<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Time-Based-Evasion — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/time-based-evasion/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 15:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/time-based-evasion/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Time-Based Evasion via Choice Exec</title><link>https://feed.craftedsignal.io/briefs/2024-01-time-based-evasion-choice/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-time-based-evasion-choice/</guid><description>Detection of choice.exe used in batch files for time-based evasion, a technique observed in SnakeKeylogger malware, indicating potential stealthy code execution and persistence.</description><content:encoded><![CDATA[<p>This brief focuses on the detection of <code>choice.exe</code> being used within batch files as a time-delay tactic, a technique notably employed by the SnakeKeylogger malware. The analysis leverages data from Endpoint Detection and Response (EDR) agents, scrutinizing process names and command-line executions. This behavior is significant because it suggests the implementation of time-based evasion techniques designed to circumvent detection mechanisms. Successful evasion could enable attackers to execute malicious code covertly, remove incriminating files, and establish persistent access on compromised systems. The use of <code>choice.exe</code> for such purposes warrants immediate investigation by security operations center (SOC) analysts due to the potential for significant system compromise and data exfiltration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access via an unknown vector.</li>
<li>A batch script is executed on the target system.</li>
<li>The batch script uses <code>choice.exe</code> with the <code>/T</code> and <code>/N</code> parameters to introduce a time delay. The <code>/T</code> parameter specifies a timeout period, and the <code>/N</code> parameter suppresses the display of choices.</li>
<li>This delay allows the malware to evade time-sensitive detection mechanisms.</li>
<li>After the delay, the script executes further commands, potentially downloading and executing a payload.</li>
<li>The payload executes, installing a keylogger such as SnakeKeylogger or 0bj3ctivity Stealer.</li>
<li>The keylogger captures sensitive information such as keystrokes and clipboard data.</li>
<li>The stolen data is exfiltrated to a remote server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised systems can lead to data theft, intellectual property loss, and financial fraud. SnakeKeylogger and similar malware have been used to steal credentials and sensitive information from various targets. Successful exploitation could result in significant financial losses, reputational damage, and legal liabilities. The number of victims and the extent of the damage depend on the attacker&rsquo;s objectives and the compromised systems&rsquo; value.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Choice.exe Time Delay</code> to your SIEM to detect the use of <code>choice.exe</code> with time-delay parameters (log source: <code>process_creation</code>).</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture the necessary process execution data for the Sigma rule.</li>
<li>Investigate any instances of <code>choice.exe</code> being used with the <code>/T</code> and <code>/N</code> parameters to determine if it is part of a malicious script.</li>
<li>Block the execution of unsigned or untrusted batch scripts to prevent the initial execution of the malicious code.</li>
<li>Monitor endpoint activity for suspicious processes and network connections originating from systems where <code>choice.exe</code> has been detected.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>time-based-evasion</category><category>malware</category><category>persistence</category><category>defense-evasion</category><category>windows</category></item></channel></rss>