<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Token-Impersonation — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/token-impersonation/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/token-impersonation/feed.xml" rel="self" type="application/rss+xml"/><item><title>Process Created with a Duplicated Token</title><link>https://feed.craftedsignal.io/briefs/2024-01-process-created-with-duplicated-token/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-process-created-with-duplicated-token/</guid><description>This rule identifies the creation of a process impersonating the token of another user logon session on Windows, potentially indicating privilege escalation.</description><content:encoded><![CDATA[<p>This detection rule identifies the creation of a process impersonating the token of another user logon session on Windows. Adversaries may duplicate tokens to create processes with elevated privileges, bypassing security controls. This technique is used for privilege escalation. The rule flags suspicious process creation by examining token usage patterns, process origins, and recent file modifications, while excluding known legitimate behaviors, to flag potential privilege escalation attempts. The rule is designed for data generated by Elastic Endpoint 8.4+.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means, such as exploiting a vulnerability or using compromised credentials.</li>
<li>The attacker identifies a user logon session with higher privileges than their current session.</li>
<li>The attacker duplicates the token of the identified user logon session using API calls like <code>DuplicateTokenEx</code>.</li>
<li>The attacker uses the duplicated token to create a new process using <code>CreateProcessWithTokenW</code>.</li>
<li>The new process inherits the privileges of the duplicated token.</li>
<li>The attacker executes malicious commands or tools within the context of the newly created process.</li>
<li>The attacker gains elevated privileges on the system, allowing them to perform actions they were previously unauthorized to do.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker to escalate privileges on the compromised system, potentially gaining administrative or system-level access. This can lead to unauthorized access to sensitive data, installation of malware, lateral movement to other systems on the network, and ultimately, complete control over the affected environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Elastic Defend to collect the necessary process creation and event data to activate this rule.</li>
<li>Deploy the Sigma rule <code>Detect Process Created with a Duplicated Token</code> to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the rule, focusing on processes with unusual parent-child relationships or unsigned code.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>privilege-escalation</category><category>token-impersonation</category><category>windows</category></item></channel></rss>