<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Evasion — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/evasion/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 27 Jan 2024 18:29:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/evasion/feed.xml" rel="self" type="application/rss+xml"/><item><title>Detection of Obfuscated IP Address Usage in Download Commands</title><link>https://feed.craftedsignal.io/briefs/2024-01-obfuscated-ip-download/</link><pubDate>Sat, 27 Jan 2024 18:29:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-obfuscated-ip-download/</guid><description>This brief details the use of obfuscated IP addresses within download commands, often employed to evade detection by hiding the true destination of malicious downloads.</description><content:encoded><![CDATA[<p>Attackers are increasingly using obfuscated IP addresses (e.g., hexadecimal, octal, or other encoded representations) within download commands to bypass security measures that rely on simple IP address blacklisting or pattern matching. This technique makes it more difficult to identify malicious network connections based on simple string matching. The observed commands include <code>Invoke-WebRequest</code>, <code>Invoke-RestMethod</code>, <code>wget</code>, <code>curl</code>, <code>DownloadFile</code>, and <code>DownloadString</code>. Defenders need to detect these obfuscated IPs to identify and block malicious download attempts. This technique has been observed across various attack campaigns and is a common tactic used to deliver malware while attempting to evade detection.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker crafts a command containing an obfuscated IP address. This may involve converting a standard IP address into its hexadecimal, octal, or decimal representation.</li>
<li>The attacker utilizes a command-line tool such as <code>curl</code>, <code>wget</code>, or PowerShell&rsquo;s <code>Invoke-WebRequest</code> to initiate a download. The command includes the obfuscated IP within a URL.</li>
<li>The command interpreter resolves the obfuscated IP address back to its standard format before initiating the network connection.</li>
<li>The target host establishes a connection to the attacker&rsquo;s server at the resolved IP address.</li>
<li>The attacker&rsquo;s server delivers a malicious payload, such as a script, executable, or document containing macros.</li>
<li>The downloaded payload is executed on the target system, potentially leading to further compromise, such as privilege escalation or lateral movement.</li>
<li>The attacker achieves their final objective, such as data exfiltration, ransomware deployment, or establishing persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the download and execution of malware, potentially compromising the targeted system. This can result in data breaches, system disruption, or financial loss. The use of obfuscation techniques makes it more difficult to detect and prevent these attacks, increasing the risk of successful compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Obfuscated IP Download Activity&rdquo; to your SIEM to detect the use of obfuscated IP addresses in download commands. Tune the rule for your environment to minimize false positives.</li>
<li>Investigate any process creation events that match the Sigma rule, paying close attention to the command-line arguments.</li>
<li>Consider implementing additional network-based detection mechanisms to identify connections to suspicious IP addresses, even if they are obfuscated.</li>
<li>Monitor process creation logs (Sysmon) for processes executing download commands like <code>Invoke-WebRequest</code>, <code>Invoke-RestMethod</code>, <code>wget</code>, <code>curl</code>, <code>DownloadFile</code>, and <code>DownloadString</code> with suspicious arguments.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>discovery</category><category>evasion</category><category>obfuscation</category></item><item><title>Suspicious HTML File Creation Leading to Potential Payload Delivery</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-html-creation/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-html-creation/</guid><description>This detection identifies the creation of HTML files with high entropy and large size, followed by execution via a browser process, indicating potential HTML smuggling and malicious payload delivery on Windows systems.</description><content:encoded><![CDATA[<p>This detection rule identifies a suspicious sequence of events indicative of HTML smuggling, where adversaries embed malicious payloads within seemingly benign HTML files to bypass security filters. The rule focuses on Windows systems and monitors for the creation of HTML files exhibiting characteristics such as high entropy (&gt;=5) and large size (&gt;=150,000 bytes) or very large size (&gt;=1,000,000 bytes) within common download and temporary directories (e.g., Downloads, Content.Outlook, AppData\Local\Temp). Subsequently, it tracks the execution of browser processes (e.g., chrome.exe, firefox.exe, iexplore.exe) opening these HTML files with specific command-line arguments (e.g., &ndash;single-argument, -url). The detection aims to uncover initial access attempts, defense evasion, and user execution of malicious files delivered through HTML smuggling techniques.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user receives a phishing email containing a malicious HTML attachment.</li>
<li>The user opens the attachment, triggering the download of a large HTML file to the Downloads folder.</li>
<li>The HTML file contains obfuscated JavaScript code that, when executed, reconstructs a malicious payload (e.g., a Cobalt Strike beacon).</li>
<li>The file is saved with an .htm or .html extension in a temporary or download directory.</li>
<li>A browser process (chrome.exe, firefox.exe, etc.) is initiated to open the HTML file, often with specific arguments like &ldquo;&ndash;single-argument&rdquo; or &ldquo;-url&rdquo;.</li>
<li>The browser renders the HTML, executing the embedded JavaScript.</li>
<li>The JavaScript deobfuscates and executes the smuggled payload, initiating a reverse shell connection to a command-and-control server.</li>
<li>The attacker gains initial access to the compromised system and can proceed with lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via HTML smuggling can lead to initial access to a targeted system, potentially enabling attackers to perform lateral movement, data exfiltration, or ransomware deployment. While the specific number of victims and targeted sectors are not explicitly stated in the source, the technique is broadly applicable and can affect any Windows user who interacts with malicious HTML attachments or downloads from untrusted sources. The consequences of successful exploitation range from data breaches and financial losses to reputational damage and operational disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM and tune the file path and browser process filters for your environment.</li>
<li>Enable file integrity monitoring (FIM) on common download and temporary directories to detect the creation of suspicious HTML files as described in the Sigma rules.</li>
<li>Implement network egress filtering to block connections to known malicious command-and-control servers and domains to prevent payload execution.</li>
<li>Educate users about the risks of opening attachments from untrusted sources and train them to recognize phishing emails as outlined in the Overview.</li>
<li>Utilize endpoint detection and response (EDR) solutions to monitor process execution and network connections for anomalous behavior associated with HTML smuggling.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>html-smuggling</category><category>phishing</category><category>initial-access</category><category>windows</category><category>evasion</category></item><item><title>Detection of Obfuscated IP Addresses via Command Line Tools</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-obfuscated-ip-cli/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-obfuscated-ip-cli/</guid><description>The use of command-line tools like ping.exe or arp.exe with obfuscated IP addresses (hex, octal, etc.) in the command line can indicate reconnaissance activity or attempts to evade security controls by masking the true destination.</description><content:encoded><![CDATA[<p>Attackers may attempt to obscure their activities by using obfuscated IP addresses within command-line tools. This is done to bypass simple pattern matching or detection rules that rely on standard IP address formats. The Sigma rule &ldquo;Obfuscated IP Via CLI&rdquo; published on 2022-08-03 and modified on 2026-03-16, focuses on detecting this behavior by identifying command lines containing hexadecimal, octal, or other encoded representations of IP addresses used with <code>ping.exe</code> or <code>arp.exe</code>. This activity can indicate reconnaissance, command and control communication, or lateral movement attempts where attackers are trying to hide the true destination of their network traffic.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system.</li>
<li>The attacker opens a command prompt (cmd.exe) or PowerShell.</li>
<li>The attacker uses <code>ping.exe</code> or <code>arp.exe</code> to test network connectivity.</li>
<li>The attacker crafts a command line that includes an obfuscated IP address (e.g., hexadecimal, octal). For example: <code>ping 0121.04.0174.012</code></li>
<li>The command is executed, attempting to resolve or connect to the obfuscated IP address.</li>
<li>If the obfuscation bypasses security controls, the tool resolves the address.</li>
<li>The attacker gathers information about the target system (if ping is successful) or network.</li>
<li>The attacker uses this information for further exploitation or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of obfuscated IPs can lead to undetected reconnaissance, lateral movement, and data exfiltration. By hiding the true destination of network traffic, attackers can bypass traditional security measures and gain a foothold within the network. The impact includes potential data breaches, system compromise, and disruption of services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Obfuscated IP Via CLI&rdquo; Sigma rule to your SIEM to detect command-line execution with obfuscated IP addresses.</li>
<li>Enable process creation logging for <code>ping.exe</code> and <code>arp.exe</code> to ensure the Sigma rule has the necessary data.</li>
<li>Investigate any alerts generated by the Sigma rule to determine if the activity is malicious.</li>
<li>Implement network segmentation to limit the scope of potential lateral movement.</li>
<li>Monitor command-line activity for unusual patterns or arguments.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>reconnaissance</category><category>evasion</category><category>command-line</category></item></channel></rss>