<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Use Case: Living Off the Land Attack Detection — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/use-case-living-off-the-land-attack-detection/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 15 May 2026 18:08:39 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/use-case-living-off-the-land-attack-detection/feed.xml" rel="self" type="application/rss+xml"/><item><title>User Detected with Suspicious Windows Process(es)</title><link>https://feed.craftedsignal.io/briefs/2026-05-suspicious-windows-process/</link><pubDate>Fri, 15 May 2026 18:08:39 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-suspicious-windows-process/</guid><description>A machine learning job combination has identified a user with one or more suspicious Windows processes exhibiting unusually high malicious probability scores, potentially involving LOLbins for defense evasion.</description><content:encoded><![CDATA[<p>A machine learning job combination has flagged users with suspicious Windows processes exhibiting unusually high malicious probability scores. This detection leverages the ProblemChild supervised ML model to identify processes classified as malicious in several ways. Anomalies containing clusters of suspicious processes, each with the same username, have an aggregate score calculated to be unusually high by an unsupervised ML model. Such clusters often contain suspicious or malicious activity, possibly involving LOLbins, that may be resistant to detection using conventional search rules. The rule requires the Living off the Land (LotL) Attack Detection integration assets to be installed, as well as Windows process events collected by integrations such as Elastic Defend or Winlogbeat.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system.</li>
<li>The attacker uses a LOLBin (Living Off The Land Binary) such as PowerShell or WMI to execute malicious commands.</li>
<li>The LOLBin spawns one or more child processes, creating a cluster of processes associated with the same user.</li>
<li>A supervised machine learning model, ProblemChild, identifies these processes as having a high probability of being malicious.</li>
<li>An unsupervised machine learning model calculates an unusually high aggregate score for the event cluster.</li>
<li>The detection triggers based on the combination of supervised and unsupervised ML scores.</li>
<li>The attacker leverages the LOLBin for defense evasion, bypassing conventional search rule detections.</li>
<li>The attacker achieves their objective, such as lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leveraging LOLbins can lead to significant system compromise, including data theft, system disruption, and lateral movement within the network. While this detection has low severity, it identifies potential malicious activity that may be resistant to traditional detection methods. False positives from legitimate administrative tools and software updates may occur.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Install and configure the Living off the Land (LotL) Attack Detection integration assets as outlined in the <a href="#setup">setup instructions</a>.</li>
<li>Ensure Windows process events are being collected by integrations such as Elastic Defend or Winlogbeat as described in the <a href="#setup">setup instructions</a>.</li>
<li>Review and tune the machine learning job identified by <code>machine_learning_job_id: problem_child_high_sum_by_user_ea</code> to minimize false positives, focusing on legitimate administrative tools like PowerShell and WMI.</li>
<li>Implement enhanced monitoring and detection rules to identify similar patterns of behavior, focusing on the specific tactics and techniques used in this incident.</li>
<li>Investigate alerts generated by this rule using the <a href="#note">investigation guide</a> to determine the scope of the incident and any potential compromise.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>Domain: Endpoint</category><category>OS: Windows</category><category>Use Case: Living off the Land Attack Detection</category><category>Rule Type: ML</category><category>Rule Type: Machine Learning</category><category>Tactic: Defense Evasion</category><category>Resources: Investigation Guide</category><category>defense-evasion</category></item><item><title>Host Detected with Suspicious Windows Process(es)</title><link>https://feed.craftedsignal.io/briefs/2026-05-suspicious-windows-processes/</link><pubDate>Fri, 15 May 2026 18:08:09 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-suspicious-windows-processes/</guid><description>A machine learning job combination has identified a host with one or more suspicious Windows processes that exhibit unusually high malicious probability scores, indicating potential masquerading tactics for defense evasion.</description><content:encoded><![CDATA[<p>This detection identifies hosts with suspicious Windows processes exhibiting unusually high malicious probability scores, leveraging machine learning to detect potential masquerading tactics for defense evasion. The rule utilizes a combination of supervised and unsupervised ML models to flag unusual process clusters on a single host, possibly involving LOLbins. This approach aims to identify activity that may be resistant to detection using conventional search rules. The rule relies on the &lsquo;problem_child_high_sum_by_host_ea&rsquo; machine learning job and requires a minimum Elastic Stack version of 9.4.0. The rule uses data ingested by the Elastic Defend or Winlogbeat integrations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is achieved through methods not specified in this source.</li>
<li>The attacker executes a legitimate Windows binary (LOLBin) such as cmd.exe, powershell.exe or certutil.exe.</li>
<li>The LOLBin is used to execute a malicious command or script.</li>
<li>The ProblemChild supervised ML model predicts that the process is malicious based on its behavior.</li>
<li>An unsupervised ML model analyzes the aggregate score of the process cluster, identifying it as unusually high.</li>
<li>The detection rule triggers, flagging the host as having suspicious processes.</li>
<li>The analyst reviews the alert and investigates the flagged processes.</li>
<li>The attacker continues their actions on the compromised host, potentially leading to data exfiltration or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using LOLBins and masquerading techniques can allow an attacker to evade traditional detection methods and gain unauthorized access to sensitive systems and data. This can lead to data breaches, financial loss, and reputational damage. While the number of victims is unknown, the sectors targeted include any organization utilizing Windows systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure the Living off the Land (LotL) Attack Detection integration assets are installed, along with Windows process events collected by Elastic Defend or Winlogbeat, as required by the <a href="#setup">setup instructions</a>.</li>
<li>Review the host name associated with the suspicious process cluster as described in the <a href="#triage-and-analysis">investigation guide</a>.</li>
<li>Examine the specific processes flagged by the ProblemChild supervised ML model to identify any known LOLbins as described in the <a href="#triage-and-analysis">investigation guide</a>.</li>
<li>Implement application whitelisting to prevent unauthorized or suspicious processes from executing, as mentioned in the <a href="#response-and-remediation">response and remediation steps</a>.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>Use Case: Living off the Land Attack Detection</category><category>Rule Type: ML</category><category>Rule Type: Machine Learning</category><category>Tactic: Defense Evasion</category><category>Resources: Investigation Guide</category><category>defense-evasion</category><category>windows</category></item></channel></rss>