<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>System-Binary-Proxy-Execution — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/system-binary-proxy-execution/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/system-binary-proxy-execution/feed.xml" rel="self" type="application/rss+xml"/><item><title>Mshta Making Network Connections Indicative of Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-mshta-network-connections/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-mshta-network-connections/</guid><description>Mshta.exe making outbound network connections may indicate adversarial activity, as it is often used to execute malicious scripts and evade detection by proxying execution of untrusted code.</description><content:encoded><![CDATA[<p>Mshta.exe is a legitimate Windows utility used to execute Microsoft HTML Application (HTA) files. Adversaries exploit it to run malicious scripts, leveraging its trusted status to bypass security measures. This activity can be difficult to detect because Mshta.exe is a signed Microsoft binary. This detection identifies suspicious network activity by Mshta.exe, excluding known benign processes, to flag potential threats. Legitimate uses of Mshta.exe include software updates, installations, and automation scripts using HTA files. This rule helps identify unauthorized network connections indicative of malicious intent and flags suspicious use of mshta.exe.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access through an unknown method, such as phishing or exploiting a software vulnerability.</li>
<li>The attacker executes a malicious script, such as VBScript or JavaScript, using Mshta.exe.</li>
<li>Mshta.exe interprets and executes the script, bypassing application control policies due to its signed status.</li>
<li>The script establishes a network connection to an external command and control (C2) server.</li>
<li>The C2 server provides instructions to the compromised host, such as downloading additional malware.</li>
<li>The downloaded malware executes, performing actions such as data exfiltration or lateral movement.</li>
<li>The attacker leverages the compromised host to move laterally within the network, compromising additional systems.</li>
<li>The attacker achieves their objective, such as stealing sensitive data or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the execution of arbitrary code, potentially compromising sensitive data, facilitating lateral movement, and establishing a persistent presence within the network. Systems affected by this activity may be used as a beachhead for further attacks, leading to significant data breaches, financial loss, and reputational damage. The number of victims can vary depending on the scope of the initial compromise and the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging to capture the command-line arguments used by Mshta.exe.</li>
<li>Deploy the &ldquo;Mshta Network Connection&rdquo; Sigma rule to your SIEM and tune for your environment.</li>
<li>Implement application whitelisting to prevent unauthorized execution of Mshta.exe and similar system binaries.</li>
<li>Monitor network connections initiated by Mshta.exe, including destination IP addresses, domains, and ports, to identify any connections to known malicious or suspicious endpoints.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>system-binary-proxy-execution</category><category>windows</category></item></channel></rss>