<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Proxy-Execution — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/proxy-execution/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 18:30:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/proxy-execution/feed.xml" rel="self" type="application/rss+xml"/><item><title>Process Activity via Compiled HTML File Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-compiled-html-execution/</link><pubDate>Wed, 03 Jan 2024 18:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-compiled-html-execution/</guid><description>Adversaries may conceal malicious code in compiled HTML files (.chm) and deliver them to a victim for execution, using the HTML Help executable (hh.exe) to proxy the execution of scripting interpreters and bypass security controls.</description><content:encoded><![CDATA[<p>Attackers are known to deliver malicious payloads within compiled HTML files (.chm) to bypass security measures and gain initial access to systems. This technique leverages the Microsoft HTML Help system and its associated executable, hh.exe, to proxy the execution of malicious code. Compiled HTML files can contain various types of content, including HTML documents, images, and scripting languages like VBA, JScript, Java, and ActiveX. By embedding malicious scripts or executables within a .chm file, attackers can trick users into executing them when they open the file. This is particularly effective because hh.exe is a signed binary, which may allow it to bypass certain security controls. The scope of this technique affects Windows systems where the HTML Help system is installed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious .chm file containing embedded malicious code, such as a PowerShell script or executable.</li>
<li>The attacker delivers the .chm file to the victim via social engineering, such as phishing or malicious websites.</li>
<li>The victim opens the .chm file, causing hh.exe to launch.</li>
<li>hh.exe processes the .chm file, rendering its content, which includes the embedded malicious script or executable.</li>
<li>The malicious code executes, often spawning a scripting interpreter like <code>powershell.exe</code> or <code>cmd.exe</code>.</li>
<li>The scripting interpreter executes commands to download additional payloads or perform malicious actions on the system.</li>
<li>The attacker gains initial access to the victim&rsquo;s system.</li>
<li>The attacker escalates privileges and moves laterally within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to initial access, code execution, and potentially full system compromise. This can result in data theft, malware installation, and further lateral movement within the network. The severity and impact depend on the permissions of the user running hh.exe and the nature of the malicious payload.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Compiled HTML File Spawning Suspicious Processes&rdquo; to your SIEM to detect instances where <code>hh.exe</code> is the parent process of scripting interpreters.</li>
<li>Enable Sysmon process creation logging to provide the necessary data for the Sigma rule to function correctly.</li>
<li>Monitor process execution chains for unknown processes originating from <code>hh.exe</code>, as mentioned in the investigation guide.</li>
<li>Implement email filtering and security awareness training to prevent users from opening malicious .chm files delivered via phishing.</li>
<li>Block the execution of unsigned or untrusted executables in the environment to reduce the risk of malicious code execution.</li>
<li>Use endpoint detection and response (EDR) solutions like Elastic Defend, CrowdStrike, Microsoft Defender XDR, and SentinelOne to detect and respond to malicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>execution</category><category>defense-evasion</category><category>compiled-html</category><category>windows</category><category>proxy-execution</category></item><item><title>InstallUtil Process Making Network Connections for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-installutil-network-connection/</link><pubDate>Wed, 03 Jan 2024 18:15:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-installutil-network-connection/</guid><description>Detection of InstallUtil.exe making outbound network connections, which can indicate adversaries leveraging it to execute code and evade detection by proxying execution through a trusted system binary.</description><content:encoded><![CDATA[<p>InstallUtil.exe is a legitimate Windows utility used for installing and uninstalling server resources. Adversaries abuse InstallUtil.exe to execute malicious code under the guise of legitimate processes, often to evade detection. This technique allows attackers to proxy execution through a trusted system binary, potentially bypassing application control and security monitoring. The detection rule identifies suspicious network activity by monitoring InstallUtil.exe&rsquo;s outbound connections, flagging potential misuse by alerting on the initial network connection attempt. This activity is detected via the Elastic EQL rule &ldquo;InstallUtil Process Making Network Connections.&rdquo;</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access through an undisclosed method.</li>
<li>The attacker uses InstallUtil.exe to execute a malicious .NET assembly.</li>
<li>InstallUtil.exe loads the malicious assembly into its process.</li>
<li>The malicious assembly executes code that establishes an outbound network connection.</li>
<li>The connection is used for command and control (C2) or data exfiltration.</li>
<li>The attacker may use the C2 channel to download and execute further payloads.</li>
<li>The attacker performs lateral movement within the network.</li>
<li>The attacker achieves their objective, such as data theft or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution within the context of a trusted Windows process (InstallUtil.exe), bypassing application control and potentially evading detection. This could result in a compromised system, data exfiltration, or further malicious activities within the network. The scope of impact depends on the attacker&rsquo;s objectives and the level of access gained, potentially affecting entire organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging and network connection logging via Sysmon or Elastic Defend to provide the data needed for the rules below.</li>
<li>Deploy the Sigma rule &ldquo;InstallUtil Network Connection&rdquo; to your SIEM and tune for your environment to detect suspicious outbound network connections from InstallUtil.exe.</li>
<li>Investigate any alerts triggered by the Sigma rule by examining the parent process of InstallUtil.exe, destination IP addresses, and associated activities.</li>
<li>Implement network monitoring and alerting for unusual outbound connections from critical systems to enhance detection of similar threats in the future.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>proxy-execution</category><category>windows</category></item><item><title>Unusual Network Activity from Windows System Binaries</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-network-activity-windows/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-network-activity-windows/</guid><description>Detection of network connections initiated by unusual Windows system binaries, often leveraged by adversaries to proxy execution of malicious code and evade detection, indicating potential defense evasion and command and control activity.</description><content:encoded><![CDATA[<p>Attackers frequently abuse trusted Windows system binaries and developer utilities to proxy the execution of malicious payloads, effectively bypassing security controls that would otherwise prevent direct execution. This technique, known as &ldquo;System Binary Proxy Execution,&rdquo; allows adversaries to masquerade their activities and blend in with legitimate system processes. This detection identifies network activity from system applications such as <code>mshta.exe</code>, <code>regsvr32.exe</code>, and <code>installutil.exe</code> that are not expected to initiate network connections under normal circumstances. The original rule was created in September 2020, and updated in May 2026. The scope of targeting includes any Windows environment where adversaries might attempt to evade detection by proxying malicious activity through trusted system binaries.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system, often through phishing or exploiting a vulnerability.</li>
<li>The attacker drops a malicious payload onto the system, potentially obfuscated to avoid detection.</li>
<li>The attacker uses a trusted system binary, such as <code>mshta.exe</code>, <code>regsvr32.exe</code>, or <code>installutil.exe</code> to execute the payload.</li>
<li>The system binary initiates a network connection, potentially to a command-and-control (C2) server.</li>
<li>The attacker uses the C2 channel to download additional tools or exfiltrate data.</li>
<li>The attacker moves laterally within the network, compromising additional systems.</li>
<li>The attacker achieves their final objective, such as data theft, ransomware deployment, or system disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to a variety of negative impacts, including data breaches, system compromise, and potential financial losses. The technique is often employed in targeted attacks and can be difficult to detect due to the use of legitimate system binaries. If successful, attackers can maintain persistence, escalate privileges, and move laterally within the network, leading to widespread damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation (Event ID 1) and network connection (Event ID 3) logging to provide the necessary data for detection.</li>
<li>Deploy the Sigma rules in this brief to your SIEM to detect unusual network activity from Windows system binaries.</li>
<li>Regularly review and update the list of known benign network connections from these binaries to reduce false positives.</li>
<li>Implement application control policies to restrict the execution of untrusted applications.</li>
<li>Monitor DNS queries (Sysmon Event ID 22) for suspicious domain resolutions originating from system binaries.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>proxy-execution</category><category>windows</category></item><item><title>Conhost Proxy Execution for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-conhost-proxy-exec/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-conhost-proxy-exec/</guid><description>Adversaries abuse the Console Window Host (conhost.exe) with the `--headless` argument to proxy execution of malicious commands, evading detection by blending in with legitimate Windows software.</description><content:encoded><![CDATA[<p>Attackers are leveraging the Console Window Host (conhost.exe) to proxy execution of commands, using the <code>--headless</code> argument to hide malicious activity. This technique allows adversaries to blend in with legitimate Windows processes, making detection more challenging. This behavior, often associated with defense evasion, involves using conhost.exe to execute commands such as PowerShell, cmd.exe, mshta, curl, and scripts. The activity can be seen across multiple environments including endpoints, Windows systems, and cloud platforms like Microsoft Defender XDR and SentinelOne. Defenders must differentiate between legitimate uses of conhost.exe, such as those by Winget-AutoUpdate or OpenSSH, and malicious proxy executions, which could indicate broader compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system, possibly through phishing or exploiting a vulnerability.</li>
<li>The attacker executes a command that calls conhost.exe with the <code>--headless</code> argument.</li>
<li>Conhost.exe is used to proxy the execution of a malicious command, such as PowerShell, cmd.exe, or mshta.</li>
<li>The proxied command downloads a malicious payload from a remote server using tools like curl or bitsadmin.</li>
<li>The downloaded payload is executed, establishing persistence on the compromised system.</li>
<li>The attacker uses the compromised system to move laterally within the network, compromising additional systems.</li>
<li>Sensitive data is exfiltrated from the network to a remote server controlled by the attacker.</li>
<li>The attacker achieves their final objective, such as deploying ransomware or stealing intellectual property.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to a complete compromise of the targeted system and potentially the entire network. This can result in data theft, financial loss, and reputational damage. The use of <code>conhost.exe</code> for proxy execution makes it difficult to detect malicious activity, potentially allowing attackers to remain undetected for extended periods. The impact could range from individual workstation compromises to large-scale network breaches, affecting potentially hundreds or thousands of systems within an organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Proxy Execution via Console Window Host&rdquo; Sigma rule to your SIEM and tune for your environment to detect suspicious <code>conhost.exe</code> activity.</li>
<li>Monitor process creation events for <code>conhost.exe</code> with the <code>--headless</code> argument, focusing on the command-line arguments to identify potentially malicious commands.</li>
<li>Investigate any instances of <code>conhost.exe</code> executing suspicious scripts, downloaders, or task scheduler modifications to identify potential threats.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture detailed process execution information, as recommended in the setup instructions linked in the overview.</li>
<li>Review the investigation fields in the brief to understand the key data points for analyzing potential proxy execution attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>proxy-execution</category><category>windows</category></item><item><title>Proxy Execution via Windows OpenSSH Client</title><link>https://feed.craftedsignal.io/briefs/2024-01-openssh-proxy-execution/</link><pubDate>Wed, 03 Jan 2024 14:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-openssh-proxy-execution/</guid><description>Detection of command execution via proxy using the Windows OpenSSH client (ssh.exe or sftp.exe) to bypass application control using trusted Windows binaries.</description><content:encoded><![CDATA[<p>This detection identifies attempts to execute commands through a proxy using the Windows OpenSSH client (ssh.exe or sftp.exe). Attackers may abuse this behavior to evade application control policies by leveraging the trusted Windows OpenSSH binaries. The technique involves using the <code>ProxyCommand</code> or <code>LocalCommand</code> options with the OpenSSH client to execute arbitrary commands on the target system. The rule focuses on detecting command lines containing potentially malicious commands such as PowerShell, schtasks, mshta, msiexec, cmd, or script execution, indicating a possible attempt to bypass security measures. The detection logic is applicable to Windows systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system.</li>
<li>The attacker executes the Windows OpenSSH client (ssh.exe or sftp.exe) with either the <code>ProxyCommand</code> or <code>LocalCommand</code> option.</li>
<li>The <code>ProxyCommand</code> or <code>LocalCommand</code> parameter specifies a command to be executed locally on the system.</li>
<li>The command includes potentially malicious payloads such as PowerShell commands, scheduled tasks manipulation (schtasks), or execution of other LOLBINs (Living Off the Land Binaries) like mshta or msiexec.</li>
<li>The OpenSSH client executes the specified command.</li>
<li>The malicious command performs actions such as downloading and executing additional payloads, creating scheduled tasks for persistence, or executing arbitrary code.</li>
<li>The attacker achieves their objectives, such as gaining further access to the system, escalating privileges, or deploying malware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to a complete compromise of the affected system. Attackers can bypass application control mechanisms, execute arbitrary code, and establish persistence. This can result in data theft, system disruption, or further propagation of the attack within the network. The severity of the impact depends on the privileges of the account running the OpenSSH client and the specific actions performed by the malicious commands.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line details to capture the execution of ssh.exe and sftp.exe with malicious parameters.</li>
<li>Deploy the Sigma rule <code>Proxy Execution via Windows OpenSSH</code> to your SIEM to detect suspicious OpenSSH client executions with malicious commands in the command line.</li>
<li>Monitor for the creation of child processes from ssh.exe or sftp.exe, as this can indicate the execution of malicious commands specified in the <code>ProxyCommand</code> or <code>LocalCommand</code> options.</li>
<li>Review and restrict the usage of <code>PermitLocalCommand</code> in OpenSSH server configurations to prevent attackers from executing commands locally on the system after a connection is established.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>proxy-execution</category><category>openssh</category><category>application-control-bypass</category></item><item><title>Suspicious MSBuild Execution from Scripting Processes</title><link>https://feed.craftedsignal.io/briefs/2024-01-msbuild-script-execution/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-msbuild-script-execution/</guid><description>Adversaries may use MSBuild, a legitimate Microsoft tool, to execute malicious code through script interpreters for defense evasion and execution on Windows systems.</description><content:encoded><![CDATA[<p>The Microsoft Build Engine (MSBuild) is a software build platform typically used by developers. However, attackers can abuse MSBuild to execute malicious code by using it as a proxy execution method, allowing them to bypass traditional defenses. This technique involves invoking MSBuild from scripting environments like PowerShell or cmd.exe to run arbitrary code within the context of a trusted process. The activity detected by this rule focuses on instances where MSBuild is launched by a script interpreter, which is not typical for standard software development workflows. This behavior, observed since at least 2020, can be used for stealthy execution of payloads and defense evasion tactics, especially in environments that trust MSBuild as a legitimate system utility. Defenders should be aware of this technique as it allows attackers to blend in with normal system activity and bypass application control policies.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system, potentially through phishing or exploiting a software vulnerability.</li>
<li>A script (e.g., PowerShell, cmd.exe) is used to execute a malicious command or series of commands.</li>
<li>The script invokes <code>msbuild.exe</code> with specific arguments to execute arbitrary code. This might involve inline tasks or references to external XML project files containing malicious instructions.</li>
<li>MSBuild processes the provided XML file or inline task, interpreting and executing the malicious code.</li>
<li>The executed code performs actions such as downloading additional payloads, modifying system configurations, or establishing persistence.</li>
<li>MSBuild, acting as a proxy, executes the attacker&rsquo;s code within a trusted process, potentially evading detection by security software.</li>
<li>The attacker leverages the compromised system to move laterally within the network, escalating privileges, and accessing sensitive data.</li>
<li>The attacker&rsquo;s final objective is achieved, such as data exfiltration or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary code on Windows systems, potentially leading to data theft, system compromise, and further propagation within the network. This technique can bypass application control and other security measures, making it difficult to detect and prevent. The impact can range from minor data breaches to complete system takeover, depending on the attacker&rsquo;s objectives and the compromised system&rsquo;s role within the organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging (Event ID 1) to capture the process tree and command-line arguments, enabling detection of suspicious MSBuild executions.</li>
<li>Deploy the Sigma rule <code>Microsoft Build Engine Started by a Script Process</code> to your SIEM to identify instances of MSBuild being invoked by script interpreters. Tune the rule with appropriate whitelisting for known development activities to reduce false positives.</li>
<li>Monitor process execution events for <code>msbuild.exe</code> with parent processes such as <code>cmd.exe</code>, <code>powershell.exe</code>, <code>cscript.exe</code>, and <code>mshta.exe</code>.</li>
<li>Implement application control policies to restrict the execution of MSBuild to authorized users and directories.</li>
<li>Regularly review and update the list of excluded processes and directories in the Sigma rule to adapt to changing development practices.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>msbuild</category><category>proxy-execution</category></item><item><title>Unusual System Utilities Initiating Network Connections</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-process-network/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-process-network/</guid><description>Adversaries may leverage unusual system utilities such as Microsoft.Workflow.Compiler.exe, bginfo.exe, cdb.exe, cmstp.exe, csi.exe, dnx.exe, fsi.exe, ieexec.exe, iexpress.exe, odbcconf.exe, rcsi.exe and xwizard.exe to execute code and evade detection, as identified by network connections originating from these processes.</description><content:encoded><![CDATA[<p>Attackers frequently exploit built-in system utilities to bypass security measures and execute malicious code. This technique, known as &ldquo;Living off the Land,&rdquo; allows them to blend in with legitimate system activity, making detection more challenging. This threat brief focuses on identifying unusual network connections originating from Windows system utilities that are not typically associated with network communication. This behavior is often indicative of an attacker leveraging these tools for purposes such as downloading payloads, establishing command and control, or exfiltrating data. The utilities of concern include: Microsoft.Workflow.Compiler.exe, bginfo.exe, cdb.exe, cmstp.exe, csi.exe, dnx.exe, fsi.exe, ieexec.exe, iexpress.exe, odbcconf.exe, rcsi.exe and xwizard.exe. Defenders should monitor for network activity from these processes to identify potential malicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through methods such as phishing or exploiting a vulnerability.</li>
<li>The attacker leverages a system utility such as <code>cmstp.exe</code> to execute malicious code.</li>
<li><code>cmstp.exe</code> is invoked with a malicious INF file, leading to the execution of arbitrary commands.</li>
<li>The executed code initiates a network connection to an external server.</li>
<li>The connection is used to download a secondary payload, such as a reverse shell or malware.</li>
<li>The attacker uses the downloaded payload to establish a persistent presence on the system.</li>
<li>The attacker performs lateral movement to other systems on the network.</li>
<li>The attacker exfiltrates sensitive data from compromised systems to a remote server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to a compromised system with unauthorized code execution, data exfiltration, and potential lateral movement within the network. Due to the low severity and the high probability of false positives, this rule should be tuned for specific environments and paired with other detection mechanisms. This may lead to data breaches, financial loss, or reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the Sigma rules provided in this brief to detect unusual network connections from system utilities within your environment.</li>
<li>Monitor process execution events for the utilities listed in the rule query to identify potential abuse of these tools.</li>
<li>Enable Sysmon Event ID 1 (Process Creation) and Event ID 3 (Network Connection) logging for enhanced visibility into process execution and network activity.</li>
<li>Correlate detections from this rule with other security alerts and logs to gain a more complete understanding of the attack.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>proxy-execution</category><category>windows</category></item><item><title>MSBuild Started by System Process for Defense Evasion and Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-msbuild-system-process/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-msbuild-system-process/</guid><description>Adversaries are leveraging MSBuild, a Microsoft Build Engine, to execute malicious code by initiating it from system processes such as Explorer or WMI to evade defenses and execute unauthorized actions.</description><content:encoded><![CDATA[<p>The Microsoft Build Engine (MSBuild) is a legitimate tool used by developers to build applications. However, adversaries are known to abuse MSBuild to execute malicious code, leveraging its trusted status to bypass security measures. This technique allows attackers to perform various actions on compromised systems while blending in with legitimate system activity. The observed behavior involves MSBuild being started by system processes like Explorer (explorer.exe) or Windows Management Instrumentation (WMI, wmiprvse.exe). Defenders should be aware of this unusual activity as it signifies a potential defense evasion tactic and unauthorized code execution within the targeted environment. This activity has been observed across environments leveraging Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, CrowdStrike, and standard Windows event logging.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through various means (e.g., phishing, exploitation of vulnerabilities).</li>
<li>The attacker leverages a script or payload that invokes MSBuild.exe.</li>
<li>The script or payload is executed by a system process like explorer.exe or wmiprvse.exe, which is highly unusual for typical MSBuild usage.</li>
<li>MSBuild.exe starts with specific command-line arguments that dictate the build process, often involving malicious code.</li>
<li>The malicious code is embedded within an MSBuild project file (.csproj or similar).</li>
<li>MSBuild.exe executes the malicious code as part of the build process.</li>
<li>The executed code performs actions such as downloading additional payloads, modifying system configurations, or establishing persistence.</li>
<li>The attacker achieves their objective, such as gaining remote access, exfiltrating data, or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to a variety of negative outcomes, including unauthorized code execution, system compromise, data theft, and potentially complete system takeover. The use of MSBuild as a proxy execution method allows attackers to evade traditional security controls and blend in with legitimate system activities. This can result in delayed detection and increased dwell time, amplifying the potential damage. Since MSBuild is a trusted Microsoft utility, its abuse can make malicious activity harder to identify and respond to.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Microsoft Build Engine Started by a System Process&rdquo; to your SIEM to detect instances of MSBuild.exe being launched by explorer.exe or wmiprvse.exe (see rules section).</li>
<li>Enable process creation logging with command line arguments to capture the full context of MSBuild.exe executions (reference setup instructions in the source URL).</li>
<li>Investigate any instances of MSBuild.exe started by explorer.exe or wmiprvse.exe to determine if they are legitimate or malicious.</li>
<li>Implement enhanced monitoring and logging for MSBuild.exe and related processes to detect similar activities in the future, ensuring alerts are configured for rapid response.</li>
<li>Review and whitelist any legitimate scripts or administrative tools that leverage MSBuild for authorized tasks to reduce false positives.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>msbuild</category><category>proxy-execution</category><category>windows</category></item><item><title>Windows Proxy Execution of .NET Utilities via Scripts</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-proxy-execution-net-utilities/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-proxy-execution-net-utilities/</guid><description>Detects the execution of .NET utilities by script processes from unusual locations, indicative of signed binary proxy execution for defense evasion and code execution.</description><content:encoded><![CDATA[<p>This threat brief addresses the abuse of trusted Microsoft .NET binaries as proxies for malicious code execution. Attackers leverage script-based execution (e.g., PowerShell, VBScript, batch files) from atypical or user-writable directories to launch .NET utilities like aspnet_compiler.exe, msbuild.exe, regasm.exe, InstallUtil.exe, and vbc.exe. This method allows threat actors to bypass security controls and blend in with legitimate system activity. Observed activity occurs in environments where endpoint detection and response (EDR) agents are deployed. The lack of command-line variation between the utility&rsquo;s image path and its executed process reinforces the suspicion of proxy execution. This technique has been associated with malware campaigns, including the deployment of VIP Keylogger.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (potentially through phishing or exploiting a software vulnerability, although this source does not specify the entry vector).</li>
<li>The attacker drops a malicious script (e.g., a PowerShell script) into a user-writable directory such as C:\Users\Public\ or C:\Temp\.</li>
<li>The malicious script executes, and is often obfuscated to evade detection, from the non-standard location.</li>
<li>The script then calls a legitimate .NET utility (e.g., InstallUtil.exe) to execute malicious code.</li>
<li>The .NET utility executes with minimal command-line arguments, often just the executable path itself, to further blend in with legitimate activity.</li>
<li>The .NET utility loads and executes attacker-controlled code, bypassing application control policies.</li>
<li>The malicious code performs actions such as keylogging (as seen with VIP Keylogger), credential theft, or lateral movement.</li>
<li>The attacker achieves their objective, such as data exfiltration or establishing persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation enables attackers to bypass application control and execute arbitrary code, potentially leading to data theft, system compromise, and persistent access. While the number of victims and specific sectors are not detailed in this brief&rsquo;s source, the use of VIP Keylogger as a payload demonstrates the potential for sensitive data exfiltration. Organizations lacking robust endpoint detection capabilities are at significant risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect .NET Utility Execution from Unusual Script Parents&rdquo; to identify potential proxy execution attempts based on process relationships and file paths (rule provided below).</li>
<li>Investigate any instances of .NET utilities (aspnet_compiler.exe, msbuild.exe, regasm.exe, InstallUtil.exe, vbc.exe) being launched from user-writable directories, especially when the parent process is a script interpreter (batch, CMD, PowerShell, JScript, VBScript, HTML).</li>
<li>Monitor process creation events (Sysmon EventID 1 or Windows Event Log Security 4688) for unusual parent-child process relationships involving script interpreters and .NET utilities.</li>
<li>Implement application control policies to restrict the execution of .NET utilities from untrusted locations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>proxy-execution</category><category>net-utility</category><category>defense-evasion</category><category>execution</category><category>signed-binary-proxy-execution</category></item><item><title>Unusual Child Processes of RunDLL32 Execution Without Arguments</title><link>https://feed.craftedsignal.io/briefs/2024-01-rundll32-no-args/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rundll32-no-args/</guid><description>The execution of `rundll32.exe` without arguments, followed by a child process execution, indicates potential abuse of Rundll32 for proxy execution or payload handoff, often employed for defense evasion on Windows systems.</description><content:encoded><![CDATA[<p>This detection identifies instances where <code>rundll32.exe</code> is executed without arguments or with malformed arguments, immediately followed by the execution of a child process. This behavior is atypical, as <code>rundll32.exe</code> is normally invoked with specific parameters indicating a DLL, export, or Control_RunDLL target. Attackers may exploit this by using <code>rundll32.exe</code> as a proxy to execute other malicious payloads or for command and control. The detection logic focuses on identifying instances where the argument count is one and the command line does not conform to expected patterns. This behavior has been observed being used by malware to evade traditional detection methods by proxying execution through a trusted Windows utility. This rule is applicable to endpoint telemetry, Windows event logs, and Crowdstrike FDR data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An initial access vector, such as a phishing email or exploit, delivers an initial payload to the system.</li>
<li>The initial payload executes, potentially dropping or creating a file on disk, or directly invoking rundll32.exe.</li>
<li><code>rundll32.exe</code> is executed without arguments, or with malformed arguments, bypassing typical usage patterns. This is the key indicator the rule detects.</li>
<li><code>rundll32.exe</code> spawns a child process, which could be a script interpreter (e.g., <code>powershell.exe</code>, <code>cmd.exe</code>), another executable, or a network utility.</li>
<li>The child process executes malicious code, downloads additional payloads, or establishes a command and control connection.</li>
<li>The attacker leverages the child process for lateral movement or privilege escalation within the network.</li>
<li>The final objective could include data exfiltration, ransomware deployment, or persistent access to the compromised system.</li>
<li>The adversary uses <code>rundll32.exe</code> to hide the execution of the malicious process and blend into normal system activity.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, allowing attackers to gain control of the affected system. This can result in data breaches, system compromise, and potential lateral movement within the network. The use of a trusted system binary like <code>rundll32.exe</code> makes detection more challenging. It affects Windows systems and can be used in targeted attacks as well as widespread campaigns. Organizations failing to detect this behavior are at risk of significant data loss and operational disruption.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Unusual RunDLL32 Child Process</code> to your SIEM and tune for your environment to detect the execution of <code>rundll32.exe</code> without arguments, followed by a child process.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to collect the necessary data for the Sigma rule.</li>
<li>Investigate any alerts generated by this rule to determine the legitimacy of the <code>rundll32.exe</code> execution and the spawned child process.</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted executables in your environment, mitigating the impact of this technique.</li>
<li>Monitor process execution events for unusual parent-child relationships involving <code>rundll32.exe</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>proxy-execution</category><category>rundll32</category></item><item><title>Control Panel Process with Unusual Arguments</title><link>https://feed.craftedsignal.io/briefs/2024-01-control-panel-abuse/</link><pubDate>Tue, 02 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-control-panel-abuse/</guid><description>Adversaries may abuse control.exe to proxy execution of malicious code by using the Control Panel process to execute payloads from unusual locations, detected by identifying suspicious keywords or paths in the process command line.</description><content:encoded><![CDATA[<p>This detection rule identifies unusual instances of Control Panel being executed with suspicious keywords or paths in the process command line. Control Panel (control.exe) is a legitimate Windows utility, but adversaries may abuse it to proxy execution of malicious code, effectively bypassing defense mechanisms. This technique involves launching control.exe with command-line arguments that point to malicious payloads or unusual file types, such as image files or INF files, or paths containing traversal sequences. The rule is designed to trigger when control.exe is launched with suspicious arguments like image files, INF files, paths containing traversal sequences, or paths in user-writable locations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An adversary gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The adversary stages a malicious payload on the system in a location such as <code>AppData\Local</code> or <code>Users\Public</code>.</li>
<li>The adversary crafts a command line that uses <code>control.exe</code> to execute the malicious payload. The command line includes a suspicious path, such as <code>control.exe evil.jpg</code> or <code>control.exe ..\..\..\evil.dll</code>.</li>
<li>The <code>control.exe</code> process is executed with the malicious command line.</li>
<li><code>Control.exe</code> attempts to load the specified file.</li>
<li>If the file is an executable or script, it is executed within the context of the <code>control.exe</code> process.</li>
<li>The malicious code performs its intended actions (e.g., downloading additional payloads, establishing persistence, or exfiltrating data).</li>
<li>The adversary achieves their objective, such as data theft or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, allowing adversaries to install malware, steal sensitive data, or compromise the entire system. This can result in significant financial loss, reputational damage, and disruption of business operations. Because Control Panel is a signed Microsoft binary, abusing it can bypass application control policies.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Control Panel Process with Unusual Arguments&rdquo; to your SIEM to detect suspicious <code>control.exe</code> command lines (rule).</li>
<li>Enable Sysmon process creation logging to capture the command-line arguments of <code>control.exe</code> (logsource).</li>
<li>Monitor process execution events for instances of <code>control.exe</code> launching child processes (rule).</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the parent process, command-line arguments, and any subsequent network connections (rule).</li>
<li>Implement application control policies to restrict the execution of <code>control.exe</code> from unusual locations (overview).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>proxy-execution</category><category>windows</category></item><item><title>Msiexec Arbitrary DLL Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-msiexec-dll-execution/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-msiexec-dll-execution/</guid><description>Adversaries may abuse the msiexec.exe utility to proxy the execution of malicious DLL payloads, bypassing application control and other defenses.</description><content:encoded><![CDATA[<p>Msiexec.exe is the command-line utility for the Windows Installer, commonly used to execute installation packages (.msi). Attackers are known to abuse msiexec.exe to proxy the execution of arbitrary DLLs, a technique that helps bypass application control and evade detection. This approach leverages the trusted nature of msiexec.exe to execute malicious code, making it harder for security tools to identify and block the activity. The abuse of msiexec.exe has been observed in various attack campaigns, highlighting the need for defenders to monitor its usage closely.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system, often through phishing or exploitation of a vulnerability.</li>
<li>The attacker uploads a malicious DLL to the compromised system.</li>
<li>The attacker uses msiexec.exe with the <code>/Y</code> flag to execute the malicious DLL. This flag is used to trigger DLL execution via msiexec.</li>
<li>Msiexec.exe loads and executes the malicious DLL.</li>
<li>The malicious DLL performs its intended actions, such as establishing persistence, escalating privileges, or deploying additional malware.</li>
<li>The attacker may use the proxy execution through msiexec.exe to evade detection by security tools monitoring process execution.</li>
<li>The attacker pivots to other systems or begins data exfiltration.</li>
<li>The ultimate objective is often data theft, system compromise, or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary code on the targeted system, potentially leading to a full system compromise. This can result in data breaches, financial loss, and reputational damage. The technique is particularly effective at bypassing application control solutions, increasing the likelihood of a successful attack. While specific victim counts are unavailable, the widespread use of Windows Installer makes this a relevant threat across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Suspicious Msiexec Execute Arbitrary DLL</code> to your SIEM to detect the execution of msiexec.exe with the <code>/Y</code> flag, indicative of potential malicious DLL execution.</li>
<li>Investigate any instances of msiexec.exe executing DLLs from unusual or temporary locations.</li>
<li>Implement application control policies to restrict the execution of msiexec.exe to authorized users and legitimate installation processes.</li>
<li>Monitor process creation events for msiexec.exe to identify suspicious command-line arguments and parent processes.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>proxy-execution</category><category>msiexec</category></item></channel></rss>