<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>File-Share — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/file-share/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 14:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/file-share/feed.xml" rel="self" type="application/rss+xml"/><item><title>Remote Execution via File Shares</title><link>https://feed.craftedsignal.io/briefs/2024-01-remote-execution-via-file-shares/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-remote-execution-via-file-shares/</guid><description>This rule identifies the execution of a file that was created by the virtual system process, potentially indicating lateral movement via network file shares in Windows environments.</description><content:encoded><![CDATA[<p>This detection identifies lateral movement via network file shares by detecting the execution of a file that was recently created by the virtual system process (PID 4), commonly associated with file share operations. Adversaries may leverage network shares to distribute malicious payloads or tools across the network to compromise additional hosts. This technique allows attackers to execute code remotely, expanding their foothold within the environment. The rule focuses on Windows systems and monitors for newly created executable files (e.g., .exe, .scr, .pif, .com) that are then executed. Exceptions are made for known legitimate software vendors and specific file paths to reduce false positives.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the network.</li>
<li>The attacker uploads a malicious executable (e.g., malware, custom tool) to a network file share. The file creation event is attributed to PID 4.</li>
<li>A user or automated process on a remote system accesses the file share.</li>
<li>The malicious executable is copied or accessed from the network share onto the remote system.</li>
<li>The user, either intentionally or through deception, executes the malicious executable.</li>
<li>The executed file initiates malicious activities on the remote system.</li>
<li>The attacker achieves code execution on the remote system.</li>
<li>The attacker uses this foothold for further lateral movement, data exfiltration, or other malicious objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation through remote execution via file shares can lead to widespread compromise across the network. Attackers can gain unauthorized access to sensitive data, install backdoors, or deploy ransomware. The impact ranges from data breaches and financial losses to significant disruption of business operations. The severity of the impact depends on the attacker&rsquo;s objectives and the extent of their lateral movement within the environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect suspicious executions of files created by PID 4 on Windows systems.</li>
<li>Review and restrict write access to network shares to minimize the risk of unauthorized file uploads.</li>
<li>Monitor file creation events (event.type in (&ldquo;creation&rdquo;, &ldquo;change&rdquo;)) on network shares for unusual activity using file integrity monitoring tools.</li>
<li>Investigate any alerts generated by the Sigma rule by examining the process execution chain and associated network connections.</li>
<li>Enrich process creation events (category: process_creation) with code signature information to validate the legitimacy of executed files.</li>
<li>Use osquery to retrieve the files&rsquo; SHA-256 hash values using the PowerShell <code>Get-FileHash</code> cmdlet and search for the existence and reputation of the hashes in resources like VirusTotal, Hybrid-Analysis, CISCO Talos, Any.run, etc.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>file-share</category><category>windows</category></item></channel></rss>