<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Net.exe — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/net.exe/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/net.exe/feed.xml" rel="self" type="application/rss+xml"/><item><title>OneDrive Share Mounted via Net Utility for Potential Data Exfiltration</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-onedrive-share-mount/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-onedrive-share-mount/</guid><description>Adversaries may mount OneDrive shares as network drives using net.exe or net1.exe to stage, access, or exfiltrate data through cloud-hosted WebDAV paths, potentially bypassing traditional file share monitoring.</description><content:encoded><![CDATA[<p>Attackers may abuse the legitimate <code>net.exe</code> or <code>net1.exe</code> utilities to mount OneDrive shares as network drives on compromised Windows systems. This technique allows them to leverage cloud-hosted WebDAV paths for staging, accessing, or exfiltrating sensitive data. By using OneDrive, attackers can potentially bypass traditional file share monitoring and data loss prevention (DLP) controls, blending malicious traffic with legitimate cloud service usage. This activity has been observed in environments where data exfiltration is a primary objective, as it provides a covert channel for moving data outside the organization. This is an anomaly that warrants investigation as legitimate users may also perform this task.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows endpoint via phishing, exploitation of a vulnerability, or stolen credentials.</li>
<li>The attacker executes <code>net.exe</code> or <code>net1.exe</code> with specific parameters to mount a OneDrive share as a network drive. The command includes the <code>use</code> parameter and a URL pointing to <code>https://d.docs.live.net</code>.</li>
<li>The attacker authenticates to the OneDrive share, potentially using stolen credentials or tokens.</li>
<li>The attacker copies sensitive data to the mounted OneDrive share.</li>
<li>The data is synchronized to the attacker&rsquo;s OneDrive account, effectively exfiltrating it from the victim&rsquo;s network.</li>
<li>The attacker may remove the mounted drive using <code>net use</code> with the <code>/delete</code> option to remove traces of the activity.</li>
<li>The attacker covers their tracks by deleting relevant event logs or modifying timestamps.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to exfiltrate sensitive data from the victim&rsquo;s environment via a trusted cloud service, potentially leading to financial loss, reputational damage, and legal liabilities. The use of OneDrive can make detection more challenging, as the network traffic is often whitelisted and may not trigger traditional DLP alerts. The number of potential victims is broad, affecting any organization that uses OneDrive and has vulnerable or compromised Windows endpoints.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect OneDrive Share Mounting via Net Utility</code> to your SIEM to identify potential malicious use of <code>net.exe</code> or <code>net1.exe</code> (log source: process_creation).</li>
<li>Enable Sysmon process creation logging (Event ID 1) with command line arguments to capture the full <code>net.exe</code> commands used for mounting shares.</li>
<li>Monitor Windows Event Log Security (Event ID 4688) for process creation events involving <code>net.exe</code> or <code>net1.exe</code> with parameters indicative of mounting a OneDrive share.</li>
<li>Implement network monitoring to detect unusual traffic patterns to <code>https://d.docs.live.net</code> that may indicate data exfiltration to OneDrive.</li>
<li>Review and tune the Sigma rule, <code>Detect OneDrive Share Mounting via Net Utility</code> based on observed false positives in your environment.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>data-exfiltration</category><category>onedrive</category><category>net.exe</category></item></channel></rss>