<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Explorer.exe — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/explorer.exe/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/explorer.exe/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious Explorer Child Process via DCOM</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-explorer-child-process/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-explorer-child-process/</guid><description>Adversaries abuse the trusted status of explorer.exe to launch malicious scripts or executables, often using DCOM to start processes like PowerShell or cmd.exe, achieving initial access, defense evasion, and execution.</description><content:encoded><![CDATA[<p>Attackers frequently exploit Windows Explorer (explorer.exe) to execute malicious code due to its inherent trust within the operating system. This involves spawning child processes such as PowerShell, cmd.exe, or other scripting engines via Component Object Model (COM) and Distributed Component Object Model (DCOM). This technique enables attackers to bypass security controls, blending malicious activity with legitimate system processes. The detection rule identifies such anomalies by monitoring child processes of Explorer with specific characteristics, excluding known benign activities, to flag potential threats. This activity is frequently associated with initial access and execution of follow-on malware.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attack begins with an initial access vector such as spearphishing (T1566).</li>
<li>A user clicks a malicious link or opens an attachment, leading to code execution.</li>
<li>The initial payload exploits explorer.exe through DCOM using the -Embedding argument.</li>
<li>Explorer.exe spawns a child process such as powershell.exe, cmd.exe, or mshta.exe (T1059, T1218).</li>
<li>The spawned process executes malicious commands or scripts.</li>
<li>These commands might download or execute additional payloads.</li>
<li>The attacker achieves code execution, potentially gaining persistence on the system.</li>
<li>The ultimate objective is often lateral movement, data exfiltration, or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary code within a trusted process context, bypassing application whitelisting and other security controls. This can lead to initial access, privilege escalation, and persistence within the compromised system. The compromise can remain undetected for extended periods due to the trusted nature of the parent process (explorer.exe), enabling attackers to perform reconnaissance, deploy malware, exfiltrate data, or disrupt services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line details to detect suspicious explorer.exe child processes.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Explorer Child Process - PowerShell&rdquo; to identify instances of PowerShell spawned by explorer.exe with suspicious arguments.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Explorer Child Process - Scripting Engines&rdquo; to detect other scripting engines launched by explorer.exe.</li>
<li>Monitor process execution events for processes like powershell.exe, cmd.exe, cscript.exe, wscript.exe, mshta.exe, regsvr32.exe, and rundll32.exe with a parent process of explorer.exe and the argument &ldquo;-Embedding&rdquo; via process creation logs.</li>
<li>Implement application control policies to restrict execution of unsigned or untrusted scripts and executables.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>initial-access</category><category>defense-evasion</category><category>execution</category><category>explorer.exe</category><category>dcom</category></item></channel></rss>