<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Net-Utility — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/net-utility/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/net-utility/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Proxy Execution of .NET Utilities via Scripts</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-proxy-execution-net-utilities/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-proxy-execution-net-utilities/</guid><description>Detects the execution of .NET utilities by script processes from unusual locations, indicative of signed binary proxy execution for defense evasion and code execution.</description><content:encoded><![CDATA[<p>This threat brief addresses the abuse of trusted Microsoft .NET binaries as proxies for malicious code execution. Attackers leverage script-based execution (e.g., PowerShell, VBScript, batch files) from atypical or user-writable directories to launch .NET utilities like aspnet_compiler.exe, msbuild.exe, regasm.exe, InstallUtil.exe, and vbc.exe. This method allows threat actors to bypass security controls and blend in with legitimate system activity. Observed activity occurs in environments where endpoint detection and response (EDR) agents are deployed. The lack of command-line variation between the utility&rsquo;s image path and its executed process reinforces the suspicion of proxy execution. This technique has been associated with malware campaigns, including the deployment of VIP Keylogger.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (potentially through phishing or exploiting a software vulnerability, although this source does not specify the entry vector).</li>
<li>The attacker drops a malicious script (e.g., a PowerShell script) into a user-writable directory such as C:\Users\Public\ or C:\Temp\.</li>
<li>The malicious script executes, and is often obfuscated to evade detection, from the non-standard location.</li>
<li>The script then calls a legitimate .NET utility (e.g., InstallUtil.exe) to execute malicious code.</li>
<li>The .NET utility executes with minimal command-line arguments, often just the executable path itself, to further blend in with legitimate activity.</li>
<li>The .NET utility loads and executes attacker-controlled code, bypassing application control policies.</li>
<li>The malicious code performs actions such as keylogging (as seen with VIP Keylogger), credential theft, or lateral movement.</li>
<li>The attacker achieves their objective, such as data exfiltration or establishing persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation enables attackers to bypass application control and execute arbitrary code, potentially leading to data theft, system compromise, and persistent access. While the number of victims and specific sectors are not detailed in this brief&rsquo;s source, the use of VIP Keylogger as a payload demonstrates the potential for sensitive data exfiltration. Organizations lacking robust endpoint detection capabilities are at significant risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect .NET Utility Execution from Unusual Script Parents&rdquo; to identify potential proxy execution attempts based on process relationships and file paths (rule provided below).</li>
<li>Investigate any instances of .NET utilities (aspnet_compiler.exe, msbuild.exe, regasm.exe, InstallUtil.exe, vbc.exe) being launched from user-writable directories, especially when the parent process is a script interpreter (batch, CMD, PowerShell, JScript, VBScript, HTML).</li>
<li>Monitor process creation events (Sysmon EventID 1 or Windows Event Log Security 4688) for unusual parent-child process relationships involving script interpreters and .NET utilities.</li>
<li>Implement application control policies to restrict the execution of .NET utilities from untrusted locations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>proxy-execution</category><category>net-utility</category><category>defense-evasion</category><category>execution</category><category>signed-binary-proxy-execution</category></item></channel></rss>