<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Event-Subscription — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/event-subscription/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/event-subscription/feed.xml" rel="self" type="application/rss+xml"/><item><title>Detect Suspicious WMI Event Subscription Creation for Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-01-wmi-event-subscription/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wmi-event-subscription/</guid><description>This threat brief details the detection of malicious Windows Management Instrumentation (WMI) event subscriptions, a technique used by attackers for persistence and privilege escalation on Windows systems.</description><content:encoded><![CDATA[<p>Attackers abuse Windows Management Instrumentation (WMI) event subscriptions to establish persistence on compromised systems. By creating WMI event subscriptions that trigger malicious actions based on system events, adversaries can ensure their code executes automatically. This technique is particularly effective because WMI is a legitimate system administration tool, making malicious activity harder to detect. This rule focuses on detecting suspicious WMI event consumers, specifically <code>CommandLineEventConsumer</code> and <code>ActiveScriptEventConsumer</code>. The detection leverages Sysmon event code 21 and endpoint API events related to <code>IWbemServices::PutInstance</code> calls. The timeframe for the rule is set to look back 9 minutes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker uses PowerShell or another scripting language to interact with the WMI service.</li>
<li>The attacker creates a new WMI event filter to monitor for a specific system event.</li>
<li>The attacker creates a WMI event consumer, such as <code>CommandLineEventConsumer</code> or <code>ActiveScriptEventConsumer</code>, to execute a malicious payload.</li>
<li>The attacker links the event filter and consumer by creating a WMI event subscription.</li>
<li>The malicious WMI event subscription persists across reboots.</li>
<li>When the specified event occurs, the malicious consumer executes the attacker&rsquo;s payload.</li>
<li>The attacker maintains persistent access and can perform further malicious activities, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent access to the compromised system, even after reboots or other system changes. This can lead to long-term data theft, system compromise, or the deployment of ransomware. While the number of victims is unknown, this technique can be used against a wide range of Windows systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon WMI event logging to capture event code 21, which is crucial for detecting WMI event subscription creation.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious WMI Event Subscription Creation&rdquo; to your SIEM to identify potentially malicious WMI activity.</li>
<li>Investigate any process associated with the <code>IWbemServices::PutInstance</code> API call, particularly those using <code>CommandLineEventConsumer</code> or <code>ActiveScriptEventConsumer</code>, as indicated in the Attack Chain section.</li>
<li>Monitor for processes or activities around the time of the event to identify potential lateral movement or further persistence mechanisms as outlined in the overview.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>wmi</category><category>windows</category><category>event-subscription</category></item></channel></rss>