<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Docker Inc — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/docker-inc/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 14:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/docker-inc/feed.xml" rel="self" type="application/rss+xml"/><item><title>Suspicious PowerShell Engine ImageLoad</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-powershell-imageload/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-powershell-imageload/</guid><description>This rule identifies instances where the PowerShell engine is loaded by processes other than powershell.exe, potentially indicating attackers attempting to use PowerShell functionality stealthily by using the underlying System.Management.Automation namespace and bypassing PowerShell security features.</description><content:encoded><![CDATA[<p>Attackers can leverage the PowerShell engine without directly executing <code>powershell.exe</code>. This technique, often referred to as &ldquo;PowerShell without PowerShell,&rdquo; involves using the underlying System.Management.Automation namespace. This approach allows attackers to bypass application allowlisting and PowerShell security features, operating more stealthily within a compromised environment. This technique makes detection more challenging, as standard PowerShell execution logs might not capture the activity. The activity is detected by monitoring which processes load the System.Management.Automation.dll or System.Management.Automation.ni.dll libraries. This activity can legitimately happen where vendors have their own PowerShell implementations that are shipped with some products.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means, such as exploiting a vulnerability or using compromised credentials.</li>
<li>The attacker deploys a custom tool or script on the target system. This tool is designed to interact with the System.Management.Automation namespace directly.</li>
<li>The custom tool loads the <code>System.Management.Automation.dll</code> or <code>System.Management.Automation.ni.dll</code> library into its process space.</li>
<li>The tool uses the loaded PowerShell engine to execute malicious commands or scripts without invoking <code>powershell.exe</code>.</li>
<li>The attacker performs reconnaissance activities, such as gathering system information or network configurations, using PowerShell commands.</li>
<li>The attacker attempts to move laterally within the network, leveraging the PowerShell engine to execute commands on other systems.</li>
<li>The attacker installs malware or backdoors using the PowerShell engine to maintain persistence within the compromised environment.</li>
<li>The attacker exfiltrates sensitive data or causes damage to the system, completing the objectives of the attack.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leveraging &ldquo;PowerShell without PowerShell&rdquo; can lead to significant compromise of Windows systems. Attackers can bypass traditional security measures, potentially leading to data theft, system disruption, or the installation of persistent malware. The technique&rsquo;s stealthy nature can prolong the time to detection, increasing the potential for widespread damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Suspicious PowerShell Engine ImageLoad</code> to your SIEM to detect when the <code>System.Management.Automation.dll</code> or <code>System.Management.Automation.ni.dll</code> libraries are loaded by unexpected processes.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the process execution chain (parent process tree) for unknown processes.</li>
<li>Implement endpoint detection and response (EDR) solutions like Elastic Defend to provide visibility into process behavior and library loading events, activating the <code>process_creation</code> and <code>image_load</code> log sources.</li>
<li>Review and tune exclusions to the Sigma rule based on legitimate vendor applications to reduce false positives.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>powershell</category><category>execution</category><category>windows</category></item></channel></rss>