<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Startup — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/startup/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 14:30:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/startup/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious Scripts in the Startup Directory</title><link>https://feed.craftedsignal.io/briefs/2024-01-startup-folder-persistence/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-startup-folder-persistence/</guid><description>This rule identifies script engines creating files or the creation of script files in the Windows Startup folder, a persistence technique used by adversaries to automatically execute scripts upon user login.</description><content:encoded><![CDATA[<p>Adversaries may abuse the Windows Startup folder to maintain persistence in an environment. The Startup folder is a special folder in Windows where programs added to this folder are executed during account logon without user interaction. This rule identifies script engines (wscript.exe, cscript.exe) creating files or the creation of script files with specific extensions (vbs, vbe, wsh, wsf, js, jse, sct, hta, ps1, bat, cmd) in the Startup folder. The rule is designed for data generated by Elastic Defend and also supports Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system.</li>
<li>The attacker creates a malicious script (e.g., VBScript, PowerShell) designed to execute arbitrary commands.</li>
<li>The attacker identifies the Startup folder path for a specific user or all users.</li>
<li>The attacker creates a shortcut file (e.g., .lnk) or a script file directly within the Startup folder.</li>
<li>The shortcut or script is configured to execute the malicious script.</li>
<li>The system is restarted or the user logs in.</li>
<li>The operating system automatically executes the script located in the Startup folder.</li>
<li>The malicious script executes, allowing the attacker to perform actions such as installing malware, establishing persistence, or exfiltrating data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leveraging the Startup folder persistence mechanism allows the attacker to maintain unauthorized access to a compromised system. This can lead to the execution of malicious code, installation of malware, data theft, and further compromise of the network. The impact is significant, potentially affecting all users who log into the system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Script Creation in Startup Directory&rdquo; to your SIEM and tune for your environment to identify the creation of suspicious scripts in the Startup folder.</li>
<li>Deploy the Sigma rule &ldquo;Detect Script Execution via Startup Directory&rdquo; to your SIEM and tune for your environment to identify script execution from the Startup directory.</li>
<li>Enable Sysmon Event ID 11 (File Create) to collect necessary data for the detections above.</li>
<li>Investigate any alerts generated by these rules promptly to identify and remediate potential persistence attempts.</li>
<li>Block the file extensions listed in the rule query (vbs, vbe, wsh, wsf, js, jse, sct, hta, ps1, bat, cmd) from being written to the startup folder via application control policies where possible.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>startup</category><category>windows</category><category>attack.persistence</category></item><item><title>Suspicious Process Writing to Startup Folder for Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-01-startup-persistence/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-startup-persistence/</guid><description>Adversaries may establish persistence by writing malicious files to the Windows Startup folder, allowing them to automatically execute upon user logon; this detection identifies suspicious processes creating files in these locations.</description><content:encoded><![CDATA[<p>Attackers often leverage the Windows Startup folder to maintain persistence, as any executable placed in this folder will automatically run when a user logs into the system. This technique is particularly effective because it requires no user interaction and can easily be automated. This rule detects when processes commonly abused by attackers, such as cmd.exe, powershell.exe, or mshta.exe, write or modify files within the Startup folders. The rule focuses on identifying unauthorized persistence mechanisms and helps defenders uncover potentially compromised systems. By monitoring file creation events in the Startup folders by suspicious processes, this detection aims to catch malicious activity early in the attack chain.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker executes a command shell (e.g., <code>cmd.exe</code>, <code>powershell.exe</code>) on the compromised system.</li>
<li>The attacker uses the command shell to write a malicious executable or script file to one of the Windows Startup folders (<code>C:\\Users\\*\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\*</code> or <code>C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\StartUp\\*</code>).</li>
<li>The attacker modifies the file attributes (e.g., using <code>attrib.exe</code>) to hide the file or make it more difficult to detect.</li>
<li>The attacker schedules a reboot or waits for the user to log off and back on.</li>
<li>Upon user logon, the malicious executable or script in the Startup folder is automatically executed.</li>
<li>The malicious code establishes persistence, potentially downloading additional payloads or establishing a command and control (C2) channel.</li>
<li>The attacker maintains persistent access to the compromised system, enabling further malicious activities such as data theft or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to persistent access on the compromised system, allowing attackers to maintain their foothold even after system reboots. This can lead to data exfiltration, installation of ransomware, or further propagation within the network. The number of affected systems depends on the scope of the initial compromise and the attacker&rsquo;s ability to move laterally. Sectors commonly targeted by persistence techniques include finance, healthcare, and government.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 11 (File Create) to capture file creation events, as referenced in the <a href="#setup">setup instructions</a>.</li>
<li>Deploy the Sigma rule <code>Suspicious Process Writing to Startup Folder</code> to your SIEM to detect suspicious processes creating files in the startup folder, and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule to determine if the activity is malicious, referencing the <a href="#note">investigation guide</a>.</li>
<li>Block the processes listed in the rule (<code>cmd.exe</code>, <code>powershell.exe</code>, etc.) from writing to the startup folders if legitimate use is not required.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>startup</category><category>windows</category></item></channel></rss>