<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Network-Configuration — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/network-configuration/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/network-configuration/feed.xml" rel="self" type="application/rss+xml"/><item><title>Detection of Processes Launching netsh.exe for Malicious Purposes</title><link>https://feed.craftedsignal.io/briefs/2024-01-netsh-abuse/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-netsh-abuse/</guid><description>Detection of netsh.exe execution by unusual processes indicative of potential malicious activity, including persistence and network configuration changes by threat actors.</description><content:encoded><![CDATA[<p>This brief focuses on the anomalous execution of <code>netsh.exe</code>, a command-line utility native to Windows operating systems used for network configuration. While legitimate use of <code>netsh.exe</code> exists, its invocation by uncommon processes can signify malicious activity, such as establishing persistence or modifying network settings. This activity has been observed in attacks attributed to Volt Typhoon, where it was used for &ldquo;living off the land&rdquo; tactics targeting US critical infrastructure, and in malware campaigns involving Azorult, Snake Keylogger, ShrinkLocker, and Hellcat Ransomware. Defenders should monitor for unexpected processes launching <code>netsh.exe</code> to identify potential threats within their environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system through various means (e.g., compromised credentials, exploitation of vulnerabilities).</li>
<li>The attacker attempts to establish persistence on the compromised system.</li>
<li>The attacker uses a process (e.g., a script interpreter or legitimate application) to execute <code>netsh.exe</code>.</li>
<li><code>netsh.exe</code> is invoked with specific commands to modify network configurations (e.g., adding firewall rules, configuring port forwarding, or changing DNS settings).</li>
<li>These network configuration changes facilitate further malicious activities, such as lateral movement, command and control communication, or data exfiltration.</li>
<li>Malicious helper DLLs are loaded through <code>netsh.exe</code> to maintain persistent access.</li>
<li>The attacker uses the compromised system as a foothold to move laterally within the network, targeting critical assets.</li>
<li>The attacker achieves their objective, such as data theft, system disruption, or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via anomalous <code>netsh.exe</code> execution can lead to significant network compromise, including persistent access for attackers, unauthorized modification of network settings, and potential privilege escalation. This can result in data breaches, service disruption, and reputational damage. The Volt Typhoon campaign targeted US critical infrastructure, demonstrating the potential for significant impact on national security. Multiple malware families including Azorult, Snake Keylogger, ShrinkLocker, and Hellcat Ransomware have been known to abuse <code>netsh.exe</code>.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events (Sysmon Event ID 1, Windows Event Log Security 4688) for the execution of <code>netsh.exe</code> by unusual parent processes.</li>
<li>Implement the Sigma rule <code>Detect Suspicious Processes Launching Netsh</code> to identify suspicious invocations of <code>netsh.exe</code>.</li>
<li>Investigate any instances where <code>netsh.exe</code> is launched with network configuration-related commands.</li>
<li>Review and audit existing <code>netsh.exe</code> configurations to identify any unauthorized or malicious changes.</li>
<li>Consider blocking execution of <code>netsh.exe</code> where it is not required for legitimate business operations.</li>
<li>Deploy the Sigma rule <code>Detect Netsh Helper DLL Load</code> to detect malicious DLL loading by netsh.exe.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>netsh</category><category>living-off-the-land</category><category>persistence</category><category>network-configuration</category></item></channel></rss>