encoded and Compressed</title><link>https://feed.craftedsignal.io/briefs/2024-01-powershell-compressed-payload/</link><pubDate>Wed, 03 Jan 2024 18:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-powershell-compressed-payload/</guid><description>Detects PowerShell scripts employing Base64 decoding combined with .NET decompression (Deflate/GZip) to deobfuscate and reconstruct malicious payloads in memory, evading traditional defenses.</description><content:encoded><![CDATA[<p>This detection identifies PowerShell scripts leveraging a combination of Base64 encoding and .NET compression techniques (Deflate/GZip) to conceal malicious payloads. Attackers employ this method to bypass security measures by deobfuscating and reconstructing the payload directly in memory. This technique allows adversaries to evade detection mechanisms that rely on static analysis of script content. The rule focuses on identifying script block content exhibiting this behavior, providing defenders with visibility into potential defense evasion attempts within their Windows environments. This rule was last updated on 2026-05-04, and its initial version was created on 2021/10/19.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access through methods like phishing or exploiting a vulnerability.</li>
<li>A PowerShell script is executed on the target system, potentially through a compromised user account.</li>
<li>The PowerShell script contains a Base64 encoded string representing a compressed payload.</li>
<li>The script uses the <code>FromBase64String</code> function to decode the Base64 encoded string.</li>
<li>The script decompresses the decoded data using .NET compression classes like <code>System.IO.Compression.DeflateStream</code> or <code>System.IO.Compression.GzipStream</code>.</li>
<li>The decompressed data reveals a malicious payload, such as a reverse shell or credential theft tool.</li>
<li>The script executes the payload in memory, bypassing traditional file-based detection methods.</li>
<li>The attacker achieves their objective, such as gaining persistent access, stealing data, or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to complete system compromise, data theft, and deployment of malware such as ransomware. The obfuscation techniques make detection more difficult, increasing the dwell time of attackers within the network. Windows systems are primarily affected. If Windows Defender Advanced Threat Protection is being used, this can evade its protection.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging to capture the necessary events for detection (related to the logsource in the rules below).</li>
<li>Deploy the Sigma rule &ldquo;PowerShell Suspicious Payload Encoded and Compressed&rdquo; to your SIEM and tune it for your environment.</li>
<li>Investigate any alerts generated by the rule, focusing on the reconstructed script block content.</li>
<li>Review PowerShell execution policies to restrict the execution of unsigned or untrusted scripts.</li>
<li>Monitor process telemetry for PowerShell instances and their parent processes.</li>
<li>Restrict PowerShell execution to trusted administrative paths where feasible.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>powershell</category><category>windows</category></item><item><title>Network Connection via Compiled HTML File</title><link>https://feed.craftedsignal.io/briefs/2024-01-hh-exe-network-connection/</link><pubDate>Wed, 03 Jan 2024 17:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-hh-exe-network-connection/</guid><description>This rule detects network connections initiated by hh.exe, the HTML Help executable, which may indicate the execution of malicious code embedded in compiled HTML files (.chm) to deliver malicious payloads, bypass security controls, and gain initial access via social engineering.</description><content:encoded><![CDATA[<p>Adversaries may conceal malicious code in a compiled HTML file (.chm) and deliver it to a victim for execution. CHM content is loaded by the HTML Help executable program (hh.exe). Attackers can use CHM files to proxy the execution of malicious payloads via a signed binary to bypass security controls, and also to gain initial access to environments via social engineering methods. This rule identifies network connections done by hh.exe, which can potentially indicate abuse to download malicious files or tooling, or masquerading. The detection logic focuses on network connections originating from hh.exe to external IPs, excluding private or reserved IP ranges.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The user receives a compiled HTML file (.chm), often through social engineering tactics such as phishing.</li>
<li>The user opens the .chm file, which is then executed by the HTML Help executable (hh.exe).</li>
<li>The hh.exe process loads and renders the HTML content within the .chm file.</li>
<li>Embedded within the HTML content is malicious JavaScript or other scripting code.</li>
<li>The malicious script executes, initiating a network connection via hh.exe to an external server.</li>
<li>The external server hosts a malicious payload, such as a reverse shell or an executable file.</li>
<li>Hh.exe downloads the malicious payload to the victim&rsquo;s machine.</li>
<li>The downloaded payload is executed, granting the attacker initial access or performing other malicious actions like data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to initial access to a victim&rsquo;s system, potentially bypassing security controls through a signed Microsoft binary. This can result in the download and execution of arbitrary payloads, leading to data exfiltration, lateral movement within the network, or installation of malware. The exploitation can spread rapidly through social engineering, affecting multiple users within an organization. While the severity is rated as medium, the potential for escalation to a critical compromise is high if the attacker gains a foothold in the environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process and network monitoring on Windows endpoints, focusing on hh.exe activity (Data Source: Elastic Defend, Sysmon, SentinelOne).</li>
<li>Deploy the Sigma rule <code>Network Connection via Compiled HTML File</code> to your SIEM and tune for your environment to detect suspicious network connections initiated by hh.exe.</li>
<li>Monitor for hh.exe spawning child processes, which could indicate the execution of downloaded payloads. Create a Sigma rule to detect such events.</li>
<li>Implement network segmentation to limit the impact of a compromised host and restrict lateral movement.</li>
<li>Conduct regular security awareness training to educate users about the risks of opening unsolicited .chm files.</li>
<li>Inspect the digital signatures of hh.exe and other system binaries to ensure their integrity and authenticity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>execution</category><category>defense-evasion</category><category>command-and-control</category><category>malicious-file</category><category>html-help</category></item></channel></rss>