<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Wdac — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/wdac/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 02 Nov 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/wdac/feed.xml" rel="self" type="application/rss+xml"/><item><title>WDAC Policy File Creation by Unusual Process</title><link>https://feed.craftedsignal.io/briefs/2024-11-wdac-policy-evasion/</link><pubDate>Sat, 02 Nov 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-wdac-policy-evasion/</guid><description>Adversaries may use a specially crafted Windows Defender Application Control (WDAC) policy to restrict the execution of security products, detected by unusual process creation of WDAC policy files.</description><content:encoded><![CDATA[<p>Attackers are increasingly targeting Windows Defender Application Control (WDAC) to disable or weaken endpoint defenses. By crafting malicious WDAC policies, adversaries can block legitimate security software and evade detection. This technique involves creating WDAC policy files (.p7b or .cip) in protected system directories using unauthorized processes. The activity often occurs when attackers have already gained a foothold in the system and are attempting to solidify their position. Successful deployment of a malicious WDAC policy can significantly hinder incident response and allow malware to operate undetected. This tactic has gained traction since late 2024, with offensive tools like Krueger demonstrating the potential for weaponizing WDAC against EDR solutions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to the system through methods such as phishing or exploiting a software vulnerability.</li>
<li><strong>Privilege Escalation:</strong> The attacker escalates privileges to gain administrative access, which is required to modify WDAC policies.</li>
<li><strong>Policy Creation:</strong> The attacker crafts a malicious WDAC policy using tools or scripts. This policy is designed to block specific security products or processes.</li>
<li><strong>Staging:</strong> The malicious policy is staged in a temporary location on the system, often within user-writable directories.</li>
<li><strong>Policy Placement:</strong> The attacker moves the malicious WDAC policy file (.p7b or .cip) to a protected system directory, such as <code>C:\Windows\System32\CodeIntegrity\</code> or <code>C:\Windows\System32\CodeIntegrity\CiPolicies\Active\</code>. The tool used may be a Living-off-the-Land Binary (LOLBin) or a custom .NET assembly.</li>
<li><strong>Activation:</strong> The attacker triggers the activation of the new WDAC policy, which often requires a system reboot or the use of a service control utility.</li>
<li><strong>Defense Evasion:</strong> Once the policy is active, the targeted security products are blocked, allowing the attacker to operate with reduced risk of detection.</li>
<li><strong>Lateral Movement/Objectives:</strong> With defenses weakened, the attacker can move laterally within the network, exfiltrate data, or achieve other objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack targeting WDAC can severely impair an organization&rsquo;s ability to detect and respond to threats. By blocking security software, attackers can operate with impunity, leading to data breaches, financial losses, and reputational damage. Observed damage includes disabled endpoint detection and response (EDR) solutions, allowing ransomware and other malware to execute without interference. The scope of impact can range from individual workstations to entire domains, depending on the breadth of the WDAC policy deployment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;WDAC Policy File by an Unusual Process&rdquo; Sigma rule to your SIEM to detect unauthorized WDAC policy modifications.</li>
<li>Monitor file creation events with extensions .p7b and .cip in <code>C:\Windows\System32\CodeIntegrity\</code> and <code>C:\Windows\System32\CodeIntegrity\CiPolicies\Active\</code> directories, specifically filtering for processes other than <code>poqexec.exe</code>, <code>TiWorker.exe</code>, and <code>omadmclient.exe</code>.</li>
<li>Enable Sysmon Event ID 11 (File Create) logging to capture file creation events and provide the necessary data for the Sigma rule to function effectively.</li>
<li>Implement strict access control policies on WDAC policy directories to prevent unauthorized modification.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wdac</category><category>defense-evasion</category><category>windows</category></item></channel></rss>