<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Lolbin — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/lolbin/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 10 Apr 2026 16:27:52 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/lolbin/feed.xml" rel="self" type="application/rss+xml"/><item><title>AWS EC2 LOLBin Execution via SSM SendCommand</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-aws-ec2-lolbin-ssm/</link><pubDate>Fri, 10 Apr 2026 16:27:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-aws-ec2-lolbin-ssm/</guid><description>Detection of Living Off the Land Binaries (LOLBins) or GTFOBins execution on EC2 instances via AWS Systems Manager (SSM) SendCommand API, potentially indicating malicious activity.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting the execution of Living Off the Land Binaries (LOLBins) or GTFOBins on Amazon EC2 instances via AWS Systems Manager (SSM) <code>SendCommand</code> API. The technique involves correlating AWS CloudTrail <code>SendCommand</code> events with endpoint process execution by matching SSM command IDs. While AWS redacts command parameters in CloudTrail logs, this correlation technique reveals the actual commands executed on EC2 instances. This is critical because adversaries may abuse SSM to execute malicious commands remotely without requiring SSH or RDP access. They can leverage legitimate system utilities for various malicious purposes, including data exfiltration, establishing reverse shells, or facilitating lateral movement within the cloud environment. The rule was last updated on 2026-04-10.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to AWS via compromised credentials or an exposed IAM role.</li>
<li>The attacker uses the AWS CLI or API to initiate an SSM <code>SendCommand</code> to a target EC2 instance. The <code>DocumentName</code> parameter is set to <code>AWS-RunShellScript</code>.</li>
<li>The SSM agent on the EC2 instance receives the <code>SendCommand</code> request.</li>
<li>The SSM agent executes a shell script (<code>_script.sh</code>) within a dedicated directory for orchestration.</li>
<li>The shell script executes a LOLBin, such as <code>curl</code>, <code>wget</code>, <code>python</code>, or <code>perl</code>, to perform malicious actions. The parent process of the LOLBin will be the SSM shell script.</li>
<li>The LOLBin is used to download a malicious payload, establish a reverse shell, or exfiltrate data.</li>
<li>The attacker uses the established reverse shell to perform further actions on the EC2 instance.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to EC2 instances, data exfiltration, deployment of malware, and lateral movement within the AWS environment. Although a number of impacted organizations is not available, this attack is able to bypass traditional network security controls. Organizations in any sector utilizing AWS EC2 instances and SSM are potentially at risk. The lack of required SSH or RDP access makes this technique particularly stealthy.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable AWS CloudTrail logging to capture <code>SendCommand</code> events and monitor for <code>AWS-RunShellScript</code> in the <code>request_parameters</code>.</li>
<li>Deploy the Sigma rule &ldquo;Detect AWS EC2 LOLBin Execution via SSM SendCommand&rdquo; to your SIEM and tune for your environment.</li>
<li>Monitor endpoint process execution logs for the execution of LOLBins like <code>curl</code>, <code>wget</code>, <code>python</code>, <code>perl</code>, <code>nc</code>, etc., with parent processes related to SSM.</li>
<li>Implement strict IAM policies to restrict SSM <code>SendCommand</code> permissions to only authorized users and roles.</li>
<li>Review and audit existing SSM configurations to identify and remediate any overly permissive settings.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>aws</category><category>ec2</category><category>ssm</category><category>lolbin</category><category>execution</category><category>cloud</category></item><item><title>Suspicious Windows Process Cluster from Parent Process via Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-parent-process/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-parent-process/</guid><description>A machine learning model detected a parent process spawning a cluster of suspicious Windows processes with high malicious probability scores, potentially indicating LOLBins usage and defense evasion.</description><content:encoded><![CDATA[<p>This alert leverages Elastic&rsquo;s ProblemChild integration to detect potential Living off the Land (LotL) attacks on Windows systems. The rule utilizes a combination of supervised and unsupervised machine learning models to identify parent processes spawning clusters of suspicious child processes. These child processes are flagged as having unusually high malicious probability scores, suggesting the use of LOLBins or other defense evasion techniques. The detection focuses on identifying groups of processes with the same parent process name where the aggregated malicious score for the cluster is unusually high, as determined by an unsupervised machine learning model. The rule is active as of October 2023, with updates through April 2026 and requires Elastic Stack version 9.4.0 or later.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means.</li>
<li>The attacker leverages a legitimate, signed Windows binary (LOLBin) such as <code>powershell.exe</code> or <code>cmd.exe</code>.</li>
<li>The LOLBin is used to execute malicious code or commands.</li>
<li>The LOLBin spawns one or more child processes that perform malicious actions like reconnaissance or lateral movement.</li>
<li>The ProblemChild supervised ML model flags the child processes as having a high malicious probability score.</li>
<li>The unsupervised ML model calculates an unusually high aggregate score for the cluster of child processes originating from the same parent process.</li>
<li>The detection rule triggers, identifying the suspicious parent-child process relationship.</li>
<li>The attacker achieves their objective, such as data exfiltration or persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using LOLBins can allow adversaries to bypass traditional signature-based detections and operate undetected within a network. The masquerading of malicious activity as legitimate system processes makes it difficult for security teams to identify and respond to threats effectively. The impact can range from data theft and system compromise to ransomware deployment, depending on the attacker&rsquo;s objectives. The machine learning detection helps analysts to prioritize alerts which may otherwise be missed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure the Living off the Land (LotL) Attack Detection integration assets are installed within Elastic Security, as described in the &ldquo;Setup&rdquo; section of this brief.</li>
<li>Investigate any alerts generated by the &ldquo;Parent Process Detected with Suspicious Windows Process(es)&rdquo; rule, focusing on the parent process name and the command-line arguments of the suspicious child processes (reference: Investigation Guide in the rule&rsquo;s <code>note</code> field).</li>
<li>Tune the <code>anomaly_threshold</code> value (currently 75) in the rule configuration based on your environment&rsquo;s baseline activity to reduce false positives.</li>
<li>Whitelisting parent process names can mitigate false positives generated by legitimate administrative tools. (reference: False positive analysis in the rule&rsquo;s <code>note</code> field)</li>
<li>Enable Windows process creation logging via Elastic Defend or Winlogbeat to ensure the rule has the necessary data to function (reference: Setup section).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>lolbin</category><category>windows</category></item><item><title>Suspicious Managed Code Hosting Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-suspicious-managedcode-hosting/</link><pubDate>Mon, 29 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-suspicious-managedcode-hosting/</guid><description>This rule detects suspicious managed code hosting processes on Windows systems, potentially indicating code injection or defense evasion tactics by monitoring file events associated with processes commonly used to host managed code, such as wscript.exe, cscript.exe, and mshta.exe.</description><content:encoded><![CDATA[<p>This detection identifies suspicious managed code hosting processes on Windows systems. Attackers may leverage processes like <code>wscript.exe</code>, <code>cscript.exe</code>, <code>mshta.exe</code>, <code>wmic.exe</code>, <code>svchost.exe</code>, <code>dllhost.exe</code>, <code>cmstp.exe</code>, and <code>regsvr32.exe</code> to execute malicious code, often bypassing traditional security controls. These processes can be abused to load and execute .NET assemblies or other managed code components. The detection focuses on identifying unusual file creation events associated with these processes which could indicate an attacker is attempting to leverage these processes for malicious purposes. This activity might be indicative of code injection, defense evasion, or other suspicious code execution techniques. The rule uses EQL to search for file events associated with specific processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through a phishing email or compromised software.</li>
<li>The attacker uses a LOLBin such as <code>mshta.exe</code> or <code>regsvr32.exe</code> to bypass application control.</li>
<li>The LOLBin executes a malicious script or loads a malicious DLL from a user-writable location.</li>
<li>The malicious script or DLL performs reconnaissance activities, such as gathering system information or enumerating network resources.</li>
<li>The attacker then attempts to escalate privileges by exploiting a vulnerability or using stolen credentials.</li>
<li>The attacker uses the compromised process to download and execute additional malware.</li>
<li>The malware establishes persistence on the system through scheduled tasks or registry modifications.</li>
<li>The attacker performs lateral movement within the network, compromising additional systems and exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, allowing attackers to compromise systems, steal sensitive data, and establish persistence. The use of LOLBins can bypass application control, making detection more challenging. Depending on the scope of the attack, this could result in significant financial losses, reputational damage, and disruption of business operations. This is a high-severity finding due to the potential for attackers to gain full control over affected systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon file creation logging (Event ID 11) to collect the necessary data for this detection.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Managed Code Hosting Process&rdquo; to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by this rule, focusing on the file paths, process command lines, and parent processes involved.</li>
<li>Monitor for unexpected file creation events associated with processes like <code>wscript.exe</code>, <code>cscript.exe</code>, and <code>mshta.exe</code> in user-writable directories.</li>
<li>Implement application control policies to restrict the execution of LOLBins and other potentially malicious processes.</li>
<li>Correlate the detection with other security events to identify related malicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>managed code</category><category>lolbin</category></item><item><title>Potential Abuse of Certreq for File Transfer via HTTP POST</title><link>https://feed.craftedsignal.io/briefs/2024-01-certreq-post/</link><pubDate>Sun, 28 Jan 2024 20:47:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-certreq-post/</guid><description>Adversaries may abuse the Windows Certreq utility to download files or upload data to a remote URL by making an HTTP POST request, potentially for command and control or exfiltration, which can be detected by monitoring process execution events.</description><content:encoded><![CDATA[<p>The Windows Certreq utility is a command-line tool used for managing certificates. Adversaries may abuse Certreq to download files from or upload data to a remote server by initiating an HTTP POST request. This behavior can be used for command and control (C2) or exfiltration. This technique leverages a legitimate system binary (LOLBin) to evade detection. Elastic has observed this behavior being detected through multiple data sources including Elastic Defend, Microsoft Defender XDR, Sysmon, SentinelOne, and Crowdstrike. This is a cross-industry threat that can affect any organization using Windows.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker executes Certreq.exe with the <code>-Post</code> argument to initiate an HTTP POST request.</li>
<li>The Certreq process attempts to connect to a remote server to send or receive data.</li>
<li>The remote server responds to the Certreq request, potentially delivering a file or receiving exfiltrated data.</li>
<li>The downloaded file is saved to disk (if applicable).</li>
<li>The attacker may execute the downloaded file or further process the exfiltrated data.</li>
<li>The attacker may attempt to clean up the Certreq command from command history or logs to evade detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could lead to the download and execution of malicious payloads, potentially compromising the affected system and network. Alternatively, sensitive data could be exfiltrated from the target environment. The impact can range from data theft and system compromise to full network intrusion, depending on the attacker&rsquo;s objectives and the data accessed. The severity is medium because Certreq is a legitimate tool, and its abuse requires specific command-line arguments and network activity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Certreq HTTP Post Request&rdquo; to your SIEM to identify potential abuse of Certreq for file transfer.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture the execution of Certreq.exe and its command-line arguments, enabling detections.</li>
<li>Monitor network connections originating from Certreq.exe for unusual destinations or data transfer patterns using network connection logs.</li>
<li>Investigate any instances of Certreq.exe executing with the <code>-Post</code> argument, as this is not typical usage of the utility.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lolbin</category><category>command-and-control</category><category>exfiltration</category><category>certreq</category></item><item><title>Suspicious Child Processes Spawned by WScript or CScript</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-wscript-cscript-suspicious-child-process/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-wscript-cscript-suspicious-child-process/</guid><description>Detects suspicious processes spawned by WScript or CScript, a common technique used by adversaries to execute LOLBINs, PowerShell, or inject code into suspended processes for defense evasion.</description><content:encoded><![CDATA[<p>This detection identifies suspicious child processes spawned by Windows Script Host (WScript) or CScript. Adversaries commonly leverage WScript and CScript to execute malicious scripts, LOLBINs (Living Off The Land Binaries), and PowerShell, or inject code into suspended processes as a form of defense evasion. While some legitimate scripts may utilize tools detected by this analytic, it serves as a valuable indicator that a script may be executing suspicious code. Notably, the WhisperGate malware and campaigns by FIN7 have employed similar techniques. This activity has been observed since at least 2022, and continues to be relevant for defenders.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user (unknowingly or through social engineering) executes a malicious script.</li>
<li>The malicious script is interpreted by either <code>wscript.exe</code> or <code>cscript.exe</code>.</li>
<li>The script executes a LOLBIN such as <code>regsvr32.exe</code>, <code>rundll32.exe</code>, <code>winhlp32.exe</code>, <code>certutil.exe</code>, <code>msbuild.exe</code>, <code>cmd.exe</code>, <code>powershell.exe</code>, <code>pwsh.exe</code>, <code>wmic.exe</code>, or <code>mshta.exe</code>.</li>
<li>The LOLBIN executes further commands or downloads additional payloads. <code>Certutil.exe</code> may be used to decode and install malicious binaries.</li>
<li>The attacker gains control over the compromised system.</li>
<li>The attacker uses the compromised system as a pivot for lateral movement.</li>
<li>The attacker attempts to escalate privileges and establish persistence.</li>
<li>The attacker may exfiltrate data or deploy ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to complete system compromise, data theft, and potential ransomware deployment. Organizations across various sectors are vulnerable, as this technique is commonly used by both commodity malware and advanced persistent threat (APT) groups. The WhisperGate malware targeting Ukrainian organizations in 2022 demonstrated the destructive potential of this technique.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging (Event ID 1) and Windows Event Log Security Auditing (4688) to capture process execution events necessary for the provided rules.</li>
<li>Deploy the Sigma rule <code>Suspicious Child Processes Spawned by WScript or CScript</code> to your SIEM to detect suspicious child processes. Tune the rule based on your environment&rsquo;s baseline activity, filtering out any legitimate use cases.</li>
<li>Investigate any alerts generated by this rule, focusing on the parent and child processes involved and the commands executed.</li>
<li>Monitor endpoint logs for unusual or unexpected process executions originating from WScript or CScript.</li>
<li>Block execution of the LOLBINs (<code>regsvr32.exe</code>, <code>rundll32.exe</code>, <code>winhlp32.exe</code>, <code>certutil.exe</code>, <code>msbuild.exe</code>, <code>cmd.exe</code>, <code>powershell.exe</code>, <code>pwsh.exe</code>, <code>wmic.exe</code>, or <code>mshta.exe</code>) if they are not required in your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wscript</category><category>cscript</category><category>lolbin</category><category>malware</category><category>defense-evasion</category></item><item><title>Suspicious Copy from or to System Directory</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-susp-copy-system-dir/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-susp-copy-system-dir/</guid><description>This threat involves the suspicious copying of files from or to Windows system directories (System32, SysWOW64, WinSxS) using command-line tools, often employed by attackers to relocate LOLBINs for defense evasion.</description><content:encoded><![CDATA[<p>Attackers often copy legitimate operating system binaries (LOLBINs) from standard system directories to evade detection. This technique involves using command-line tools like <code>cmd.exe</code>, <code>powershell.exe</code>, <code>robocopy.exe</code>, or <code>xcopy.exe</code> to move these binaries to different locations on the disk, frequently with modified names. By relocating and renaming LOLBINs, threat actors attempt to bypass security measures that rely on file path or filename-based detection. This technique has been observed in various attack campaigns, including those involving malware delivery and ransomware deployment. This behavior aims to execute malicious operations under the guise of legitimate system processes, complicating forensic analysis and incident response efforts.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is achieved through an undisclosed method (e.g., exploitation, phishing).</li>
<li>The attacker gains command execution on the target system.</li>
<li>The attacker uses <code>cmd.exe</code> or <code>powershell.exe</code> to initiate a copy operation.</li>
<li>The command line includes the <code>copy</code> command, <code>copy-item</code>, <code>cp</code>, or <code>cpi</code> to copy a file.</li>
<li>The source file is located within a Windows system directory such as <code>C:\\Windows\\System32</code>, <code>C:\\Windows\\SysWOW64</code>, or <code>C:\\Windows\\WinSxS</code>.</li>
<li>The destination directory is outside the standard system directories.</li>
<li>The copied binary is then executed from the new location.</li>
<li>The attacker uses the LOLBIN to perform further malicious actions, such as downloading payloads or executing arbitrary code.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of this attack allows threat actors to evade traditional security detections by using renamed and relocated LOLBINs. This can lead to the successful execution of malicious payloads, potentially resulting in data theft, system compromise, or ransomware deployment. The impact can range from localized infections to domain-wide ransomware attacks, depending on the attacker&rsquo;s objectives and the scope of the compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Suspicious Copy From or To System Directory&rdquo; to your SIEM to detect this behavior and tune for your environment.</li>
<li>Investigate any <code>process_creation</code> events where <code>cmd.exe</code> or <code>powershell.exe</code> is used to copy files from system directories as indicated by the rule and the details in the Attack Chain section.</li>
<li>Monitor for the execution of LOLBINs such as <code>certutil.exe</code>, <code>robocopy.exe</code>, and <code>xcopy.exe</code> from non-standard locations.</li>
<li>Implement application control policies to restrict the execution of unauthorized or relocated binaries.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>lolbin</category><category>windows</category></item><item><title>Regsvr32 Silent and Install Parameter DLL Loading</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-regsvr32-dll-loading/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-regsvr32-dll-loading/</guid><description>Detection of regsvr32.exe being used with the silent and DLL install parameter to load a DLL, a technique used by RATs like Remcos and njRAT to execute arbitrary code.</description><content:encoded><![CDATA[<p>This threat brief focuses on the abuse of <code>regsvr32.exe</code>, a legitimate Microsoft Windows utility, to load and execute malicious DLLs. Attackers, including those using Remote Access Trojans (RATs) like Remcos and njRAT, leverage <code>regsvr32.exe</code> with the <code>/s</code> (silent) parameter and the <code>DLLInstall</code> function call. The activity is observed by analyzing process command-line arguments and parent process details from Endpoint Detection and Response (EDR) agents. This technique allows attackers to bypass application whitelisting and execute arbitrary code, maintain persistence, and compromise the system further. The detection described was published in splunk-escu on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access via an unknown vector (e.g., phishing, exploit).</li>
<li>The attacker deploys a malicious DLL on the compromised system.</li>
<li>The attacker executes <code>regsvr32.exe</code> with the <code>/s</code> (silent) parameter and the <code>DLLInstall</code> function, for example: <code>regsvr32.exe /s /i:DLLInstall &lt;malicious_dll_path&gt;</code>.</li>
<li><code>Regsvr32.exe</code> loads the specified DLL.</li>
<li>The DLLInstall function within the DLL executes, performing malicious actions. This could involve installing services, modifying registry keys, or injecting code into other processes.</li>
<li>The attacker establishes persistence through registry modifications or scheduled tasks created by the DLL.</li>
<li>The attacker executes arbitrary commands on the system, potentially installing additional malware or exfiltrating data.</li>
<li>The attacker achieves their final objective, such as data theft, system disruption, or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can allow attackers to execute arbitrary code, bypass application whitelisting, and establish persistence on compromised systems. This can lead to data theft, system disruption, or ransomware deployment. The affected systems can be remotely controlled by the attacker, enabling further lateral movement within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Regsvr32 Silent and Install Param Dll Loading</code> to detect instances of <code>regsvr32.exe</code> being used with the <code>/s</code> and <code>/i</code> parameters.</li>
<li>Enable Sysmon process creation logging (Event ID 1) and Windows Event Log Security Auditing (Event ID 4688) to capture the necessary process and command-line information.</li>
<li>Investigate any instances of <code>regsvr32.exe</code> execution with the silent and DLLInstall parameters, paying close attention to the parent process and the DLL being loaded.</li>
<li>Implement application control policies to restrict the execution of <code>regsvr32.exe</code> or other LOLBins from untrusted locations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>lolbin</category><category>dll-loading</category><category>regsvr32</category></item><item><title>LOLBIN Network Connection for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-lolbin-network-connection/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-lolbin-network-connection/</guid><description>Adversaries can use Living-Off-The-Land Binaries (LOLBINs) such as expand.exe, extrac32.exe, ieexec.exe, and makecab.exe to establish network connections, potentially bypassing security controls and facilitating malicious activities on Windows systems.</description><content:encoded><![CDATA[<p>Attackers may leverage LOLBINs, signed binaries that are part of the operating system, to perform malicious actions while blending in with legitimate system activity. This technique allows them to evade detection by application allowlists and signature validation. This brief focuses on the abuse of expand.exe, extrac32.exe, ieexec.exe, and makecab.exe to initiate outbound network connections. The LOLBINs are used to execute malicious code, download additional payloads, or establish command and control channels. This activity can be indicative of malware installation, data exfiltration, or other malicious post-exploitation activities. Detection is crucial to identify potentially compromised systems and prevent further damage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system (e.g., through phishing or exploitation of a vulnerability).</li>
<li>The attacker executes a signed LOLBIN, such as <code>expand.exe</code>, <code>extrac32.exe</code>, <code>ieexec.exe</code>, or <code>makecab.exe</code>.</li>
<li>The LOLBIN is used to download or execute a malicious payload from a remote server.</li>
<li>The executed binary establishes a network connection to an external IP address.</li>
<li>Data exfiltration may occur over the established network connection.</li>
<li>The attacker maintains persistence on the system by scheduling tasks or modifying registry keys.</li>
<li>The attacker moves laterally within the network, compromising additional systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leveraging LOLBINs can result in the installation of malware, data theft, or full system compromise. The use of signed binaries makes it more difficult to detect malicious activity, potentially allowing attackers to operate undetected for extended periods. The financial and reputational damage caused by such attacks can be significant. While the risk score is low, the potential for defense evasion justifies monitoring.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the provided Sigma rule <code>Network Connection via Signed Binary</code> to detect suspicious network connections initiated by LOLBINs.</li>
<li>Monitor process execution logs for instances of <code>expand.exe</code>, <code>extrac32.exe</code>, <code>ieexec.exe</code>, and <code>makecab.exe</code> using process creation logging.</li>
<li>Review network connection logs for outbound connections initiated by these processes, excluding connections to internal networks based on the provided list of private IP ranges.</li>
<li>Investigate any detected instances of LOLBINs making external network connections, correlating with other suspicious activities on the affected host, as detailed in the &ldquo;Triage and analysis&rdquo; section.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>lolbin</category><category>defense-evasion</category><category>windows</category></item><item><title>ProblemChild ML Model Detects Unusual Process on Windows Host</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-problemchild-rare-process/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-problemchild-rare-process/</guid><description>The ProblemChild machine learning model detected a rare Windows process indicative of defense evasion, potentially involving LOLbins, on a host not commonly associated with malicious activity.</description><content:encoded><![CDATA[<p>This detection leverages the ProblemChild supervised machine learning model to identify unusual Windows processes that may be indicative of defense evasion tactics. The model flags processes that are both statistically unusual for a given host and predicted to be suspicious based on their characteristics. This approach aims to detect Living off the Land (LotL) attacks, where adversaries use legitimate system binaries (LOLbins) to evade traditional signature-based detection methods. The rule specifically targets processes observed on hosts that do not commonly exhibit malicious behavior. The alert requires the Elastic&rsquo;s Living off the Land (LotL) Attack Detection integration assets to be installed, processing Windows process events collected by Elastic Defend or Winlogbeat. This detection rule was last updated on 2026-04-01 and requires Elastic Stack version 9.4.0 or higher.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Adversary gains initial access to a Windows system.</li>
<li>The attacker leverages a LOLbin (e.g., <code>powershell.exe</code>, <code>cmd.exe</code>, <code>mshta.exe</code>) to execute malicious commands.</li>
<li>The LOLbin spawns a child process to perform a specific task, such as downloading a file or modifying system settings.</li>
<li>The spawned process exhibits characteristics flagged as suspicious by the ProblemChild ML model.</li>
<li>The suspicious process attempts to evade detection by masquerading as a legitimate system process or by obfuscating its activity.</li>
<li>The attacker uses the process to establish persistence, escalate privileges, or move laterally within the network.</li>
<li>The ultimate objective is to exfiltrate sensitive data, deploy ransomware, or disrupt business operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful defense evasion attack can allow adversaries to operate undetected within a network, leading to data breaches, financial losses, and reputational damage. The use of LOLbins makes it difficult to distinguish malicious activity from legitimate system operations. This detection rule aims to reduce the dwell time of attackers by identifying suspicious processes early in the attack chain, even if they are using legitimate tools. False positives may occur due to routine administrative tasks, software updates, or custom scripts.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure that the Living off the Land (LotL) Attack Detection integration is installed and properly configured, as described in the &ldquo;Setup&rdquo; section of this brief.</li>
<li>Verify that Windows process events are being collected by Elastic Defend or Winlogbeat, as required by the detection rule.</li>
<li>Deploy the following Sigma rule to detect unusual process spawns and tune the <code>Image|endswith</code> and <code>CommandLine|contains</code> conditions for your specific environment.</li>
<li>Review the investigation guide provided in the rule description to triage and analyze potential false positives.</li>
<li>Adjust the <code>anomaly_threshold</code> (currently 75) in the Elastic detection rule based on your environment&rsquo;s baseline to reduce noise.</li>
<li>Monitor for MITRE ATT&amp;CK Technique T1218 (System Binary Proxy Execution) to identify potential LOLbin abuse.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>lolbin</category><category>windows</category><category>machine-learning</category></item></channel></rss>