Skip to content
Threat Feed

Tag

Proxy-Execution

12 briefs RSS
medium advisory

Process Activity via Compiled HTML File Execution

Adversaries may conceal malicious code in compiled HTML files (.chm) and deliver them to a victim for execution, using the HTML Help executable (hh.exe) to proxy the execution of scripting interpreters and bypass security controls.

Microsoft HTML Help system +5 execution defense-evasion compiled-html windows proxy-execution
2r 5t
medium advisory

InstallUtil Process Making Network Connections for Defense Evasion

Detection of InstallUtil.exe making outbound network connections, which can indicate adversaries leveraging it to execute code and evade detection by proxying execution through a trusted system binary.

Elastic Defend +1 defense-evasion proxy-execution windows
2r 1t
medium advisory

Unusual Network Activity from Windows System Binaries

Detection of network connections initiated by unusual Windows system binaries, often leveraged by adversaries to proxy execution of malicious code and evade detection, indicating potential defense evasion and command and control activity.

Windows defense-evasion proxy-execution
3r 5t
high advisory

Conhost Proxy Execution for Defense Evasion

Adversaries abuse the Console Window Host (conhost.exe) with the `--headless` argument to proxy execution of malicious commands, evading detection by blending in with legitimate Windows software.

Elastic Defend +2 defense-evasion proxy-execution windows
3r 1t
high advisory

Proxy Execution via Windows OpenSSH Client

Detection of command execution via proxy using the Windows OpenSSH client (ssh.exe or sftp.exe) to bypass application control using trusted Windows binaries.

M365 Defender +2 defense-evasion proxy-execution openssh application-control-bypass
2r
medium advisory

Suspicious MSBuild Execution from Scripting Processes

Adversaries may use MSBuild, a legitimate Microsoft tool, to execute malicious code through script interpreters for defense evasion and execution on Windows systems.

MSBuild defense-evasion execution proxy-execution
2r 6t
low advisory

Unusual System Utilities Initiating Network Connections

Adversaries may leverage unusual system utilities such as Microsoft.Workflow.Compiler.exe, bginfo.exe, cdb.exe, cmstp.exe, csi.exe, dnx.exe, fsi.exe, ieexec.exe, iexpress.exe, odbcconf.exe, rcsi.exe and xwizard.exe to execute code and evade detection, as identified by network connections originating from these processes.

Elastic Defend +1 defense-evasion proxy-execution windows
2r 3t
medium advisory

MSBuild Started by System Process for Defense Evasion and Execution

Adversaries are leveraging MSBuild, a Microsoft Build Engine, to execute malicious code by initiating it from system processes such as Explorer or WMI to evade defenses and execute unauthorized actions.

Elastic Defend +3 defense-evasion execution msbuild proxy-execution windows
2r 2t
high advisory

Windows Proxy Execution of .NET Utilities via Scripts

Detects the execution of .NET utilities by script processes from unusual locations, indicative of signed binary proxy execution for defense evasion and code execution.

Windows proxy-execution net-utility defense-evasion execution signed-binary-proxy-execution
2r 2t
high advisory

Unusual Child Processes of RunDLL32 Execution Without Arguments

The execution of `rundll32.exe` without arguments, followed by a child process execution, indicates potential abuse of Rundll32 for proxy execution or payload handoff, often employed for defense evasion on Windows systems.

Elastic Defend defense-evasion proxy-execution rundll32
2r 1t
high advisory

Control Panel Process with Unusual Arguments

Adversaries may abuse control.exe to proxy execution of malicious code by using the Control Panel process to execute payloads from unusual locations, detected by identifying suspicious keywords or paths in the process command line.

Elastic Defend +3 defense-evasion proxy-execution windows
2r 1t
medium advisory

Msiexec Arbitrary DLL Execution

Adversaries may abuse the msiexec.exe utility to proxy the execution of malicious DLL payloads, bypassing application control and other defenses.

Windows defense-evasion proxy-execution msiexec
2r 1t