<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Raccine — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/raccine/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/raccine/feed.xml" rel="self" type="application/rss+xml"/><item><title>Raccine Scheduled Task Deletion via Schtasks</title><link>https://feed.craftedsignal.io/briefs/2024-01-raccine-task-deletion/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-raccine-task-deletion/</guid><description>Detection of adversaries deleting the Raccine Rules Updater scheduled task via `schtasks.exe` to disable the ransomware protection tool, potentially leading to data encryption and loss.</description><content:encoded><![CDATA[<p>This brief focuses on detecting the deletion of the Raccine Rules Updater scheduled task, a critical action that adversaries may take to disable Raccine, a security tool designed to prevent ransomware attacks. The deletion is typically performed using the <code>schtasks.exe</code> command. This activity is significant because successful deletion of the Raccine scheduled task allows ransomware to execute unimpeded, leading to potential data encryption and data loss. The detection leverages endpoint detection and response (EDR) agents and focuses on process names and command-line executions to identify this malicious behavior. Defenders should prioritize monitoring for this activity as it often precedes ransomware deployment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of the target system via unspecified means (e.g., phishing, exploitation of public-facing application).</li>
<li>Execution of arbitrary commands on the compromised system.</li>
<li>The adversary uses <code>schtasks.exe</code> to query the list of scheduled tasks to identify the Raccine Rules Updater task.</li>
<li><code>schtasks.exe</code> is then used with the <code>delete</code> parameter to remove the &ldquo;Raccine Rules Updater&rdquo; scheduled task.</li>
<li>The operating system removes the scheduled task entry.</li>
<li>Ransomware is deployed on the system without Raccine&rsquo;s protection.</li>
<li>Ransomware encrypts files on local and network shares.</li>
<li>A ransom note is dropped, demanding payment for decryption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful deletion of the Raccine scheduled task can lead to a successful ransomware attack. This can result in data encryption, system downtime, and potential financial losses due to ransom payments or recovery costs. The severity of the impact depends on the extent of the data encryption and the organization&rsquo;s ability to recover from backups. Organizations without Raccine deployed are not directly affected but remain vulnerable to ransomware.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rules to detect the execution of <code>schtasks.exe</code> deleting tasks containing &ldquo;Raccine&rdquo; in the task name or description (<code>schtasks_raccine_deletion</code>).</li>
<li>Enable process monitoring and command-line logging via Sysmon or similar EDR solutions to ensure visibility into process executions.</li>
<li>Investigate any instances of <code>schtasks.exe</code> being used to delete scheduled tasks, especially those related to security tools.</li>
<li>Review and harden scheduled task permissions to prevent unauthorized modifications.</li>
<li>Monitor parent processes of <code>schtasks.exe</code> for suspicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>raccine</category><category>ransomware</category><category>defense-evasion</category><category>scheduled-task</category><category>windows</category></item></channel></rss>