<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Mandatory-Profile — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/mandatory-profile/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/mandatory-profile/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Persistence via Mandatory User Profile Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-ntuser-man-persistence/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ntuser-man-persistence/</guid><description>Adversaries may abuse Windows mandatory profiles by dropping a malicious NTUSER.MAN file containing pre-populated persistence-related registry keys to establish persistence, which can evade traditional registry-based monitoring.</description><content:encoded><![CDATA[<p>Attackers may leverage Windows mandatory profiles to achieve persistence by crafting or modifying an <code>NTUSER.MAN</code> file containing malicious registry entries. Windows loads registry settings directly from this file when a user logs in, causing embedded persistence mechanisms, such as Run keys or logon scripts, to activate. This technique allows adversaries to establish persistence without directly modifying the live registry, potentially evading detection by traditional registry-based monitoring tools. This technique may be used for stealthy persistence on systems where mandatory profiles are in use.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The adversary gains initial access to the system, possibly through exploiting a vulnerability or using stolen credentials.</li>
<li>The attacker locates a user profile directory on the system, typically found under <code>C:\\Users\\</code>.</li>
<li>The attacker creates or modifies an <code>NTUSER.MAN</code> file within the user&rsquo;s profile directory. This file contains registry settings that will be loaded when the user logs in.</li>
<li>The adversary embeds malicious registry keys within the <code>NTUSER.MAN</code> file, such as entries in the <code>Run</code> or <code>RunOnce</code> keys, or configurations for logon scripts.</li>
<li>The user logs off and then logs back onto the system.</li>
<li>Upon logon, Windows loads the registry settings from the <code>NTUSER.MAN</code> file.</li>
<li>The malicious registry keys are executed, enabling the attacker to establish persistence or perform other malicious activities.</li>
<li>The adversary maintains persistence on the system, enabling them to execute commands, install malware, or steal data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to establish a persistent presence on the compromised system. This can lead to unauthorized access to sensitive data, further compromise of the network, and potential data exfiltration. The use of mandatory profiles for persistence can make detection more challenging as the malicious activity is triggered during user logon.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential Persistence via Mandatory User Profile Creation&rdquo; to detect the creation of NTUSER.MAN files by non-SYSTEM processes (see below).</li>
<li>Deploy the Sigma rule &ldquo;Potential Persistence via Mandatory User Profile Modification&rdquo; to detect modification of NTUSER.MAN files by non-SYSTEM processes (see below).</li>
<li>Monitor file creation and modification events related to <code>NTUSER.MAN</code> in user profile directories to identify suspicious activity.</li>
<li>Review endpoint detection coverage to ensure offline registry hive and profile-based persistence techniques are monitored.</li>
<li>Investigate any file creation or modification of NTUSER.MAN files by reviewing process.name, process.executable, and parent process relationships.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>windows</category><category>mandatory-profile</category><category>file-modification</category></item></channel></rss>