<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>AdminArsenal — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/adminarsenal/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 10:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/adminarsenal/feed.xml" rel="self" type="application/rss+xml"/><item><title>Remote Execution of Windows Services via RPC</title><link>https://feed.craftedsignal.io/briefs/2024-01-remote-service-execution/</link><pubDate>Tue, 02 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-remote-service-execution/</guid><description>Detection of remote execution of Windows services over RPC by correlating `services.exe` network connections and spawned child processes, potentially indicating lateral movement.</description><content:encoded><![CDATA[<p>This detection rule identifies the remote execution of Windows services over Remote Procedure Call (RPC), a technique often employed for lateral movement within a network. The rule focuses on correlating network connections initiated by <code>services.exe</code> with subsequent child process creation events. While this activity can be a legitimate function of administrators using remote management tools, it also represents a potential attack vector. The rule aims to strike a balance between detecting malicious activity and minimizing false positives arising from routine administrative tasks. The detection logic is based on identifying network connections to <code>services.exe</code> followed by the creation of child processes that are not commonly associated with legitimate service management. The rule requires the use of Elastic Defend or Sysmon for adequate logging coverage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the network.</li>
<li>The attacker attempts to move laterally to other systems.</li>
<li>The attacker establishes a connection to the target system&rsquo;s <code>services.exe</code> process over RPC using a high port (&gt;= 49152).</li>
<li>The attacker uses the established RPC connection to create or start a new service on the remote system.</li>
<li>The <code>services.exe</code> process on the remote system spawns a child process related to the newly created or started service.</li>
<li>This new process executes the attacker&rsquo;s payload, potentially granting further access or executing malicious commands.</li>
<li>The attacker leverages the newly executed service for persistent access or further lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack could result in unauthorized access to sensitive data, disruption of critical services, or the deployment of ransomware. Lateral movement allows attackers to compromise multiple systems within the network, escalating the impact of the initial breach. Due to the nature of the technique, it can be challenging to distinguish between legitimate administrative activity and malicious actions, leading to delayed detection and increased dwell time for attackers.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rules to your SIEM and tune the filters for known-good executables in your environment to reduce false positives.</li>
<li>Enable Sysmon process-creation (Event ID 1) and network connection (Event ID 3) logging to ensure the required data for the Sigma rules is available.</li>
<li>Investigate any alerts triggered by these rules, focusing on the parent process and network connection details associated with the spawned child process.</li>
<li>Consider excluding known remote management tools from triggering the detection by adding exceptions based on <code>process.executable</code> or <code>process.args</code> in the Sigma rules.</li>
<li>Monitor the network for unusual RPC activity, especially connections to <code>services.exe</code> from unexpected source IPs.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>execution</category><category>windows</category></item></channel></rss>