<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>LOLbins — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/lolbins/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 23 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/lolbins/feed.xml" rel="self" type="application/rss+xml"/><item><title>Unusual Process Spawned by a Parent Process via Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-process-spawn/</link><pubDate>Tue, 23 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-process-spawn/</guid><description>A machine learning job detected a suspicious Windows process, predicted malicious by the ProblemChild model and flagged as an unusual child process name for its parent, potentially indicating LOLbins usage and evading traditional detection.</description><content:encoded><![CDATA[<p>This alert originates from an Elastic machine learning job named <code>problem_child_rare_process_by_parent_ea</code> designed to detect Living off the Land (LotL) attacks on Windows systems. The model identifies processes spawned by parent processes that are statistically rare and have a high probability of being malicious based on the &ldquo;ProblemChild&rdquo; supervised learning model. This approach aims to uncover malicious activities that utilize legitimate system binaries (LOLbins) for nefarious purposes, effectively bypassing traditional signature-based detections. The alert relies on Windows process events collected by Elastic Defend or Winlogbeat with the LotL Attack Detection integration. This detection method becomes particularly important as attackers increasingly rely on existing tools to blend in with normal system activity and avoid raising suspicion.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access via unspecified means (e.g., phishing, compromised credentials).</li>
<li>Attacker leverages a legitimate system binary (LOLbin) such as <code>powershell.exe</code> or <code>cmd.exe</code>.</li>
<li>The LOLbin is used to execute a malicious payload or script.</li>
<li>The malicious process is spawned as a child process of the LOLbin.</li>
<li>Elastic&rsquo;s machine learning model identifies the child process as rare and potentially malicious based on its parent-child relationship and other features.</li>
<li>The rare process executes malicious commands, possibly downloading further payloads.</li>
<li>The attacker achieves their objective, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack utilizing LOLbins can lead to significant compromise, including data theft, system disruption, and further propagation within the network. The reliance on trusted system binaries makes these attacks difficult to detect with traditional methods, potentially allowing attackers to operate undetected for extended periods. The impact is directly correlated to the privileges of the initial compromised account and the effectiveness of lateral movement techniques employed by the attacker.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure that the Living off the Land (LotL) Attack Detection integration is installed and configured correctly, along with either Elastic Defend or Winlogbeat, as described in the rule&rsquo;s <code>setup</code> section.</li>
<li>Review the parent and child process names identified in the alert to determine if they are legitimate applications or associated with LOLbins, as detailed in the investigation guide within the rule&rsquo;s <code>note</code> section.</li>
<li>Investigate the command-line arguments used by the suspicious process for potentially malicious commands or scripts as described in the rule <code>note</code> section.</li>
<li>Tune the <code>anomaly_threshold</code> setting in the machine learning job configuration based on your environment&rsquo;s baseline activity to reduce false positives, as described in the rule documentation.</li>
<li>Implement exceptions for legitimate administrative tools and software updates to reduce false positives, as mentioned in the rule&rsquo;s <code>note</code> section.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>lolbins</category><category>windows</category><category>machine-learning</category></item><item><title>Suspicious Windows Process Cluster Detection via Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-windows-process/</link><pubDate>Wed, 03 Jan 2024 18:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-windows-process/</guid><description>A machine learning job combination has identified a host with one or more suspicious Windows processes that exhibit unusually high malicious probability scores, potentially indicating masquerading and defense evasion tactics.</description><content:encoded><![CDATA[<p>This detection identifies suspicious Windows processes exhibiting high malicious probability scores. The rule leverages machine learning to detect clusters of processes that may be indicative of defense evasion tactics, such as masquerading or the use of LOLbins (Living Off The Land Binaries). Specifically, a supervised ML model (ProblemChild) predicts whether a process is malicious, and an unsupervised ML model assesses the aggregate score of process clusters on a single host. The rule focuses on identifying unusual process clusters on a single host, indicating potential masquerading tactics for defense evasion. The rule requires the Living off the Land (LotL) Attack Detection integration assets to be installed, as well as Windows process events collected by integrations such as Elastic Defend or Winlogbeat. It was last updated on 2026/04/01 and requires Elastic Stack version 9.4.0 or later.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to the Windows host through various methods, such as exploiting vulnerabilities or using compromised credentials (not detailed in source).</li>
<li>Execution: The attacker executes a LOLBin (e.g., PowerShell, cmd.exe, mshta.exe) on the compromised host.</li>
<li>Masquerading: The attacker attempts to masquerade the malicious activity by naming or placing the LOLBin within a legitimate system folder.</li>
<li>Defense Evasion: The attacker utilizes the LOLBin with specific command-line arguments designed to evade detection by traditional signature-based security solutions.</li>
<li>Privilege Escalation (Optional): The attacker may attempt to escalate privileges using further LOLBINS or other techniques.</li>
<li>Lateral Movement (Optional): The attacker may use the compromised host to move laterally to other systems within the network.</li>
<li>Command and Control (Optional): The attacker may establish command and control (C2) communication with an external server to receive further instructions.</li>
<li>Impact: The attacker achieves their objective, such as data exfiltration, ransomware deployment, or system disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to various negative impacts, including data breaches, financial loss, and reputational damage. The rule is assigned a low severity, due to it likely being a supplemental detection to other rules. Lateral movement and exfiltration can also be accomplished. There is no information available on the number of victims and specific sectors targeted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure the Living off the Land (LotL) Attack Detection integration is installed and configured correctly, along with either Elastic Defend or Winlogbeat, to collect Windows process events as outlined in the <a href="https://www.elastic.co/guide/en/security/current/prebuilt-ml-jobs.html">setup instructions</a>.</li>
<li>Review the host name associated with the suspicious process cluster to determine if it is a critical asset or has a history of similar alerts as suggested in the investigation guide.</li>
<li>Examine the specific processes flagged by the ProblemChild supervised ML model to identify any known LOLbins or unusual command-line arguments that may indicate masquerading, per the investigation guide.</li>
<li>Implement application whitelisting to prevent unauthorized or suspicious processes from executing in the future, as advised in the remediation steps.</li>
<li>Tune the anomaly threshold of the machine learning job (<code>problem_child_high_sum_by_host_ea</code>) to reduce false positives based on your environment&rsquo;s specific characteristics and activity patterns.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>masquerading</category><category>LOLbins</category><category>windows</category></item><item><title>Unusual Process Spawned by a User Detected by Machine Learning</title><link>https://feed.craftedsignal.io/briefs/2024-01-rare-process-user/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rare-process-user/</guid><description>A machine learning job detected a suspicious Windows process, predicted to be malicious by the ProblemChild supervised ML model and found to be unusual within the user's context, potentially indicating defense evasion techniques like masquerading or the use of LOLbins.</description><content:encoded><![CDATA[<p>A machine learning (ML) rule has identified unusual process execution on a Windows endpoint. This detection leverages two ML models from the Elastic ProblemChild integration: a supervised model that predicts malicious processes and an unsupervised model that identifies processes anomalous to the user&rsquo;s typical behavior. The rule focuses on detecting defense evasion tactics, specifically the potential use of Living-off-the-Land Binaries (LOLbins) or masquerading techniques, which can be difficult to detect with traditional signature-based methods. This detection uses data from the Elastic Endpoint or Winlogbeat and requires the Living off the Land (LotL) Attack Detection integration assets to be installed. This rule was last updated April 1, 2026 and requires Elastic Stack version 9.4.0 or higher.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access through an existing user account.</li>
<li>Execution: The attacker executes a standard Windows process (e.g., cmd.exe, powershell.exe).</li>
<li>Defense Evasion: The attacker leverages LOLbins to perform malicious actions, blending in with legitimate system activity.</li>
<li>Masquerading: The attacker renames or moves malicious tools to mimic legitimate system files.</li>
<li>Privilege Escalation (Optional): The attacker attempts to escalate privileges using the compromised process.</li>
<li>Lateral Movement (Optional): The attacker uses the compromised process to move laterally to other systems.</li>
<li>Command and Control (Optional): The process establishes a connection to a command and control server for further instructions.</li>
<li>Impact: The attacker achieves their objective, such as data exfiltration, system compromise, or persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using these techniques can lead to a full system compromise, data theft, or the installation of persistent backdoors. The use of LOLbins makes detection difficult, potentially allowing attackers to operate undetected for extended periods. The impact is amplified by the potential for lateral movement to other systems within the network. While the severity is rated &ldquo;low&rdquo;, successful exploitation allows attackers to move laterally and establish persistence in the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure the Living off the Land (LotL) Attack Detection integration is installed and properly configured, as detailed in the rule setup (Elastic Defend or Winlogbeat).</li>
<li>Investigate alerts generated by the &ldquo;Unusual Process Spawned by a User&rdquo; rule (rule_id: 40155ee4-1e6a-4e4d-a63b-e8ba16980cfb) to determine the legitimacy of the flagged process.</li>
<li>Tune the anomaly threshold (anomaly_threshold: 75) based on your environment to reduce false positives, as mentioned in the rule parameters.</li>
<li>Review the &ldquo;False positive analysis&rdquo; section in the rule&rsquo;s note for guidance on identifying and excluding legitimate processes.</li>
<li>Implement the provided Sigma rule to detect unusual command line arguments associated with LOLBins.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>endpoint</category><category>windows</category><category>defense evasion</category><category>machine learning</category><category>lolbins</category></item></channel></rss>