<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Living-Off-the-Land — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/living-off-the-land/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 09 Jan 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/living-off-the-land/feed.xml" rel="self" type="application/rss+xml"/><item><title>Crowdstrike RTR Script Execution via PowerShell</title><link>https://feed.craftedsignal.io/briefs/2024-01-crowdstrike-rtr-script-execution/</link><pubDate>Tue, 09 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-crowdstrike-rtr-script-execution/</guid><description>Detection of PowerShell execution initiated via Crowdstrike Real Time Response (RTR) 'runscript' command, potentially indicating malicious actors leveraging compromised Crowdstrike Dashboard access to execute commands on remote hosts using encoded commands.</description><content:encoded><![CDATA[<p>This threat brief addresses the abuse of Crowdstrike Real Time Response (RTR) functionality to execute arbitrary commands on managed hosts. Attackers with access to a Crowdstrike Dashboard can use the &ldquo;runscript&rdquo; command to execute scripts, often PowerShell, on remote systems. This is particularly concerning because it allows attackers to leverage a trusted platform for malicious purposes, potentially bypassing traditional security controls. The encoded commands within PowerShell obfuscate the attacker&rsquo;s actions, making detection more challenging. This technique has been observed in past campaigns where threat actors target SaaS applications, highlighting the potential for significant impact on organizations relying on these services.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains unauthorized access to the Crowdstrike Dashboard.</li>
<li>Attacker uses the RTR &ldquo;runscript&rdquo; command to initiate a PowerShell script execution on a target host.</li>
<li>The RTR process spawns <code>dllhost.exe</code> to execute the script.</li>
<li><code>dllhost.exe</code> initiates <code>powershell.exe</code> with encoded command parameters (<code>-EncodedCommand</code>).</li>
<li>PowerShell executes the attacker-controlled, obfuscated script.</li>
<li>The script performs malicious activities such as reconnaissance, lateral movement, or data exfiltration.</li>
<li>Results of the script execution may be returned to the attacker via command and control channels.</li>
<li>Attacker achieves their final objective, such as data theft, system compromise, or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to complete compromise of targeted systems. An attacker with RTR access can use this technique to bypass normal endpoint security controls. This can result in data breaches, financial losses, and reputational damage. The impact is amplified by the trust relationship between Crowdstrike and its managed endpoints, making detection and prevention more difficult.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Crowdstrike RTR PowerShell EncodedCommand Execution</code> to identify suspicious PowerShell executions originating from Crowdstrike RTR.</li>
<li>Monitor process creation events (Sysmon EventID 1) and filter for PowerShell processes with encoded commands (<code>-EncodedCommand</code>) where the parent process is <code>dllhost.exe</code>.</li>
<li>Review and restrict Crowdstrike Dashboard access to only authorized personnel to prevent unauthorized use of RTR.</li>
<li>Implement multi-factor authentication (MFA) for all Crowdstrike Dashboard accounts.</li>
<li>Implement the Sigma rule <code>Detect Crowdstrike RTR PowerShell EncodedCommand Execution - Alternate</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>living-off-the-land</category><category>rtr</category><category>script-execution</category></item><item><title>Suspicious MSBuild Spawned by WMI Provider Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-msbuild-spawn/</link><pubDate>Wed, 03 Jan 2024 18:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-msbuild-spawn/</guid><description>The analytic identifies instances where wmiprvse.exe spawns msbuild.exe, an unusual process relationship indicative of potential COM object misuse and unauthorized code execution on Windows systems.</description><content:encoded><![CDATA[<p>This detection identifies a suspicious process execution pattern where <code>wmiprvse.exe</code> (the WMI Provider Host process) spawns <code>msbuild.exe</code>. This behavior is atypical because <code>msbuild.exe</code> is usually initiated by <code>devenv.exe</code> (Visual Studio) during software development. An adversary might leverage this technique to proxy execution of malicious code through a trusted Windows utility, a tactic known as &ldquo;Living off the Land.&rdquo; The activity is significant because it allows attackers to execute arbitrary code or scripts without directly introducing new executables, potentially leading to system compromise or further malicious activities, such as lateral movement and data exfiltration. The detection focuses on process relationships and command-line executions observed on Windows endpoints. This technique has been observed in campaigns such as the Storm-2460 CLFS Zero Day Exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system through an exploit or compromised credentials.</li>
<li>The attacker uses WMI to execute a malicious command or script.</li>
<li><code>wmiprvse.exe</code> is invoked as part of the WMI execution process.</li>
<li>The attacker crafts a malicious project file or uses an existing one to execute code through MSBuild.</li>
<li><code>wmiprvse.exe</code> spawns <code>msbuild.exe</code> to build and execute the malicious project.</li>
<li><code>msbuild.exe</code> executes the attacker&rsquo;s code, potentially downloading additional payloads or executing commands.</li>
<li>The attacker achieves code execution within the context of MSBuild, bypassing some application control defenses.</li>
<li>The attacker performs further malicious activities such as credential theft, lateral movement, or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary code, escalate privileges, and bypass application control mechanisms. This can lead to full system compromise, data theft, and further propagation within the network. The number of affected systems depends on the scope of the initial compromise. Successful attacks leveraging this technique have been observed to facilitate lateral movement and data exfiltration.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging (Event ID 1) to capture process relationships for detection.</li>
<li>Deploy the Sigma rule <code>Suspicious MSBuild Spawned by WMI Provider</code> to your SIEM to detect anomalous process spawns.</li>
<li>Investigate any instances where <code>wmiprvse.exe</code> spawns <code>msbuild.exe</code>, focusing on the executed command-line arguments and project files.</li>
<li>Implement application control policies to restrict the execution of <code>msbuild.exe</code> to authorized users and processes.</li>
<li>Monitor for suspicious network connections originating from <code>msbuild.exe</code> processes using a network intrusion detection system (NIDS).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>living-off-the-land</category><category>defense-evasion</category><category>msbuild</category></item><item><title>Suspicious MSBuild Execution from Non-Standard Path</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-msbuild-non-standard-path/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-msbuild-non-standard-path/</guid><description>Detection of msbuild.exe execution from a non-standard path, indicating potential attempts to evade detection and execute malicious code.</description><content:encoded><![CDATA[<p>Attackers commonly abuse msbuild.exe, a legitimate Microsoft build tool, to execute malicious code while bypassing security controls. This technique, known as &ldquo;Living off the Land,&rdquo; allows threat actors to utilize trusted system binaries to perform malicious actions. This analytic focuses on detecting instances where msbuild.exe is executed from a non-standard path. This deviation from the expected execution path is a strong indicator of malicious activity, as legitimate uses typically involve the standard installation directory. Identifying and responding to these anomalous executions can prevent attackers from gaining a foothold and escalating their attacks. This detection is relevant across various attack scenarios, including malware deployment, privilege escalation, and lateral movement.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access through various methods (e.g., phishing, exploiting a vulnerability).</li>
<li>File Dropping: A malicious payload or script is dropped onto the system.</li>
<li>MSBuild Download: Attacker downloads a malicious .csproj file or modifies an existing one.</li>
<li>Evade defenses: The attacker copies msbuild.exe to a non-standard path.</li>
<li>Execution: The attacker executes msbuild.exe from the non-standard path, pointing it to the malicious .csproj file.</li>
<li>Code Execution: MSBuild parses the project file and executes the embedded malicious code or commands.</li>
<li>Persistence/Lateral Movement: Depending on the executed code, the attacker establishes persistence or moves laterally within the network.</li>
<li>Objective Achieved: The attacker achieves their objective, such as data theft, system compromise, or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, system compromise, data exfiltration, and further malicious activities. The execution of msbuild.exe from a non-standard path is often a precursor to more serious attacks, including ransomware deployment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the Sigma rule &ldquo;Suspicious MSBuild Execution from Non-Standard Path&rdquo; to detect msbuild.exe execution from unusual locations based on process creation logs.</li>
<li>Enable process creation logging with command-line arguments via Sysmon or other EDR solutions to ensure accurate detection of msbuild.exe execution.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on the parent process, command-line arguments, and destination IP addresses.</li>
<li>Baseline MSBuild.exe usage within your environment to identify legitimate uses and filter them from the detection logic.</li>
<li>Monitor for network connections originating from msbuild.exe processes launched from non-standard paths to identify potential command and control activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>msbuild</category><category>lolbas</category><category>living-off-the-land</category><category>defense-evasion</category></item><item><title>Suspicious Microsoft Workflow Compiler Usage</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-workflow-compiler/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-workflow-compiler/</guid><description>The use of Microsoft Workflow Compiler (microsoft.workflow.compiler.exe), a rarely utilized executable typically found in C:\Windows\Microsoft.NET\Framework64\v4.0.30319, can indicate malicious intent such as code execution or persistence mechanisms, potentially leading to unauthorized access.</description><content:encoded><![CDATA[<p>The Microsoft Workflow Compiler (microsoft.workflow.compiler.exe) is a legitimate Microsoft executable, but its usage is uncommon in typical environments. This makes it an attractive target for attackers looking to bypass security controls and execute malicious code. Located in C:\Windows\Microsoft.NET\Framework64\v4.0.30319, the executable is designed for compiling workflow definitions, but can be abused to execute arbitrary code. Its rare usage means that any execution of this binary warrants further investigation. This activity is often seen after initial compromise, as an attempt to establish persistence or execute payloads.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system, potentially through exploitation of a vulnerability or social engineering.</li>
<li>The attacker leverages an existing scripting capability (e.g., PowerShell) to stage the malicious payload.</li>
<li>The attacker executes microsoft.workflow.compiler.exe to compile and execute a malicious workflow definition.</li>
<li>The workflow definition contains embedded code or calls out to external resources to download and execute additional payloads.</li>
<li>The compiled code executes in the context of the workflow compiler process, potentially bypassing application whitelisting.</li>
<li>The attacker establishes persistence by creating a scheduled task or modifying registry keys to automatically execute the malicious workflow on system startup.</li>
<li>The attacker performs lateral movement using the compromised system as a pivot point to access other systems within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can allow attackers to execute arbitrary code, bypass application whitelisting, and establish persistence on compromised systems. The lack of widespread usage of the Microsoft Workflow Compiler makes its malicious use difficult to detect, potentially allowing attackers to maintain a foothold in the environment for extended periods. If the attacker achieves persistence and lateral movement, it could lead to data exfiltration, ransomware deployment, or other significant security incidents.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Suspicious Microsoft Workflow Compiler Execution</code> to detect the execution of <code>microsoft.workflow.compiler.exe</code> with unusual parent processes.</li>
<li>Enable Sysmon process creation logging (Event ID 1) or Windows Event Log Security (4688) to ensure the necessary telemetry for the detection is available.</li>
<li>Investigate any identified instances of <code>microsoft.workflow.compiler.exe</code> execution, paying close attention to the parent process, command-line arguments, and network activity.</li>
<li>Monitor process execution data for unusual parent-child process relationships involving <code>microsoft.workflow.compiler.exe</code>, especially if the parent process is a scripting engine like PowerShell or cmd.exe.</li>
<li>Review and tune the <code>suspicious_microsoft_workflow_compiler_usage_filter</code> macro in the original Splunk search to reduce false positives in your environment.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>living-off-the-land</category><category>proxy-execution</category><category>endpoint</category></item><item><title>Suspicious Microsoft Workflow Compiler Rename</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-workflow-compiler-rename/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-workflow-compiler-rename/</guid><description>Detection of the renaming of microsoft.workflow.compiler.exe, a technique used by attackers to evade security controls and potentially execute arbitrary code for privilege escalation or persistence.</description><content:encoded><![CDATA[<p>This brief focuses on the suspicious renaming of the Microsoft Workflow Compiler (microsoft.workflow.compiler.exe), a legitimate but rarely used executable typically found in C:\Windows\Microsoft.NET\Framework64\v4.0.30319. Attackers may rename this file to masquerade malicious activity and bypass security solutions that rely on file name-based detection. This technique can be employed by various threat actors, including ransomware groups like BlackByte, to execute arbitrary code, escalate privileges, and maintain persistence on compromised systems. The LOLBAS Project documents this binary as a potential avenue for malicious code execution. This activity is significant because it represents a living-off-the-land tactic (LOTL) that is harder to detect than custom malware.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker identifies Microsoft.Workflow.Compiler.exe in C:\Windows\Microsoft.NET\Framework64\v4.0.30319.</li>
<li>The attacker renames Microsoft.Workflow.Compiler.exe to a different name (e.g., svchost.exe) using a command-line tool like <code>rename</code>.</li>
<li>The attacker executes the renamed executable with malicious parameters or a payload.</li>
<li>The renamed Microsoft Workflow Compiler executes arbitrary code, bypassing file name-based security controls.</li>
<li>The attacker achieves privilege escalation by exploiting the trust associated with the original executable.</li>
<li>The attacker establishes persistence by scheduling the renamed executable to run automatically.</li>
<li>The attacker uses the compromised system to move laterally, exfiltrate data, or deploy ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful renaming and execution of the Microsoft Workflow Compiler can lead to significant compromise, allowing attackers to bypass security measures and execute arbitrary code. This can lead to privilege escalation, persistence, and further malicious activities such as data theft or ransomware deployment. The BlackByte ransomware group has been known to use similar LOLBIN techniques, and the ease of renaming the file makes it a popular choice for attackers looking to evade detection.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events (Sysmon EventID 1 or Windows Event Log Security 4688) for the execution of renamed Microsoft Workflow Compiler processes using the provided Sigma rule <code>Detect Suspicious Microsoft Workflow Compiler Execution</code>.</li>
<li>Implement endpoint detection and response (EDR) solutions to collect and analyze process telemetry, including process names, original file names, parent processes, and command-line arguments.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Microsoft Workflow Compiler Rename</code> to identify instances where <code>Microsoft.Workflow.Compiler.exe</code> is renamed.</li>
<li>Investigate any alerts generated by the Sigma rules, paying close attention to the parent processes, command-line arguments, and destination hosts.</li>
<li>Enable Sysmon process creation logging to activate the rules above.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>lolbin</category><category>defense-evasion</category><category>living-off-the-land</category><category>masquerading</category></item><item><title>Detection of Processes Launching netsh.exe for Malicious Purposes</title><link>https://feed.craftedsignal.io/briefs/2024-01-netsh-abuse/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-netsh-abuse/</guid><description>Detection of netsh.exe execution by unusual processes indicative of potential malicious activity, including persistence and network configuration changes by threat actors.</description><content:encoded><![CDATA[<p>This brief focuses on the anomalous execution of <code>netsh.exe</code>, a command-line utility native to Windows operating systems used for network configuration. While legitimate use of <code>netsh.exe</code> exists, its invocation by uncommon processes can signify malicious activity, such as establishing persistence or modifying network settings. This activity has been observed in attacks attributed to Volt Typhoon, where it was used for &ldquo;living off the land&rdquo; tactics targeting US critical infrastructure, and in malware campaigns involving Azorult, Snake Keylogger, ShrinkLocker, and Hellcat Ransomware. Defenders should monitor for unexpected processes launching <code>netsh.exe</code> to identify potential threats within their environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system through various means (e.g., compromised credentials, exploitation of vulnerabilities).</li>
<li>The attacker attempts to establish persistence on the compromised system.</li>
<li>The attacker uses a process (e.g., a script interpreter or legitimate application) to execute <code>netsh.exe</code>.</li>
<li><code>netsh.exe</code> is invoked with specific commands to modify network configurations (e.g., adding firewall rules, configuring port forwarding, or changing DNS settings).</li>
<li>These network configuration changes facilitate further malicious activities, such as lateral movement, command and control communication, or data exfiltration.</li>
<li>Malicious helper DLLs are loaded through <code>netsh.exe</code> to maintain persistent access.</li>
<li>The attacker uses the compromised system as a foothold to move laterally within the network, targeting critical assets.</li>
<li>The attacker achieves their objective, such as data theft, system disruption, or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via anomalous <code>netsh.exe</code> execution can lead to significant network compromise, including persistent access for attackers, unauthorized modification of network settings, and potential privilege escalation. This can result in data breaches, service disruption, and reputational damage. The Volt Typhoon campaign targeted US critical infrastructure, demonstrating the potential for significant impact on national security. Multiple malware families including Azorult, Snake Keylogger, ShrinkLocker, and Hellcat Ransomware have been known to abuse <code>netsh.exe</code>.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events (Sysmon Event ID 1, Windows Event Log Security 4688) for the execution of <code>netsh.exe</code> by unusual parent processes.</li>
<li>Implement the Sigma rule <code>Detect Suspicious Processes Launching Netsh</code> to identify suspicious invocations of <code>netsh.exe</code>.</li>
<li>Investigate any instances where <code>netsh.exe</code> is launched with network configuration-related commands.</li>
<li>Review and audit existing <code>netsh.exe</code> configurations to identify any unauthorized or malicious changes.</li>
<li>Consider blocking execution of <code>netsh.exe</code> where it is not required for legitimate business operations.</li>
<li>Deploy the Sigma rule <code>Detect Netsh Helper DLL Load</code> to detect malicious DLL loading by netsh.exe.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>netsh</category><category>living-off-the-land</category><category>persistence</category><category>network-configuration</category></item></channel></rss>