<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>File-Download — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/file-download/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 06 Apr 2026 15:34:19 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/file-download/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential File Download via a Headless Browser</title><link>https://feed.craftedsignal.io/briefs/2026-06-headless-browser-download/</link><pubDate>Mon, 06 Apr 2026 15:34:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-06-headless-browser-download/</guid><description>Detects the execution of headless browsers from suspicious parent processes with arguments indicative of scripted retrieval, bypassing application control policies and restrictions on direct download tools.</description><content:encoded><![CDATA[<p>This detection identifies potential file downloads via headless browsers on Windows systems. Attackers abuse headless browser capabilities (chrome.exe, msedge.exe, brave.exe, browser.exe, dragon.exe, vivaldi.exe) to download files, proxy traffic, and bypass application control policies. The technique leverages trusted, signed binaries to evade security restrictions, effectively using the browser as a covert download tool. The activity is characterized by a headless browser being launched from a suspicious parent process, such as a script host, Office application, or command shell, with arguments that facilitate scripted content retrieval like <code>--headless*</code>, <code>--dump-dom</code>, <code>*http*</code>, and <code>data:text/html;base64,*</code>. Defenders should monitor for such anomalous browser behavior to identify and prevent malicious file downloads.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user unknowingly executes a malicious script or document (e.g., via phishing or drive-by download).</li>
<li>The script (e.g., PowerShell, VBScript) or document macro initiates a process, such as cmd.exe or powershell.exe.</li>
<li>The parent process spawns a headless browser instance (chrome.exe, msedge.exe, etc.) with the <code>--headless</code> argument.</li>
<li>Additional arguments are passed to the headless browser to specify a URL for download or base64 encoded content (<code>--dump-dom *http*</code>, <code>data:text/html;base64,*</code>).</li>
<li>The headless browser retrieves the content from the specified URL or decodes the base64 data.</li>
<li>The browser saves the downloaded content to disk, often in a user-writable directory.</li>
<li>The initial script or document executes the downloaded file or uses it for further malicious activities.</li>
<li>The attacker achieves their objective, such as establishing persistence, exfiltrating data, or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, data compromise, and system compromise. Attackers can use this technique to download malware, bypass security controls, and establish a foothold in the compromised system. The impact can range from individual workstation compromise to large-scale network infiltration, depending on the attacker&rsquo;s objectives and the privileges of the compromised user.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules in this brief to your SIEM to detect suspicious headless browser activity, tuning for your environment.</li>
<li>Enable process creation logging and command-line auditing to capture the necessary data for the Sigma rules.</li>
<li>Investigate alerts generated by the Sigma rules, focusing on the parent process, browser arguments, and downloaded file artifacts.</li>
<li>Review and harden application control policies to restrict the execution of headless browsers from suspicious parent processes.</li>
<li>Monitor network connections from headless browsers to identify potential command and control traffic or data exfiltration attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-and-control</category><category>headless-browser</category><category>file-download</category><category>windows</category></item><item><title>Remote File Download via PowerShell</title><link>https://feed.craftedsignal.io/briefs/2024-01-remote-file-download-powershell/</link><pubDate>Wed, 03 Jan 2024 15:25:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-remote-file-download-powershell/</guid><description>Detects PowerShell being used to download executable files from untrusted remote destinations, a common technique for attackers to introduce tooling or malware into a compromised environment.</description><content:encoded><![CDATA[<p>Attackers frequently use PowerShell, a legitimate administration tool, to download malicious payloads into compromised systems. This technique allows them to bypass traditional security measures by leveraging a trusted tool. This activity often occurs during the command and control phase, where attackers introduce additional tooling or malware for further exploitation. This rule identifies instances where PowerShell downloads executable and script files from untrusted remote destinations. It does this by correlating network and file events, specifically looking for PowerShell processes initiating network connections to non-whitelisted domains followed by the creation of executable or script files. The rule helps defenders identify and respond to potential command and control activity and malware deployment attempts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, possibly through phishing or exploiting a vulnerability.</li>
<li>The attacker uses PowerShell (powershell.exe, pwsh.exe, or powershell_ise.exe) to initiate a network connection to a remote domain.</li>
<li>The DNS request is made to a domain not in the allowed list (e.g., not *.microsoft.com, *.azureedge.net, etc.).</li>
<li>PowerShell downloads a file with an executable extension (e.g., .exe, .dll, .ps1, .bat) or a file with a MZ header.</li>
<li>The downloaded file is saved to disk.</li>
<li>The file is saved to a location that is not excluded by the rule, filtering out commonly used temporary directories.</li>
<li>The downloaded executable or script is then executed, leading to further malicious activities.</li>
<li>The attacker achieves persistence, lateral movement, or data exfiltration depending on the downloaded payload.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the introduction of malware, backdoors, or other malicious tools into the compromised system. This can enable attackers to perform a wide range of malicious activities, including data theft, system compromise, and further propagation within the network. The compromised system can become a beachhead for further attacks, potentially impacting numerous systems and leading to significant financial and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>PowerShell Remote File Download</code> to detect PowerShell processes downloading executable files from untrusted remote destinations by correlating network and file creation events.</li>
<li>Enable Elastic Defend to provide the necessary network and file event data for the rule to function correctly as noted in the <a href="https://ela.st/install-elastic-defend">setup instructions</a>.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the parent process of the PowerShell process, the reputation of the downloaded file, and any other suspicious activities on the affected host, as per the investigation guide in the rule&rsquo;s <code>note</code> field.</li>
<li>Review and customize the whitelisted domains in the Sigma rule to match your organization&rsquo;s specific environment and trusted external resources, as described in the <code>query</code> field.</li>
<li>Block the identified malicious domains or IP addresses at the network perimeter to prevent further downloads.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>file-download</category><category>powershell</category><category>windows</category></item><item><title>Remote File Download via Desktopimgdownldr Utility</title><link>https://feed.craftedsignal.io/briefs/2024-01-desktopimgdownldr-remote-file-copy/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-desktopimgdownldr-remote-file-copy/</guid><description>The desktopimgdownldr utility can be abused to download remote files, potentially bypassing standard download restrictions and acting as an alternative to certutil for malware or tool deployment.</description><content:encoded><![CDATA[<p>The <code>desktopimgdownldr.exe</code> utility, a legitimate Windows tool for configuring lock screen and desktop images, can be misused by adversaries to download arbitrary files from remote locations. This is achieved by leveraging the <code>/lockscreenurl</code> argument followed by an HTTP or HTTPS URL. This technique allows attackers to bypass traditional download restrictions and can be used to retrieve malicious payloads, tools, or scripts directly onto a compromised system. This method is particularly effective because <code>desktopimgdownldr.exe</code> is a signed Microsoft binary, potentially evading initial detection based on process name or file reputation. The detection rule was initially created in September 2020 and updated in May 2026. This technique is valuable for attackers seeking to transfer files without using common tools like <code>certutil</code>, <code>powershell</code>, or <code>bitsadmin</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system through an existing vulnerability, credential compromise, or social engineering.</li>
<li>The attacker executes <code>desktopimgdownldr.exe</code> with the <code>/lockscreenurl</code> argument, specifying a URL from which to download a malicious file.</li>
<li><code>desktopimgdownldr.exe</code> initiates an HTTP or HTTPS request to the specified URL.</li>
<li>The remote server responds with the file content, which <code>desktopimgdownldr.exe</code> saves to disk.</li>
<li>The attacker then executes the downloaded file (e.g., a malicious script or executable).</li>
<li>The malicious code performs actions such as establishing persistence, escalating privileges, or deploying further malware.</li>
<li>The attacker uses the compromised system to move laterally within the network, accessing sensitive data and systems.</li>
<li>The attacker achieves their final objective, such as data exfiltration, ransomware deployment, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to download and execute arbitrary files on a Windows system, leading to potential compromise of the host and the network. This can result in data theft, system damage, or ransomware infection. Due to the legitimate nature of the <code>desktopimgdownldr.exe</code> utility, this technique can bypass security controls and detection mechanisms, increasing the likelihood of successful exploitation. While the exact number of victims is unknown, any Windows system where an attacker can execute commands is potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Remote File Download via Desktopimgdownldr Utility&rdquo; to your SIEM to detect the execution of <code>desktopimgdownldr.exe</code> with the <code>/lockscreenurl</code> argument.</li>
<li>Monitor process creation events for <code>desktopimgdownldr.exe</code> to identify suspicious command-line arguments.</li>
<li>Enable Sysmon process creation logging to ensure sufficient data is available for the provided Sigma rules.</li>
<li>Investigate any instances of <code>desktopimgdownldr.exe</code> downloading files from external URLs to determine if they are malicious.</li>
<li>Implement application control policies to restrict the execution of unauthorized or unknown executables in sensitive environments.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>file-download</category><category>windows</category><category>desktopimgdownldr</category></item></channel></rss>