<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Sccm — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/sccm/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jul 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/sccm/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Windows Session Hijacking via CcmExec</title><link>https://feed.craftedsignal.io/briefs/2024-07-sccm-dll-hijacking/</link><pubDate>Wed, 03 Jul 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-sccm-dll-hijacking/</guid><description>Adversaries may exploit Microsoft's System Center Configuration Manager by loading malicious DLLs into SCNotification.exe, a process associated with user notifications, potentially leading to Windows session hijacking.</description><content:encoded><![CDATA[<p>Attackers may attempt to hijack Windows user sessions by exploiting Microsoft&rsquo;s System Center Configuration Manager (SCCM). This involves loading malicious DLLs into <code>SCNotification.exe</code>, a process responsible for user notifications within the SCCM framework. The vulnerability arises when <code>SCNotification.exe</code> loads untrusted DLLs, potentially impersonating a user session. This activity is often characterized by recent DLL file creation or modification, coupled with the DLL lacking a trusted code signature. The references indicate this technique has been discussed publicly, raising awareness and the potential for increased exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system.</li>
<li>Attacker places a malicious DLL on the system. This DLL may be disguised to appear legitimate.</li>
<li>The attacker manipulates the system to cause <code>SCNotification.exe</code> to load the malicious DLL. This may involve modifying registry keys or file paths.</li>
<li><code>SCNotification.exe</code> loads the attacker-controlled DLL.</li>
<li>The malicious DLL executes within the context of the <code>SCNotification.exe</code> process.</li>
<li>The attacker leverages the hijacked process to impersonate a user session.</li>
<li>Attacker gains unauthorized access to user accounts and data.</li>
<li>Attacker performs malicious actions under the guise of the compromised user, such as data exfiltration or privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack could lead to unauthorized access to sensitive data, privilege escalation, and further compromise of the network. Victims could experience data breaches, financial loss, or reputational damage. The impact depends on the extent of access gained by the attacker and the sensitivity of the data accessed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential Windows Session Hijacking via CcmExec&rdquo; to your SIEM to detect suspicious DLL loads by <code>SCNotification.exe</code>.</li>
<li>Investigate alerts triggered by the Sigma rule, focusing on DLLs with recent file creation times or modifications (DLL timestamps) and untrusted signatures.</li>
<li>Implement application whitelisting to prevent unauthorized DLLs from being loaded by <code>SCNotification.exe</code> as described in the remediation steps in the note section.</li>
<li>Monitor process creation events for <code>SCNotification.exe</code> and related processes.</li>
<li>Enable Sysmon process creation logging to enhance visibility into process execution events, which activates the Sigma rules above.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>dll-hijacking</category><category>sccm</category></item></channel></rss>