<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>SentinelOne — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/sentinelone/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 14:17:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/sentinelone/feed.xml" rel="self" type="application/rss+xml"/><item><title>Windows Port Forwarding Rule Addition via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2026-05-port-forwarding-registry/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-port-forwarding-registry/</guid><description>An adversary may abuse port forwarding to bypass network segmentation restrictions by creating a new port forwarding rule through modification of the Windows registry.</description><content:encoded><![CDATA[<p>Attackers may configure port forwarding rules to bypass network segmentation restrictions, effectively using the compromised host as a jump box to access previously unreachable systems. This involves modifying the registry to redirect incoming TCP connections from a local port to another port or a remote computer. The technique is typically employed post-compromise to facilitate lateral movement and maintain unauthorized access within the network. This activity is detected by monitoring changes to the <code>HKLM\SYSTEM\*ControlSet*\Services\PortProxy\v4tov4\</code> registry subkeys.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system through an exploit or compromised credentials.</li>
<li>The attacker executes a command-line interface (e.g., <code>cmd.exe</code> or <code>powershell.exe</code>) with administrative privileges.</li>
<li>The attacker uses <code>reg.exe</code> or PowerShell&rsquo;s <code>Set-ItemProperty</code> cmdlet to modify the <code>HKLM\SYSTEM\CurrentControlSet\Services\PortProxy\v4tov4\</code> registry key.</li>
<li>The attacker configures a new port forwarding rule by creating a new subkey under <code>v4tov4\</code> with specific settings for the local port, remote address, and remote port.</li>
<li>The attacker sets the <code>ListenAddress</code>, <code>ListenPort</code>, <code>ConnectAddress</code>, and <code>ConnectPort</code> values within the new subkey.</li>
<li>The attacker verifies the successful creation and activation of the port forwarding rule using <code>netsh interface portproxy show v4tov4</code>.</li>
<li>The attacker leverages the newly created port forwarding rule to tunnel traffic through the compromised host, bypassing network segmentation.</li>
<li>The attacker uses the proxied connection to access internal resources and conduct further attacks, such as lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation enables attackers to bypass network segmentation restrictions, leading to unauthorized access to internal systems and data. This can facilitate lateral movement, data exfiltration, and further compromise of the network. The severity of the impact depends on the sensitivity of the accessible resources and the extent of the attacker&rsquo;s lateral movement.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon registry event logging to capture modifications to the <code>HKLM\SYSTEM\*ControlSet*\Services\PortProxy\v4tov4\</code> registry subkeys, enabling detection of malicious port forwarding rule additions.</li>
<li>Deploy the Sigma rule &ldquo;Port Forwarding Rule Addition via Registry Modification&rdquo; to your SIEM to detect suspicious registry modifications related to port forwarding.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the process execution chain and the user account that performed the action.</li>
<li>Regularly review and audit existing port forwarding rules to identify and remove any unauthorized or suspicious configurations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>port-forwarding</category><category>registry-modification</category><category>command-and-control</category><category>defense-evasion</category><category>windows</category></item><item><title>Suspicious Zoom Child Process Execution</title><link>https://feed.craftedsignal.io/briefs/2024-11-suspicious-zoom-child-process/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-suspicious-zoom-child-process/</guid><description>A suspicious Zoom child process was detected, indicating a potential attempt to run unnoticed by masquerading as Zoom.exe or exploiting a vulnerability, resulting in the execution of cmd.exe, powershell.exe, pwsh.exe, or powershell_ise.exe.</description><content:encoded><![CDATA[<p>This detection identifies suspicious child processes spawned by Zoom.exe, potentially indicating an attempt to evade detection or exploit vulnerabilities within the Zoom application. The rule focuses on detecting instances where command interpreters like cmd.exe, PowerShell, or PowerShell ISE are launched as child processes of Zoom. This behavior can be indicative of an attacker attempting to execute malicious commands or scripts within the context of the Zoom application, potentially escalating privileges or gaining unauthorized access to system resources. It&rsquo;s crucial for defenders to investigate such occurrences, as they may signify ongoing exploitation or malicious activity leveraging Zoom as an initial access vector.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>User launches the Zoom application (Zoom.exe).</li>
<li>A vulnerability in Zoom is exploited, or the user is socially engineered into running a malicious command.</li>
<li>Zoom.exe spawns a child process, such as cmd.exe, powershell.exe, pwsh.exe, or powershell_ise.exe.</li>
<li>The spawned process executes commands or scripts, potentially downloading or executing malware.</li>
<li>The malicious script or command performs reconnaissance activities on the system.</li>
<li>The script establishes persistence by creating a scheduled task or modifying registry keys.</li>
<li>The attacker gains remote access to the compromised system.</li>
<li>The attacker performs lateral movement and data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could allow attackers to execute arbitrary commands, escalate privileges, and compromise the affected system. Depending on the user&rsquo;s privileges, attackers could gain access to sensitive data, install malware, or pivot to other systems on the network. The impact ranges from data breaches to complete system compromise, potentially affecting all users within the organization who utilize the Zoom application.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Suspicious Zoom Child Process&rdquo; to your SIEM to detect command interpreters spawned by Zoom.exe. Tune the rule for your environment to minimize false positives.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture detailed information about process executions, which is essential for the Sigma rule above.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the command-line arguments and network connections of the spawned processes.</li>
<li>Monitor Windows Security Event Logs for process creation events related to Zoom.exe and its child processes to identify suspicious behavior.</li>
<li>Consider implementing application control policies to restrict the execution of unauthorized processes within the Zoom application context.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>windows</category></item><item><title>Suspicious Windows PowerShell Arguments Detected</title><link>https://feed.craftedsignal.io/briefs/2024-09-susp-powershell-args/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-09-susp-powershell-args/</guid><description>This rule identifies the execution of PowerShell with suspicious argument values, often observed during malware installation, by detecting unusual PowerShell arguments indicative of abuse, focusing on patterns like encoded commands, suspicious downloads, and obfuscation techniques.</description><content:encoded><![CDATA[<p>This detection rule identifies the execution of PowerShell with suspicious argument values on Windows systems. This behavior is frequently associated with malware installation and other malicious activities. PowerShell is a powerful scripting language, and adversaries often exploit its capabilities to execute malicious scripts, download payloads, and obfuscate commands. The rule focuses on detecting patterns such as encoded commands, suspicious downloads (e.g., using WebClient or Invoke-WebRequest), and various obfuscation techniques used to evade detection. The rule is designed to work with various data sources, including Elastic Defend, Windows Security Event Logs, Sysmon, and third-party EDR solutions like CrowdStrike, Microsoft Defender XDR, and SentinelOne, enhancing its applicability across different environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker uses PowerShell to download a malicious payload from a remote server using commands like <code>DownloadFile</code> or <code>DownloadString</code>.</li>
<li>The downloaded payload is often encoded or obfuscated to evade detection. Common techniques include Base64 encoding, character manipulation, and compression.</li>
<li>PowerShell is then used to decode or deobfuscate the payload using methods like <code>[Convert]::FromBase64String</code> or <code>[char[]](...) -join ''</code>.</li>
<li>The deobfuscated payload is executed directly in memory using techniques like <code>iex</code> (Invoke-Expression) or <code>Reflection.Assembly.Load</code>.</li>
<li>The executed payload performs malicious actions, such as installing malware, establishing persistence, or exfiltrating data.</li>
<li>The attacker may use techniques like <code>WebClient</code> to download files from a remote URL.</li>
<li>Commands like <code>nslookup -q=txt</code> are used for command and control.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to malware installation, data theft, system compromise, and further propagation of the attack within the network. The detection of suspicious PowerShell arguments helps to identify and prevent these malicious activities before significant damage can occur. Without proper detection, attackers can maintain persistence, escalate privileges, and compromise sensitive data. The rule helps defenders identify and respond to these threats quickly, minimizing the impact of potential attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect suspicious PowerShell activity.</li>
<li>Enable Sysmon process creation logging with command line arguments to ensure the necessary data is captured for the Sigma rules to function effectively.</li>
<li>Investigate any alerts generated by the Sigma rules to determine the legitimacy of the PowerShell activity and take appropriate remediation steps.</li>
<li>Continuously tune the Sigma rules based on your environment to reduce false positives and improve detection accuracy.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>powershell</category><category>malware</category><category>execution</category></item><item><title>Suspicious Execution via Windows Command Debugging Utility</title><link>https://feed.craftedsignal.io/briefs/2024-07-cdb-execution/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-cdb-execution/</guid><description>Adversaries can abuse the Windows command line debugging utility cdb.exe to execute commands or shellcode from non-standard paths, evading traditional security measures.</description><content:encoded><![CDATA[<p>The Windows command line debugging utility, cdb.exe, is a legitimate tool used for debugging applications. However, adversaries can exploit it to execute unauthorized commands or shellcode, bypassing security measures. This can be achieved by running cdb.exe from non-standard installation paths and using specific command-line arguments to execute malicious commands. The LOLBAS project documents this technique, highlighting its potential for defense evasion. This activity has been observed across various environments, necessitating detection strategies that focus on identifying anomalous executions of cdb.exe.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system.</li>
<li>The attacker copies cdb.exe to a non-standard location (outside &ldquo;Program Files&rdquo; and &ldquo;Program Files (x86)&rdquo;).</li>
<li>The attacker executes cdb.exe with the <code>-cf</code>, <code>-c</code>, or <code>-pd</code> command-line arguments.</li>
<li>These arguments are used to specify a command file or execute a direct command.</li>
<li>The command file or command directly executes malicious code, such as shellcode.</li>
<li>The malicious code performs actions such as creating new processes, modifying files, or establishing network connections.</li>
<li>These actions allow the attacker to maintain persistence or escalate privileges.</li>
<li>The ultimate goal is to evade defenses and execute arbitrary code on the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows adversaries to execute arbitrary commands and shellcode on the affected system, potentially leading to complete system compromise. This can result in data theft, installation of malware, or further propagation within the network. The technique is effective at bypassing application whitelisting and other security controls that rely on standard execution paths.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Execution via Windows Command Debugging Utility&rdquo; to your SIEM to detect suspicious cdb.exe executions (see rules section).</li>
<li>Enable process creation logging via Sysmon or Windows Security Event Logs to provide the necessary data for the Sigma rule.</li>
<li>Implement application whitelisting to prevent execution of cdb.exe from non-standard paths.</li>
<li>Monitor process command lines for the <code>-cf</code>, <code>-c</code>, and <code>-pd</code> flags when cdb.exe is executed.</li>
<li>Investigate any instances of cdb.exe running from unusual directories to determine legitimacy.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lolbas</category><category>defense-evasion</category><category>windows</category></item><item><title>SIP Provider Modification for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-sip-provider-modification/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-sip-provider-modification/</guid><description>This rule detects modifications to the registered Subject Interface Package (SIP) providers, which are used by the Windows cryptographic system to validate file signatures, potentially indicating an attempt to bypass signature validation or inject code for defense evasion.</description><content:encoded><![CDATA[<p>This detection rule identifies modifications to Subject Interface Package (SIP) providers, a critical component of the Windows cryptographic system responsible for validating file signatures. Attackers may attempt to subvert trust controls by modifying SIP providers, allowing them to bypass signature validation checks and potentially inject malicious code into trusted processes. This activity is a form of defense evasion, allowing unauthorized code execution. The rule focuses on detecting suspicious registry changes associated with SIP providers, while excluding known benign processes to minimize false positives. The rule is designed for data generated by Elastic Defend, but also supports third-party data sources like CrowdStrike, Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon. This activity is related to MITRE ATT&amp;CK technique T1553.003 (SIP and Trust Provider Hijacking).</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system through various means (e.g., phishing, exploitation of vulnerabilities).</li>
<li>The attacker escalates privileges to gain necessary permissions to modify the registry.</li>
<li>The attacker modifies the registry keys associated with SIP providers, specifically targeting <code>CryptSIPDllPutSignedDataMsg</code> and <code>Trust\\FinalPolicy</code> locations.</li>
<li>The attacker changes the <code>Dll</code> value within these registry keys to point to a malicious DLL.</li>
<li>The system, upon attempting to validate a file signature, loads the malicious DLL instead of the legitimate SIP provider.</li>
<li>The malicious DLL executes arbitrary code, potentially injecting it into other processes.</li>
<li>The attacker uses the injected code to further compromise the system or network.</li>
<li>The attacker achieves their final objective, such as data exfiltration, ransomware deployment, or establishing persistence.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of SIP providers allows attackers to bypass signature validation checks, leading to the execution of unsigned or malicious code. This can compromise the integrity of the system, leading to data breaches, system instability, or further propagation of malware within the network. The impact can range from individual workstation compromise to widespread organizational damage, depending on the scope of the attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect SIP Provider Modification via Registry</code> to your SIEM and tune it for your environment to detect suspicious registry modifications related to SIP providers.</li>
<li>Enable Sysmon registry event logging to collect the necessary data for the Sigma rules above.</li>
<li>Investigate any alerts generated by the rules, focusing on the process responsible for the registry change and the DLL being loaded, as described in the rule&rsquo;s triage section.</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted code.</li>
<li>Monitor the registry paths listed in the Sigma rules for unexpected changes.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>registry-modification</category></item><item><title>Service DACL Modification via sc.exe</title><link>https://feed.craftedsignal.io/briefs/2024-07-service-dacl-modification/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-service-dacl-modification/</guid><description>Detection of service DACL modifications via `sc.exe` using the `sdset` command, potentially leading to defense evasion by denying service access to legitimate users or system accounts.</description><content:encoded><![CDATA[<p>This detection identifies the modification of Discretionary Access Control Lists (DACLs) for Windows services using the <code>sc.exe</code> utility. Attackers can leverage this technique to deny access to a service, making it unmanageable or hiding it from system administrators and users. The detection rule focuses on identifying instances where <code>sc.exe</code> is used with the <code>sdset</code> argument, specifically targeting the denial of access for key user groups such as IU, SU, BA, SY, and WD. This activity is indicative of a defense evasion attempt aimed at hindering security tools or preventing remediation. The rule is designed for data generated by Elastic Defend, but also supports integrations with third-party data sources like CrowdStrike, Microsoft Defender XDR, and SentinelOne Cloud Funnel, offering broad coverage for detecting this malicious behavior across diverse environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system through various means (e.g., compromised credentials, phishing).</li>
<li>The attacker elevates privileges to gain necessary permissions to modify service configurations.</li>
<li>The attacker executes <code>sc.exe</code> with the <code>sdset</code> command to modify the DACL of a targeted service.</li>
<li>The <code>sdset</code> command arguments specify the new security descriptor, denying access to specific user groups (e.g., IU, SU, BA, SY, WD).</li>
<li>The service becomes inaccessible to the targeted user groups, potentially disrupting legitimate operations or security tools.</li>
<li>The attacker may repeat this process for multiple services to further impair system functionality or evade detection.</li>
<li>The attacker leverages the disabled or hidden services to maintain persistence or carry out other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of service DACLs can lead to a denial-of-service condition for legitimate users and system administrators. This can impair the functionality of critical security tools, hinder incident response efforts, and provide attackers with a persistent foothold on the compromised system. The hiding of services can also prevent users from identifying and removing malicious services. While the number of victims is not specified in the source, organizations across various sectors are potentially vulnerable to this type of attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Service DACL Modification via sc.exe</code> to your SIEM to detect this specific behavior.</li>
<li>Enable Sysmon process creation logging to provide the necessary data for the Sigma rule to function effectively.</li>
<li>Investigate any instances where <code>sc.exe</code> is used with the <code>sdset</code> argument and access denial flags, focusing on the targeted user groups (IU, SU, BA, SY, WD).</li>
<li>Implement strict access controls and monitor for unauthorized attempts to modify service configurations.</li>
<li>Regularly audit service permissions to identify and remediate any unauthorized changes.</li>
<li>Review and update endpoint protection policies to prevent similar threats in the future, ensuring that all systems are equipped with the latest security patches and configurations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>windows</category></item><item><title>Remote Desktop File Opened from Suspicious Path</title><link>https://feed.craftedsignal.io/briefs/2024-11-rdp-file-attachment/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-rdp-file-attachment/</guid><description>Adversaries may abuse RDP files delivered via phishing from suspicious locations to gain unauthorized access to systems.</description><content:encoded><![CDATA[<p>Attackers are increasingly using malicious Remote Desktop Protocol (RDP) files to gain initial access to systems. These RDP files, often delivered via spearphishing attachments, contain connection settings that, when opened, can compromise a system. This technique allows adversaries to bypass traditional security measures by leveraging a legitimate tool (mstsc.exe) with a malicious configuration file. The observed activity involves opening RDP files from suspicious locations like Downloads, temporary folders (AppData\Local\Temp), and Outlook content cache (INetCache\Content.Outlook). This campaign has been observed as recently as October 2024, where Midnight Blizzard conducted large-scale spear-phishing using RDP files. Defenders should monitor for the execution of mstsc.exe with RDP files from untrusted locations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a spearphishing email containing a malicious RDP file as an attachment.</li>
<li>The victim receives the email and, lured by social engineering, downloads the attached RDP file to a local directory, often the Downloads folder.</li>
<li>The victim double-clicks the RDP file, initiating the execution of <code>mstsc.exe</code>.</li>
<li><code>mstsc.exe</code> reads the connection settings from the RDP file, which may include malicious configurations such as altered gateway settings or credential theft mechanisms.</li>
<li><code>mstsc.exe</code> attempts to establish a remote desktop connection based on the RDP file&rsquo;s settings.</li>
<li>If the connection is successful, the attacker gains unauthorized access to the remote system.</li>
<li>The attacker may then perform reconnaissance, move laterally, and escalate privileges within the compromised network.</li>
<li>The final objective could be data exfiltration, ransomware deployment, or establishing persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using malicious RDP files can lead to unauthorized access to sensitive systems and data. The consequences range from data breaches and financial loss to complete system compromise and disruption of operations. The Microsoft Security blog reported a large-scale spear-phishing campaign utilizing RDP files as recently as October 2024. The targets may be across various sectors, with potentially widespread impact depending on the attacker&rsquo;s objectives and the scope of the compromised network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Remote Desktop File Opened from Suspicious Path</code> to your SIEM and tune for your environment, focusing on the specified file paths and <code>mstsc.exe</code> execution.</li>
<li>Enable process creation logging with command-line arguments to capture the execution of <code>mstsc.exe</code> and the paths of the RDP files being opened.</li>
<li>Educate users on the risks associated with opening RDP files from untrusted sources, particularly those received as email attachments.</li>
<li>Implement strict email filtering to block or quarantine emails with RDP attachments from external sources.</li>
<li>Monitor network connections for unusual RDP traffic originating from systems where suspicious RDP files were executed.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>initial-access</category><category>rdp</category><category>phishing</category><category>windows</category></item><item><title>Potential Secure File Deletion via SDelete Utility</title><link>https://feed.craftedsignal.io/briefs/2024-01-28-sdelete-filename-rename/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-28-sdelete-filename-rename/</guid><description>This rule detects file name patterns generated by the use of Sysinternals SDelete utility, potentially used by attackers to delete forensic indicators and hinder data recovery efforts.</description><content:encoded><![CDATA[<p>The Sysinternals SDelete utility is a legitimate tool developed by Microsoft for securely deleting files by overwriting and renaming them multiple times. While intended for secure data disposal, adversaries can abuse SDelete to remove forensic artifacts, destroy evidence of their activities, and impede data recovery efforts after a successful ransomware attack or data theft. This activity can be used as a post-exploitation technique. This detection rule focuses on identifying file name patterns indicative of SDelete&rsquo;s operation, specifically detecting files with names resembling &ldquo;*AAA.AAA&rdquo;. The rule is designed to work with various endpoint detection and response solutions, including Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, and CrowdStrike.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker escalates privileges to gain the necessary permissions to delete files.</li>
<li>The attacker deploys or utilizes an existing copy of the SDelete utility.</li>
<li>The attacker executes SDelete against targeted files or directories.</li>
<li>SDelete overwrites the targeted file(s) multiple times with random data.</li>
<li>SDelete renames the file(s) multiple times, often with patterns such as &ldquo;*AAA.AAA&rdquo;.</li>
<li>SDelete deletes the file(s) making recovery difficult.</li>
<li>The attacker removes SDelete or any associated tools to further cover their tracks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this technique can result in the permanent deletion of crucial forensic artifacts, log files, or even critical data. This can severely hinder incident response efforts, making it challenging to identify the scope of the attack, the attacker&rsquo;s methods, and the compromised assets. The number of victims and affected sectors depends on the scale of the initial breach and the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Potential Secure File Deletion via SDelete Utility&rdquo; detection rule to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the detection rule, focusing on the process execution chain and identifying the user account involved.</li>
<li>Review the privileges assigned to the user account to ensure the least privilege principle is followed.</li>
<li>Enable Sysmon Event ID 11 (File Create) logging to enhance visibility into file creation events.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense evasion</category><category>impact</category><category>windows</category></item><item><title>Potential NetNTLMv1 Downgrade Attack via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2026-05-netntlmv1-downgrade/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-netntlmv1-downgrade/</guid><description>This brief details a registry modification attack that downgrades the system to NTLMv1 authentication, enabling NetNTLMv1 downgrade attacks, typically performed with local administrator privileges on Windows systems.</description><content:encoded><![CDATA[<p>This rule detects a specific defense evasion technique where an attacker modifies the Windows registry to force a system to use the less secure NTLMv1 authentication protocol. This is known as a NetNTLMv1 downgrade attack. The registry modification involves changing the <code>LmCompatibilityLevel</code> value, which controls the authentication level. Attackers with local administrator privileges can perform this modification to weaken the authentication mechanism, making it easier to intercept and crack credentials. The rule is designed to detect this activity by monitoring registry events from various sources, including Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, and Crowdstrike. It is important to monitor for this activity as it can lead to credential theft and further compromise of the system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains local administrator privileges on a Windows system.</li>
<li>The attacker uses a registry editor or command-line tool (e.g., <code>reg.exe</code>, PowerShell) to modify the <code>LmCompatibilityLevel</code> value in the registry.</li>
<li>The attacker navigates to one of the following registry paths: <code>HKLM\System\CurrentControlSet\Control\Lsa\LmCompatibilityLevel</code> or <code>HKLM\SYSTEM\CurrentControlSet\Control\Lsa</code>.</li>
<li>The attacker sets the <code>LmCompatibilityLevel</code> value to &ldquo;0&rdquo;, &ldquo;1&rdquo;, or &ldquo;2&rdquo; (or their hexadecimal equivalents &ldquo;0x00000000&rdquo;, &ldquo;0x00000001&rdquo;, &ldquo;0x00000002&rdquo;). These values force the system to use NTLMv1.</li>
<li>The system now uses NTLMv1 for authentication attempts.</li>
<li>The attacker initiates a man-in-the-middle attack to capture NTLMv1 authentication traffic using tools like Responder or Inveigh.</li>
<li>The captured NTLMv1 hashes are cracked using brute-force or dictionary attacks, revealing the user&rsquo;s credentials.</li>
<li>The attacker uses the compromised credentials to gain unauthorized access to network resources or other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful NetNTLMv1 downgrade attack can lead to the compromise of user credentials, enabling attackers to move laterally within the network, access sensitive data, and potentially escalate privileges. The impact can range from data breaches to complete system compromise, depending on the attacker&rsquo;s objectives and the compromised user&rsquo;s privileges.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential NetNTLMv1 Downgrade Attack&rdquo; to detect registry modifications setting <code>LmCompatibilityLevel</code> to insecure values (0, 1, 2) within the specified registry paths.</li>
<li>Enable Sysmon registry event logging to ensure the necessary data is available for the Sigma rule to function correctly.</li>
<li>Review registry event logs for unauthorized modifications of <code>LmCompatibilityLevel</code> to confirm legitimate administrative actions.</li>
<li>Implement strict access control policies to limit local administrator privileges and reduce the attack surface.</li>
<li>Monitor the references URL for updates on recommended security configurations related to NTLM authentication.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>ntlm</category><category>registry-modification</category><category>windows</category></item><item><title>Potential Evasion via Windows Filtering Platform Blocking Security Software</title><link>https://feed.craftedsignal.io/briefs/2026-05-wfp-evasion/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wfp-evasion/</guid><description>Adversaries may add malicious Windows Filtering Platform (WFP) rules to prevent endpoint security solutions from sending telemetry data, impairing defenses, which this rule detects by identifying multiple WFP block events where the process name is associated with endpoint security software.</description><content:encoded><![CDATA[<p>The Windows Filtering Platform (WFP) provides APIs and system services for network filtering and packet processing. Attackers can abuse WFP by creating malicious rules to block endpoint security processes, hindering their ability to send telemetry. This can be achieved by tools like Shutter, EDRSilencer, and Nighthawk. This detection rule identifies patterns of blocked network events linked to security software processes, signaling potential evasion tactics. The rule specifically looks for blocked network events linked to processes associated with known security software, aiming to detect and alert on attempts to disable or modify security tools. This behavior is especially concerning as it allows attackers to operate with reduced visibility.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system (e.g., via compromised credentials or exploiting a vulnerability).</li>
<li>The attacker escalates privileges to gain administrative rights, necessary to interact with the Windows Filtering Platform.</li>
<li>The attacker uses a tool or script (e.g., leveraging the <code>netsh</code> command or custom WFP API calls) to create a new WFP filter.</li>
<li>The WFP filter is configured to block network traffic originating from specific processes associated with endpoint security software (e.g., <code>elastic-agent.exe</code>, <code>sysmon.exe</code>).</li>
<li>The system begins blocking network communication from the targeted security software.</li>
<li>The attacker executes malicious commands or malware on the system, knowing that security telemetry will be suppressed.</li>
<li>The attacker moves laterally within the network, repeating the WFP filter deployment on other systems to further impair defenses.</li>
<li>The attacker achieves their final objective, such as data exfiltration or ransomware deployment, with reduced risk of detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using WFP to impair defenses can lead to a significant reduction in the effectiveness of endpoint security solutions. This can result in delayed detection of malicious activities, increased dwell time for attackers, and ultimately, a higher likelihood of successful data breaches or ransomware attacks. With endpoint telemetry blocked, organizations may remain unaware of the ongoing compromise until significant damage has occurred. The number of affected systems can vary depending on the attacker&rsquo;s scope and objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable and review Windows Audit Filtering Platform Connection and Packet Drop events to populate the logs required for the provided EQL rule (logs-system.security*, logs-windows.forwarded*, winlogbeat-*).</li>
<li>Deploy the provided EQL rule to your SIEM to detect suspicious WFP modifications and tune for your environment.</li>
<li>Investigate any alerts generated by the EQL rule, focusing on identifying the specific processes being blocked and the source of the WFP rule modifications.</li>
<li>Regularly review and audit WFP rules to identify any unauthorized or suspicious entries.</li>
<li>Implement strict access controls and monitoring for systems authorized to modify WFP rules.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows-filtering-platform</category><category>endpoint-security</category></item><item><title>Local Account TokenFilter Policy Modification for Defense Evasion and Lateral Movement</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-local-account-token-filter-policy-disabled/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-local-account-token-filter-policy-disabled/</guid><description>Adversaries may modify the LocalAccountTokenFilterPolicy registry key to bypass User Account Control (UAC) and gain elevated privileges remotely by granting high-integrity tokens to remote connections from local administrators, facilitating lateral movement and defense evasion.</description><content:encoded><![CDATA[<p>The LocalAccountTokenFilterPolicy is a Windows registry setting that, when enabled (set to 1), allows remote connections from local members of the Administrators group to be granted full high-integrity tokens during negotiation. This bypasses User Account Control (UAC) restrictions, allowing for elevated privileges remotely. Attackers may modify this registry setting to facilitate lateral movement within a network. This rule detects modifications to this specific registry setting, alerting on potential unauthorized changes that could lead to defense evasion and privilege escalation. The modification of this policy has been observed being leveraged in conjunction with pass-the-hash attacks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a system through an exploit, such as phishing or exploiting a vulnerability.</li>
<li>The attacker obtains local administrator credentials on the compromised system.</li>
<li>The attacker modifies the LocalAccountTokenFilterPolicy registry key to a value of 1. This is done to allow remote connections from local administrator accounts to receive high-integrity tokens. The registry key is typically located at <code>HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy</code>.</li>
<li>The attacker leverages a &ldquo;pass the hash&rdquo; attack (T1550.002) using the compromised local administrator credentials.</li>
<li>The attacker attempts to move laterally to other systems within the network using the &ldquo;pass the hash&rdquo; technique and the modified LocalAccountTokenFilterPolicy.</li>
<li>Due to the LocalAccountTokenFilterPolicy being enabled, the remote connection from the local administrator account receives a full high-integrity token.</li>
<li>The attacker bypasses UAC on the remote system, gaining elevated privileges.</li>
<li>The attacker performs malicious activities on the remote system, such as data exfiltration or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the LocalAccountTokenFilterPolicy allows attackers to bypass User Account Control (UAC) and gain elevated privileges on remote systems, potentially leading to unauthorized access to sensitive data, lateral movement across the network, and the deployment of ransomware. The overall impact can include data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Local Account TokenFilter Policy Enabled</code> to your SIEM and tune for your environment to detect unauthorized modifications to the LocalAccountTokenFilterPolicy registry key.</li>
<li>Enable Sysmon registry event logging to capture modifications to the registry, which is required for the <code>Local Account TokenFilter Policy Enabled</code> Sigma rule.</li>
<li>Review the processes excluded in the rule query and ensure they are legitimate and necessary to prevent false positives.</li>
<li>Monitor registry events for changes to the <code>HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy</code> path, specifically looking for changes to the value data.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>lateral-movement</category><category>persistence</category><category>registry-modification</category></item><item><title>Enumerating Domain Trusts via DSQUERY.EXE</title><link>https://feed.craftedsignal.io/briefs/2026-05-domain-trust-discovery/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-domain-trust-discovery/</guid><description>Adversaries may use the `dsquery.exe` command-line utility to enumerate trust relationships for lateral movement in Windows multi-domain environments.</description><content:encoded><![CDATA[<p>The <code>dsquery.exe</code> utility is a command-line tool in Windows used to query Active Directory. Attackers may leverage <code>dsquery.exe</code> to discover domain trust relationships within a Windows environment, mapping out potential lateral movement paths. This discovery is often an early stage in reconnaissance, before an attacker attempts to move laterally to other systems. This activity can be detected across various endpoint detection platforms including Elastic Defend, CrowdStrike, Microsoft Defender XDR, and SentinelOne. This activity is not inherently malicious, as administrators also use it for legitimate purposes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised host within the target environment.</li>
<li>The attacker executes <code>dsquery.exe</code> with the argument <code>objectClass=trustedDomain</code> to enumerate domain trusts.</li>
<li>The command execution is logged by endpoint detection and response (EDR) solutions or Windows Security Event Logs.</li>
<li>The attacker parses the output of the <code>dsquery.exe</code> command to identify trusted domains and their attributes.</li>
<li>The attacker uses the discovered trust information to plan lateral movement strategies.</li>
<li>The attacker attempts to authenticate to other systems within the trusted domains using stolen credentials or other exploits.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enumeration of domain trusts enables attackers to map out the Active Directory environment and identify potential pathways for lateral movement. While the enumeration itself is low impact, it facilitates subsequent actions like credential theft, privilege escalation, and data exfiltration. This can lead to widespread compromise across the organization, impacting numerous systems and sensitive data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Enumerating Domain Trusts via DSQUERY.EXE&rdquo; to your SIEM and tune for your environment.</li>
<li>Investigate any execution of <code>dsquery.exe</code> with the argument <code>objectClass=trustedDomain</code> to identify potentially malicious activity.</li>
<li>Monitor process execution events for <code>dsquery.exe</code> to detect suspicious command-line arguments and execution patterns.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>domain-trust</category><category>windows</category></item><item><title>Command Shell Activity Started via RunDLL32</title><link>https://feed.craftedsignal.io/briefs/2026-05-rundll32-cmd-shell/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-rundll32-cmd-shell/</guid><description>This rule detects command shell activity, such as cmd.exe or powershell.exe, initiated by RunDLL32, a technique commonly abused by attackers to execute malicious code and bypass security controls.</description><content:encoded><![CDATA[<p>Attackers commonly abuse RunDLL32, a legitimate Windows utility, to execute malicious code by hosting it within DLLs. This technique allows adversaries to launch command shells like cmd.exe or PowerShell, effectively bypassing traditional security controls. Defenders should be aware of this technique because it provides a stealthy way for attackers to execute arbitrary commands, potentially leading to further compromise of the system. This activity is detected by monitoring for command shells initiated by RunDLL32, while excluding known benign patterns to reduce false positives. The detection rule was last updated on 2026/05/04 and supports multiple data sources, including Elastic Defend, Microsoft Defender XDR, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system through an exploit or social engineering.</li>
<li>The attacker uses RunDLL32.exe to execute a malicious DLL.</li>
<li>RunDLL32.exe loads the specified DLL into memory.</li>
<li>The malicious DLL contains code to execute a command shell (cmd.exe or powershell.exe).</li>
<li>RunDLL32.exe spawns a command shell process.</li>
<li>The attacker uses the command shell to execute commands for reconnaissance.</li>
<li>The attacker may use the command shell to download additional payloads.</li>
<li>The attacker leverages the command shell to perform lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary commands on the compromised system. While the rule is rated &ldquo;low&rdquo; severity, this initial access can lead to credential access (T1552) and further lateral movement within the network. Attackers can potentially gain full control of the system, leading to data theft, system disruption, or other malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Command Shell Activity Started via RunDLL32&rdquo; to your SIEM and tune for your environment.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to provide the necessary data for this detection.</li>
<li>Review the process details of RunDLL32.exe to confirm the parent-child relationship with the command shell, helping to reduce false positives.</li>
<li>Implement enhanced monitoring for rundll32.exe and related processes to detect similar activities in the future and improve response times.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>execution</category><category>command-shell</category><category>rundll32</category></item><item><title>Code Signing Policy Modification Through Built-in Tools</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-code-signing-policy-modification/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-code-signing-policy-modification/</guid><description>Attackers may attempt to disable or modify code signing policies on Windows systems by using built-in tools like bcdedit.exe in order to execute unsigned or self-signed malicious code.</description><content:encoded><![CDATA[<p>Attackers may attempt to subvert trust controls by disabling or modifying the code signing policy. This allows them to execute unsigned or self-signed malicious code. This can be achieved by modifying boot configuration data (BCD) settings using the built-in bcdedit.exe utility on Windows. Disabling Driver Signature Enforcement (DSE) allows the loading of untrusted drivers, which can compromise system integrity. The rule identifies commands that can disable the Driver Signature Enforcement feature. The scope of the targeting is broad, as it can affect any Windows system where an attacker gains sufficient privileges to modify the BCD settings. This activity is detected by analyzing process execution events for specific command-line arguments used with bcdedit.exe. The detection rule was last updated on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains administrative privileges on a Windows system.</li>
<li>The attacker executes <code>bcdedit.exe</code> with arguments to disable driver signature enforcement. Example: <code>bcdedit.exe /set testsigning on</code> or <code>bcdedit.exe /set nointegritychecks on</code>.</li>
<li>The <code>bcdedit.exe</code> modifies the Boot Configuration Data (BCD) store.</li>
<li>The system is restarted to apply the changes made to the BCD.</li>
<li>The attacker loads an unsigned or self-signed malicious driver.</li>
<li>The malicious driver executes with kernel-level privileges.</li>
<li>The attacker performs malicious activities such as installing rootkits, bypassing security controls, or stealing sensitive data.</li>
<li>The attacker maintains persistence by ensuring the malicious driver is loaded on subsequent system reboots.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the code signing policy can lead to the execution of unsigned or self-signed malicious code, which can compromise the integrity and security of the system. Attackers can install rootkits, bypass security controls, or steal sensitive data. The impact can range from individual system compromise to broader network-wide attacks, depending on the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Code Signing Policy Modification Through Built-in Tools&rdquo; to your SIEM to detect the execution of <code>bcdedit.exe</code> with arguments used to disable code signing (process.args).</li>
<li>Enable process creation logging with command line arguments on Windows systems to ensure the Sigma rule can capture the relevant events (logsource).</li>
<li>Investigate any detected instances of code signing policy modification, as this activity is typically not legitimate and can indicate malicious activity. The rule <code>First Time Seen Driver Loaded - df0fd41e-5590-4965-ad5e-cd079ec22fa9</code> can be used to detect suspicious drivers loaded into the system after the command was executed.</li>
<li>Ensure that Driver Signature Enforcement is enabled on all systems.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>code-signing</category><category>windows</category></item><item><title>Potential Chroot Container Escape via Mount</title><link>https://feed.craftedsignal.io/briefs/2024-01-chroot-container-escape/</link><pubDate>Sat, 02 May 2026 12:45:21 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chroot-container-escape/</guid><description>The rule detects a potential chroot container escape via mount, which involves a user within a container mounting the host's root file system and using chroot to escape the containerized environment, indicating a privilege escalation attempt.</description><content:encoded><![CDATA[<p>This detection rule monitors for a specific sequence of commands on Linux systems that could indicate an attempt to escape a containerized environment. The attack involves first mounting a file system, typically targeting the host&rsquo;s root file system, and then using the <code>chroot</code> command to change the root directory. This combination, if successful, allows an attacker inside a container to gain unauthorized access to the host system. The rule is designed to identify this uncommon behavior pattern, which is a strong indicator of malicious activity. The rule is applicable to environments utilizing Elastic Defend, SentinelOne Cloud Funnel, and Crowdstrike FDR. The detection looks for this sequence occurring within a 5-minute timeframe.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a container, possibly through exploiting a vulnerability or misconfiguration in the application running within the container.</li>
<li>The attacker attempts to mount the host&rsquo;s root filesystem within the container using the <code>mount</code> command, often targeting <code>/dev/sd*</code> devices. This requires sufficient privileges within the container, or the exploitation of a container escape vulnerability to gain such privileges.</li>
<li>The <code>mount</code> command is executed with arguments specifying the device to mount and the mount point within the container&rsquo;s file system.</li>
<li>The attacker then executes the <code>chroot</code> command, changing the root directory of the current process to the mounted host&rsquo;s root filesystem.</li>
<li>After successfully executing <code>chroot</code>, the attacker&rsquo;s perspective shifts to the host&rsquo;s file system, allowing them to access and modify sensitive files and configurations.</li>
<li>The attacker uses their newly acquired access to install backdoors, create new user accounts with elevated privileges, or modify system configurations to establish persistence.</li>
<li>The attacker may attempt to move laterally to other containers or systems within the network, leveraging their compromised position on the host.</li>
<li>The final objective is to gain complete control over the host system and potentially the entire infrastructure, leading to data exfiltration, system disruption, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful container escape can have severe consequences, potentially leading to complete compromise of the host system and the data it contains. Depending on the environment, this could affect a single server or spread to many hosts. The compromise of containerized environments can lead to data breaches, service disruption, and reputational damage. Given the sensitive nature of data often processed within containers, the impact can range from financial losses to regulatory penalties.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment to detect potential container escapes.</li>
<li>Enable Elastic Defend integration to collect process data, and ensure Session View data is enabled to enhance visibility as mentioned in the setup guide.</li>
<li>Review and harden container configurations to minimize privileges granted to containerized processes, reducing the attack surface for escape attempts.</li>
<li>Implement network segmentation to limit the potential for lateral movement following a successful container escape.</li>
<li>Monitor process execution logs for unusual mount and chroot command sequences within container environments using Elastic Defend, SentinelOne, and Crowdstrike logs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>container-escape</category><category>privilege-escalation</category><category>linux</category></item><item><title>Potential Kerberos SPN Spoofing via Suspicious DNS Query</title><link>https://feed.craftedsignal.io/briefs/2024-10-kerberos-spn-spoofing-dns/</link><pubDate>Fri, 01 May 2026 17:31:25 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-10-kerberos-spn-spoofing-dns/</guid><description>Detects suspicious DNS queries containing a base64-encoded blob, indicating potential Kerberos coercion attacks and SPN spoofing via DNS to coerce authentication to attacker-controlled hosts, enabling Kerberos or NTLM relay attacks.</description><content:encoded><![CDATA[<p>This detection identifies a specific pattern in DNS queries indicative of Kerberos SPN spoofing, a technique used to coerce systems into authenticating to attacker-controlled hosts. The pattern &ldquo;UWhRCA&hellip;BAAAA&rdquo; represents a marshaled CREDENTIAL_TARGET_INFORMATION structure. Attackers exploit this by crafting malicious DNS names to trick victim systems into requesting Kerberos tickets for legitimate services, often their own identity, but directed towards an attacker-controlled endpoint. This can lead to Kerberos relay or NTLM reflection/relay attacks, bypassing normal NTLM fallback mechanisms. The technique is associated with tools like RemoteKrbRelay and wspcoerce. This activity has been observed in various attacks targeting Windows environments where Kerberos authentication is prevalent. Defenders need to detect and mitigate this early stage of credential access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a target Windows system within the network.</li>
<li>The attacker sets up a malicious server to receive coerced authentication requests.</li>
<li>The attacker crafts a malicious DNS query containing a base64-encoded blob &ldquo;UWhRCA&hellip;BAAAA&rdquo; representing a marshaled CREDENTIAL_TARGET_INFORMATION structure.</li>
<li>The victim system, triggered by an external factor (e.g., RPC call, scheduled task, or web request), attempts to resolve the crafted DNS name.</li>
<li>The malicious DNS query is sent to the DNS server, which resolves to the attacker&rsquo;s server.</li>
<li>The victim system initiates a Kerberos authentication request to the attacker&rsquo;s server, believing it to be a legitimate service.</li>
<li>The attacker&rsquo;s server relays the Kerberos ticket or uses NTLM reflection/relay techniques to gain unauthorized access.</li>
<li>The attacker compromises the victim system or pivots to other systems within the network using the stolen credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to credential compromise, lateral movement, and domain takeover. Victims in Active Directory environments are particularly vulnerable. The impact includes unauthorized access to sensitive data, disruption of services, and potential ransomware deployment. If the coerced service has high privileges, the attacker can gain complete control over the compromised system or even the entire domain. Organizations using Kerberos authentication are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Potential Kerberos SPN Spoofing via Suspicious DNS Query&rdquo; rule to your SIEM and tune for your environment to detect malicious DNS queries.</li>
<li>Enable Sysmon Event ID 22 - DNS Query logging to provide the necessary data for detection.</li>
<li>Investigate and block any DNS queries resolving to external IPs that contain the &ldquo;UWhRCA&hellip;BAAAA&rdquo; pattern.</li>
<li>Monitor process creation events for processes initiating DNS queries containing the suspicious pattern, specifically looking for known coercion tools.</li>
<li>Implement network segmentation to limit the impact of lateral movement if a system is compromised.</li>
<li>Review and harden Kerberos configurations to prevent SPN spoofing and relay attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>kerberos</category><category>spn-spoofing</category><category>dns</category><category>windows</category></item><item><title>WDAC Policy File Creation by Unusual Process</title><link>https://feed.craftedsignal.io/briefs/2024-11-wdac-policy-evasion/</link><pubDate>Sat, 02 Nov 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-11-wdac-policy-evasion/</guid><description>Adversaries may use a specially crafted Windows Defender Application Control (WDAC) policy to restrict the execution of security products, detected by unusual process creation of WDAC policy files.</description><content:encoded><![CDATA[<p>Attackers are increasingly targeting Windows Defender Application Control (WDAC) to disable or weaken endpoint defenses. By crafting malicious WDAC policies, adversaries can block legitimate security software and evade detection. This technique involves creating WDAC policy files (.p7b or .cip) in protected system directories using unauthorized processes. The activity often occurs when attackers have already gained a foothold in the system and are attempting to solidify their position. Successful deployment of a malicious WDAC policy can significantly hinder incident response and allow malware to operate undetected. This tactic has gained traction since late 2024, with offensive tools like Krueger demonstrating the potential for weaponizing WDAC against EDR solutions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Access:</strong> The attacker gains initial access to the system through methods such as phishing or exploiting a software vulnerability.</li>
<li><strong>Privilege Escalation:</strong> The attacker escalates privileges to gain administrative access, which is required to modify WDAC policies.</li>
<li><strong>Policy Creation:</strong> The attacker crafts a malicious WDAC policy using tools or scripts. This policy is designed to block specific security products or processes.</li>
<li><strong>Staging:</strong> The malicious policy is staged in a temporary location on the system, often within user-writable directories.</li>
<li><strong>Policy Placement:</strong> The attacker moves the malicious WDAC policy file (.p7b or .cip) to a protected system directory, such as <code>C:\Windows\System32\CodeIntegrity\</code> or <code>C:\Windows\System32\CodeIntegrity\CiPolicies\Active\</code>. The tool used may be a Living-off-the-Land Binary (LOLBin) or a custom .NET assembly.</li>
<li><strong>Activation:</strong> The attacker triggers the activation of the new WDAC policy, which often requires a system reboot or the use of a service control utility.</li>
<li><strong>Defense Evasion:</strong> Once the policy is active, the targeted security products are blocked, allowing the attacker to operate with reduced risk of detection.</li>
<li><strong>Lateral Movement/Objectives:</strong> With defenses weakened, the attacker can move laterally within the network, exfiltrate data, or achieve other objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack targeting WDAC can severely impair an organization&rsquo;s ability to detect and respond to threats. By blocking security software, attackers can operate with impunity, leading to data breaches, financial losses, and reputational damage. Observed damage includes disabled endpoint detection and response (EDR) solutions, allowing ransomware and other malware to execute without interference. The scope of impact can range from individual workstations to entire domains, depending on the breadth of the WDAC policy deployment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;WDAC Policy File by an Unusual Process&rdquo; Sigma rule to your SIEM to detect unauthorized WDAC policy modifications.</li>
<li>Monitor file creation events with extensions .p7b and .cip in <code>C:\Windows\System32\CodeIntegrity\</code> and <code>C:\Windows\System32\CodeIntegrity\CiPolicies\Active\</code> directories, specifically filtering for processes other than <code>poqexec.exe</code>, <code>TiWorker.exe</code>, and <code>omadmclient.exe</code>.</li>
<li>Enable Sysmon Event ID 11 (File Create) logging to capture file creation events and provide the necessary data for the Sigma rule to function effectively.</li>
<li>Implement strict access control policies on WDAC policy directories to prevent unauthorized modification.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wdac</category><category>defense-evasion</category><category>windows</category></item><item><title>MsiExec Child Process Spawning Network Connections for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-10-msiexec-network-connection/</link><pubDate>Sat, 26 Oct 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-10-msiexec-network-connection/</guid><description>Detection of MsiExec spawning child processes that initiate network connections, potentially indicating abuse of Windows Installers for malware delivery and defense evasion.</description><content:encoded><![CDATA[<p>Adversaries may abuse the Windows Installer service (msiexec.exe) to proxy the execution of malicious payloads, effectively bypassing application control and other security mechanisms. This technique, known as &ldquo;Msiexec&rdquo; proxy execution (T1218.007), involves using msiexec.exe to execute malicious DLLs or scripts. The detection focuses on identifying child processes spawned by MsiExec, particularly those exhibiting network activity. This behavior is atypical for legitimate software installations and updates, making it a strong indicator of potential malicious use. Defenders should be aware of this technique as it allows attackers to blend in with legitimate system processes. The Elastic detection rule, updated on 2026-05-04, aims to identify this suspicious activity across multiple data sources including Elastic Defend, Sysmon, and SentinelOne.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system through an exploit or social engineering.</li>
<li>Attacker leverages msiexec.exe to execute a malicious MSI package with a <code>/v</code> parameter, commonly used to pass verbose logging options, potentially hiding malicious commands.</li>
<li>The malicious MSI package contains custom actions that execute arbitrary code.</li>
<li>Msiexec.exe spawns a child process (e.g., powershell.exe, cmd.exe, or another executable) to carry out malicious actions.</li>
<li>The child process establishes a network connection to an external server or performs DNS lookups, possibly for command and control (C2) communication or to download additional payloads.</li>
<li>The attacker uses the network connection to download and execute further tools or scripts.</li>
<li>The attacker performs lateral movement within the network.</li>
<li>The final objective could be data exfiltration, ransomware deployment, or persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass application control and execute arbitrary code on the system. This can lead to malware installation, data theft, or complete system compromise. While the exact number of victims is not specified in the provided source, the technique can be applied across various sectors. The impact can range from individual workstation compromises to large-scale breaches affecting entire organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>MsiExec Child Process with Unusual Executable and Network Connection</code> to detect suspicious msiexec.exe child processes initiating network connections based on unusual executable paths.</li>
<li>Enable Sysmon process creation logging (Event ID 1) and network connection logging (Event ID 3) to provide the necessary data for the Sigma rule.</li>
<li>Investigate any alerts triggered by the Sigma rules, focusing on the process tree, command-line arguments, and network destinations.</li>
<li>Review and whitelist legitimate software installations and automated deployment tools that use MsiExec and require network access to minimize false positives, as detailed in the &ldquo;False positive analysis&rdquo; section of the source material.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>msiexec</category></item><item><title>Alternate Data Stream Creation/Execution at Volume Root Directory</title><link>https://feed.craftedsignal.io/briefs/2024-07-root-dir-ads-creation/</link><pubDate>Mon, 08 Jul 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-root-dir-ads-creation/</guid><description>Detection of Alternate Data Stream (ADS) creation at a volume root directory, a technique used to hide malware and tools by exploiting how ADSs in root directories are not readily visible to standard system utilities, indicating a defense evasion attempt.</description><content:encoded><![CDATA[<p>This detection rule identifies the creation or execution of Alternate Data Streams (ADS) within the root directory of a volume on Windows systems. Attackers leverage this technique to conceal malicious tools or data, as ADSs created in this manner are not easily discoverable by standard system utilities. This method allows for the persistence and execution of malware while evading typical detection mechanisms. This rule is designed for data generated by Elastic Defend, Microsoft Defender XDR, and SentinelOne Cloud Funnel, providing broad coverage across different endpoint security solutions. Monitoring for ADS activity at the volume root is crucial to identify potential defense evasion attempts and hidden malicious payloads.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker executes a script or program (e.g., PowerShell) to create a hidden ADS at the root of a volume (e.g., <code>C:\:evil.exe</code>).</li>
<li>The ADS is populated with malicious code, such as a reverse shell or malware payload.</li>
<li>The attacker uses a command-line tool or script to execute the hidden ADS file. For example: <code>wmic process call create &quot;cmd.exe /c start C:\:evil.exe&quot;</code>.</li>
<li>The malicious code within the ADS executes, allowing the attacker to perform unauthorized actions, such as data exfiltration or establishing persistence.</li>
<li>The attacker uses the hidden ADS to maintain persistence on the system, ensuring continued access even after reboots.</li>
<li>The attacker further leverages the compromised system to move laterally within the network, compromising additional systems and escalating privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to hide malicious tools and maintain persistence on compromised systems. The creation of ADSs at the volume root directory makes it difficult for administrators and security tools to detect the presence of malware. This can lead to prolonged compromise, data breaches, and significant disruption of business operations. The rule has a risk score of 47, and a medium severity is applied.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect ADS creation and execution at the volume root directory.</li>
<li>Enable logging for file creation events (Sysmon Event ID 11) and process creation events (Sysmon Event ID 1) for enhanced visibility into ADS activity.</li>
<li>Investigate alerts generated by the Sigma rules to determine the legitimacy of ADS creation or execution, focusing on processes and file paths that match the <code>[A-Z]:\\:.+</code> regex pattern in the rule query.</li>
<li>Regularly scan systems for hidden ADS files using specialized tools to uncover any potential malicious files.</li>
<li>Implement application control policies to restrict the execution of unauthorized applications and prevent the creation of malicious ADSs.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>hide-artifacts</category><category>alternate-data-stream</category></item><item><title>NTDS Dump via Wbadmin</title><link>https://feed.craftedsignal.io/briefs/2024-07-ntds-dump-wbadmin/</link><pubDate>Wed, 03 Jul 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-ntds-dump-wbadmin/</guid><description>Attackers with Backup Operator privileges may abuse wbadmin.exe to access the NTDS.dit file, enabling credential dumping and domain compromise.</description><content:encoded><![CDATA[<p>This detection identifies the execution of <code>wbadmin.exe</code> with arguments indicative of an attempt to access and dump the NTDS.dit file from a Windows domain controller. Attackers with sufficient privileges, specifically those belonging to groups like Backup Operators, can abuse the legitimate <code>wbadmin.exe</code> utility to create a backup of the Active Directory database (NTDS.dit). This file contains sensitive credential information, and once obtained, attackers can extract password hashes and compromise the entire domain. This activity is often part of a larger attack aimed at gaining persistent access and control over the network. The Elastic detection rule was published on 2024-06-05 and last updated on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the target network. This may be achieved through phishing, exploiting vulnerabilities, or compromised credentials.</li>
<li>The attacker escalates privileges to obtain membership in the Backup Operators group or a similar privileged group capable of running backups.</li>
<li>The attacker executes <code>wbadmin.exe</code> with the <code>recovery</code> argument, targeting the NTDS.dit file. The command line includes parameters to create a system state backup.</li>
<li>Wbadmin creates a backup of the system state, including the NTDS.dit file, in a specified location.</li>
<li>The attacker copies the NTDS.dit file from the backup location to a separate location for offline analysis.</li>
<li>The attacker uses tools such as <code>ntdsutil.exe</code> or <code>secretsdump.py</code> to extract password hashes from the NTDS.dit file.</li>
<li>The attacker cracks the password hashes or uses them in pass-the-hash attacks to gain access to other systems and resources within the domain.</li>
<li>The attacker achieves domain dominance and persistence, allowing them to control critical systems and data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to dump credentials from the NTDS.dit file, leading to complete compromise of the Active Directory domain. This enables them to move laterally, access sensitive data, and establish persistent control over the environment. The impact can include data breaches, ransomware deployment, and long-term disruption of business operations. The medium risk score indicates that while the attack requires specific privileges, the consequences are significant if successful.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line arguments to detect <code>wbadmin.exe</code> execution as described in the Attack Chain (Data Source: Windows Security Event Logs, Sysmon).</li>
<li>Implement the provided Sigma rule to detect suspicious <code>wbadmin.exe</code> execution with NTDS.dit related arguments in your SIEM (Rule: NTDS Dump via Wbadmin).</li>
<li>Monitor and restrict membership in privileged groups like Backup Operators to minimize the risk of abuse (Reference: <a href="https://medium.com/r3d-buck3t/windows-privesc-with-sebackupprivilege-65d2cd1eb960)">https://medium.com/r3d-buck3t/windows-privesc-with-sebackupprivilege-65d2cd1eb960)</a>.</li>
<li>Review and whitelist legitimate backup schedules or disaster recovery processes to reduce false positives (False positive analysis).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>windows</category><category>wbadmin</category><category>ntds.dit</category></item><item><title>Microsoft Management Console File Execution from Unusual Path</title><link>https://feed.craftedsignal.io/briefs/2024-07-mmc-untrusted-path/</link><pubDate>Wed, 03 Jul 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-mmc-untrusted-path/</guid><description>Adversaries may use Microsoft Management Console (MMC) files from untrusted paths to bypass security controls for initial access and execution on Windows systems.</description><content:encoded><![CDATA[<p>Attackers may exploit Microsoft Management Console (MMC) by executing .msc files from non-standard directories to bypass security controls. This technique can be used for initial access and execution. This detection focuses on identifying the execution of <code>mmc.exe</code> with <code>.msc</code> files from paths outside the typical system directories, which are generally considered trusted. By monitoring process executions and filtering out known legitimate paths, analysts can identify potentially malicious activity related to the misuse of MMC. The rule aims to detect deviations from standard administrative practices that could indicate unauthorized access or command execution via malicious or compromised <code>.msc</code> files. The detection logic specifically excludes executions from common directories like <code>System32</code>, <code>SysWOW64</code>, and <code>Program Files</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through an unspecified method.</li>
<li>The attacker places a malicious <code>.msc</code> file in an unusual or untrusted directory (e.g., <code>C:\Users\Public</code>).</li>
<li>The attacker executes <code>mmc.exe</code> with the malicious <code>.msc</code> file as an argument from the untrusted path.</li>
<li><code>mmc.exe</code> processes the <code>.msc</code> file, potentially executing embedded commands or scripts.</li>
<li>The malicious <code>.msc</code> file performs unauthorized actions on the system, such as modifying system settings or executing arbitrary code.</li>
<li>The attacker leverages the execution context of <code>mmc.exe</code> to bypass security controls and escalate privileges.</li>
<li>The attacker may establish persistence by creating a scheduled task or modifying registry keys to execute the malicious <code>.msc</code> file automatically.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access, command execution, and privilege escalation, potentially compromising the entire system. While specific victim counts or sector targeting are not available, the technique is applicable across various Windows environments. The use of a trusted system binary like <code>mmc.exe</code> for malicious purposes can evade traditional security measures, making detection more challenging.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the Sigma rule <code>Microsoft Management Console File from Unusual Path</code> to detect the execution of <code>mmc.exe</code> with <code>.msc</code> files from untrusted paths.</li>
<li>Enable process creation logging with command-line arguments to provide the necessary data for the Sigma rule to function effectively.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the origin and content of the <code>.msc</code> file.</li>
<li>Consider implementing application control policies to restrict the execution of <code>.msc</code> files to authorized directories only.</li>
<li>Review and audit the use of MMC in the environment to identify any legitimate use cases that might trigger false positives.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>execution</category><category>defense-evasion</category><category>windows</category></item><item><title>DNS Global Query Block List Modified or Disabled</title><link>https://feed.craftedsignal.io/briefs/2024-07-dns-gqbl-modified/</link><pubDate>Wed, 03 Jul 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-07-dns-gqbl-modified/</guid><description>Attackers with DNSAdmin privileges can modify or disable the DNS Global Query Block List (GQBL) in Windows, allowing exploitation of hosts running WPAD with default settings for privilege escalation and lateral movement.</description><content:encoded><![CDATA[<p>The DNS Global Query Block List (GQBL) is a Windows security feature designed to prevent the resolution of specific DNS names, commonly exploited in attacks like WPAD spoofing. Attackers who have obtained elevated privileges, such as DNSAdmin, can modify or disable this list to bypass security controls. This allows exploitation of hosts running WPAD with default settings. The modification of the GQBL can be used for privilege escalation and lateral movement within a network. This rule detects changes to the registry values associated with the GQBL, specifically &ldquo;EnableGlobalQueryBlockList&rdquo; and &ldquo;GlobalQueryBlockList.&rdquo; This activity could indicate an attacker attempting to weaken defenses to facilitate further malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, possibly through compromised credentials or exploiting a vulnerability.</li>
<li>The attacker escalates privileges to obtain DNSAdmin rights.</li>
<li>The attacker modifies the &ldquo;EnableGlobalQueryBlockList&rdquo; registry value to &ldquo;0&rdquo; or &ldquo;0x00000000,&rdquo; effectively disabling the GQBL.</li>
<li>Alternatively, the attacker modifies the &ldquo;GlobalQueryBlockList&rdquo; registry value to remove &ldquo;wpad&rdquo; from the list.</li>
<li>The attacker leverages the disabled GQBL to conduct WPAD spoofing attacks, redirecting network traffic to attacker-controlled servers.</li>
<li>The attacker captures user credentials transmitted during WPAD authentication.</li>
<li>The attacker uses the captured credentials to move laterally to other systems on the network.</li>
<li>The attacker achieves their final objective, such as data exfiltration or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification or disabling of the DNS Global Query Block List can lead to WPAD spoofing attacks, credential theft, lateral movement, and ultimately, complete compromise of the network. Attackers can leverage this technique to gain unauthorized access to sensitive data or systems. The impact includes potential data breaches, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Registry Modification of DNS Global Query Block List</code> to your SIEM to detect unauthorized changes to the GQBL configuration.</li>
<li>Enable Sysmon registry event logging to capture the necessary events for the Sigma rule to function (reference the logsource in the rule).</li>
<li>Review and restrict DNSAdmin privileges to only necessary accounts to minimize the attack surface (reference: Overview section).</li>
<li>Monitor network traffic for unusual DNS queries or WPAD-related activity, correlating with registry modification events (reference: Attack Chain step 5).</li>
<li>Regularly audit registry settings related to DNS configuration, including the GQBL, to identify unauthorized modifications (reference: Attack Chain steps 3 &amp; 4).</li>
<li>Update security policies and procedures to include specific measures for monitoring and protecting the DNS Global Query Block List (reference: Impact section).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>registry-modification</category><category>windows</category></item><item><title>Suspicious Child Processes from Communication Applications</title><link>https://feed.craftedsignal.io/briefs/2024-01-suspicious-comm-app-child-process/</link><pubDate>Wed, 31 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-suspicious-comm-app-child-process/</guid><description>The detection rule identifies suspicious child processes spawned from communication applications on Windows systems, potentially indicating masquerading or exploitation of vulnerabilities within these applications.</description><content:encoded><![CDATA[<p>This detection rule focuses on identifying suspicious child processes of communication applications such as Slack, Cisco Webex, Microsoft Teams, Discord, WhatsApp, Zoom, and Thunderbird on Windows operating systems. Attackers may attempt to masquerade as legitimate processes or exploit vulnerabilities in these applications to execute malicious code. The rule monitors for the creation of child processes by these communication apps and checks if those child processes are unexpected, untrusted, or lack a valid code signature. This detection is crucial because successful exploitation can lead to unauthorized access, data exfiltration, or further compromise of the system. The rule has been actively maintained since August 2023, with updates as recent as May 2026, indicating its relevance and ongoing refinement to address emerging threats.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>User launches a communication application (e.g., Slack, Teams, Webex).</li>
<li>The communication application executes a vulnerable or compromised component.</li>
<li>The compromised component spawns a child process (e.g., powershell.exe, cmd.exe).</li>
<li>The child process executes a malicious command or script.</li>
<li>The script attempts to download additional payloads from an external source.</li>
<li>The payload executes, establishing persistence through registry modification or scheduled tasks.</li>
<li>The attacker gains remote access to the system.</li>
<li>Data exfiltration or lateral movement within the network occurs.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the compromise of sensitive data, installation of malware, and potential lateral movement within the organization&rsquo;s network. By exploiting communication applications, attackers can gain access to internal communications, confidential documents, and user credentials. The number of affected users and the extent of the damage depend on the compromised application and the attacker&rsquo;s objectives. If successful, this attack may lead to significant financial loss, reputational damage, and disruption of business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Suspicious Communication App Child Process</code> to your SIEM to detect anomalous child processes spawned by communication applications and tune for your environment.</li>
<li>Enable process creation logging with command line arguments in Windows to ensure that the Sigma rule has the necessary data to function correctly (logsource: <code>process_creation</code>, product: <code>windows</code>).</li>
<li>Investigate any alerts generated by the rule and review the command line arguments of the spawned processes to identify potential malicious activity.</li>
<li>Implement application whitelisting to restrict the execution of unauthorized applications and reduce the attack surface.</li>
<li>Ensure that all communication applications are updated to the latest versions to patch known vulnerabilities and reduce the risk of exploitation.</li>
<li>Examine the network activity of the affected system to identify any suspicious outbound connections that may indicate data exfiltration or communication with a command and control server, referencing the setup guide.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>windows</category></item><item><title>Network-Level Authentication (NLA) Disabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-nla/</link><pubDate>Wed, 31 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-nla/</guid><description>Adversaries may disable Network-Level Authentication (NLA) by modifying specific registry keys to bypass authentication requirements for Remote Desktop Protocol (RDP) and enable persistence mechanisms.</description><content:encoded><![CDATA[<p>Network Level Authentication (NLA) is a security feature in Windows that requires users to authenticate before establishing a full RDP session, adding an extra layer of protection against unauthorized access. Attackers might attempt to disable NLA to gain access to the Windows sign-in screen without proper authentication. This tactic can facilitate the deployment of persistence mechanisms, such as leveraging Accessibility Features like Sticky Keys, or enable unauthorized remote access. This brief addresses the registry modifications associated with disabling NLA and provides detection strategies to identify such attempts. The references indicate that this technique is used in conjunction with other attacks for lateral movement within a compromised network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access to the system is gained (potentially via compromised credentials or vulnerability exploitation).</li>
<li>The attacker elevates privileges to modify system-level settings.</li>
<li>The attacker modifies the registry key <code>HKLM\SYSTEM\ControlSet*\Control\Terminal Server\WinStations\RDP-Tcp\UserAuthentication</code> to disable NLA.</li>
<li>The <code>UserAuthentication</code> value is set to &ldquo;0&rdquo; or &ldquo;0x00000000&rdquo;.</li>
<li>The attacker attempts to establish an RDP connection to the compromised system.</li>
<li>Due to the disabled NLA, the attacker bypasses the initial authentication screen.</li>
<li>The attacker leverages accessibility features (e.g., Sticky Keys) for persistence or further exploitation.</li>
<li>The attacker gains unauthorized access to the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of NLA allows attackers to bypass authentication and gain unauthorized access to systems via RDP. This can lead to data theft, malware installation, or further lateral movement within the network. While the exact number of victims and sectors targeted are unspecified, the potential impact includes significant data breaches and system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process-creation and registry event logging to detect the registry modifications (Elastic Defend, Elastic Endgame, Microsoft Defender XDR, SentinelOne, Sysmon).</li>
<li>Deploy the Sigma rule provided to detect attempts to modify the <code>UserAuthentication</code> registry key (Sysmon Registry Events).</li>
<li>Review and harden RDP configurations across the environment to prevent unauthorized access (Microsoft documentation).</li>
<li>Monitor endpoint security policies to detect unauthorized registry modifications (Endpoint Security Policies).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>lateral-movement</category><category>registry-modification</category><category>windows</category></item><item><title>Wireless Credential Dumping via Netsh</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-wireless-creds-dumping/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-wireless-creds-dumping/</guid><description>Adversaries use the Windows built-in utility Netsh to dump Wireless saved access keys in clear text, potentially leading to credential compromise.</description><content:encoded><![CDATA[<p>Attackers often target wireless credentials to gain unauthorized network access. This involves using the legitimate Windows command-line tool <code>netsh.exe</code> to extract Wi-Fi passwords stored on a compromised system. By leveraging <code>netsh</code>, attackers can bypass traditional security measures and retrieve sensitive information without deploying custom malware. The technique involves specific command-line arguments that instruct <code>netsh</code> to display wireless keys in cleartext, exposing the network passwords. Defenders must monitor <code>netsh</code> command-line activity to identify potential credential access attempts. This activity can lead to lateral movement within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a Windows system (e.g., via phishing or exploiting a software vulnerability).</li>
<li>The attacker executes <code>netsh.exe</code> with specific arguments to list available wireless profiles.</li>
<li>The attacker identifies a target wireless profile from the list.</li>
<li>The attacker executes <code>netsh.exe</code> again, this time specifying the target profile and requesting the key to be displayed in cleartext using the <code>key=clear</code> argument.</li>
<li><code>Netsh.exe</code> retrieves the Wi-Fi password from the Windows Wireless LAN service.</li>
<li>The password is displayed in the command output, which the attacker captures.</li>
<li>The attacker uses the obtained Wi-Fi password to connect to the wireless network.</li>
<li>The attacker can now perform lateral movement and access internal resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful credential dumping allows attackers to gain unauthorized access to wireless networks. This can lead to lateral movement within the organization&rsquo;s network, access to sensitive data, and further compromise of systems and resources. The impact includes potential data breaches, financial losses, and reputational damage. This technique allows attackers to bypass traditional network access controls.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Wireless Credential Dumping via Netsh</code> to identify suspicious <code>netsh.exe</code> commands in your environment.</li>
<li>Enable Sysmon process creation logging to capture the <code>netsh.exe</code> command-line arguments.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on the process lineage and user context as outlined in the &ldquo;Triage and analysis&rdquo; section of the source.</li>
<li>Implement strong password policies for Wi-Fi networks, including the use of WPA2 or WPA3 encryption.</li>
<li>Review and restrict the use of <code>netsh.exe</code> on systems where it is not required, using application control solutions.</li>
<li>Monitor for related alerts indicating lateral movement, staging, remote access, or persistence, as mentioned in the &ldquo;Triage and analysis&rdquo; section of the source.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>netsh</category><category>windows</category></item><item><title>Windows Console History Clearing</title><link>https://feed.craftedsignal.io/briefs/2024-01-30-clearing-console-history/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-30-clearing-console-history/</guid><description>Adversaries may clear the command history of a compromised account to conceal the actions undertaken during an intrusion on a Windows system.</description><content:encoded><![CDATA[<p>Attackers can try to cover their tracks by clearing the PowerShell console history on Windows systems. PowerShell offers multiple ways to log commands, including the built-in history and the command history managed by the PSReadLine module. This activity is often part of post-compromise behavior aimed at evading detection and forensic analysis. This rule detects the execution of specific commands that clear the built-in PowerShell logs or delete the <code>ConsoleHost_history.txt</code> file. The rule focuses on PowerShell activity and covers scenarios where commands like Clear-History, Remove-Item, rm, and Set-PSReadlineOption are used to manipulate command history.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained through an unspecified method, potentially exploiting a vulnerability or using stolen credentials.</li>
<li>The attacker executes PowerShell (powershell.exe, pwsh.exe, or powershell_ise.exe) to perform reconnaissance and other malicious activities.</li>
<li>The attacker attempts to clear the PowerShell command history using the <code>Clear-History</code> cmdlet.</li>
<li>Alternatively, the attacker attempts to remove the <code>ConsoleHost_history.txt</code> file using <code>Remove-Item</code> or <code>rm</code>, which stores the PSReadLine command history.</li>
<li>Another method involves using the <code>Set-PSReadlineOption</code> cmdlet with the <code>SaveNothing</code> parameter to prevent the saving of future command history.</li>
<li>The attacker may leverage other tools and techniques to further obscure their activities and maintain persistence on the compromised system.</li>
<li>The attacker attempts to move laterally to other systems within the network to increase their impact.</li>
<li>The final objective is data exfiltration, deployment of ransomware, or other malicious activities, all while attempting to evade detection by clearing logs and command history.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful clearing of console history hinders forensic investigations and incident response efforts. If command history is cleared, administrators will have difficulty reconstructing the attacker&rsquo;s actions and identifying the extent of the compromise. This can lead to prolonged incident response times, increased damage, and potential for further exploitation of the compromised systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Clearing PowerShell History</code> to your SIEM to detect the use of <code>Clear-History</code> cmdlet, potentially indicating an attempt to remove command history.</li>
<li>Deploy the Sigma rule <code>Detect Removal of PowerShell History File</code> to detect the use of <code>Remove-Item</code> or <code>rm</code> command against the PowerShell history file.</li>
<li>Enable PowerShell logging and auditing policies to ensure adequate visibility into PowerShell activity as described in the <a href="https://ela.st/audit-process-creation">setup instructions</a> to improve detection capabilities.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>powershell</category><category>windows</category></item><item><title>System File Ownership Change for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-system-file-ownership-change/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-system-file-ownership-change/</guid><description>Adversaries may modify file or directory ownership to evade access control lists (ACLs) and access protected files, often using icacls.exe or takeown.exe to reset permissions on system files.</description><content:encoded><![CDATA[<p>Attackers often attempt to modify file or directory ownership to bypass access controls and gain unauthorized access to sensitive data or system resources. This involves altering permissions associated with critical files or directories, granting broader access to accounts under attacker control or resetting permissions to default values which might be more permissive. This defense evasion technique can be used to establish persistence, escalate privileges, or exfiltrate data without triggering standard security alerts. The common tools used include <code>icacls.exe</code> and <code>takeown.exe</code>, typically targeting files within the <code>C:\Windows\</code> directory.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is achieved through an existing compromised account or vulnerability.</li>
<li>The attacker uses <code>takeown.exe /f &lt;file&gt;</code> to take ownership of a target file or directory.</li>
<li>The attacker uses <code>icacls.exe &lt;file&gt; /reset</code> to reset the ACL of the file or directory.</li>
<li>Alternatively, the attacker uses <code>icacls.exe &lt;file&gt; /grant Everyone:F</code> to grant full control to everyone, weakening security.</li>
<li>The attacker modifies the contents of the file, such as injecting malicious code or configuration changes.</li>
<li>The attacker leverages the modified file for persistence, such as a modified system DLL loaded at boot.</li>
<li>The system executes the malicious code when the compromised file is accessed or executed.</li>
<li>The attacker achieves their objective, such as maintaining persistence, escalating privileges, or executing arbitrary commands.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromising file and directory permissions can lead to significant security breaches. Successful attacks can allow unauthorized access to sensitive data, system instability, or the execution of malicious code with elevated privileges. This can affect any Windows environment where file permissions are improperly managed, with potential for widespread system compromise and data exfiltration. The impact is most severe on systems containing sensitive data or critical infrastructure components.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process execution for <code>icacls.exe</code> and <code>takeown.exe</code> with suspicious arguments targeting system files (e.g., <code>C:\Windows\*</code>) to detect potential permission modification attempts using the provided Sigma rules.</li>
<li>Enable Windows Security Auditing for file system changes to capture events related to permission modifications and ownership changes.</li>
<li>Deploy the provided Sigma rules to your SIEM and tune for your environment, specifically focusing on processes modifying permissions on files within the <code>C:\Windows\</code> directory.</li>
<li>Investigate any alerts triggered by the Sigma rules, focusing on the process execution chain and the target files being modified.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>windows</category></item><item><title>Netsh Helper DLL Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-01-netsh-helper-dll/</link><pubDate>Tue, 30 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-netsh-helper-dll/</guid><description>Attackers may abuse the Netsh Helper DLL functionality by adding malicious DLLs to execute payloads every time the netsh utility is executed via administrators or scheduled tasks, achieving persistence.</description><content:encoded><![CDATA[<p>The <code>netsh.exe</code> utility in Windows supports the addition of Helper DLLs to extend its functionality. An attacker can abuse this mechanism to establish persistence by adding a malicious DLL. When <code>netsh.exe</code> is executed, the malicious DLL is loaded and executed, allowing the attacker to run arbitrary code with the privileges of the user or process that initiated <code>netsh.exe</code>. This can be done by administrators or scheduled tasks, making it a stealthy and effective persistence technique. The registry key targeted by this technique is <code>HKLM\Software\Microsoft\netsh\</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system through unspecified means.</li>
<li>Attacker creates a malicious DLL to be used as a Netsh Helper DLL.</li>
<li>Attacker modifies the Windows Registry to add the malicious DLL as a Netsh Helper DLL under <code>HKLM\Software\Microsoft\netsh\</code>.</li>
<li>The system administrator or a scheduled task executes <code>netsh.exe</code>.</li>
<li><code>netsh.exe</code> loads and executes the malicious DLL, granting the attacker code execution.</li>
<li>The malicious DLL performs its intended actions, such as establishing a reverse shell or deploying additional malware.</li>
<li>The attacker maintains persistence on the system through the malicious Netsh Helper DLL.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to establish persistent access to a compromised system. This can lead to data theft, system compromise, and further malicious activities. While the risk score is low, the persistence mechanism can allow attackers to maintain a foothold for extended periods, increasing the potential for significant damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor registry modifications under the <code>HKLM\Software\Microsoft\netsh\</code> path for suspicious DLL additions using the &ldquo;Netsh Helper DLL Registry Modification&rdquo; Sigma rule.</li>
<li>Enable Sysmon registry event logging to collect the necessary data for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule by reviewing the DLL file properties, timestamps, and related processes.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>windows</category><category>netsh</category><category>registry</category></item><item><title>MsXsl.exe Network Connection for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-msxsl-network-connection/</link><pubDate>Tue, 30 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-msxsl-network-connection/</guid><description>Msxsl.exe, a legitimate Windows utility, is being abused by adversaries to make network connections to non-local IPs for command and control or data exfiltration, potentially bypassing security measures.</description><content:encoded><![CDATA[<p>MsXsl.exe is a Windows utility designed to transform XML data using XSLT stylesheets. Adversaries are known to abuse this utility to execute malicious scripts, bypassing application control and other security measures. This behavior is often used as a defense evasion technique to download or execute malicious payloads. This activity has been observed since at least March 2020. The abuse of msxsl.exe allows attackers to establish command and control or exfiltrate sensitive data without being easily detected, as the tool is a signed Microsoft binary. This matters for defenders because it highlights the need to monitor legitimate system utilities for anomalous behavior, specifically network connections to external IP addresses.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through unspecified means.</li>
<li>The attacker leverages msxsl.exe to execute a malicious script.</li>
<li>Msxsl.exe initiates a network connection to an external IP address.</li>
<li>The script downloads a malicious payload from the external server.</li>
<li>The downloaded payload is executed on the compromised system.</li>
<li>The attacker establishes a command and control channel through the network connection.</li>
<li>The attacker performs data exfiltration via the established C2 channel.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised systems can be used for further malicious activities, including data theft, lateral movement, and deployment of additional malware. Successful exploitation can lead to sensitive data exfiltration, disruption of services, or complete system compromise. The low risk score does not represent impact, but instead reflects that the behavior is not always malicious, and may be a feature of normal software operation.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon network connection logging to monitor msxsl.exe network activity.</li>
<li>Deploy the Sigma rule &ldquo;Network Connection via MsXsl&rdquo; to your SIEM and tune for your environment to detect suspicious network connections originating from msxsl.exe.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the destination IP address and the parent process of msxsl.exe.</li>
<li>Whitelist legitimate uses of msxsl.exe in your environment based on known good processes or applications to reduce false positives.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>command-and-control</category><category>windows</category><category>msxsl</category></item><item><title>VaultCmd Usage for Listing Windows Credentials</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-vaultcmd-credential-access/</link><pubDate>Mon, 29 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-vaultcmd-credential-access/</guid><description>Adversaries may use vaultcmd.exe to list credentials stored in the Windows Credential Manager to gain unauthorized access to saved usernames and passwords, potentially in preparation for lateral movement.</description><content:encoded><![CDATA[<p>Attackers may abuse the Windows Credential Manager to list or dump credentials stored within. This allows for the exfiltration of saved usernames and passwords. The tool vaultcmd.exe can be used to interact with the Credential Manager and list the stored credentials. This activity is often performed in preparation for lateral movement within a compromised network. This detection focuses on identifying instances where vaultcmd.exe is executed with the <code>/list*</code> argument, indicating an attempt to enumerate stored credentials. The detection rule is designed to identify abuse of vaultcmd for credential access, enabling defenders to detect unauthorized credential access activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means (e.g., phishing, exploitation of a vulnerability).</li>
<li>The attacker executes <code>vaultcmd.exe</code> with the <code>/list</code> argument to enumerate the credentials stored in the Windows Credential Manager.</li>
<li>The <code>vaultcmd.exe</code> process accesses the Credential Manager to retrieve the list of saved credentials.</li>
<li>The output of <code>vaultcmd.exe</code> (the list of credentials) is captured or redirected to a file for later exfiltration.</li>
<li>The attacker parses the output to identify valuable credentials, such as domain administrator accounts or service accounts.</li>
<li>The attacker uses the acquired credentials to authenticate to other systems on the network (lateral movement).</li>
<li>The attacker elevates privileges on the target systems.</li>
<li>The final objective is achieved, such as data theft or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of this attack chain can lead to unauthorized access to sensitive resources, lateral movement within the network, and ultimately, data theft, system compromise, or ransomware deployment. A compromised user account can grant the attacker access to internal systems, confidential data, and critical infrastructure. If the attacker gains domain administrator credentials, they can compromise the entire Windows domain.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process execution events for instances of <code>vaultcmd.exe</code> being executed with the <code>/list*</code> argument (Data Source: Windows Security Event Logs, Sysmon, Microsoft Defender XDR, SentinelOne, Crowdstrike).</li>
<li>Deploy the Sigma rule &ldquo;Detect VaultCmd Credential Listing&rdquo; to your SIEM to identify potential credential access attempts.</li>
<li>Investigate any identified instances of <code>vaultcmd.exe</code> being executed with the <code>/list*</code> argument to determine the legitimacy of the activity.</li>
<li>Review and update endpoint protection configurations to ensure that similar threats are detected and blocked in the future.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>windows</category><category>vaultcmd</category></item><item><title>Suspicious Managed Code Hosting Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-suspicious-managedcode-hosting/</link><pubDate>Mon, 29 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-suspicious-managedcode-hosting/</guid><description>This rule detects suspicious managed code hosting processes on Windows systems, potentially indicating code injection or defense evasion tactics by monitoring file events associated with processes commonly used to host managed code, such as wscript.exe, cscript.exe, and mshta.exe.</description><content:encoded><![CDATA[<p>This detection identifies suspicious managed code hosting processes on Windows systems. Attackers may leverage processes like <code>wscript.exe</code>, <code>cscript.exe</code>, <code>mshta.exe</code>, <code>wmic.exe</code>, <code>svchost.exe</code>, <code>dllhost.exe</code>, <code>cmstp.exe</code>, and <code>regsvr32.exe</code> to execute malicious code, often bypassing traditional security controls. These processes can be abused to load and execute .NET assemblies or other managed code components. The detection focuses on identifying unusual file creation events associated with these processes which could indicate an attacker is attempting to leverage these processes for malicious purposes. This activity might be indicative of code injection, defense evasion, or other suspicious code execution techniques. The rule uses EQL to search for file events associated with specific processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through a phishing email or compromised software.</li>
<li>The attacker uses a LOLBin such as <code>mshta.exe</code> or <code>regsvr32.exe</code> to bypass application control.</li>
<li>The LOLBin executes a malicious script or loads a malicious DLL from a user-writable location.</li>
<li>The malicious script or DLL performs reconnaissance activities, such as gathering system information or enumerating network resources.</li>
<li>The attacker then attempts to escalate privileges by exploiting a vulnerability or using stolen credentials.</li>
<li>The attacker uses the compromised process to download and execute additional malware.</li>
<li>The malware establishes persistence on the system through scheduled tasks or registry modifications.</li>
<li>The attacker performs lateral movement within the network, compromising additional systems and exfiltrating sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, allowing attackers to compromise systems, steal sensitive data, and establish persistence. The use of LOLBins can bypass application control, making detection more challenging. Depending on the scope of the attack, this could result in significant financial losses, reputational damage, and disruption of business operations. This is a high-severity finding due to the potential for attackers to gain full control over affected systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon file creation logging (Event ID 11) to collect the necessary data for this detection.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Managed Code Hosting Process&rdquo; to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by this rule, focusing on the file paths, process command lines, and parent processes involved.</li>
<li>Monitor for unexpected file creation events associated with processes like <code>wscript.exe</code>, <code>cscript.exe</code>, and <code>mshta.exe</code> in user-writable directories.</li>
<li>Implement application control policies to restrict the execution of LOLBins and other potentially malicious processes.</li>
<li>Correlate the detection with other security events to identify related malicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>managed code</category><category>lolbin</category></item><item><title>Program Files Directory Masquerading</title><link>https://feed.craftedsignal.io/briefs/2024-01-program-files-masquerading/</link><pubDate>Mon, 29 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-program-files-masquerading/</guid><description>Adversaries may masquerade malicious executables within directories mimicking the legitimate Windows Program Files directory to evade defenses and execute untrusted code.</description><content:encoded><![CDATA[<p>This detection identifies processes executing from directories that masquerade as the legitimate Windows Program Files directories. Attackers may create directories with similar names (e.g., &ldquo;C:\Program Files Bad&rdquo; or &ldquo;C:\Program Files(x86) Malicious&rdquo;) to host and execute malicious executables, bypassing security measures that trust the standard Program Files locations. This technique is particularly effective when combined with low-privilege accounts, as it allows attackers to evade detections that whitelist only the standard, trusted Program Files paths. The timeframe for this rule is the last 9 months. This matters to defenders because it highlights a common tactic used to bypass established trust relationships within the Windows operating system, requiring more granular inspection of process execution paths.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker creates a new directory that mimics the &ldquo;Program Files&rdquo; or &ldquo;Program Files (x86)&rdquo; directory (e.g., &ldquo;C:\Program Files Bad&rdquo;).</li>
<li>The attacker copies or downloads malicious executable files into the newly created masquerading directory.</li>
<li>The attacker executes the malicious executable from the masquerading directory.</li>
<li>The operating system loads the executable and begins its execution, potentially bypassing any allowlisting rules that only check the standard &ldquo;Program Files&rdquo; locations.</li>
<li>The malicious executable performs its intended actions, such as installing malware, establishing persistence, or exfiltrating data.</li>
<li>The attacker leverages the compromised system to move laterally within the network, repeating the masquerading technique on other systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to malware infection, data theft, or complete system compromise. The impact is significant, as it undermines the trust placed in the &ldquo;Program Files&rdquo; directory and allows attackers to operate undetected for extended periods. While no specific victim counts are given, the technique is broadly applicable to any Windows environment, especially those relying on simple path-based allowlisting for security.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Program Files Directory Masquerading Detection</code> to your SIEM to detect suspicious process executions from masquerading directories.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to collect the necessary process execution data for the Sigma rule.</li>
<li>Regularly review and update allowlisting rules to include more specific criteria beyond just the &ldquo;Program Files&rdquo; directory, such as file hashes or digital signatures.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the parent processes and user accounts associated with the suspicious executions.</li>
<li>Monitor file creation events in the root directory to detect suspicious folders being created (file_event category)</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>masquerading</category><category>windows</category></item><item><title>Potential Remote Install via MsiExec</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-msiexec-remote-payload/</link><pubDate>Mon, 29 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-msiexec-remote-payload/</guid><description>This rule detects attempts to install a file from a remote server using MsiExec, which adversaries may abuse to deliver malware, by identifying msiexec.exe processes running with arguments indicative of remote installations and executed from suspicious parent processes.</description><content:encoded><![CDATA[<p>Adversaries may abuse Windows Installer (msiexec.exe) to perform remote installations of malicious payloads. This technique is used for initial access, defense evasion, and execution of arbitrary code. The detection rule identifies attempts to install a file from a remote server using MsiExec. The rule looks for msiexec.exe processes running with arguments such as <code>-i</code>, <code>/i</code>, <code>-p</code>, or <code>/p</code>, indicative of remote installations, and executed from suspicious parent processes like <code>sihost.exe</code>, <code>explorer.exe</code>, <code>cmd.exe</code>, <code>wscript.exe</code>, <code>mshta.exe</code>, <code>powershell.exe</code>, <code>wmiprvse.exe</code>, <code>pcalua.exe</code>, <code>forfiles.exe</code>, and <code>conhost.exe</code>. The rule includes exceptions to reduce false positives from legitimate software installations, specifically excluding command lines containing <code>--set-server</code>, <code>UPGRADEADD</code>, <code>--url</code>, <code>USESERVERCONFIG</code>, <code>RCTENTERPRISESERVER</code>, <code>app.ninjarmm.com</code>, <code>zoom.us/client</code>, <code>SUPPORTSERVERSTSURI</code>, <code>START_URL</code>, <code>AUTOCONFIG</code>, <code>awscli.amazonaws.com</code>, <code>*/i \&quot;C:*</code>, and <code>*/i C:\\*</code>. This technique can lead to complete system compromise and data exfiltration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access via an unspecified method (e.g., phishing, exploit).</li>
<li>The attacker uses a script or command-line interpreter (e.g., <code>cmd.exe</code>, <code>powershell.exe</code>) to initiate the <code>msiexec.exe</code> process.</li>
<li>The <code>msiexec.exe</code> process is launched with arguments that specify a remote MSI package (<code>-i</code>, <code>/i</code>, <code>-p</code>, <code>/p</code>) and enable silent installation (<code>/qn</code>, <code>-qn</code>, <code>-q</code>, <code>/q</code>, <code>/quiet</code>).</li>
<li>The <code>msiexec.exe</code> process downloads the MSI package from a remote server over HTTP or HTTPS.</li>
<li><code>msiexec.exe</code> executes the downloaded MSI package, which may contain malicious payloads.</li>
<li>The malicious payload executes, potentially performing actions such as installing malware, establishing persistence, or escalating privileges.</li>
<li>The attacker gains control over the compromised system.</li>
<li>The attacker performs further actions, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, allowing attackers to install malware, steal sensitive data, or disrupt system operations. A compromised system can be used as a pivot point to access other systems on the network. The impact can range from data breaches and financial losses to reputational damage and disruption of critical services. The number of potential victims depends on the scope of the initial access and the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect suspicious MsiExec invocations with remote payloads.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to ensure the required data is available for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the parent process, command-line arguments, and network connections associated with the <code>msiexec.exe</code> process.</li>
<li>Monitor process execution events for child processes spawned by <code>msiexec.exe</code> for anomalous activity.</li>
<li>Implement application control policies to restrict the execution of <code>msiexec.exe</code> to authorized users and processes only.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>msiexec</category><category>remote-install</category></item><item><title>Potential Exploitation of an Unquoted Service Path Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-29-unquoted-service-path/</link><pubDate>Mon, 29 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-29-unquoted-service-path/</guid><description>This rule detects potential exploitation of unquoted service path vulnerabilities, where adversaries may escalate privileges by placing a malicious executable in a higher-level directory within the path of an unquoted service executable.</description><content:encoded><![CDATA[<p>Unquoted service paths in Windows can be exploited to escalate privileges. When a service path lacks quotes, Windows may execute a malicious executable placed in a higher-level directory. This detection rule identifies suspicious processes starting from common unquoted paths, like &ldquo;C:\Program.exe&rdquo; or executables within &ldquo;C:\Program Files (x86)\&rdquo; or &ldquo;C:\Program Files\&rdquo;, signaling potential exploitation attempts. The rule aims to detect early stages of privilege escalation threats. This rule is designed for data generated by Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, Windows Security Event Logs, and Crowdstrike.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a service running with an unquoted path, such as &ldquo;C:\Program Files\Unquoted Path Service\Common\Service.exe&rdquo;.</li>
<li>The attacker places a malicious executable named &ldquo;Program.exe&rdquo; in &ldquo;C:&quot;</li>
<li>The operating system attempts to start the service &ldquo;C:\Program Files\Unquoted Path Service\Common\Service.exe&rdquo;.</li>
<li>Due to the unquoted path, the OS incorrectly parses the path and first attempts to execute &ldquo;C:\Program.exe&rdquo;.</li>
<li>The malicious &ldquo;Program.exe&rdquo; executes with the privileges of the service account.</li>
<li>The malicious executable performs actions to escalate privileges, such as adding a user to the local administrators group.</li>
<li>The attacker gains elevated access to the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of an unquoted service path vulnerability can lead to complete system compromise, as the attacker gains the privileges of the service account. This can allow the attacker to install programs, view, change, or delete data, or create new accounts with full user rights. The impact is high, potentially leading to a loss of confidentiality, integrity, and availability of the affected system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Review process executable paths to confirm if they match the patterns specified in the rule query, such as &ldquo;?:\Program.exe&rdquo; or executables within &ldquo;C:\Program Files (x86)\&rdquo; or &ldquo;C:\Program Files\&rdquo;.</li>
<li>Deploy the Sigma rule &ldquo;Potential Exploitation of an Unquoted Service Path Vulnerability&rdquo; to your SIEM and tune for your environment.</li>
<li>Enable Sysmon process-creation logging with Event ID 1 to activate the Sigma rules above.</li>
<li>Conduct a thorough review of service configurations to identify and correct any unquoted service paths as part of remediation steps.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>privilege-escalation</category><category>unquoted-service-path</category><category>windows</category></item><item><title>Potential Abuse of Certreq for File Transfer via HTTP POST</title><link>https://feed.craftedsignal.io/briefs/2024-01-certreq-post/</link><pubDate>Sun, 28 Jan 2024 20:47:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-certreq-post/</guid><description>Adversaries may abuse the Windows Certreq utility to download files or upload data to a remote URL by making an HTTP POST request, potentially for command and control or exfiltration, which can be detected by monitoring process execution events.</description><content:encoded><![CDATA[<p>The Windows Certreq utility is a command-line tool used for managing certificates. Adversaries may abuse Certreq to download files from or upload data to a remote server by initiating an HTTP POST request. This behavior can be used for command and control (C2) or exfiltration. This technique leverages a legitimate system binary (LOLBin) to evade detection. Elastic has observed this behavior being detected through multiple data sources including Elastic Defend, Microsoft Defender XDR, Sysmon, SentinelOne, and Crowdstrike. This is a cross-industry threat that can affect any organization using Windows.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker executes Certreq.exe with the <code>-Post</code> argument to initiate an HTTP POST request.</li>
<li>The Certreq process attempts to connect to a remote server to send or receive data.</li>
<li>The remote server responds to the Certreq request, potentially delivering a file or receiving exfiltrated data.</li>
<li>The downloaded file is saved to disk (if applicable).</li>
<li>The attacker may execute the downloaded file or further process the exfiltrated data.</li>
<li>The attacker may attempt to clean up the Certreq command from command history or logs to evade detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation could lead to the download and execution of malicious payloads, potentially compromising the affected system and network. Alternatively, sensitive data could be exfiltrated from the target environment. The impact can range from data theft and system compromise to full network intrusion, depending on the attacker&rsquo;s objectives and the data accessed. The severity is medium because Certreq is a legitimate tool, and its abuse requires specific command-line arguments and network activity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect Certreq HTTP Post Request&rdquo; to your SIEM to identify potential abuse of Certreq for file transfer.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture the execution of Certreq.exe and its command-line arguments, enabling detections.</li>
<li>Monitor network connections originating from Certreq.exe for unusual destinations or data transfer patterns using network connection logs.</li>
<li>Investigate any instances of Certreq.exe executing with the <code>-Post</code> argument, as this is not typical usage of the utility.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lolbin</category><category>command-and-control</category><category>exfiltration</category><category>certreq</category></item><item><title>AMSI Enable Registry Key Modification for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-amsi-registry-disable/</link><pubDate>Sat, 27 Jan 2024 18:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-amsi-registry-disable/</guid><description>Adversaries modify the AmsiEnable registry key to 0 to disable Windows Script AMSI scanning, bypassing AMSI protections for Windows Script Host or JScript execution.</description><content:encoded><![CDATA[<p>Attackers can disable the Antimalware Scan Interface (AMSI) to evade detection by modifying the <code>AmsiEnable</code> registry key. This technique is commonly employed to execute malicious scripts without triggering security warnings or blocks. The AMSI, a Windows feature, allows applications and services to request the scanning of potentially malicious content (e.g., PowerShell scripts, JScript) before execution. By setting the <code>AmsiEnable</code> value to 0, an attacker can disable AMSI for the current user, effectively bypassing real-time script scanning. This action is often a precursor to deploying further malicious payloads or establishing persistence on a compromised system. This behavior has been observed since at least 2019 and continues to be a relevant defense evasion technique.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system, possibly through phishing or exploiting a vulnerability.</li>
<li>The attacker executes a script or binary that attempts to modify the <code>AmsiEnable</code> registry key.</li>
<li>The script or binary uses <code>reg.exe</code>, PowerShell, or another tool to set the <code>AmsiEnable</code> registry value to 0. The registry key location is typically <code>HKEY_USERS\&lt;SID&gt;\Software\Microsoft\Windows Script\Settings\AmsiEnable</code>.</li>
<li>After successfully disabling AMSI, the attacker proceeds to execute malicious scripts or code. These scripts may use <code>powershell.exe</code>, <code>wscript.exe</code>, or <code>cscript.exe</code>.</li>
<li>The malicious scripts download and execute additional payloads, such as malware or remote access tools (RATs).</li>
<li>The attacker performs lateral movement within the network using the compromised system as a pivot.</li>
<li>The attacker attempts to establish persistence, ensuring continued access to the system even after reboots.</li>
<li>The attacker exfiltrates sensitive data or deploys ransomware to achieve their objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the <code>AmsiEnable</code> registry key allows attackers to execute malicious scripts without triggering AMSI alerts, leading to potential malware infections, data breaches, and system compromise. Disabling AMSI significantly reduces the effectiveness of endpoint security solutions, making the system more vulnerable to attack. The impact can range from individual workstation compromise to widespread network infections, depending on the attacker&rsquo;s objectives and the organization&rsquo;s security posture.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect AmsiEnable Registry Modification via Registry Events</code> to your SIEM to detect modifications to the <code>AmsiEnable</code> registry key.</li>
<li>Enable Sysmon registry event logging to provide the necessary data for the Sigma rule to function.</li>
<li>Monitor process creation events for processes modifying registry keys, especially <code>reg.exe</code> and PowerShell, using the rule <code>Detect AmsiEnable Registry Modification via Process Creation</code>.</li>
<li>Investigate any alerts generated by these rules promptly to determine if the activity is malicious or legitimate.</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted scripts and binaries.</li>
<li>Harden systems by restricting user permissions to modify critical registry keys.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>amsi</category><category>registry</category><category>windows</category></item><item><title>Microsoft Office 'Office Test' Registry Persistence Abuse</title><link>https://feed.craftedsignal.io/briefs/2024-01-office-test-registry-persistence/</link><pubDate>Sat, 27 Jan 2024 17:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-office-test-registry-persistence/</guid><description>Attackers modify the Microsoft Office 'Office Test' Registry key to achieve persistence by specifying a malicious DLL that executes upon application startup.</description><content:encoded><![CDATA[<p>The &ldquo;Office Test&rdquo; registry key, located under <code>HKCU\Software\Microsoft\Office Test\Special\Perf</code>, is a legitimate feature that allows specifying a DLL to be executed every time an MS Office application is started. Attackers can abuse this functionality by modifying the registry to point to a malicious DLL, achieving persistence on a compromised host. This allows for continued malicious activity even after a system restart or user logout. Elastic has published a rule to detect this behavior. The modification of this registry key, excluding deletions, is a strong indicator of potential abuse, and can be detected via endpoint detection and response (EDR) solutions as well as traditional Sysmon logging.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, often through phishing or exploiting a vulnerability.</li>
<li>The attacker establishes a foothold and escalates privileges to make necessary registry modifications.</li>
<li>The attacker modifies the <code>HKCU\Software\Microsoft\Office Test\Special\Perf</code> registry key, adding a new entry or modifying an existing one to point to a malicious DLL.</li>
<li>The attacker ensures the malicious DLL is present on the system, either by dropping it directly or using existing system tools to download it.</li>
<li>A user launches a Microsoft Office application (e.g., Word, Excel, PowerPoint).</li>
<li>The Office application loads the DLL specified in the &ldquo;Office Test&rdquo; registry key during startup.</li>
<li>The malicious DLL executes its payload, which could include establishing a reverse shell, installing malware, or exfiltrating data.</li>
<li>The attacker maintains persistence, allowing them to regain access to the system each time an Office application is started.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent access to a compromised system. The injected DLL can be used to execute arbitrary code, potentially leading to data theft, malware installation, or further compromise of the network. The relatively low risk score suggests a common technique, but the potential for persistent access makes it a significant threat.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM and tune for your environment to detect unauthorized modifications to the &ldquo;Office Test&rdquo; registry key (<code>HKCU\Software\Microsoft\Office Test\Special\Perf\*</code>).</li>
<li>Enable Sysmon Registry event logging to capture registry modifications and activate the Sigma rule above.</li>
<li>Monitor process execution logs for Office applications to detect if a suspicious DLL has been loaded or executed, as described in the investigation guide.</li>
<li>Implement enhanced monitoring and alerting for similar registry modifications across the network, as described in the remediation steps.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>registry</category><category>windows</category></item><item><title>Suspicious Alternate Data Stream (ADS) File Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-ads-file-creation/</link><pubDate>Fri, 26 Jan 2024 18:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ads-file-creation/</guid><description>Detects suspicious creation of Alternate Data Streams (ADS) on targeted files using script or command interpreters, indicative of malware hiding in ADS for defense evasion.</description><content:encoded><![CDATA[<p>This detection focuses on identifying the creation of Alternate Data Streams (ADS) on Windows systems, a technique often employed by adversaries to conceal malicious code or data within seemingly benign files. Attackers leverage scripting engines and command interpreters to write ADS to various file types, including executables, documents, and media files. This activity is uncommon in legitimate workflows, making it a valuable indicator of potential compromise. The rule is designed to trigger on file creation events where the process creating the file is a known script or command interpreter (cmd.exe, powershell.exe, etc.) and the target file has a suspicious extension. The detection excludes common legitimate ADS usage patterns. This technique is used for defense evasion, allowing malware to persist without being easily detected by traditional security measures.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker uses a command interpreter (cmd.exe, powershell.exe, etc.) or scripting engine (wscript.exe, cscript.exe) to execute malicious code.</li>
<li>The malicious code creates an Alternate Data Stream (ADS) on a targeted file (e.g., an executable, document, or image). The targeted file&rsquo;s extension could be pdf, dll, exe, dat, etc.</li>
<li>The attacker hides malicious code or data within the ADS, making it less visible to standard file system scans and security tools. The ADS is written to a file path using the <code>C:\\*:\*</code> syntax.</li>
<li>The attacker may rename or clean up any staging files to further conceal their activity.</li>
<li>The attacker can then execute the hidden code within the ADS, or use the ADS to store configuration data for later use.</li>
<li>The attacker maintains persistence by using the ADS to store and execute malicious code, bypassing typical file-based security measures.</li>
<li>The ultimate goal is to maintain unauthorized access to the system, potentially leading to data exfiltration, lateral movement, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to hide malicious code within legitimate files, evading detection by traditional security measures. This can lead to prolonged persistence on compromised systems, enabling data theft, ransomware deployment, or other malicious activities. While the specific number of victims is unknown, this technique is broadly applicable across Windows environments, potentially affecting a wide range of organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Suspicious ADS File Creation via Cmd</code> to detect ADS creation events initiated by cmd.exe.</li>
<li>Deploy the Sigma rule <code>Suspicious ADS File Creation via PowerShell</code> to detect ADS creation events initiated by powershell.exe.</li>
<li>Enable Sysmon Event ID 15 (FileCreateStreamHash) to provide detailed information about ADS creation events, as referenced in the rule&rsquo;s setup instructions.</li>
<li>Investigate any alerts generated by these rules, focusing on the file paths, creating processes, and command-line arguments involved, as detailed in the rule&rsquo;s triage and analysis notes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>ads</category><category>file-creation</category><category>windows</category></item><item><title>Group Policy Discovery via Microsoft GPResult Utility</title><link>https://feed.craftedsignal.io/briefs/2024-01-gpresult-discovery/</link><pubDate>Fri, 26 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-gpresult-discovery/</guid><description>Detects the execution of `gpresult.exe` with arguments `/z`, `/v`, `/r`, or `/x` on Windows systems, which attackers may use during reconnaissance to enumerate Group Policy Objects and identify opportunities for privilege escalation or lateral movement.</description><content:encoded><![CDATA[<p>Attackers may leverage the <code>gpresult.exe</code> utility, a built-in Windows tool, to gather information about Group Policy Objects (GPOs) within an Active Directory environment. This reconnaissance activity allows adversaries to understand the existing security policies, identify potential misconfigurations, and discover pathways for privilege escalation or lateral movement. The rule focuses on detecting the execution of <code>gpresult.exe</code> with specific command-line arguments (<code>/z</code>, <code>/v</code>, <code>/r</code>, <code>/x</code>) commonly associated with malicious reconnaissance. This behavior is typically observed after an initial compromise, where the attacker is attempting to map out the network and identify valuable targets. This activity matters for defenders as it provides an early indicator of post-compromise activity and can help prevent further damage.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a Windows system through methods such as phishing, exploiting vulnerabilities, or using stolen credentials.</li>
<li>The attacker executes <code>gpresult.exe</code> from the command line or through a script.</li>
<li>The attacker uses command-line arguments such as <code>/z</code>, <code>/v</code>, <code>/r</code>, or <code>/x</code> to request detailed information about Group Policy settings.</li>
<li><code>gpresult.exe</code> queries the Active Directory domain to retrieve GPO information applicable to the user or computer.</li>
<li>The attacker parses the output of <code>gpresult.exe</code> to identify security policies, user rights assignments, and other relevant configurations.</li>
<li>The attacker identifies potential weaknesses in the GPO configuration, such as overly permissive user rights or insecure password policies.</li>
<li>The attacker uses the gathered information to exploit identified weaknesses and escalate privileges or move laterally to other systems within the network.</li>
<li>The attacker achieves their objective, such as data exfiltration, system compromise, or deployment of ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to a comprehensive understanding of the target environment&rsquo;s security posture, enabling attackers to identify and exploit weaknesses for privilege escalation and lateral movement. While the source does not specify a number of victims or sectors targeted, the impact of a successful attack can range from data breaches and financial losses to reputational damage and disruption of operations. The discovery of misconfigured group policies can open doors for attackers to compromise critical systems and data within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Group Policy Discovery via GPResult&rdquo; to your SIEM to detect the execution of <code>gpresult.exe</code> with suspicious parameters.</li>
<li>Enable Windows process creation logging to capture command-line arguments used with <code>gpresult.exe</code> and other executables.</li>
<li>Review and harden Group Policy configurations to minimize the risk of exploitation by attackers.</li>
<li>Investigate any alerts generated by the Sigma rule &ldquo;Group Policy Discovery via GPResult&rdquo; to determine the context and intent of the activity.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>windows</category><category>group_policy</category></item><item><title>Detection of Malicious Browser Extension Installation</title><link>https://feed.craftedsignal.io/briefs/2024-01-browser-extension-install/</link><pubDate>Fri, 26 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-browser-extension-install/</guid><description>This rule identifies the installation of potentially malicious browser extensions, which adversaries can leverage for persistence and unauthorized activity by monitoring file creation events in common browser extension directories on Windows systems.</description><content:encoded><![CDATA[<p>This detection rule identifies the installation of browser extensions on Windows systems, which can be a sign of malicious activity. Threat actors may install malicious browser extensions through app store downloads disguised as legitimate extensions, social engineering tactics, or by directly compromising a system. These extensions can then be used for persistence, data theft, or other malicious purposes. The rule focuses on monitoring file creation events related to browser extension installations, specifically targeting the file paths and types associated with Firefox (.xpi) and Chromium-based browsers (.crx). It excludes known safe processes and extensions to reduce false positives. This detection is relevant for defenders because malicious browser extensions can provide a persistent foothold for attackers, allowing them to maintain access to compromised systems and user data. The rule is based on EQL and can be used with Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The user&rsquo;s system is compromised, potentially through social engineering or existing malware.</li>
<li>The attacker gains access to the system and attempts to install a malicious browser extension.</li>
<li>The attacker drops the extension file (.xpi for Firefox, .crx for Chromium) into the appropriate browser extension directory (e.g., <code>C:\\Users\\*\\AppData\\Roaming\\*\\Profiles\\*\\Extensions\\</code> for Firefox or <code>C:\\Users\\*\\AppData\\Local\\*\\*\\User Data\\Webstore Downloads\\</code> for Chromium).</li>
<li>A file creation event is triggered as the extension file is created in the target directory.</li>
<li>The detection rule identifies this file creation event based on the file name and path, filtering out known safe processes like firefox.exe.</li>
<li>The malicious extension installs itself into the browser.</li>
<li>The extension gains persistence by loading every time the browser starts.</li>
<li>The attacker can now perform malicious actions such as monitoring browsing activity, stealing credentials, or injecting malicious content into web pages.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using malicious browser extensions can lead to persistent access to the compromised system, allowing attackers to steal sensitive information such as credentials, financial data, or personal information. This can result in financial loss, identity theft, and reputational damage. The installation of malicious extensions can also lead to the injection of malicious content into web pages, redirecting users to phishing sites or distributing malware. The scope of the impact can range from individual users to entire organizations, depending on the extent of the compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 11 (File Create) logging to capture the necessary file creation events for this detection.</li>
<li>Deploy the provided Sigma rule <code>Browser Extension Install via File Creation</code> to your SIEM and tune the exclusions for your specific environment.</li>
<li>Review and update the list of known safe processes and extensions in the Sigma rule <code>Browser Extension Install via File Creation</code> to minimize false positives.</li>
<li>Implement application whitelisting policies to restrict the installation of unauthorized browser extensions.</li>
<li>Educate users on the risks associated with installing browser extensions from untrusted sources and encourage them to only install extensions from official browser stores.</li>
<li>Implement policies to regularly review installed browser extensions across the organization.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>browser-extension</category><category>windows</category></item><item><title>Unusual Network Connection via RunDLL32</title><link>https://feed.craftedsignal.io/briefs/2024-01-rundll32-network-connection/</link><pubDate>Fri, 26 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rundll32-network-connection/</guid><description>The rule detects unusual outbound network connections made by rundll32.exe, specifically when executed with minimal arguments, which may indicate command and control activity or defense evasion tactics on Windows systems.</description><content:encoded><![CDATA[<p>Attackers often abuse the <code>rundll32.exe</code> utility to execute malicious Dynamic Link Libraries (DLLs), blending their activity with legitimate system operations. This detection identifies instances where <code>rundll32.exe</code> establishes outbound network connections, particularly when executed without command-line arguments. Such behavior deviates from typical usage and may indicate command and control (C2) activity or other malicious actions. The rule is designed to detect command and control activity where adversaries are using <code>rundll32.exe</code> without arguments to make external network connections. The rule uses data from Elastic Defend, Sysmon, and SentinelOne to detect this behavior. The rule specifically excludes connections to well-known private and reserved IP ranges to reduce false positives.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, possibly through phishing or exploiting a software vulnerability.</li>
<li>The attacker attempts to execute a malicious DLL using <code>rundll32.exe</code> without specifying arguments, which is an anomaly.</li>
<li><code>rundll32.exe</code> is invoked with a command line resembling: <code>rundll32.exe &lt;path_to_dll&gt;</code>.</li>
<li>The malicious DLL initiates an outbound network connection to an external IP address.</li>
<li>The network connection attempts to bypass firewall rules by masquerading as a legitimate system process.</li>
<li>The attacker uses this connection to establish a command and control channel.</li>
<li>Data exfiltration or further exploitation activities occur over the established C2 channel.</li>
<li>The attacker achieves their final objective, such as data theft, ransomware deployment, or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to establish command and control channels on compromised systems, leading to potential data exfiltration, lateral movement within the network, and deployment of ransomware. This can result in significant financial losses, reputational damage, and disruption of business operations. The impact is broad, affecting any Windows environment where <code>rundll32.exe</code> is used.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Unusual Network Connection via RunDLL32</code> to your SIEM and tune for your environment to detect unusual network connections made by <code>rundll32.exe</code>.</li>
<li>Enable Sysmon process creation and network connection logging to capture necessary events for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the parent processes of <code>rundll32.exe</code> and the destination IP addresses of the network connections.</li>
<li>Review and harden firewall rules to prevent unauthorized outbound connections from system processes like <code>rundll32.exe</code>.</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted DLLs via <code>rundll32.exe</code>.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>command-and-control</category><category>windows</category></item><item><title>Unusual Executable File Creation by a System Critical Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-25-unusual-executable-file-creation/</link><pubDate>Thu, 25 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-25-unusual-executable-file-creation/</guid><description>The rule identifies unexpected executable file creation or modification by critical Windows processes, potentially indicating remote code execution or exploitation attempts.</description><content:encoded><![CDATA[<p>This detection rule identifies anomalous creation or modification of executable files by critical Windows system processes, like <code>smss.exe</code>, <code>csrss.exe</code>, and <code>lsass.exe</code>. Attackers may attempt to leverage these processes to evade detection, and the rule is designed to detect such activities. The rule leverages data from Elastic Defend, Microsoft Defender XDR, SentinelOne, CrowdStrike, and Sysmon. It provides investigation steps to help analysts triage and analyze potential incidents, focusing on the identity of the writing process, its lineage, and the characteristics of the written file. This rule is designed to detect potential remote code execution or other forms of exploitation targeting Windows systems. The rule logic excludes specific legitimate file paths to minimize false positives.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through methods such as phishing or exploiting a vulnerability.</li>
<li>The attacker executes code on the system.</li>
<li>The attacker attempts to escalate privileges.</li>
<li>The attacker leverages a system critical process to create or modify an executable file.</li>
<li>The created/modified file may be a backdoor, malware component, or a tool for further exploitation.</li>
<li>The attacker uses the created executable to establish persistence.</li>
<li>The attacker uses the newly created executable to perform lateral movement.</li>
<li>The attacker achieves their objective, such as data exfiltration or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution with elevated privileges. The number of victims is dependent on the scope of the initial compromise. The targeted sectors include any organization running vulnerable Windows systems. If the attack succeeds, the adversary can gain full control over the system, leading to data theft, system disruption, or further propagation of malware.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Unusual Executable File Creation by a System Critical Process&rdquo; detection rule to your SIEM and tune for your environment.</li>
<li>Enable Sysmon file creation logging (Event ID 11) to enhance detection capabilities (see setup instructions in the rule source).</li>
<li>Investigate any alerts generated by this rule, paying close attention to the writing process&rsquo;s identity, lineage, and the characteristics of the written file as detailed in the rule&rsquo;s triage and analysis section.</li>
<li>Correlate alerts from this rule with other endpoint and network activity to identify the scope of the potential compromise.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>windows</category></item><item><title>Detecting Rare SMB Connections for Potential NTLM Credential Theft</title><link>https://feed.craftedsignal.io/briefs/2024-01-rare-smb-exfiltration/</link><pubDate>Thu, 25 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rare-smb-exfiltration/</guid><description>This brief details a detection strategy for rare SMB connections originating from internal networks to the internet, potentially indicating NTLM credential theft via rogue UNC path injection.</description><content:encoded><![CDATA[<p>This detection strategy focuses on identifying unusual Server Message Block (SMB) traffic that originates from internal IP addresses and connects to external networks. The SMB protocol, commonly used for file and printer sharing within a network, can be exploited to exfiltrate data by injecting rogue UNC paths to capture NTLM credentials. This activity is often associated with threat actors attempting to steal credentials for lateral movement or data exfiltration. Defenders should be aware of this technique as it allows adversaries to bypass traditional security controls by leveraging a legitimate protocol for malicious purposes. This detection is relevant for environments utilizing Windows operating systems and SMB for internal network communications. The goal is to identify and alert on SMB connections to external IPs, excluding known safe ranges and legitimate business applications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises an internal system via phishing or other means (not detailed in source).</li>
<li>The attacker injects a rogue UNC path into a document, email, or other medium.</li>
<li>A user opens the malicious document or clicks the injected link, triggering an SMB connection to a malicious external server.</li>
<li>The SMB connection attempts to authenticate with the user&rsquo;s NTLM credentials.</li>
<li>The attacker captures the NTLM hash from the authentication attempt.</li>
<li>The attacker attempts to crack the NTLM hash to obtain the user&rsquo;s password.</li>
<li>Using the cracked password, the attacker gains unauthorized access to other systems and resources on the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to credential theft, allowing attackers to gain unauthorized access to sensitive data and systems within the organization. This can result in data breaches, financial losses, and reputational damage. The impact is significant because SMB is a common protocol within many Windows environments, making this technique highly effective if not properly monitored.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect SMB Connection to External IP&rdquo; to your SIEM to identify potentially malicious SMB connections to the internet. Tune the rule by excluding known good external IPs used by legitimate services.</li>
<li>Enable Sysmon Event ID 3 (Network Connection) with proper filtering to capture SMB traffic details as recommended in the linked setup guide, to enhance the fidelity of the detection.</li>
<li>Implement network segmentation to restrict SMB traffic to only necessary internal communications, reducing the attack surface and mitigating the risk of external exposure.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>exfiltration</category><category>credential-access</category><category>windows</category><category>smb</category><category>ntlm</category></item><item><title>Windows Script Execution from Archive File</title><link>https://feed.craftedsignal.io/briefs/2024-01-script-exec-archive/</link><pubDate>Wed, 24 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-script-exec-archive/</guid><description>This rule identifies attempts to execute Jscript/Vbscript files from an archive file, a common delivery method for malicious scripts on Windows systems.</description><content:encoded><![CDATA[<p>Attackers commonly use archive files (ZIP, RAR, 7z) to deliver malicious scripts, such as JScript and VBScript, to Windows systems. This technique allows them to bypass some initial security checks and deliver payloads that can execute arbitrary code. The &ldquo;Windows Script Execution from Archive&rdquo; detection identifies instances where Windows Script Host (wscript.exe) is launched from temporary directories containing extracted archive contents. This activity can indicate a user has opened a malicious archive, leading to potential malware execution. This detection focuses on the parent-child process relationship, where explorer.exe, winrar.exe, or 7zFM.exe spawns wscript.exe to execute scripts from the temp directory.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user receives a malicious archive file (e.g., ZIP, RAR, 7z) via email or downloads it from a website.</li>
<li>The user opens the archive file using a file archiver tool like Explorer, WinRAR, or 7-Zip.</li>
<li>The archiver extracts the contents, including a malicious JScript (.js) or VBScript (.vbs) file, to a temporary directory, such as <code>\Users\*\AppData\Local\Temp\7z*\</code>.</li>
<li>The user (or the archiver tool) inadvertently executes the extracted script using Windows Script Host (wscript.exe).</li>
<li>Wscript.exe executes the malicious script, which may perform a variety of actions, such as downloading and executing additional payloads.</li>
<li>The script establishes persistence via registry modification, adding a run key to execute upon system startup.</li>
<li>The script connects to a command-and-control server to receive further instructions.</li>
<li>The attacker gains control of the compromised system and begins lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack of this nature can lead to arbitrary code execution on the victim&rsquo;s machine, potentially resulting in data theft, malware installation, or complete system compromise. While the number of affected organizations is not specified, the technique is broadly applicable to any Windows environment where users handle archive files, potentially affecting numerous individuals and organizations across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line arguments to capture the execution of wscript.exe and its arguments.</li>
<li>Deploy the Sigma rule &ldquo;Detect Script Execution from Archive&rdquo; to your SIEM to identify suspicious script execution patterns.</li>
<li>Monitor process activity for wscript.exe and other scripting engines executing from temporary directories.</li>
<li>Configure endpoint security solutions to block execution of scripts from common temporary directories.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>execution</category><category>windows</category><category>scripting</category><category>archive</category></item><item><title>Credential Acquisition via Registry Hive Dumping</title><link>https://feed.craftedsignal.io/briefs/2024-01-24-registry-hive-dump/</link><pubDate>Wed, 24 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-24-registry-hive-dump/</guid><description>Detects attempts to export sensitive Windows registry hives (SAM/SECURITY) using reg.exe, potentially leading to credential compromise.</description><content:encoded><![CDATA[<p>This detection identifies attempts to export registry hives containing sensitive credential information using the Windows <code>reg.exe</code> utility. Attackers may target the <code>HKLM\SAM</code> and <code>HKLM\SECURITY</code> hives to extract stored credentials, including password hashes and LSA secrets. The activity is often part of a broader credential access campaign. The rule focuses on detecting the execution of <code>reg.exe</code> with specific arguments indicating an attempt to save or export these critical registry hives. The use of <code>reg.exe</code> makes this technique accessible to various threat actors, including ransomware groups and nation-state actors. Defenders need to monitor for this activity to prevent unauthorized credential access and potential lateral movement within the network. This rule specifically looks for &ldquo;save&rdquo; and &ldquo;export&rdquo; arguments targeting SAM and SECURITY hives.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker executes <code>reg.exe</code> from the command line or through a script.</li>
<li>The <code>reg.exe</code> command includes arguments to save or export registry hives.</li>
<li>The target registry hives are <code>HKLM\SAM</code> and <code>HKLM\SECURITY</code>, containing sensitive credential information.</li>
<li>The exported registry hive is saved to a file on disk or a network share.</li>
<li>The attacker may compress or encrypt the exported registry hive to evade detection.</li>
<li>The attacker retrieves the exported registry hive for offline analysis.</li>
<li>The attacker extracts credential information from the registry hive, such as password hashes and LSA secrets, to use in lateral movement or privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to acquire sensitive credentials stored within the registry. This can lead to lateral movement within the network, privilege escalation, and ultimately, data exfiltration or system compromise. Compromised credentials can be used to access critical systems and data, causing significant damage to the organization. The impact is considered high due to the potential for widespread access and control over the compromised environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation auditing with command line arguments to capture the execution of <code>reg.exe</code> with relevant arguments. (<a href="https://ela.st/audit-process-creation">Data Source: Windows Security Event Logs, Sysmon</a>)</li>
<li>Deploy the Sigma rule <code>Detect Registry Hive Export via Reg.exe</code> to your SIEM to detect the execution of <code>reg.exe</code> with arguments indicative of registry hive dumping.</li>
<li>Implement access controls and monitor file system activity to detect unauthorized access or modification of registry hive files.</li>
<li>Review and restrict the use of <code>reg.exe</code> to authorized personnel and processes.</li>
<li>Monitor for parent processes of <code>reg.exe</code> that are unusual or unexpected, which might indicate malicious activity.</li>
<li>Investigate any alerts generated by the Sigma rule by reviewing the process command line, parent process, and destination of the exported registry hive.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>registry-dump</category><category>windows</category></item><item><title>Windows Sandbox Abuse with Sensitive Configuration</title><link>https://feed.craftedsignal.io/briefs/2024-01-windows-sandbox-abuse/</link><pubDate>Wed, 10 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-windows-sandbox-abuse/</guid><description>This rule detects the abuse of Windows Sandbox with sensitive configurations to evade detection, where malware may abuse the sandbox feature to gain write access to the host file system, enable network connections, and automatically execute commands via logon, identifying the start of a new container with these sensitive configurations.</description><content:encoded><![CDATA[<p>Attackers may abuse the Windows Sandbox feature to evade detection by running malicious code within the isolated environment. This involves configuring the sandbox with sensitive options such as granting write access to the host file system, enabling network connections, and setting up automatic command execution via logon. By running within the sandbox with these configurations, malware can potentially interact with the host system, while making detection more difficult. This technique is used for defense evasion, hiding artifacts, and executing malicious activities within a virtualized environment to avoid direct exposure on the host. The rule identifies the start of a new container with sensitive configurations like write access to the host file system, network connection and automatic execution via logon command.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through an exploit or social engineering.</li>
<li>The attacker leverages Windows Sandbox by executing <code>wsb.exe</code> or <code>WindowsSandboxClient.exe</code>.</li>
<li>The attacker configures the sandbox to enable networking using <code>&lt;Networking&gt;Enable&lt;/Networking&gt;</code> or <code>&lt;NetworkingEnabled&gt;true&lt;/NetworkingEnabled&gt;</code>.</li>
<li>The attacker grants the sandbox write access to the host file system using <code>&lt;HostFolder&gt;C:\\&lt;ReadOnly&gt;false</code>.</li>
<li>The attacker sets up a logon command to automatically execute malicious code when the sandbox starts using <code>&lt;LogonCommand&gt;</code>.</li>
<li>The sandbox initializes and executes the configured logon command.</li>
<li>The malicious code interacts with the host file system and network, performing actions such as data exfiltration or lateral movement.</li>
<li>The attacker achieves their objective, such as deploying ransomware or stealing sensitive information, while operating from within the isolated sandbox environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using Windows Sandbox abuse can lead to a range of negative impacts. Attackers may gain unauthorized access to sensitive data, compromise system integrity, or disrupt business operations. The use of the sandbox environment helps to conceal malicious activity, making detection and remediation more challenging. The damage can include data breaches, financial losses, reputational damage, and regulatory penalties. Successful exploitation allows malware to interact with the host system, potentially affecting multiple systems on the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Windows Sandbox with Sensitive Configuration&rdquo; detection rule to your SIEM to identify potential sandbox abuse attempts.</li>
<li>Monitor process creation events for <code>wsb.exe</code> and <code>WindowsSandboxClient.exe</code> with command-line arguments that enable networking (<code>&lt;Networking&gt;Enable&lt;/Networking&gt;</code>, <code>&lt;NetworkingEnabled&gt;true&lt;/NetworkingEnabled&gt;</code>).</li>
<li>Monitor process creation events for <code>wsb.exe</code> and <code>WindowsSandboxClient.exe</code> with command-line arguments that enable write access to the host file system (<code>&lt;HostFolder&gt;C:\\&lt;ReadOnly&gt;false</code>).</li>
<li>Monitor process creation events for <code>wsb.exe</code> and <code>WindowsSandboxClient.exe</code> with command-line arguments that define logon commands (<code>&lt;LogonCommand&gt;</code>).</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture the necessary command-line arguments.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows-sandbox</category><category>windows</category></item><item><title>Microsoft Build Engine Started by an Office Application</title><link>https://feed.craftedsignal.io/briefs/2024-01-msbuild-office-app/</link><pubDate>Tue, 09 Jan 2024 18:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-msbuild-office-app/</guid><description>The Microsoft Build Engine (MSBuild) being started by an Office application is unusual behavior and could indicate a malicious document executing a script payload for defense evasion.</description><content:encoded><![CDATA[<p>The Microsoft Build Engine (MSBuild) is a software build platform commonly used by Windows developers. When MSBuild is started by an Office application like Word or Excel, it deviates from typical usage patterns. This behavior can be indicative of a malicious document executing a script payload as part of a defense evasion tactic. Attackers may leverage MSBuild to execute code or perform actions that would otherwise be blocked or detected. This activity is particularly concerning because it can bypass traditional security measures that focus on blocking suspicious executables or scripts directly launched by Office applications. The rule was created in March 2020, and last updated in April 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user opens a malicious Office document (e.g., Word, Excel, PowerPoint).</li>
<li>The Office document contains an embedded macro or exploit that triggers the execution of MSBuild.exe.</li>
<li>MSBuild.exe is launched as a child process of the Office application (e.g., winword.exe, excel.exe, powerpnt.exe).</li>
<li>MSBuild executes a project file or inline task specified in the command line. This can involve compiling code, executing scripts, or performing other actions.</li>
<li>The executed code or script performs malicious activities, such as downloading additional payloads, modifying system settings, or establishing persistence.</li>
<li>MSBuild may spawn child processes, such as cmd.exe, powershell.exe, or other utilities, to further execute malicious commands.</li>
<li>The attacker achieves their objective, which could include data exfiltration, installing malware, or gaining unauthorized access to the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the execution of arbitrary code on the victim&rsquo;s machine, potentially resulting in data theft, malware installation, or complete system compromise. Since MSBuild is a legitimate Microsoft tool, its use by malicious actors can make detection more challenging. The impact is high because it leverages a trusted process to carry out malicious activities, evading standard security measures.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Microsoft Build Engine Started by an Office Application&rdquo; to your SIEM to detect this specific behavior based on process creation events.</li>
<li>Enable Sysmon process creation logging with the appropriate configuration to capture the necessary process start events for the Sigma rule to function correctly.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the command-line arguments of MSBuild.exe and the parent process information, including the executable name and command line.</li>
<li>Monitor process execution events for MSBuild.exe with parent processes being Office applications as a high priority indicator of potential compromise.</li>
<li>Review and harden Office macro settings to prevent execution of malicious macros.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>msbuild</category><category>windows</category></item><item><title>Potential Local NTLM Relay via HTTP</title><link>https://feed.craftedsignal.io/briefs/2024-01-ntlm-relay-http/</link><pubDate>Tue, 09 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ntlm-relay-http/</guid><description>Adversaries may coerce local NTLM authentication over HTTP via WebDAV named-pipe paths (Print Spooler, SRVSVC), then relay credentials to elevate privileges.</description><content:encoded><![CDATA[<p>This detection identifies attempts to coerce local NTLM authentication over HTTP through WebDAV named-pipe paths, focusing on Print Spooler and SRVSVC. Attackers can exploit this vulnerability, often combined with tools like NTLMRelay2Self, PetitPotam, or modified versions of krbrelayx&rsquo;s printerbug.py, to relay the obtained credentials and escalate their privileges within the network. This technique allows attackers to bypass traditional security measures by leveraging legitimate Windows protocols for malicious purposes. Successful exploitation can lead to domain dominance and unauthorized access to sensitive resources. This activity is often associated with post-exploitation activity following initial access via other means.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system.</li>
<li>The attacker executes <code>rundll32.exe</code> to load <code>davclnt.dll</code> using the <code>DavSetCookie</code> function.</li>
<li>The <code>rundll32.exe</code> process is invoked with arguments specifying a named pipe path over HTTP, such as <code>http*/print/pipe/*</code>, <code>http*/pipe/spoolss</code>, or <code>http*/pipe/srvsvc</code>.</li>
<li>The system attempts to authenticate to the specified HTTP endpoint using NTLM.</li>
<li>The attacker intercepts the NTLM authentication request.</li>
<li>Using a relay tool like NTLMRelay2Self or ntlmrelayx, the attacker relays the captured NTLM credentials to another service or machine.</li>
<li>The attacker leverages the relayed credentials to escalate privileges or gain unauthorized access to network resources.</li>
<li>The attacker may then perform lateral movement, data exfiltration, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to escalate privileges within the compromised system and potentially the entire domain. This can lead to unauthorized access to sensitive data, deployment of ransomware, or other destructive activities. The impact ranges from data breaches and financial losses to complete system compromise. Depending on the targeted accounts, the attacker may be able to achieve domain administrator privileges.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Potential Local NTLM Relay via HTTP&rdquo; to your SIEM to detect the execution of <code>rundll32.exe</code> with specific arguments indicative of NTLM relay attempts.</li>
<li>Enable Sysmon process creation logging to ensure the necessary data is available for the Sigma rule to function correctly.</li>
<li>Monitor network connections originating from processes that load <code>davclnt.dll</code> to identify potential NTLM relay traffic.</li>
<li>Investigate and block the usage of tools like NTLMRelay2Self, PetitPotam, and ntlmrelayx within the environment.</li>
<li>Implement mitigations for NTLM relay attacks, such as enabling Extended Protection for Authentication (EPA) and disabling NTLM where possible.</li>
<li>Review and restrict the usage of WebClient service and Print Spooler service where not required.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ntlm-relay</category><category>credential-access</category><category>windows</category><category>webdav</category></item><item><title>Persistence via Scheduled Job Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-scheduled-job-persistence/</link><pubDate>Tue, 09 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-scheduled-job-persistence/</guid><description>This detection rule identifies attempts to establish persistence on Windows systems by creating scheduled jobs in the Windows Tasks directory, excluding known legitimate jobs.</description><content:encoded><![CDATA[<p>Adversaries may abuse scheduled tasks to maintain persistence on a compromised system. This involves creating or modifying scheduled tasks to execute malicious code at specific times or intervals. This activity can be used to ensure that the attacker&rsquo;s code remains active even after a system restart or user logout. The detection rule identifies suspicious job creation by monitoring specific file paths and extensions, excluding known legitimate processes to flag potential abuse. The rule is designed for data generated by Elastic Defend, but also supports Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker attempts to establish persistence.</li>
<li>The attacker uses a script or program to create a new scheduled job within the <code>C:\Windows\Tasks\</code> directory.</li>
<li>The scheduled job is configured to execute a malicious payload at a specified time or interval.</li>
<li>The malicious payload could be a script (e.g., PowerShell) or an executable.</li>
<li>The scheduled job executes, triggering the malicious payload.</li>
<li>The attacker maintains persistent access to the system.</li>
<li>The attacker performs malicious activities, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain a persistent presence on the compromised system. This allows them to execute malicious code, steal sensitive information, or perform other malicious activities over an extended period. The number of affected systems can vary depending on the scope of the initial compromise and the attacker&rsquo;s objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 11 (File Create) logging to monitor file creation events on Windows systems.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious Scheduled Job Creation&rdquo; to your SIEM and tune for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on scheduled jobs created in the <code>C:\Windows\Tasks\</code> directory with a &ldquo;.job&rdquo; extension.</li>
<li>Review and update exclusion lists for known legitimate scheduled job creation processes (e.g., CCleaner, ManageEngine) to minimize false positives.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>windows</category></item><item><title>Suspicious WerFault Child Process Abuse</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-werfault-child-process/</link><pubDate>Tue, 09 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-werfault-child-process/</guid><description>This rule detects suspicious child processes of WerFault.exe, a Windows error reporting tool, indicating potential abuse of the SilentProcessExit registry key to execute malicious processes stealthily for defense evasion, persistence, and privilege escalation.</description><content:encoded><![CDATA[<p>This detection identifies suspicious child processes spawned by WerFault.exe, the Windows Error Reporting tool. Attackers can abuse WerFault by manipulating the <code>SilentProcessExit</code> registry key to execute malicious processes. This technique allows for defense evasion, persistence, and privilege escalation. The detection focuses on WerFault processes with specific command-line arguments (<code>-s</code>, <code>-t</code>, and <code>-c</code>) known to be used in SilentProcessExit exploitation, while excluding legitimate executables like <code>Initcrypt.exe</code> and <code>Heimdal.Guard.exe</code>. The rule helps defenders identify potential attempts to hijack the error reporting mechanism for malicious purposes. The monitored data sources include Windows Event Logs, Sysmon, Elastic Defend, Microsoft Defender XDR, and SentinelOne.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker modifies the <code>SilentProcessExit</code> registry key to specify a malicious process to be executed when a target application crashes. This involves setting the <code>ReportingMode</code> and <code>Debugger</code> values under the <code>SilentProcessExit</code> key for the target application.</li>
<li>The attacker triggers a crash in the target application or waits for a legitimate crash to occur.</li>
<li>WerFault.exe is invoked to handle the application crash.</li>
<li>Due to the registry modification, WerFault.exe spawns the attacker-controlled process, passing command-line arguments such as <code>-s</code>, <code>-t</code>, and <code>-c</code>.</li>
<li>The attacker-controlled process executes with the privileges of WerFault.exe, potentially achieving privilege escalation.</li>
<li>The malicious process performs actions such as injecting code into other processes, establishing persistence, or exfiltrating data.</li>
<li>The attacker achieves their objectives, such as maintaining persistence, escalating privileges, or evading detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to persistence, privilege escalation, and defense evasion. Attackers can use this technique to execute malicious code with elevated privileges, potentially bypassing security controls and gaining unauthorized access to sensitive data and system resources. The number of victims and affected sectors can vary depending on the attacker&rsquo;s objectives and the scope of the initial compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging to capture WerFault.exe child processes (Data Source: Sysmon).</li>
<li>Deploy the Sigma rule &ldquo;WerFault Child Process Masquerading&rdquo; to your SIEM and tune for your environment.</li>
<li>Review the <code>SilentProcessExit</code> registry key for unauthorized modifications (registry_set event).</li>
<li>Investigate any WerFault.exe processes with command-line arguments <code>-s</code>, <code>-t</code>, and <code>-c</code> (process_creation event).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>privilege-escalation</category><category>masquerading</category></item><item><title>Detection of Custom Shim Database Installation for Persistence</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-app-compat-shim-persistence/</link><pubDate>Tue, 09 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-app-compat-shim-persistence/</guid><description>Attackers abuse the Application Compatibility Shim functionality in Windows to establish persistence and achieve arbitrary code execution by installing malicious shim databases, which this detection identifies through monitoring registry changes.</description><content:encoded><![CDATA[<p>Attackers can exploit the Windows Application Compatibility Shim functionality to maintain persistence and execute arbitrary code within legitimate Windows processes. This is achieved by installing custom shim databases, which are designed to ensure older applications run smoothly on newer operating systems. By manipulating these databases, attackers can stealthily inject malicious code into trusted processes. The rule detects changes in specific registry paths associated with the installation of these databases, excluding known legitimate processes to minimize false positives. This technique allows for the execution of malicious code without directly modifying the target application&rsquo;s executable, making it difficult to detect with traditional methods.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker modifies the registry to create a new entry for a custom shim database. The registry path targeted is typically under <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\AppCompatFlags\Custom\</code>.</li>
<li>The attacker writes a malicious <code>.sdb</code> file containing the custom shim database to a location on disk.</li>
<li>The registry entry created points to the malicious <code>.sdb</code> file.</li>
<li>When a targeted application is launched, Windows checks the AppCompatFlags registry keys.</li>
<li>The system loads the malicious shim database specified in the registry.</li>
<li>The malicious code within the shim database is executed in the context of the targeted application.</li>
<li>The attacker achieves persistence, as the malicious shim database is loaded every time the targeted application is run.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to maintain persistent access to the system, even after reboots or software updates. The injected code runs within the context of a legitimate process, which can evade detection by traditional security tools. This can lead to data theft, system compromise, or further malicious activities, such as lateral movement within the network. The use of application shimming for persistence affects systems running Windows and can impact organizations of any size or sector.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Custom Shim Database Installation</code> to your SIEM to identify suspicious registry modifications related to application shimming.</li>
<li>Enable Sysmon registry event logging to ensure the necessary data is available for the Sigma rule to function.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on processes that are not in the exclusion list.</li>
<li>Block or quarantine any identified malicious <code>.sdb</code> files to prevent further execution.</li>
<li>Review and update the exclusion list in the Sigma rule with any newly identified legitimate applications that use shim databases, reducing false positives.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>app-compat</category><category>shim</category><category>windows</category></item><item><title>Unusual Service Host Child Process - Childless Service</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-svchost-child-process/</link><pubDate>Thu, 04 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-svchost-child-process/</guid><description>This detection identifies unusual child processes of Service Host (svchost.exe) that traditionally do not spawn child processes, potentially indicating code injection or exploitation.</description><content:encoded><![CDATA[<p>The Windows Service Host process (svchost.exe) is a critical system component that hosts multiple Windows services to optimize resource utilization. Certain services running under svchost.exe are not expected to spawn child processes. Attackers may inject malicious code into these &ldquo;childless&rdquo; svchost processes to execute unauthorized commands and evade traditional detection methods. This detection rule identifies anomalies by monitoring child processes of svchost.exe instances associated with services known to be childless, such as <code>WdiSystemHost</code>, <code>LicenseManager</code>, and <code>StorSvc</code>, flagging potential process injection or exploitation attempts. The rule aims to identify deviations from the expected behavior of these services, providing an early warning of potential malicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system through an exploit or by leveraging existing credentials.</li>
<li>The attacker injects malicious code into a running svchost.exe process associated with a childless service like <code>WdiSystemHost</code> or <code>StorSvc</code>.</li>
<li>The injected code spawns a child process from the targeted svchost.exe instance. This could involve executing a system utility or a custom payload.</li>
<li>The child process executes commands or performs actions dictated by the injected code, such as establishing a reverse shell or downloading additional payloads.</li>
<li>The attacker uses the spawned process to perform reconnaissance activities, gathering information about the system and network.</li>
<li>The attacker escalates privileges, potentially leveraging vulnerabilities or misconfigurations accessible from the compromised svchost process.</li>
<li>The attacker moves laterally to other systems on the network, using the compromised system as a pivot point.</li>
<li>The attacker achieves their final objective, which may include data exfiltration, ransomware deployment, or establishing persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to privilege escalation, allowing attackers to gain control of the compromised system and potentially the entire network. Attackers can use the compromised system as a staging ground for further attacks, exfiltrate sensitive data, deploy ransomware, or disrupt critical services. The medium severity score reflects the potential for significant impact if the activity is not detected and contained promptly.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Unusual Svchost Child Process - Childless Service</code> to your SIEM to detect potential process injection attacks targeting svchost.exe.</li>
<li>Tune the rule by adding known false positives to the exclusion list, such as <code>WerFault.exe</code>, <code>WerFaultSecure.exe</code>, and <code>wermgr.exe</code> to reduce alert fatigue.</li>
<li>Enable process creation logging via Sysmon (Event ID 1) with command line details for better visibility into spawned processes, as described in the <a href="https://ela.st/sysmon-event-1-setup">setup guide</a>.</li>
<li>Investigate any alerts generated by the rule, focusing on the process details and parent-child relationships to determine the legitimacy of the spawned process.</li>
<li>Consider using endpoint detection and response (EDR) solutions like Elastic Defend for enhanced visibility and automated response capabilities, as the rule is designed for data generated by <a href="https://www.elastic.co/security/endpoint-security">Elastic Defend</a>.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>process_injection</category><category>privilege_escalation</category><category>defense_evasion</category><category>windows</category></item><item><title>UAC Bypass via DiskCleanup Scheduled Task Hijack</title><link>https://feed.craftedsignal.io/briefs/2024-01-uac-bypass-diskcleanup/</link><pubDate>Thu, 04 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-uac-bypass-diskcleanup/</guid><description>Attackers bypass User Account Control (UAC) by hijacking the DiskCleanup Scheduled Task to stealthily execute code with elevated permissions on Windows systems.</description><content:encoded><![CDATA[<p>This rule identifies User Account Control (UAC) bypass attempts via hijacking the DiskCleanup Scheduled Task. Attackers exploit this method to execute code with elevated privileges, bypassing standard security controls. The technique involves leveraging the <code>cleanmgr.exe</code> or <code>taskhostw.exe</code> executables with specific arguments (<code>/autoclean</code> and <code>/d</code>) outside of their expected paths. This allows attackers to run malicious code under the guise of a legitimate system process, making detection more challenging. This technique is used to gain elevated privileges on a compromised system, allowing for further malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., via phishing or exploiting a software vulnerability).</li>
<li>The attacker modifies or creates a scheduled task to execute <code>cleanmgr.exe</code> or <code>taskhostw.exe</code> with the <code>/autoclean</code> and <code>/d</code> arguments.</li>
<li>The modified scheduled task is triggered, executing the specified executable with the supplied arguments.</li>
<li>The executable, such as <code>cleanmgr.exe</code>, attempts to run Disk Cleanup.</li>
<li>If the executable path is outside the standard locations (e.g., <code>C:\\Windows\\System32</code> or <code>C:\\Windows\\SysWOW64</code>), it indicates a potential hijack.</li>
<li>Malicious code is executed with elevated privileges due to the UAC bypass.</li>
<li>The attacker uses these elevated privileges to install malware, modify system settings, or perform other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass User Account Control (UAC) and execute code with elevated privileges. This can lead to the installation of malware, modification of system settings, data theft, and other malicious activities. While the exact number of victims is unknown, this technique is effective on systems where UAC is enabled but misconfigured or vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;UAC Bypass via DiskCleanup with Suspicious Path&rdquo; to your SIEM and tune for your environment to detect UAC bypass attempts.</li>
<li>Deploy the Sigma rule &ldquo;UAC Bypass via DiskCleanup and Taskhostw&rdquo; to your SIEM to detect UAC bypass attempts.</li>
<li>Monitor process creation events for <code>cleanmgr.exe</code> and <code>taskhostw.exe</code> with the <code>/autoclean</code> and <code>/d</code> arguments, focusing on executions outside the standard system directories.</li>
<li>Review and harden scheduled tasks to prevent unauthorized modifications.</li>
<li>Ensure that UAC settings are properly configured and enforced across the organization.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>uac-bypass</category><category>privilege-escalation</category><category>windows</category><category>diskcleanup</category><category>scheduled-task</category></item><item><title>Disable Windows Event and Security Logs Using Built-in Tools</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-windows-logs/</link><pubDate>Thu, 04 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-windows-logs/</guid><description>Attackers attempt to disable Windows Event and Security Logs using logman, PowerShell, or auditpol to evade detection and cover their tracks.</description><content:encoded><![CDATA[<p>Attackers often disable Windows Event and Security Logs to evade detection on compromised systems. This activity involves tampering with, clearing, and deleting event log data to break SIEM detections, cover their tracks, and slow down incident response. The methods employed include using the <code>logman</code> utility, PowerShell commands to disable the EventLog service, or <code>auditpol</code> to disable auditing. These actions are typically performed after initial access and privilege escalation to hinder forensic investigations and maintain persistence within the environment. Defenders should monitor for these specific tools and command-line arguments to identify potential attempts to disable logging.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system, possibly through phishing or exploiting a vulnerability.</li>
<li>The attacker escalates privileges to administrator level to gain the necessary permissions to modify event logging settings.</li>
<li>The attacker uses <code>logman.exe</code> with arguments to stop or delete EventLog traces (e.g., <code>logman.exe stop EventLog-*</code>, <code>logman.exe delete EventLog-*</code>).</li>
<li>Alternatively, the attacker uses PowerShell with <code>Set-Service</code> cmdlet to disable the EventLog service (e.g., <code>powershell.exe Set-Service EventLog -StartupType Disabled</code>).</li>
<li>The attacker can also use <code>auditpol.exe</code> to disable auditing policies, preventing future events from being logged (e.g., <code>auditpol.exe /success:disable</code>).</li>
<li>After disabling logging, the attacker performs malicious activities such as lateral movement, data exfiltration, or malware deployment, with a reduced risk of detection.</li>
<li>The attacker removes traces of their activity from other logs if possible.</li>
<li>The attacker maintains persistence and continues to exploit the compromised environment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of Windows Event and Security Logs can severely hinder incident response and forensic investigations. The absence of log data makes it difficult to detect ongoing malicious activity, understand the scope of the compromise, and attribute the attack. This can lead to prolonged dwell time for attackers, increased data exfiltration, and greater overall damage to the organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Disable Windows Event and Security Logs Using Built-in Tools&rdquo; to your SIEM to detect the execution of <code>logman.exe</code>, PowerShell, and <code>auditpol.exe</code> with specific arguments related to disabling event logs.</li>
<li>Monitor process creation events for <code>logman.exe</code>, <code>powershell.exe</code>, <code>pwsh.exe</code>, <code>powershell_ise.exe</code>, and <code>auditpol.exe</code> with command-line arguments that indicate an attempt to disable event logging.</li>
<li>Enable Sysmon process creation logging to capture detailed command-line arguments for process monitoring.</li>
<li>Regularly review and audit Group Policy settings related to event logging to prevent unauthorized modifications.</li>
<li>Monitor for changes to the EventLog service configuration, including startup type and status, using system monitoring tools.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>eventlog</category></item><item><title>Incoming Execution via PowerShell Remoting</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-powershell-remoting/</link><pubDate>Wed, 03 Jan 2024 18:53:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-powershell-remoting/</guid><description>This rule identifies remote execution via Windows PowerShell remoting, which allows a user to run any Windows PowerShell command on one or more remote computers, potentially indicating lateral movement.</description><content:encoded><![CDATA[<p>This detection identifies potential lateral movement through the exploitation of Windows PowerShell remoting. PowerShell remoting is a feature that enables administrators and attackers to execute commands on remote Windows systems. The detection focuses on identifying incoming network connections on ports 5985 (HTTP) and 5986 (HTTPS), the default ports used for PowerShell Remoting, followed by the execution of processes spawned by <code>wsmprovhost.exe</code>, the Windows Remote Management process host. This activity, when originating from unexpected sources, may indicate unauthorized access and lateral movement within a network. The rule is designed to detect suspicious activity by monitoring network traffic and process execution, flagging potential unauthorized remote executions, and enabling security teams to respond swiftly.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a network, possibly through phishing or exploiting a vulnerability on an internet-facing system.</li>
<li>The attacker leverages PowerShell remoting to initiate a connection to a target system on ports 5985 or 5986.</li>
<li>The target system accepts the incoming PowerShell Remoting connection.</li>
<li>The <code>wsmprovhost.exe</code> process is launched on the target system to facilitate the remote PowerShell session.</li>
<li>The attacker executes commands remotely, spawning child processes from <code>wsmprovhost.exe</code>.</li>
<li>The attacker attempts to escalate privileges or move laterally to other systems within the network using the remote PowerShell session.</li>
<li>The attacker uses tools such as <code>net.exe</code> or <code>PsExec</code> over the remote PowerShell session to further propagate.</li>
<li>The attacker achieves their objective, such as data exfiltration or deploying ransomware, by leveraging the established remote session.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of PowerShell Remoting for lateral movement can lead to widespread compromise within an organization. An attacker could gain control over multiple systems, potentially leading to data breaches, system outages, or ransomware deployment. The number of affected systems could range from a few critical servers to a significant portion of the network, depending on the attacker&rsquo;s objectives and the organization&rsquo;s security posture. The impact could include financial losses, reputational damage, and disruption of business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Incoming Execution via PowerShell Remoting</code> to your SIEM to detect suspicious PowerShell remoting activity and tune for your environment.</li>
<li>Monitor network connections to ports 5985 and 5986, and investigate any unauthorized or unexpected traffic using the <code>network_connection</code> log source.</li>
<li>Investigate processes spawned by <code>wsmprovhost.exe</code> for unusual or malicious activity using the <code>process_creation</code> log source.</li>
<li>Whitelist authorized administrative IP addresses or user accounts that frequently perform remote management tasks, as mentioned in the false positives analysis.</li>
<li>Review and document automated scripts or scheduled tasks that use PowerShell Remoting for system maintenance, then create exceptions for their specific process names or execution paths.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>powershell</category><category>remoting</category></item><item><title>Symbolic Link Creation to Shadow Copies for Credential Access</title><link>https://feed.craftedsignal.io/briefs/2024-01-shadow-copy-symlink/</link><pubDate>Wed, 03 Jan 2024 18:15:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-shadow-copy-symlink/</guid><description>Adversaries may create symbolic links to shadow copies to access sensitive files such as ntds.dit and browser credentials, enabling credential dumping using cmd.exe or powershell.exe.</description><content:encoded><![CDATA[<p>This rule identifies the creation of symbolic links to shadow copies on Windows systems. Attackers use this technique to gain access to sensitive files stored within shadow copies, including the ntds.dit file (containing password hashes), system boot keys, and browser offline credentials. This approach allows them to bypass normal file access controls and extract credentials for lateral movement or privilege escalation. The detection rule is designed to ingest data from various sources, including Elastic Defend, CrowdStrike, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, and Windows Security Event Logs, providing broad coverage across different endpoint security solutions. The activity is typically initiated by command-line tools like cmd.exe or powershell.exe, making detection through process monitoring feasible. This technique is particularly relevant as it targets credential dumping, a critical stage in many attack campaigns.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system, possibly through phishing or exploitation of a vulnerability.</li>
<li>The attacker elevates privileges to gain administrative rights, which are required to create shadow copies and symbolic links.</li>
<li>The attacker creates a volume shadow copy using <code>vssadmin.exe</code> or similar tools.</li>
<li>The attacker uses <code>mklink</code> command or PowerShell <code>New-Item -ItemType SymbolicLink</code> to create a symbolic link to the shadow copy path.</li>
<li>The symbolic link points to a directory within the shadow copy containing sensitive files like <code>ntds.dit</code> or browser credential stores.</li>
<li>The attacker copies the targeted sensitive files (e.g., <code>ntds.dit</code>) from the shadow copy using the symbolic link.</li>
<li>The attacker removes the shadow copy to cover their tracks, although the symbolic link creation remains as evidence.</li>
<li>The attacker extracts credentials from the copied <code>ntds.dit</code> file offline for use in lateral movement or further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to gain unauthorized access to sensitive credentials stored on the compromised system. This can lead to lateral movement within the network, privilege escalation, and ultimately, the compromise of critical assets. If the <code>ntds.dit</code> file is accessed, the entire Active Directory domain could be at risk, potentially affecting thousands of users and systems. This type of attack is particularly damaging as it allows attackers to operate undetected for extended periods while they harvest credentials.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule &ldquo;Symbolic Link to Shadow Copy Created via Cmd&rdquo; to detect the creation of symbolic links to shadow copies via <code>cmd.exe</code> (rules).</li>
<li>Deploy the provided Sigma rule &ldquo;Symbolic Link to Shadow Copy Created via PowerShell&rdquo; to detect the creation of symbolic links to shadow copies via <code>powershell.exe</code> (rules).</li>
<li>Enable Sysmon Event ID 1 (Process Creation) logging to provide necessary data for the Sigma rules to function correctly (setup).</li>
<li>Review the &ldquo;Investigating Symbolic Link to Shadow Copy Created&rdquo; section in the rule&rsquo;s notes for triage and analysis steps when the rule triggers.</li>
<li>Monitor for the usage of <code>mklink</code> command with the <code>HarddiskVolumeShadowCopy</code> argument in process command lines.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>credential-access</category><category>defense-evasion</category><category>windows</category></item><item><title>InstallUtil Process Making Network Connections for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-installutil-network-connection/</link><pubDate>Wed, 03 Jan 2024 18:15:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-installutil-network-connection/</guid><description>Detection of InstallUtil.exe making outbound network connections, which can indicate adversaries leveraging it to execute code and evade detection by proxying execution through a trusted system binary.</description><content:encoded><![CDATA[<p>InstallUtil.exe is a legitimate Windows utility used for installing and uninstalling server resources. Adversaries abuse InstallUtil.exe to execute malicious code under the guise of legitimate processes, often to evade detection. This technique allows attackers to proxy execution through a trusted system binary, potentially bypassing application control and security monitoring. The detection rule identifies suspicious network activity by monitoring InstallUtil.exe&rsquo;s outbound connections, flagging potential misuse by alerting on the initial network connection attempt. This activity is detected via the Elastic EQL rule &ldquo;InstallUtil Process Making Network Connections.&rdquo;</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access through an undisclosed method.</li>
<li>The attacker uses InstallUtil.exe to execute a malicious .NET assembly.</li>
<li>InstallUtil.exe loads the malicious assembly into its process.</li>
<li>The malicious assembly executes code that establishes an outbound network connection.</li>
<li>The connection is used for command and control (C2) or data exfiltration.</li>
<li>The attacker may use the C2 channel to download and execute further payloads.</li>
<li>The attacker performs lateral movement within the network.</li>
<li>The attacker achieves their objective, such as data theft or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution within the context of a trusted Windows process (InstallUtil.exe), bypassing application control and potentially evading detection. This could result in a compromised system, data exfiltration, or further malicious activities within the network. The scope of impact depends on the attacker&rsquo;s objectives and the level of access gained, potentially affecting entire organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging and network connection logging via Sysmon or Elastic Defend to provide the data needed for the rules below.</li>
<li>Deploy the Sigma rule &ldquo;InstallUtil Network Connection&rdquo; to your SIEM and tune for your environment to detect suspicious outbound network connections from InstallUtil.exe.</li>
<li>Investigate any alerts triggered by the Sigma rule by examining the parent process of InstallUtil.exe, destination IP addresses, and associated activities.</li>
<li>Implement network monitoring and alerting for unusual outbound connections from critical systems to enhance detection of similar threats in the future.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>proxy-execution</category><category>windows</category></item><item><title>Browser Process Spawned from an Unusual Parent</title><link>https://feed.craftedsignal.io/briefs/2024-01-browser-unusual-parent/</link><pubDate>Wed, 03 Jan 2024 18:15:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-browser-unusual-parent/</guid><description>Attackers may attempt credential theft by launching browsers (Chrome, Edge) with remote debugging, headless automation, or minimal arguments from an unusual parent process on Windows systems.</description><content:encoded><![CDATA[<p>This detection identifies instances where a browser process, specifically Google Chrome or Microsoft Edge, is initiated from an unexpected parent process on a Windows system. The rule focuses on scenarios where browsers are launched with arguments indicative of remote debugging, headless automation, or minimal user interaction. Such activity can signal an attempt to manipulate a browser session for malicious purposes, potentially leading to credential theft or unauthorized access to sensitive information. The rule is designed to leverage data from Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, Sysmon, and Windows Process Creation Logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker executes a script or command to launch a browser process (chrome.exe or msedge.exe).</li>
<li>The browser is launched with specific command-line arguments, such as <code>--remote-debugging-port</code>, <code>--headless</code>, or <code>--window-position=-x,-y</code>, to enable remote control or hide the browser window.</li>
<li>The parent process of the browser is an unusual executable, not typically associated with launching browsers (e.g., not explorer.exe).</li>
<li>The attacker leverages the remote debugging port to interact with the browser session programmatically.</li>
<li>The attacker attempts to steal credentials or session cookies from the browser.</li>
<li>The attacker uses stolen credentials to access sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the theft of user credentials, enabling unauthorized access to sensitive data and systems. This could result in financial loss, data breaches, and reputational damage for affected organizations. The targeted use of browser manipulation techniques increases the likelihood of bypassing traditional security controls.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Browser Process Spawned from Unusual Parent</code> to your SIEM and tune for your environment.</li>
<li>Enable Sysmon process-creation logging (Event ID 1) to collect the necessary data for the Sigma rule.</li>
<li>Investigate any alerts generated by the <code>Browser Process Spawned from Unusual Parent</code> Sigma rule.</li>
<li>Review process command lines for arguments like <code>--remote-debugging-port</code> or <code>--headless</code> to identify potential browser manipulation attempts.</li>
<li>Monitor network connections originating from browser processes for unexpected destinations, as described in the investigation guide from the source.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>windows</category><category>browser-exploitation</category></item><item><title>Mimikatz MemSSP Log File Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-mimikatz-memssp-log/</link><pubDate>Wed, 03 Jan 2024 17:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-mimikatz-memssp-log/</guid><description>This rule detects the creation of the default Mimikatz MemSSP credential log file, mimilsa.log, which is created after the misc::memssp module injects a malicious Security Support Provider into LSASS, potentially capturing credentials from subsequent logons.</description><content:encoded><![CDATA[<p>This detection identifies the creation of the <code>mimilsa.log</code> file, a default log generated by the Mimikatz <code>misc::memssp</code> module. The <code>misc::memssp</code> module injects a malicious Security Support Provider (SSP) into the Local Security Authority Subsystem Service (LSASS) process. This injected SSP logs credentials from subsequent logons to the compromised host, allowing attackers to capture sensitive information. The creation of this log file is a strong indicator of credential access attempts and the potential compromise of user accounts and system security. This rule is designed for data generated by Elastic Defend and also supports data from CrowdStrike, Microsoft Defender XDR, and SentinelOne Cloud Funnel.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker executes Mimikatz or a similar tool with the <code>misc::memssp</code> module.</li>
<li>Mimikatz injects a malicious SSP library (e.g., <code>mimilib.dll</code>) into the LSASS process (<code>lsass.exe</code>).</li>
<li>The injected SSP hooks into the authentication process.</li>
<li>When users log on to the system, the SSP captures their credentials.</li>
<li>The captured credentials are written to the <code>mimilsa.log</code> file, typically located in <code>C:\Windows\System32\</code>.</li>
<li>The attacker retrieves the <code>mimilsa.log</code> file to obtain the captured credentials.</li>
<li>The attacker uses the stolen credentials to escalate privileges, move laterally within the network, and access sensitive resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Mimikatz MemSSP attack can lead to the compromise of user accounts, including those with administrative privileges. This allows attackers to gain unauthorized access to sensitive data, systems, and resources within the organization. Lateral movement becomes easier, potentially impacting a large number of systems. The compromised credentials can also be used for external attacks, such as gaining access to cloud services or other external resources.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Mimikatz Memssp Log File Detected</code> to your SIEM and tune for your environment.</li>
<li>Enable Sysmon file creation logging to detect the creation of <code>mimilsa.log</code> files.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the process that created the log file and any subsequent file access.</li>
<li>Monitor for the presence of <code>mimilib.dll</code> and any LSA Security Packages registry modifications, as these may indicate persistent SSP installation.</li>
<li>Review and restrict interactive logons to high-value hosts to minimize the potential for credential theft.</li>
<li>Investigate related alerts for the same <code>host.id</code> in the last 48 hours covering delivery, privilege escalation, LSASS access, persistence, lateral movement, or additional credential access.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>mimikatz</category><category>memssp</category><category>windows</category></item><item><title>Windows Subsystem for Linux Distribution Installed via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-wsl-registry-modification/</link><pubDate>Wed, 03 Jan 2024 16:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wsl-registry-modification/</guid><description>This rule detects registry modifications indicative of a new Windows Subsystem for Linux (WSL) distribution installation, a technique adversaries may leverage to evade detection by utilizing Linux environments within Windows.</description><content:encoded><![CDATA[<p>Attackers may leverage the Windows Subsystem for Linux (WSL) to evade detection by operating within a Linux environment on a Windows host. The installation of a new WSL distribution involves specific registry modifications. This rule identifies such modifications, providing an alert when a new WSL distribution is installed. This is important for defenders as it could signal an attacker setting up a persistent and potentially hidden environment for malicious activities. WSL allows attackers to utilize Linux tools and techniques on a Windows system, potentially bypassing traditional Windows-based security measures.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to the Windows system through existing vulnerabilities or compromised credentials.</li>
<li>Privilege Escalation: The attacker elevates their privileges to perform system-level changes, including registry modifications.</li>
<li>WSL Installation: The attacker initiates the installation of a WSL distribution. This may involve downloading and executing a WSL installer package.</li>
<li>Registry Modification: During installation, the system modifies the registry to configure and register the new WSL distribution. Specifically, keys under <code>HKLM\\SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\Lxss\\</code> are created/modified.</li>
<li>WSL Environment Setup: The attacker configures the installed WSL distribution, potentially installing additional tools and software needed for their objectives.</li>
<li>Execution of Malicious Activities: The attacker executes malicious commands and scripts within the WSL environment, leveraging Linux tools to perform actions such as lateral movement, data exfiltration, or persistence.</li>
<li>Defense Evasion: The attacker utilizes WSL to evade detection, as traditional Windows-based security tools may not effectively monitor or analyze activity within the Linux subsystem.</li>
<li>Persistence: The attacker establishes persistence within the WSL environment, ensuring continued access to the compromised system even after reboots or security updates.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to establish a hidden and persistent environment within the compromised Windows system. This can lead to data theft, system compromise, and further propagation of the attack within the network. The number of victims and affected sectors depends on the scope and objectives of the attacker. The use of WSL for malicious purposes can significantly complicate incident response and remediation efforts.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect WSL Installation via Registry Modification&rdquo; to your SIEM to detect new WSL installations by monitoring registry changes.</li>
<li>Enable Sysmon registry event logging to capture the necessary data for the Sigma rule to function correctly (see setup instructions in the rule description).</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the WSL installation and identify potential malicious activities.</li>
<li>Monitor for execution of suspicious processes within WSL environments, as described in &ldquo;Execution via Windows Subsystem for Linux - db7dbad5-08d2-4d25-b9b1-d3a1e4a15efd&rdquo;.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wsl</category><category>defense-evasion</category><category>windows</category></item><item><title>Detection of Bcdedit Boot Configuration Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-bcdedit-boot-config-modification/</link><pubDate>Wed, 03 Jan 2024 15:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-bcdedit-boot-config-modification/</guid><description>This rule identifies the use of bcdedit.exe to modify boot configuration data, which may be indicative of a destructive attack or ransomware activity aimed at inhibiting system recovery by disabling error recovery or ignoring boot failures.</description><content:encoded><![CDATA[<p>This detection rule identifies the execution of <code>bcdedit.exe</code> with specific arguments that modify the boot configuration data (BCD) store in Windows systems. Attackers or malware may use this technique to disable Windows Error Recovery (<code>recoveryenabled</code>) or to ignore errors during the boot process (<code>bootstatuspolicy ignoreallfailures</code>). These modifications are often performed to prevent systems from recovering properly after an attack, particularly in ransomware scenarios. The rule is designed to work with data from Elastic Defend, CrowdStrike, Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon. The detection logic focuses on process execution events that include the relevant <code>bcdedit.exe</code> command-line arguments. Defenders should be aware of legitimate uses of <code>bcdedit.exe</code> by administrators for troubleshooting or data recovery purposes, so context is crucial.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to the system through various means, such as phishing or exploiting a vulnerability.</li>
<li>Privilege Escalation: The attacker escalates privileges to gain administrative access, required to modify boot configuration settings.</li>
<li>Reconnaissance: The attacker performs reconnaissance to identify the system&rsquo;s configuration and identify appropriate targets for modification.</li>
<li>Disable Recovery: The attacker uses <code>bcdedit.exe</code> to disable Windows Error Recovery using the <code>/set {default} recoveryenabled No</code> command.</li>
<li>Ignore Boot Failures: The attacker uses <code>bcdedit.exe</code> to set the boot status policy to ignore all failures using the <code>/set {default} bootstatuspolicy ignoreallfailures</code> command.</li>
<li>System Impact: By modifying the boot configuration, the attacker inhibits system recovery, making it harder for the system to recover from errors or malicious activity.</li>
<li>Payload Execution: The attacker deploys and executes the primary malicious payload, such as ransomware, leveraging the modified boot configuration to maximize impact.</li>
<li>Final Objective: The attacker achieves their final objective, which could include data encryption, data theft, or system disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of boot configuration data can lead to significant system instability and data loss. In ransomware attacks, this technique prevents the system from recovering, increasing the likelihood of the victim paying the ransom. While the exact number of affected organizations is unknown, this technique is widely used in ransomware campaigns and can affect any Windows system if successfully executed.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Modification of Boot Configuration&rdquo; Sigma rule to your SIEM and tune for your environment to detect the malicious use of <code>bcdedit.exe</code> described in this brief.</li>
<li>Enable Sysmon process creation logging to capture <code>bcdedit.exe</code> executions and their command-line arguments (Sysmon Event ID 1).</li>
<li>Investigate any detected instances of <code>bcdedit.exe</code> modifying boot configuration settings to determine legitimacy, as described in the rule&rsquo;s &ldquo;Triage and analysis&rdquo; section.</li>
<li>Monitor process execution logs for unexpected processes running <code>bcdedit.exe</code> with arguments related to disabling recovery or ignoring boot failures.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>boot-configuration</category><category>bcdedit</category><category>impact</category><category>windows</category></item><item><title>Windows Backup Deletion via Wbadmin</title><link>https://feed.craftedsignal.io/briefs/2024-01-wbadmin-backup-deletion/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wbadmin-backup-deletion/</guid><description>Adversaries may delete Windows backup catalogs and system state backups using wbadmin.exe to inhibit system recovery, often as part of ransomware or other destructive attacks.</description><content:encoded><![CDATA[<p>Attackers, including ransomware groups, often attempt to remove or impair an organization&rsquo;s ability to recover from an attack. One method to achieve this is by deleting Windows backup catalogs and system state backups using the <code>wbadmin.exe</code> utility. Windows Server Backup stores details about backups (what volumes are backed up and where the backups are located) in a backup catalog. Removing these catalogs renders backups unusable for recovery, increasing the impact of the attack. This technique is frequently observed in ransomware playbooks and other destructive attacks targeting Windows environments. This activity can be detected using endpoint detection and response (EDR) solutions, Windows Security Event Logs, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system via phishing, exploiting a vulnerability, or using compromised credentials.</li>
<li>The attacker escalates privileges to administrator level to execute wbadmin.exe.</li>
<li>The attacker executes <code>wbadmin.exe</code> with the <code>delete catalog</code> command to remove backup catalogs.</li>
<li>The attacker executes <code>wbadmin.exe</code> with the <code>delete systemstatebackup</code> command to remove system state backups.</li>
<li>The attacker may also delete shadow copies using <code>vssadmin.exe</code> or <code>wmic.exe</code> to further hinder recovery.</li>
<li>The attacker deploys ransomware or initiates other destructive actions.</li>
<li>The attacker encrypts or destroys data on the system and connected network shares.</li>
<li>The attacker demands a ransom payment for data recovery, which is complicated by the deleted backups.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful deletion of backup catalogs and system state backups significantly impairs an organization&rsquo;s ability to recover from a ransomware attack or other destructive event. This can lead to prolonged downtime, data loss, and financial losses associated with incident response and recovery efforts. While the number of direct victims of this specific technique is difficult to quantify, the impact is typically observed in conjunction with broader ransomware campaigns affecting organizations across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging with Event ID 1 to capture <code>wbadmin.exe</code> executions and activate the first Sigma rule.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
<li>Monitor Windows Security Event Logs for process creation events related to <code>wbadmin.exe</code>.</li>
<li>Investigate any instances of <code>wbadmin.exe</code> executing with <code>delete</code> arguments.</li>
<li>Review and harden account access controls to prevent unauthorized use of <code>wbadmin.exe</code>.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>impact</category><category>backup-deletion</category><category>windows</category></item><item><title>Suspicious Enumeration Commands Spawned via WMIPrvSE</title><link>https://feed.craftedsignal.io/briefs/2024-01-wmiprvse-enumeration/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wmiprvse-enumeration/</guid><description>This rule detects suspicious execution of system enumeration commands by the Windows Management Instrumentation Provider Service (WMIPrvSE), indicating potential reconnaissance or malicious activity on Windows systems.</description><content:encoded><![CDATA[<p>Attackers can leverage the Windows Management Instrumentation (WMI) to execute commands for reconnaissance and enumeration within a compromised system. This involves spawning native Windows tools via the WMI Provider Service (WMIPrvSE). This activity is often used to gather system and network information in a stealthy manner, which could be part of a larger attack, such as lateral movement or privilege escalation. This behavior matters because it allows adversaries to gather information about the target environment without using easily detectable methods, potentially leading to further compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a Windows system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker uses WMI to execute a reconnaissance command.</li>
<li>WMIPrvSE.exe is invoked to execute the attacker&rsquo;s specified command.</li>
<li>The attacker executes commands such as <code>ipconfig.exe</code>, <code>net.exe</code>, or <code>systeminfo.exe</code> via WMIPrvSE.exe to gather network configuration details, user information, and system information.</li>
<li>The enumerated information is collected and potentially exfiltrated to a command and control server.</li>
<li>The attacker uses the gathered information to identify further targets within the network.</li>
<li>The attacker moves laterally to other systems using stolen credentials or exploited vulnerabilities.</li>
<li>The attacker achieves their final objective, such as data exfiltration, ransomware deployment, or persistent access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of enumeration commands via WMIPrvSE allows attackers to gather sensitive information about the system and network environment. This information can be used to facilitate lateral movement, privilege escalation, and data theft, potentially leading to significant financial loss, reputational damage, and disruption of business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging to capture the execution of enumeration commands (Data Source: Sysmon).</li>
<li>Deploy the Sigma rule &ldquo;Enumeration Command Spawned via WMIPrvSE&rdquo; to your SIEM to detect suspicious WMIPrvSE activity (Sigma rule).</li>
<li>Investigate any instances of WMIPrvSE spawning common enumeration tools such as <code>net.exe</code>, <code>ipconfig.exe</code>, or <code>systeminfo.exe</code> (Sigma rule).</li>
<li>Implement network segmentation to limit the scope of potential lateral movement following successful enumeration (Attack Chain).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>enumeration</category><category>wmi</category><category>discovery</category><category>execution</category><category>windows</category></item><item><title>Suspicious Antimalware Scan Interface DLL Creation</title><link>https://feed.craftedsignal.io/briefs/2024-01-amsi-dll-hijack/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-amsi-dll-hijack/</guid><description>An adversary may attempt to bypass AMSI by creating a rogue AMSI DLL in an unusual location to evade detection.</description><content:encoded><![CDATA[<p>The Antimalware Scan Interface (AMSI) is a Windows interface that allows applications and services to integrate with antimalware products. Attackers may attempt to bypass AMSI to execute malicious code without detection. This detection identifies the creation of the AMSI DLL (<code>amsi.dll</code>) in unusual locations, which is a common technique used to load a rogue AMSI module instead of the legitimate one. This technique can be used to evade detection by security products that rely on AMSI for scanning potentially malicious scripts and code. The rule is designed to work with data from Winlogbeat, Elastic Endpoint, Sysmon, Endgame, SentinelOne Cloud Funnel, Microsoft Defender XDR, and Crowdstrike.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means (e.g., phishing, exploit).</li>
<li>The attacker determines the location of the legitimate <code>amsi.dll</code> file.</li>
<li>The attacker identifies a writable directory where a malicious <code>amsi.dll</code> can be placed. This location must be in the search order of applications that use AMSI, such as PowerShell or other scripting hosts.</li>
<li>The attacker copies or creates a malicious <code>amsi.dll</code> in the identified location. This rogue DLL is designed to bypass or disable AMSI functionality.</li>
<li>A process like PowerShell or another scripting host is launched. Because the malicious <code>amsi.dll</code> is in a higher-priority directory, it is loaded instead of the legitimate AMSI library.</li>
<li>The launched process executes malicious code (e.g., PowerShell script).</li>
<li>Because the rogue <code>amsi.dll</code> is loaded, AMSI scans are bypassed, allowing the malicious code to execute without detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful AMSI bypass can allow attackers to execute malicious code, such as malware, scripts, or exploits, without detection by antimalware products. This can lead to system compromise, data theft, or other malicious activities. The impact can range from a single compromised endpoint to a wider breach of an organization&rsquo;s network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable file creation monitoring with Sysmon or Elastic Defend to detect the creation of files, specifically DLLs, in unusual locations.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Antimalware Scan Interface DLL Creation&rdquo; to your SIEM to detect the creation of <code>amsi.dll</code> in non-standard paths. Tune the rule for your environment.</li>
<li>Investigate any alerts generated by the Sigma rule by examining the parent process, file path, and user context to determine if the activity is malicious.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>amsi-bypass</category><category>dll-hijacking</category><category>windows</category></item><item><title>Script Execution via Microsoft HTML Application</title><link>https://feed.craftedsignal.io/briefs/2024-01-script-execution-via-html-app/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-script-execution-via-html-app/</guid><description>Detects the execution of scripts via HTML applications using Windows utilities rundll32.exe or mshta.exe to bypass defenses by proxying execution of malicious content with signed binaries.</description><content:encoded><![CDATA[<p>This detection identifies the execution of scripts via HTML applications, leveraging Windows utilities like <code>rundll32.exe</code> or <code>mshta.exe</code>. Attackers often use this method to bypass process and signature-based defenses by proxying the execution of malicious content through legitimate, signed binaries. The detection focuses on specific command-line arguments and patterns associated with this technique, while also excluding known legitimate uses by applications such as Citrix System32 (<code>wfshell.exe</code>), Microsoft Access (<code>MSACCESS.EXE</code>), and Quokka.Works (<code>GTInstaller.exe</code>). This technique is used by attackers to execute malicious scripts without directly running them, thus evading traditional security measures. The detection rule analyzes process names, command-line arguments, parent processes, and file paths to identify potentially malicious activity indicative of defense evasion.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access through various means (e.g., phishing, drive-by download).</li>
<li>The attacker leverages a malicious HTML application (HTA) file or a scriptlet (SCT) file.</li>
<li>The attacker uses <code>mshta.exe</code> or <code>rundll32.exe</code> to execute the malicious HTA or SCT file. The command line includes obfuscated or encoded script content.</li>
<li><code>mshta.exe</code> or <code>rundll32.exe</code> process spawns a child process, such as <code>cmd.exe</code> or <code>powershell.exe</code>, to execute further commands.</li>
<li>The spawned process executes malicious code, such as downloading and executing a payload.</li>
<li>The attacker achieves persistence by modifying registry keys or creating scheduled tasks.</li>
<li>The attacker performs lateral movement by exploiting vulnerabilities or using stolen credentials.</li>
<li>The final objective is achieved, such as data exfiltration, ransomware deployment, or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to arbitrary code execution, allowing attackers to compromise the system, steal sensitive data, deploy ransomware, or establish a persistent foothold. Due to the nature of the technique, it can bypass many traditional security measures. The wide adoption of Windows and the inherent trust placed in signed binaries makes this a potent evasion technique. Failure to detect and prevent this attack can lead to significant financial and reputational damage for the targeted organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Script Execution via Microsoft HTML Application&rdquo; to your SIEM to detect suspicious <code>mshta.exe</code> and <code>rundll32.exe</code> executions. Tune the rule by adding exceptions for known legitimate uses in your environment.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to ensure the visibility required for the Sigma rules to function correctly.</li>
<li>Monitor process command lines for suspicious arguments like &ldquo;script:eval&rdquo;, &ldquo;WScript.Shell&rdquo;, and &ldquo;mshta http&rdquo; which are indicative of this technique.</li>
<li>Implement application control policies to restrict the execution of <code>mshta.exe</code> and <code>rundll32.exe</code> where they are not required for legitimate business purposes.</li>
<li>Investigate and block any identified malicious HTA files or scriptlet URLs found in the command lines of detected processes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>script-execution</category><category>windows</category></item><item><title>Conhost Proxy Execution for Defense Evasion</title><link>https://feed.craftedsignal.io/briefs/2024-01-conhost-proxy-exec/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-conhost-proxy-exec/</guid><description>Adversaries abuse the Console Window Host (conhost.exe) with the `--headless` argument to proxy execution of malicious commands, evading detection by blending in with legitimate Windows software.</description><content:encoded><![CDATA[<p>Attackers are leveraging the Console Window Host (conhost.exe) to proxy execution of commands, using the <code>--headless</code> argument to hide malicious activity. This technique allows adversaries to blend in with legitimate Windows processes, making detection more challenging. This behavior, often associated with defense evasion, involves using conhost.exe to execute commands such as PowerShell, cmd.exe, mshta, curl, and scripts. The activity can be seen across multiple environments including endpoints, Windows systems, and cloud platforms like Microsoft Defender XDR and SentinelOne. Defenders must differentiate between legitimate uses of conhost.exe, such as those by Winget-AutoUpdate or OpenSSH, and malicious proxy executions, which could indicate broader compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system, possibly through phishing or exploiting a vulnerability.</li>
<li>The attacker executes a command that calls conhost.exe with the <code>--headless</code> argument.</li>
<li>Conhost.exe is used to proxy the execution of a malicious command, such as PowerShell, cmd.exe, or mshta.</li>
<li>The proxied command downloads a malicious payload from a remote server using tools like curl or bitsadmin.</li>
<li>The downloaded payload is executed, establishing persistence on the compromised system.</li>
<li>The attacker uses the compromised system to move laterally within the network, compromising additional systems.</li>
<li>Sensitive data is exfiltrated from the network to a remote server controlled by the attacker.</li>
<li>The attacker achieves their final objective, such as deploying ransomware or stealing intellectual property.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to a complete compromise of the targeted system and potentially the entire network. This can result in data theft, financial loss, and reputational damage. The use of <code>conhost.exe</code> for proxy execution makes it difficult to detect malicious activity, potentially allowing attackers to remain undetected for extended periods. The impact could range from individual workstation compromises to large-scale network breaches, affecting potentially hundreds or thousands of systems within an organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Proxy Execution via Console Window Host&rdquo; Sigma rule to your SIEM and tune for your environment to detect suspicious <code>conhost.exe</code> activity.</li>
<li>Monitor process creation events for <code>conhost.exe</code> with the <code>--headless</code> argument, focusing on the command-line arguments to identify potentially malicious commands.</li>
<li>Investigate any instances of <code>conhost.exe</code> executing suspicious scripts, downloaders, or task scheduler modifications to identify potential threats.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture detailed process execution information, as recommended in the setup instructions linked in the overview.</li>
<li>Review the investigation fields in the brief to understand the key data points for analyzing potential proxy execution attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>proxy-execution</category><category>windows</category></item><item><title>Windows Firewall Disabled via Netsh</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-windows-firewall-rules/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-windows-firewall-rules/</guid><description>Detection of adversaries disabling Windows Firewall rules using the `netsh.exe` command-line tool to weaken defenses and facilitate unauthorized network activity.</description><content:encoded><![CDATA[<p>Attackers commonly use the <code>netsh.exe</code> utility, a command-line scripting tool, to manage network configurations. Abusers leverage <code>netsh.exe</code> to disable or modify Windows Firewall rules, a built-in host-based firewall. This manipulation weakens the system&rsquo;s defenses, allowing unauthorized network traffic and enabling lateral movement within the compromised environment. The activity allows for command and control communications and unhindered exploitation of internal resources. Defenders must monitor <code>netsh.exe</code> executions for unexpected firewall modifications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a Windows system through various means such as phishing or exploiting a vulnerability.</li>
<li>Privilege Escalation: The attacker escalates privileges to a level sufficient to modify firewall settings.</li>
<li>Discovery: The attacker uses reconnaissance techniques to identify existing firewall rules.</li>
<li>Defense Evasion: The attacker uses <code>netsh.exe</code> to disable specific firewall rules, using commands like <code>netsh advfirewall firewall set rule name=&quot;rule_name&quot; new enable=no</code>.</li>
<li>Defense Evasion: Alternatively, the attacker disables the entire firewall using <code>netsh advfirewall set allprofiles state off</code>.</li>
<li>Lateral Movement: With the firewall weakened, the attacker moves laterally to other systems on the network.</li>
<li>Command and Control: The attacker establishes command and control channels, which may now be unimpeded by firewall rules.</li>
<li>Impact: The attacker achieves their objectives, such as data exfiltration, ransomware deployment, or further compromise of the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of Windows Firewall rules can lead to significant security breaches. Attackers can move laterally within the network, compromise additional systems, and exfiltrate sensitive data. The impact can range from data loss and financial damage to reputational harm and legal consequences. The defense evasion enables attackers to establish persistent command and control channels, maintain a long-term presence within the compromised environment and conduct further malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging to monitor <code>netsh.exe</code> executions and related command-line arguments to support detections.</li>
<li>Deploy the Sigma rules in this brief to your SIEM to detect attempts to disable Windows Firewall rules via <code>netsh.exe</code>. Tune the rules for your specific environment.</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on identifying the user account, process execution chain, and the specific firewall rules being modified.</li>
<li>Implement strict access controls to limit the number of users with the privileges necessary to modify firewall settings.</li>
<li>Regularly review and audit firewall configurations to ensure they are properly configured and have not been tampered with.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>firewall</category></item><item><title>Suspicious PowerShell Execution via Windows Script Host</title><link>https://feed.craftedsignal.io/briefs/2024-01-script-powershell-execution/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-script-powershell-execution/</guid><description>Detection of PowerShell processes launched by cscript.exe or wscript.exe, indicative of potential malicious initial access or execution attempts.</description><content:encoded><![CDATA[<p>This detection identifies PowerShell execution initiated by Windows Script Host processes (cscript.exe or wscript.exe). Attackers often use Windows Script Host (WSH) to execute malicious scripts as an initial access method. These scripts can act as droppers for second-stage payloads or download tools and utilities necessary for further compromise. The rule focuses on the parent-child process relationship between WSH and PowerShell, highlighting a common technique used to bypass security controls and execute arbitrary commands on a compromised system. This activity is relevant to defenders as it represents a potential entry point for various attacks, including malware deployment and data exfiltration. The detection logic is based on process execution events observed in Windows environments and is designed to work with data from Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The user receives a phishing email with a malicious attachment (e.g., a .vbs or .js file).</li>
<li>The user opens the attachment, which is processed by either wscript.exe or cscript.exe.</li>
<li>The scripting engine executes the embedded malicious code.</li>
<li>The script downloads a PowerShell script from a remote server or contains an embedded, obfuscated PowerShell command.</li>
<li>The script uses wscript.exe or cscript.exe to launch powershell.exe to execute the downloaded or embedded PowerShell script.</li>
<li>PowerShell executes, performing malicious actions such as downloading additional payloads, modifying system settings, or establishing persistence.</li>
<li>PowerShell attempts to connect to external command-and-control servers to receive further instructions.</li>
<li>The attacker gains initial access to the system and can proceed with lateral movement, data exfiltration, or other malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to initial access, allowing attackers to deploy malware, steal sensitive information, or perform other malicious activities. The impact can range from data breaches and financial losses to reputational damage. The severity depends on the attacker&rsquo;s objectives and the level of access they gain. The number of affected systems depends on the scope of the phishing campaign or other initial access methods used to deliver the malicious script.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging to capture the necessary event data for the rules below.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
<li>Investigate process execution chains where cscript.exe or wscript.exe spawn powershell.exe using the provided Sigma rules.</li>
<li>Implement email security measures to block phishing emails with script attachments.</li>
<li>Monitor network connections originating from PowerShell processes for suspicious outbound traffic.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>initial-access</category><category>execution</category><category>windows</category><category>powershell</category><category>script</category></item><item><title>Proxy Execution via Windows OpenSSH Client</title><link>https://feed.craftedsignal.io/briefs/2024-01-openssh-proxy-execution/</link><pubDate>Wed, 03 Jan 2024 14:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-openssh-proxy-execution/</guid><description>Detection of command execution via proxy using the Windows OpenSSH client (ssh.exe or sftp.exe) to bypass application control using trusted Windows binaries.</description><content:encoded><![CDATA[<p>This detection identifies attempts to execute commands through a proxy using the Windows OpenSSH client (ssh.exe or sftp.exe). Attackers may abuse this behavior to evade application control policies by leveraging the trusted Windows OpenSSH binaries. The technique involves using the <code>ProxyCommand</code> or <code>LocalCommand</code> options with the OpenSSH client to execute arbitrary commands on the target system. The rule focuses on detecting command lines containing potentially malicious commands such as PowerShell, schtasks, mshta, msiexec, cmd, or script execution, indicating a possible attempt to bypass security measures. The detection logic is applicable to Windows systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system.</li>
<li>The attacker executes the Windows OpenSSH client (ssh.exe or sftp.exe) with either the <code>ProxyCommand</code> or <code>LocalCommand</code> option.</li>
<li>The <code>ProxyCommand</code> or <code>LocalCommand</code> parameter specifies a command to be executed locally on the system.</li>
<li>The command includes potentially malicious payloads such as PowerShell commands, scheduled tasks manipulation (schtasks), or execution of other LOLBINs (Living Off the Land Binaries) like mshta or msiexec.</li>
<li>The OpenSSH client executes the specified command.</li>
<li>The malicious command performs actions such as downloading and executing additional payloads, creating scheduled tasks for persistence, or executing arbitrary code.</li>
<li>The attacker achieves their objectives, such as gaining further access to the system, escalating privileges, or deploying malware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to a complete compromise of the affected system. Attackers can bypass application control mechanisms, execute arbitrary code, and establish persistence. This can result in data theft, system disruption, or further propagation of the attack within the network. The severity of the impact depends on the privileges of the account running the OpenSSH client and the specific actions performed by the malicious commands.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line details to capture the execution of ssh.exe and sftp.exe with malicious parameters.</li>
<li>Deploy the Sigma rule <code>Proxy Execution via Windows OpenSSH</code> to your SIEM to detect suspicious OpenSSH client executions with malicious commands in the command line.</li>
<li>Monitor for the creation of child processes from ssh.exe or sftp.exe, as this can indicate the execution of malicious commands specified in the <code>ProxyCommand</code> or <code>LocalCommand</code> options.</li>
<li>Review and restrict the usage of <code>PermitLocalCommand</code> in OpenSSH server configurations to prevent attackers from executing commands locally on the system after a connection is established.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>proxy-execution</category><category>openssh</category><category>application-control-bypass</category></item><item><title>Windows User Account Creation via Net.exe</title><link>https://feed.craftedsignal.io/briefs/2024-01-user-account-creation/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-user-account-creation/</guid><description>This rule identifies attempts to create new users on Windows systems using net.exe, a common tactic used by attackers to increase access or establish persistence.</description><content:encoded><![CDATA[<p>Attackers may create new accounts (both local and domain) to maintain access to victim systems. This rule identifies the usage of <code>net.exe</code> to create new accounts on Windows systems. The detection logic focuses on process execution events where <code>net.exe</code> or <code>net1.exe</code> are executed with arguments indicative of user creation, specifically the &lsquo;user&rsquo; argument in conjunction with either the &lsquo;/ad&rsquo; or &lsquo;/add&rsquo; flags. While account creation is a common administrative task, suspicious executions, especially those initiated by unusual parent processes or accounts, warrant further investigation. This rule is designed for data generated by Elastic Defend but also supports third-party data sources like CrowdStrike, Microsoft Defender XDR, and SentinelOne Cloud Funnel, enhancing its applicability across various security environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means, such as exploiting a vulnerability or using stolen credentials.</li>
<li>The attacker opens a command prompt or PowerShell session.</li>
<li>The attacker uses <code>net.exe</code> or <code>net1.exe</code> to create a new user account. The command includes the <code>user</code> argument along with <code>/add</code> or <code>/ad</code> flags. For example: <code>net user &lt;username&gt; &lt;password&gt; /add</code>.</li>
<li>The attacker may add the newly created user to privileged groups, such as <code>Administrators</code> or <code>Domain Admins</code>, to elevate privileges.</li>
<li>The attacker uses the new account to move laterally within the network, accessing sensitive data or systems.</li>
<li>The attacker establishes persistence by configuring the new account to be a service account or adding it to local administrator groups.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized access to sensitive data, lateral movement within the network, and long-term persistence on compromised systems. The impact is often determined by the privileges assigned to the newly created account. If the attacker adds the account to the <code>Administrators</code> group, they can effectively take full control of the affected system. In a domain environment, creating a domain account can lead to wider compromise across the entire network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process-creation logging to capture the necessary events for the rules below.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
<li>Investigate any instances of <code>net.exe</code> or <code>net1.exe</code> creating user accounts, especially when initiated by unusual parent processes.</li>
<li>Monitor for newly created accounts being added to privileged groups.</li>
<li>Review the triage and analysis steps in the rule&rsquo;s original documentation for guidance on investigating and responding to potential incidents.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>user-account-creation</category><category>windows</category></item><item><title>Unusual Network Connection via DllHost</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-dllhost-network-connection/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-dllhost-network-connection/</guid><description>The rule identifies unusual instances of dllhost.exe making outbound network connections to non-local IPs, which may indicate adversarial Command and Control activity and defense evasion.</description><content:encoded><![CDATA[<p>The detection rule identifies unusual instances of dllhost.exe making outbound network connections, which may indicate adversarial command and control activity. Dllhost.exe is a legitimate Windows process used to host DLL services. Adversaries may exploit it for stealthy command and control by initiating unauthorized network connections to non-local IPs. This approach helps in identifying potential threats by focusing on unusual network behaviors associated with this process. The rule aims to detect activity related to defense evasion, where adversaries use system binaries to proxy execution. The detection logic relies on identifying dllhost.exe processes initiating network connections to destinations outside of commonly used private IP ranges.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system (e.g., via phishing or exploitation).</li>
<li>The attacker executes a malicious DLL file on the compromised system.</li>
<li>The attacker uses dllhost.exe to host and execute the malicious DLL.</li>
<li>The malicious DLL initiates a network connection to an external IP address, bypassing traditional process-based network monitoring.</li>
<li>The attacker establishes a command and control (C2) channel via the dllhost.exe process.</li>
<li>The attacker uses the C2 channel to send commands and receive data from the compromised system.</li>
<li>The attacker performs lateral movement within the network.</li>
<li>The attacker exfiltrates sensitive data from the compromised network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the establishment of a covert command and control channel, allowing attackers to remotely control the compromised system. This can result in data theft, further compromise of the network, and potential financial loss. The references point to APT29 activity, suggesting sophisticated actors may leverage this technique.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation (Event ID 1) and network connection (Event ID 3) logging to enhance visibility of process execution and network activity (<a href="https://ela.st/sysmon-event-1-setup">https://ela.st/sysmon-event-1-setup</a>, <a href="https://ela.st/sysmon-event-3-setup">https://ela.st/sysmon-event-3-setup</a>).</li>
<li>Deploy the Sigma rule <code>Unusual Network Connection via DllHost</code> to your SIEM to detect suspicious outbound connections from dllhost.exe.</li>
<li>Investigate and whitelist legitimate software updates or enterprise applications that use dllhost.exe for network communications to reduce false positives, as described in the rule&rsquo;s analysis notes.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>command-and-control</category><category>windows</category></item><item><title>Suspicious Execution via Microsoft Office Add-Ins</title><link>https://feed.craftedsignal.io/briefs/2024-01-office-addins/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-office-addins/</guid><description>This rule detects suspicious execution of Microsoft Office applications launching Office Add-Ins from unusual paths or with atypical parent processes, potentially indicating an attempt to gain initial access via a malicious phishing campaign.</description><content:encoded><![CDATA[<p>Attackers are increasingly leveraging malicious Microsoft Office Add-Ins to gain initial access and persistence on victim systems. These add-ins, often delivered through phishing campaigns, contain embedded malicious code. This detection identifies unusual execution patterns, such as Office applications (WINWORD.EXE, EXCEL.EXE, POWERPNT.EXE, MSACCESS.EXE, VSTOInstaller.exe) launching add-ins (wll, xll, ppa, ppam, xla, xlam, vsto) from suspicious paths like Temp or Downloads directories, or with atypical parent processes (explorer.exe, OpenWith.exe, cmd.exe, powershell.exe). The detection logic filters out known benign activities to minimize false positives, focusing on anomalies indicative of malicious intent, such as installations of Logitech software. This activity matters because successful exploitation can lead to arbitrary code execution, data theft, and further compromise of the victim&rsquo;s network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user receives a phishing email containing a malicious Microsoft Office document.</li>
<li>The user opens the document, which prompts them to enable macros or install an add-in.</li>
<li>The malicious add-in (wll, xll, ppa, ppam, xla, xlam, vsto) is downloaded from a remote server or dropped into a suspicious directory, such as %TEMP% or %APPDATA%.</li>
<li>The user executes an Office application (WINWORD.EXE, EXCEL.EXE, POWERPNT.EXE, MSACCESS.EXE), which loads the malicious add-in.</li>
<li>The malicious add-in executes arbitrary code, potentially downloading and executing a second-stage payload.</li>
<li>The add-in may establish persistence by modifying registry keys or creating scheduled tasks.</li>
<li>The attacker gains initial access to the system and can perform reconnaissance, lateral movement, and data exfiltration.</li>
<li>The attacker achieves their objective, which could include data theft, ransomware deployment, or intellectual property theft.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to complete system compromise, data theft, and potential ransomware deployment. Organizations across all sectors are at risk, particularly those with a high volume of email traffic. The use of malicious Office Add-Ins provides attackers with a persistent foothold within the victim&rsquo;s environment, allowing for long-term data collection and disruption of business operations. This can lead to significant financial losses, reputational damage, and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Office Add-In Loaded From Suspicious Path</code> to detect add-ins loaded from temporary or download directories based on <code>process.args</code> and <code>process.name</code>.</li>
<li>Deploy the Sigma rule <code>Office Add-In Loaded By Suspicious Parent</code> to detect add-ins loaded by <code>cmd.exe</code> or <code>powershell.exe</code> based on <code>process.parent.name</code>.</li>
<li>Investigate any instances of <code>VSTOInstaller.exe</code> executing with the <code>/Uninstall</code> argument, as this may indicate suspicious activity, correlating with the exclusion rule in the provided query.</li>
<li>Monitor for Office applications launching add-ins with parent processes of <code>explorer.exe</code> or <code>OpenWith.exe</code> using process creation logs and the provided query logic.</li>
<li>Implement stricter email filtering to prevent phishing emails containing malicious Office documents from reaching end-users.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>office-addins</category><category>phishing</category><category>initial-access</category></item><item><title>Potential RemoteMonologue Attack via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-remotemonologue-regmod/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-remotemonologue-regmod/</guid><description>This rule detects potential RemoteMonologue attacks by identifying attempts to perform session hijacking via COM object registry modification, specifically when the RunAs value is set to Interactive User.</description><content:encoded><![CDATA[<p>The RemoteMonologue attack technique abuses Component Object Model (COM) objects to coerce authentication from a remote system. This is achieved by modifying the <code>RunAs</code> registry value associated with a COM object. Setting this value to &ldquo;Interactive User&rdquo; forces the COM object to run under the context of the interactive user, enabling attackers to hijack sessions and potentially escalate privileges. This technique is often used as a defense evasion or persistence mechanism by adversaries after gaining initial access to a system. The attack involves modifying registry keys associated with COM objects to trigger NTLM authentication coercion. This can be used for lateral movement and gaining access to sensitive resources. This rule is designed to detect registry modifications indicative of the RemoteMonologue attack.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to the target system through unspecified means.</li>
<li>Identify COM Objects: The attacker identifies suitable COM objects for abuse.</li>
<li>Modify Registry: The attacker modifies the registry to set the <code>RunAs</code> value for the selected COM object to <code>Interactive User</code>. This involves modifying the registry path <code>HKCR\AppID\{Clsid}\RunAs</code>.</li>
<li>Trigger COM Object Execution: The attacker triggers the execution of the modified COM object, potentially through a remote procedure call or other inter-process communication mechanisms.</li>
<li>Authentication Coercion: The execution of the COM object triggers NTLM authentication to a system controlled by the attacker.</li>
<li>Relay Attack: The attacker relays the coerced NTLM authentication to gain access to other resources on the network.</li>
<li>Session Hijacking: Successful relay leads to session hijacking, allowing the attacker to impersonate the user.</li>
<li>Lateral Movement/Privilege Escalation: The attacker uses the hijacked session for lateral movement or privilege escalation within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful RemoteMonologue attack can lead to unauthorized access to sensitive systems and data. By coercing authentication and hijacking sessions, attackers can bypass security controls and escalate their privileges within the network. The scope of the impact depends on the privileges of the hijacked user account and the resources accessible to that account. This attack can enable lateral movement, data exfiltration, and other malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect RemoteMonologue Registry Modification</code> to your SIEM to identify suspicious registry modifications related to COM object hijacking.</li>
<li>Enable Sysmon registry event logging to capture the necessary data for the Sigma rules to function effectively.</li>
<li>Investigate any alerts generated by the Sigma rule by reviewing the registry event logs and identifying the user account and process responsible for the registry modification.</li>
<li>Implement enhanced monitoring on critical systems to detect any attempts to modify COM object registry settings.</li>
<li>Block the attack by ensuring &ldquo;RunAs&rdquo; value is not set to &ldquo;Interactive User&rdquo;.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>remotemonologue</category><category>defense-evasion</category><category>persistence</category><category>windows</category></item><item><title>Potential Defense Evasion via Filter Manager (fltMC.exe)</title><link>https://feed.craftedsignal.io/briefs/2024-01-filter-manager-evasion/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-filter-manager-evasion/</guid><description>Adversaries may abuse the Filter Manager Control Program (fltMC.exe) to unload filter drivers, thereby evading security software defenses such as malware detection and file system monitoring.</description><content:encoded><![CDATA[<p>The Filter Manager Control Program (fltMC.exe) is a Windows utility used to manage filter drivers, also known as minifilters. These minifilters are leveraged by various security products, including EDR, antivirus solutions, and data loss prevention tools, to intercept and modify I/O requests. Attackers can abuse fltMC.exe to unload these minifilters, effectively disabling or circumventing the security measures they provide. This allows malicious actors to operate without detection, potentially leading to data breaches, malware infections, or other harmful activities. This technique has been observed being used to disable security products such as Bitdefender, SentinelOne and ManageEngine Endpoint Central.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system (e.g., via compromised credentials or exploit).</li>
<li>Attacker executes <code>fltMC.exe</code> with administrative privileges.</li>
<li><code>fltMC.exe</code> attempts to unload a specific filter driver (minifilter).</li>
<li>The operating system processes the request to unload the specified filter driver.</li>
<li>If successful, the targeted minifilter is removed from the active filter stack.</li>
<li>Security software relying on the unloaded minifilter ceases to function correctly, leaving a security gap.</li>
<li>Attacker performs malicious actions, such as deploying malware or exfiltrating sensitive data, without the protection of the disabled filter driver.</li>
<li>Attacker achieves their objective, such as data theft or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to disable or circumvent security controls, increasing the likelihood of successful malware infections, data breaches, and other malicious activities. The scope of impact depends on the specific filter driver unloaded and the security products it supports. Disabling a critical EDR minifilter could leave the entire system vulnerable, while disabling a less critical filter might only impact a subset of security features.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for the execution of <code>fltMC.exe</code> with the <code>unload</code> argument to identify potential evasion attempts (see Sigma rule &ldquo;Potential Evasion via Filter Manager&rdquo;).</li>
<li>Investigate any instances of <code>fltMC.exe</code> execution where the parent process is not a known and trusted system management tool.</li>
<li>Implement strict access controls to limit the ability of users to execute <code>fltMC.exe</code> or modify filter driver configurations.</li>
<li>Review the list of exclusions in the provided EQL query to identify any legitimate software that may be generating false positives.</li>
<li>Ensure that endpoint security solutions are properly configured and monitored to detect and prevent unauthorized filter driver modifications.</li>
<li>Enable Sysmon process creation logging to activate the rules above.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>filter-driver</category><category>fltMC.exe</category><category>windows</category></item><item><title>Kerberos Traffic from Unusual Process</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-kerberoasting-unusual-process/</link><pubDate>Wed, 03 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-kerberoasting-unusual-process/</guid><description>Detects network connections to the standard Kerberos port from an unusual process other than lsass.exe, potentially indicating Kerberoasting or Pass-the-Ticket activity on Windows systems.</description><content:encoded><![CDATA[<p>This detection identifies unusual processes initiating network connections to the standard Kerberos port (88) on Windows systems. Typically, the <code>lsass.exe</code> process handles Kerberos traffic on domain-joined hosts. The rule aims to detect processes other than <code>lsass.exe</code> communicating with the Kerberos port, which could indicate malicious activity such as Kerberoasting (T1558.003) or Pass-the-Ticket (T1550.003). The detection is designed to work with data from Elastic Defend and SentinelOne Cloud Funnel. This can help security teams identify potential credential access attempts and lateral movement within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises a user account or system within the domain.</li>
<li>The attacker executes a malicious binary or script (e.g., PowerShell) on the compromised system.</li>
<li>The malicious process attempts to request Kerberos service tickets (TGS) for various services within the domain. This is done by connecting to the Kerberos port (88) on a domain controller.</li>
<li>The attacker uses tools like <code>Rubeus</code> or <code>Kerberoast.ps1</code> to enumerate and request TGS tickets.</li>
<li>The unusual process (not <code>lsass.exe</code>) sends Kerberos traffic to the domain controller.</li>
<li>The attacker extracts the Kerberos tickets from memory or network traffic.</li>
<li>The attacker cracks the offline TGS tickets to obtain service account passwords (Kerberoasting).</li>
<li>The attacker uses the compromised service account credentials to move laterally within the network or access sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful Kerberoasting or Pass-the-Ticket attack can lead to unauthorized access to sensitive resources and lateral movement within the network. Attackers can compromise service accounts with elevated privileges, potentially leading to domain-wide compromise. Detection of this behavior can prevent attackers from gaining access to critical assets. While the exact number of victims and sectors targeted are unknown, this technique is widely used by various threat actors in targeted attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Kerberos Traffic from Unusual Process&rdquo; Sigma rule to your SIEM and tune for your environment. Enable network connection logging to capture the necessary traffic.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on the process execution chain and potential malicious binaries.</li>
<li>Review event ID 4769 for suspicious ticket requests as mentioned in the rule&rsquo;s documentation.</li>
<li>Examine host services for suspicious entries as outlined in the original Elastic detection rule using Osquery.</li>
<li>Monitor for processes connecting to port 88, filtering out legitimate Kerberos clients like <code>lsass.exe</code>, using the &ldquo;Detect Kerberos Traffic from Non-Standard Process&rdquo; Sigma rule.</li>
<li>Investigate processes identified by the rule and compare them to the list of legitimate processes to identify unauthorized connections to the Kerberos port.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>kerberoasting</category><category>credential-access</category><category>lateral-movement</category><category>windows</category></item><item><title>Windows Subsystem for Linux Enabled via Dism Utility</title><link>https://feed.craftedsignal.io/briefs/2024-01-wsl-enabled-via-dism/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wsl-enabled-via-dism/</guid><description>Adversaries may enable and use Windows Subsystem for Linux (WSL) using the Microsoft Dism utility to evade detection on Windows systems by running Linux applications and tools.</description><content:encoded><![CDATA[<p>Attackers may enable the Windows Subsystem for Linux (WSL) to run Linux applications and tools directly on Windows, potentially bypassing security controls and hindering detection. This involves using the Dism.exe utility to enable the &ldquo;Microsoft-Windows-Subsystem-Linux&rdquo; feature. By leveraging WSL, adversaries can execute malicious code, access Windows resources, and perform various malicious activities while blending in with legitimate system processes. The use of WSL provides an environment where traditional Windows-based security solutions may have limited visibility, thus offering a way to evade detection. This activity has been observed as a post-exploitation technique, used after initial access to a compromised system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through methods such as phishing, exploiting vulnerabilities, or using compromised credentials.</li>
<li>The attacker executes Dism.exe (Deployment Image Servicing and Management tool).</li>
<li>Dism.exe is invoked with the command-line argument to enable the &ldquo;Microsoft-Windows-Subsystem-Linux&rdquo; feature.</li>
<li>The system processes the Dism.exe command and enables WSL.</li>
<li>The attacker installs a Linux distribution (e.g., Ubuntu, Kali) within the WSL environment.</li>
<li>The attacker uses the WSL environment to execute Linux-based tools and scripts for reconnaissance, lateral movement, or data exfiltration.</li>
<li>The attacker leverages the WSL environment to interact with Windows resources or execute Windows commands.</li>
<li>The attacker achieves their objective, such as stealing sensitive data or establishing persistence on the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful enablement of WSL can lead to a compromised Windows system being used as a platform for Linux-based attacks. This can result in data theft, system compromise, and further propagation of malicious activity within the network. The use of WSL can make it difficult to detect malicious activity since it allows attackers to blend Linux-based attacks with normal Windows operations. The lack of visibility into the WSL environment by traditional Windows security tools can lead to prolonged periods of undetected malicious activity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for the execution of <code>Dism.exe</code> with command-line arguments that include <code>Microsoft-Windows-Subsystem-Linux</code> to detect WSL enablement attempts (see Sigma rule <code>Detect WSL Enablement via Dism</code>).</li>
<li>Enable Sysmon process creation logging to capture detailed command-line information for processes, which is crucial for detecting this activity (Sysmon Event ID 1).</li>
<li>Implement the provided Sigma rule to detect suspicious usage of the DISM utility to enable WSL. Tune the rule based on your environment to minimize false positives.</li>
<li>Investigate any alerts generated by the Sigma rule <code>Detect WSL Enablement via Dism</code> to determine the legitimacy of the activity.</li>
<li>Monitor network connections originating from WSL processes for suspicious outbound traffic.</li>
<li>Consider blocking the execution of Dism.exe if WSL is not a sanctioned tool in your environment.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>wsl</category><category>windows</category></item><item><title>Windows Scheduled Tasks AT Command Enabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-at-command-enabled/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-at-command-enabled/</guid><description>Attackers may enable the deprecated Windows AT command via registry modification to achieve local persistence or lateral movement.</description><content:encoded><![CDATA[<p>The legacy Windows AT command allows scheduling tasks for execution. While deprecated since Windows 8 and Windows Server 2012, it remains present for backwards compatibility. Attackers may enable the AT command through registry modifications to achieve persistence or lateral movement within a network. This technique bypasses modern security controls and can be difficult to detect without specific monitoring. The detection rule monitors registry changes enabling this command, flagging potential misuse by checking specific registry paths and values indicative of enabling the AT command. The use of this command allows an attacker to execute commands with elevated privileges, potentially compromising the entire system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, possibly through phishing or exploiting a vulnerability.</li>
<li>The attacker attempts to enable the AT command by modifying the registry.</li>
<li>The registry key <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Configuration\EnableAt</code> is modified to a value of &ldquo;1&rdquo; or &ldquo;0x00000001&rdquo;.</li>
<li>The attacker uses the AT command to schedule a malicious task.</li>
<li>The scheduled task executes a command or script, such as downloading and executing malware.</li>
<li>The malware establishes persistence on the system.</li>
<li>The attacker uses the compromised system as a pivot point for lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Enabling the AT command can lead to unauthorized task scheduling, malware execution, persistence, and lateral movement within a network. Successful exploitation can compromise sensitive data, disrupt operations, and grant attackers persistent access to critical systems. The use of a deprecated command makes it harder to detect, increasing the impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor registry events for modifications to <code>HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\Configuration\EnableAt</code> as described in the rule overview.</li>
<li>Deploy the Sigma rule &ldquo;Scheduled Tasks AT Command Enabled&rdquo; to your SIEM and tune for your environment.</li>
<li>Enable Sysmon process creation and registry event logging to activate the rule.</li>
<li>Investigate any alerts triggered by the Sigma rule &ldquo;Scheduled Tasks AT Command Enabled&rdquo; for suspicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>lateral-movement</category><category>windows</category></item><item><title>Windows Host Network Discovery Enabled via Netsh</title><link>https://feed.craftedsignal.io/briefs/2024-01-enable-network-discovery/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-enable-network-discovery/</guid><description>Attackers can enable host network discovery via netsh.exe to weaken host firewall settings, facilitating lateral movement by identifying other systems on the network.</description><content:encoded><![CDATA[<p>Attackers can leverage the <code>netsh.exe</code> utility to modify Windows Firewall settings, specifically enabling Network Discovery. This setting allows a host to broadcast its presence and services, making it easier for attackers to identify potential targets within the network for lateral movement. The behavior is often a post-exploitation technique to weaken host-based defenses after gaining initial access. The modification uses netsh.exe, a command-line scripting utility for managing network configurations. This activity can be easily scripted and automated, making it a common step in reconnaissance and lateral movement playbooks. Defenders should monitor for unauthorized use of <code>netsh.exe</code> to modify firewall settings.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to a Windows host.</li>
<li>Attacker executes <code>netsh.exe</code> with elevated privileges.</li>
<li><code>netsh.exe</code> is used to modify the Windows Firewall configuration.</li>
<li>The specific command executed enables Network Discovery using the <code>netsh advfirewall firewall set rule group=&quot;Network Discovery&quot; new enable=Yes</code> syntax.</li>
<li>The firewall rule group &ldquo;Network Discovery&rdquo; is modified to allow inbound and outbound traffic.</li>
<li>The compromised host begins sending out broadcast messages, advertising its presence and services on the network.</li>
<li>The attacker uses the information gathered to identify other vulnerable systems on the network.</li>
<li>The attacker moves laterally to other systems based on the discovery information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to easily enumerate and identify other vulnerable systems within the network. This can lead to rapid lateral movement, further compromising the environment. The risk is heightened when the compromised host has access to sensitive data or critical systems. There is no specific victim count or sector targeted mentioned in the provided source.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Enable Host Network Discovery via Netsh&rdquo; to your SIEM to detect the use of <code>netsh.exe</code> to enable network discovery (see rule below).</li>
<li>Enable Windows Firewall logging and monitor for changes to firewall rules, specifically those related to Network Discovery.</li>
<li>Review and restrict the use of <code>netsh.exe</code> to authorized personnel and systems only.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows</category><category>firewall</category></item><item><title>Windows Firewall Disabled via PowerShell</title><link>https://feed.craftedsignal.io/briefs/2024-01-powershell-firewall-disable/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-powershell-firewall-disable/</guid><description>Attackers may disable the Windows firewall or its rules using the `Set-NetFirewallProfile` PowerShell cmdlet to enable lateral movement and command and control activity.</description><content:encoded><![CDATA[<p>Attackers often attempt to disable or modify system firewalls to evade network restrictions and facilitate lateral movement within a compromised environment. The Windows Firewall, a built-in component, provides host-based traffic filtering. Disabling it allows unrestricted communication, aiding command and control activities and hindering detection efforts. This activity is commonly achieved through PowerShell, leveraging cmdlets like <code>Set-NetFirewallProfile</code>. The rule focuses on detecting the use of this specific cmdlet to disable the Windows Firewall, alerting defenders to potential defense evasion attempts. This technique is valuable to attackers across various attack vectors, especially after initial access has been established.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access through methods such as phishing or exploiting a vulnerability in a network-facing application.</li>
<li>Privilege Escalation (if necessary): The attacker escalates privileges to gain the necessary permissions to modify firewall settings.</li>
<li>PowerShell Execution: The attacker executes PowerShell, either through an interactive session or a script.</li>
<li>Disable Firewall Profile: The attacker uses the <code>Set-NetFirewallProfile</code> cmdlet with parameters such as <code>-Enabled False</code> to disable the firewall for all, public, domain, or private profiles.</li>
<li>Network Reconnaissance: With the firewall disabled, the attacker performs network reconnaissance to identify valuable assets and potential lateral movement paths.</li>
<li>Lateral Movement: The attacker moves laterally to other systems on the network, exploiting trust relationships or vulnerabilities.</li>
<li>Command and Control: The attacker establishes command and control channels to communicate with compromised systems and exfiltrate sensitive data.</li>
<li>Data Exfiltration or Further Exploitation: The attacker exfiltrates sensitive data or continues to exploit the environment based on their objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of the Windows Firewall can lead to unrestricted lateral movement within a network, allowing attackers to compromise additional systems and exfiltrate sensitive data. This can result in data breaches, financial losses, and reputational damage. While the source does not specify the number of affected organizations, any environment relying on Windows Firewall for network segmentation is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect the use of <code>Set-NetFirewallProfile</code> with the <code>-Enabled False</code> parameter (see Sigma rule below).</li>
<li>Enable process creation logging on Windows endpoints to capture PowerShell executions (reference the logsource in the Sigma rule).</li>
<li>Investigate any alerts generated by the Sigma rule to determine the legitimacy of the firewall modification activity.</li>
<li>Review and enforce the principle of least privilege to limit the number of users with permissions to modify firewall settings.</li>
<li>Consider implementing additional network segmentation and monitoring controls to detect and prevent lateral movement even if the Windows Firewall is disabled.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>powershell</category><category>firewall</category><category>windows</category></item><item><title>Windows Defender Exclusions Added via PowerShell</title><link>https://feed.craftedsignal.io/briefs/2024-01-defender-exclusion-powershell/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-defender-exclusion-powershell/</guid><description>Adversaries may attempt to bypass Windows Defender's capabilities by using PowerShell to add exclusions for folders or processes, and this activity can be detected by monitoring PowerShell command lines that use `Add-MpPreference` or `Set-MpPreference` with exclusion parameters.</description><content:encoded><![CDATA[<p>Attackers may attempt to evade detection by modifying Windows Defender&rsquo;s configuration to exclude specific files, folders, or processes from scanning. This is often achieved by using PowerShell commands to add exclusions. The tactic allows malware to operate without being detected by the built-in antivirus solution. Observed as early as 2018 with Trickbot disabling Windows Defender, this technique remains relevant today. This activity can be performed using <code>Add-MpPreference</code> or <code>Set-MpPreference</code> commands in PowerShell, specifying exclusions by path or process name. Detecting these modifications is critical for maintaining the integrity of endpoint security. The scope of targeting ranges from individual workstations to entire networks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system via an undisclosed method.</li>
<li>The attacker executes PowerShell with administrative privileges.</li>
<li>The attacker uses the <code>Add-MpPreference</code> or <code>Set-MpPreference</code> cmdlet to add an exclusion.</li>
<li>The exclusion specifies a file path, folder, or process that should be ignored by Windows Defender.</li>
<li>Windows Defender is reconfigured to ignore the specified item.</li>
<li>The attacker deploys or executes malware in the excluded location.</li>
<li>The malware operates without interference from Windows Defender.</li>
<li>The attacker achieves their final objective, such as data theft or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to operate undetected on compromised systems, leading to potential data breaches, lateral movement within the network, and deployment of ransomware. While the exact number of victims is unknown, this technique is widely used by various threat actors, impacting organizations across various sectors. The lack of detection can lead to prolonged periods of compromise, increasing the potential damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Windows Defender Exclusions Added via PowerShell&rdquo; to your SIEM to detect suspicious PowerShell commands used to add exclusions.</li>
<li>Enable Sysmon process creation logging with command line auditing to capture the necessary event data for the Sigma rule.</li>
<li>Regularly review Windows Defender exclusion lists to identify any unauthorized or suspicious entries.</li>
<li>Investigate any PowerShell process that uses <code>Add-MpPreference</code> or <code>Set-MpPreference</code> with exclusion parameters, as identified by the provided Sigma rule.</li>
<li>Monitor for processes and file modifications within excluded directories.</li>
<li>Configure alerts to notify security teams when new Windows Defender exclusions are added.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>powershell</category><category>windows</category></item><item><title>Werfault ReflectDebugger Persistence via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-werfault-reflectdebugger-persistence/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-werfault-reflectdebugger-persistence/</guid><description>Attackers may establish persistence by modifying the ReflectDebugger registry key associated with Windows Error Reporting to execute arbitrary code when Werfault is invoked with the '-pr' parameter.</description><content:encoded><![CDATA[<p>Attackers can abuse the Windows Error Reporting (Werfault) service to establish persistence on a compromised system. This is achieved by modifying the ReflectDebugger registry key. When Werfault is executed with the <code>-pr</code> parameter, it will execute the debugger specified in the ReflectDebugger registry key. This allows attackers to execute arbitrary code every time the Windows Error Reporting utility is triggered. The technique involves modifying specific registry paths associated with the ReflectDebugger. This behavior has been documented as a persistence mechanism in malware analysis reports.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system through unspecified means.</li>
<li>The attacker attempts to modify the Windows Error Reporting ReflectDebugger registry key.</li>
<li>The attacker modifies the ReflectDebugger value within one of the following registry paths: <code>HKLM\Software\Microsoft\Windows\Windows Error Reporting\Hangs\ReflectDebugger</code>, <code>\REGISTRY\MACHINE\Software\Microsoft\Windows\Windows Error Reporting\Hangs\ReflectDebugger</code>, or <code>MACHINE\Software\Microsoft\Windows\Windows Error Reporting\Hangs\ReflectDebugger</code>.</li>
<li>The attacker sets the ReflectDebugger value to a malicious executable or script.</li>
<li>The attacker triggers Werfault.exe with the <code>-pr</code> parameter, either manually or through a system event.</li>
<li>Werfault.exe executes the attacker-controlled code specified in the ReflectDebugger registry value.</li>
<li>The attacker achieves persistence, as the malicious code is executed each time Werfault is triggered with the <code>-pr</code> parameter.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to achieve persistence on the targeted system. This can lead to the execution of arbitrary code, potentially resulting in data theft, further malware installation, or complete system compromise. The impact is limited by the permissions of the Werfault process. While no specific victim counts are available, this technique can affect any Windows system where the attacker can modify the registry.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Werfault ReflectDebugger Registry Modification</code> to detect unauthorized modifications to the ReflectDebugger registry key (logsource: <code>registry_set</code>, rule title).</li>
<li>Enable Sysmon process creation logging to detect the execution of Werfault with the <code>-pr</code> parameter.</li>
<li>Monitor registry events for changes to the specific ReflectDebugger paths mentioned in the overview section (<code>HKLM\Software\Microsoft\Windows\Windows Error Reporting\Hangs\ReflectDebugger</code>).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>registry_modification</category><category>werfault</category></item><item><title>Unusual System Utilities Initiating Network Connections</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-process-network/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-process-network/</guid><description>Adversaries may leverage unusual system utilities such as Microsoft.Workflow.Compiler.exe, bginfo.exe, cdb.exe, cmstp.exe, csi.exe, dnx.exe, fsi.exe, ieexec.exe, iexpress.exe, odbcconf.exe, rcsi.exe and xwizard.exe to execute code and evade detection, as identified by network connections originating from these processes.</description><content:encoded><![CDATA[<p>Attackers frequently exploit built-in system utilities to bypass security measures and execute malicious code. This technique, known as &ldquo;Living off the Land,&rdquo; allows them to blend in with legitimate system activity, making detection more challenging. This threat brief focuses on identifying unusual network connections originating from Windows system utilities that are not typically associated with network communication. This behavior is often indicative of an attacker leveraging these tools for purposes such as downloading payloads, establishing command and control, or exfiltrating data. The utilities of concern include: Microsoft.Workflow.Compiler.exe, bginfo.exe, cdb.exe, cmstp.exe, csi.exe, dnx.exe, fsi.exe, ieexec.exe, iexpress.exe, odbcconf.exe, rcsi.exe and xwizard.exe. Defenders should monitor for network activity from these processes to identify potential malicious activity.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through methods such as phishing or exploiting a vulnerability.</li>
<li>The attacker leverages a system utility such as <code>cmstp.exe</code> to execute malicious code.</li>
<li><code>cmstp.exe</code> is invoked with a malicious INF file, leading to the execution of arbitrary commands.</li>
<li>The executed code initiates a network connection to an external server.</li>
<li>The connection is used to download a secondary payload, such as a reverse shell or malware.</li>
<li>The attacker uses the downloaded payload to establish a persistent presence on the system.</li>
<li>The attacker performs lateral movement to other systems on the network.</li>
<li>The attacker exfiltrates sensitive data from compromised systems to a remote server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to a compromised system with unauthorized code execution, data exfiltration, and potential lateral movement within the network. Due to the low severity and the high probability of false positives, this rule should be tuned for specific environments and paired with other detection mechanisms. This may lead to data breaches, financial loss, or reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the Sigma rules provided in this brief to detect unusual network connections from system utilities within your environment.</li>
<li>Monitor process execution events for the utilities listed in the rule query to identify potential abuse of these tools.</li>
<li>Enable Sysmon Event ID 1 (Process Creation) and Event ID 3 (Network Connection) logging for enhanced visibility into process execution and network activity.</li>
<li>Correlate detections from this rule with other security alerts and logs to gain a more complete understanding of the attack.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>proxy-execution</category><category>windows</category></item><item><title>Unusual Persistence via Services Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-registry-persistence/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-registry-persistence/</guid><description>Detection of processes modifying the Windows services registry key directly, potentially indicating stealthy persistence attempts via abnormal service creation or modification.</description><content:encoded><![CDATA[<p>This detection identifies processes that modify the Windows services registry key directly, bypassing the standard Windows APIs. This behavior can signify an adversary&rsquo;s attempt to establish persistence stealthily by creating new services or altering existing ones in an unexpected manner. The detection logic focuses on changes to the <code>ServiceDLL</code> and <code>ImagePath</code> values within specific registry paths associated with service configurations. This rule is designed for data generated by Elastic Defend and also supports Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon Registry Events. The rule helps security analysts identify potentially malicious activity related to service manipulation, which can lead to persistent access and control over compromised systems. The rule excludes known legitimate processes and paths to minimize false positives, focusing on anomalous registry modifications.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through various means (e.g., phishing, exploitation of a vulnerability).</li>
<li>The attacker escalates privileges to gain administrative access, allowing them to modify the registry.</li>
<li>The attacker directly modifies the <code>HKLM\SYSTEM\ControlSet*\Services\*\ServiceDLL</code> or <code>HKLM\SYSTEM\ControlSet*\Services\*\ImagePath</code> registry keys to point to a malicious DLL or executable.</li>
<li>The attacker&rsquo;s malicious DLL or executable is configured to run as a service, ensuring persistence across system reboots.</li>
<li>The compromised service starts automatically during system startup or manually when triggered by the attacker.</li>
<li>The malicious service executes arbitrary code, providing the attacker with persistent control over the system.</li>
<li>The attacker may use the compromised service to perform further malicious activities, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to achieve persistence on the compromised system, maintaining access even after reboots or user logoffs. This can lead to long-term control over the system, enabling attackers to perform various malicious activities, including data theft, deployment of ransomware, or use of the system as a foothold for further attacks within the network. The severity is further amplified if critical services are targeted, potentially leading to system instability or denial of service.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon registry event logging to capture the necessary data for this detection (Data Source: Sysmon).</li>
<li>Deploy the provided Sigma rules to your SIEM to detect unusual service registry modifications (Sigma rules).</li>
<li>Tune the Sigma rules by adding exceptions for legitimate software installations or updates that modify service registry keys directly (Sigma rules).</li>
<li>Investigate any alerts generated by the Sigma rules, focusing on processes modifying the <code>ServiceDLL</code> or <code>ImagePath</code> registry values (Sigma rules).</li>
<li>Review endpoint protection policies to ensure that similar unauthorized registry modifications are detected and blocked in the future (Response and remediation).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>persistence</category><category>windows</category><category>registry modification</category></item><item><title>Unusual Parent Process for cmd.exe</title><link>https://feed.craftedsignal.io/briefs/2024-01-unusual-cmd-parent/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-unusual-cmd-parent/</guid><description>The detection rule identifies cmd.exe instances spawned by uncommon parent processes, such as lsass.exe, csrss.exe, or regsvr32.exe, which may indicate unauthorized or suspicious activity, thus aiding in early threat detection.</description><content:encoded><![CDATA[<p>This detection rule identifies unusual parent processes spawning <code>cmd.exe</code> on Windows systems. While <code>cmd.exe</code> is a legitimate command-line interpreter, adversaries can exploit it by launching it from atypical parent processes to execute malicious commands stealthily. The rule focuses on identifying <code>cmd.exe</code> instances spawned by uncommon parent processes like <code>lsass.exe</code>, <code>csrss.exe</code>, and <code>regsvr32.exe</code>, which may indicate unauthorized or suspicious activity. The rule is based on the EQL query language and is designed for data generated by Elastic Defend, Microsoft Defender XDR, and SentinelOne Cloud Funnel, as well as Sysmon event logs. This detection helps in early threat detection by flagging anomalies in process relationships.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker executes a malicious payload on the system.</li>
<li>The malicious payload spawns <code>cmd.exe</code> to execute commands.</li>
<li>The <code>cmd.exe</code> process is launched by an unusual parent process, such as <code>lsass.exe</code> or <code>csrss.exe</code>, instead of typical processes like <code>explorer.exe</code> or <code>cmd.exe</code>.</li>
<li>The <code>cmd.exe</code> process executes malicious commands, such as downloading additional payloads, modifying system configurations, or exfiltrating data.</li>
<li>The attacker uses the <code>cmd.exe</code> process to establish persistence on the system by creating scheduled tasks or modifying registry keys.</li>
<li>The attacker performs lateral movement by using <code>cmd.exe</code> to access other systems on the network.</li>
<li>The attacker achieves their final objective, such as data theft, system compromise, or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack leveraging an unusual parent process for <code>cmd.exe</code> can lead to a range of adverse outcomes, including system compromise, data theft, and ransomware deployment. The impact can vary depending on the attacker&rsquo;s objectives and the level of access they gain. Without proper detection and response, organizations can suffer financial losses, reputational damage, and operational disruption. The severity is dependent on the specific commands executed via the spawned command prompt.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided EQL query to your Elastic Security environment to detect unusual parent processes for <code>cmd.exe</code>.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture the necessary data for this detection and ensure proper configuration.</li>
<li>Tune the EQL query for your environment by excluding legitimate parent processes, identified in the &ldquo;False positive analysis&rdquo; section, that may trigger false positives (e.g., <code>SearchIndexer.exe</code>, <code>WUDFHost.exe</code>).</li>
<li>Investigate any alerts generated by this rule to determine the nature of the malicious activity and the extent of the compromise.</li>
<li>Implement enhanced monitoring and logging for <code>cmd.exe</code> and its parent processes to detect similar anomalies in the future.</li>
<li>Consider deploying endpoint detection and response (EDR) solutions like Elastic Defend, Microsoft Defender XDR, or SentinelOne Cloud Funnel for enhanced visibility and protection.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>execution</category><category>windows</category><category>cmd.exe</category></item><item><title>UAC Bypass Attempt via Elevated COM Internet Explorer Add-On Installer</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-uac-bypass-ieinstal/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-uac-bypass-ieinstal/</guid><description>This threat brief details a UAC bypass technique leveraging the Internet Explorer Add-On Installer (ieinstal.exe) and Component Object Model (COM) to execute arbitrary code with elevated privileges.</description><content:encoded><![CDATA[<p>This detection rule identifies a User Account Control (UAC) bypass technique that abuses the Internet Explorer Add-On Installer (ieinstal.exe) to launch malicious programs with elevated privileges. Attackers exploit elevated COM interfaces to circumvent UAC, allowing for stealthy code execution. The specific behavior involves executing a program from a temporary directory using ieinstal.exe with the <code>-Embedding</code> argument. This bypass can be utilized to perform various malicious activities, including installing malware, modifying system settings, or establishing persistence. The targeted systems are Windows endpoints where UAC is enabled. This technique matters because it allows attackers to gain unauthorized access with elevated permissions, undermining standard Windows security controls.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system, possibly through phishing or other means.</li>
<li>The attacker drops a malicious executable into a temporary directory, such as <code>C:\Users\&lt;user&gt;\AppData\Local\Temp\IDC*.tmp\</code>.</li>
<li>The attacker invokes <code>ieinstal.exe</code> with the <code>-Embedding</code> argument, specifying the path to the malicious executable.</li>
<li><code>ieinstal.exe</code>, running with elevated privileges, launches the malicious executable due to COM object handling.</li>
<li>The malicious executable executes with elevated privileges, bypassing UAC prompts.</li>
<li>The attacker leverages elevated privileges to perform malicious activities, such as installing malware or modifying system settings.</li>
<li>The attacker establishes persistence to maintain elevated access across system reboots.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this UAC bypass technique allows attackers to execute arbitrary code with elevated privileges, bypassing security controls designed to prevent unauthorized system modifications. This can lead to the installation of malware, data theft, or complete system compromise. The severity of the impact is high, as it grants attackers significant control over the affected system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;UAC Bypass Attempt via Elevated COM Internet Explorer Add-On Installer&rdquo; to your SIEM to detect potential UAC bypass attempts.</li>
<li>Enable Sysmon process creation logging to capture the necessary events for the Sigma rule to function correctly.</li>
<li>Monitor process execution from temporary directories, specifically those matching the pattern <code>C:\\*\\AppData\\*\\Temp\\IDC*.tmp\\*.exe</code>.</li>
<li>Investigate any instances of <code>ieinstal.exe</code> being executed with the <code>-Embedding</code> argument, as this is a key indicator of the UAC bypass attempt.</li>
<li>Implement application whitelisting to prevent unauthorized executables from running, particularly those in temporary directories.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>uac-bypass</category><category>privilege-escalation</category><category>com</category><category>ieinstal</category></item><item><title>Suspicious SolarWinds Child Process Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-solarwinds-child-process/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-solarwinds-child-process/</guid><description>Detection of unusual child processes spawned by SolarWinds processes may indicate malicious program execution, potentially bypassing security controls.</description><content:encoded><![CDATA[<p>This detection rule identifies suspicious child processes initiated by SolarWinds.BusinessLayerHost.exe or SolarWinds.BusinessLayerHostx64.exe, excluding known legitimate operations. Adversaries may exploit the trusted SolarWinds processes to execute unauthorized programs with elevated privileges, bypassing security controls. The rule focuses on Windows systems and is designed to detect activity indicative of post-compromise actions following a supply chain attack. This detection is crucial for organizations that utilize SolarWinds software, as malicious actors could leverage compromised SolarWinds installations to gain unauthorized access and execute arbitrary code within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of the SolarWinds software supply chain (T1195.002).</li>
<li>Malicious code is injected into SolarWinds.BusinessLayerHost.exe or SolarWinds.BusinessLayerHostx64.exe.</li>
<li>The compromised SolarWinds process spawns a suspicious child process.</li>
<li>The child process executes a malicious command or binary, attempting to evade detection.</li>
<li>The child process leverages Native APIs (T1106) to perform privileged actions.</li>
<li>Lateral movement or data exfiltration may occur from the compromised host.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the execution of arbitrary code on systems running SolarWinds software. This can result in data theft, system compromise, and further propagation of the attack throughout the network. Organizations in various sectors utilizing SolarWinds products are potentially at risk. The impact may include loss of sensitive data, disruption of critical services, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Suspicious SolarWinds Child Process - CommandLine</code> to detect potentially malicious child processes of SolarWinds.BusinessLayerHost.exe or SolarWinds.BusinessLayerHostx64.exe.</li>
<li>Deploy the Sigma rule <code>Suspicious SolarWinds Child Process - Executable</code> to detect execution of unusual executables as child processes of SolarWinds.BusinessLayerHost.exe or SolarWinds.BusinessLayerHostx64.exe.</li>
<li>Enable process creation logging with command line details on Windows systems to ensure the Sigma rules have sufficient data.</li>
<li>Review and tune the rules for false positives based on legitimate SolarWinds child processes in your environment, updating the exclusion lists in the rules accordingly, referencing the &ldquo;false_positives&rdquo; section in the rule description.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>supply-chain</category><category>execution</category><category>solarwinds</category></item><item><title>Suspicious Modifications to Windows Security Support Provider (SSP) Registry</title><link>https://feed.craftedsignal.io/briefs/2024-01-ssp-registry-modification/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-ssp-registry-modification/</guid><description>Adversaries may modify the Windows Security Support Provider (SSP) configuration in the registry to establish persistence or evade defenses.</description><content:encoded><![CDATA[<p>Attackers can abuse the Windows Security Support Provider (SSP) mechanism to establish persistence on a compromised system. SSPs are DLLs loaded into the Local Security Authority Subsystem Service (LSASS) process, which handles authentication in Windows. By modifying specific registry keys related to SSP configuration, attackers can force LSASS to load malicious DLLs at startup, effectively creating a persistent backdoor. This technique is often used to maintain unauthorized access to a system even after a reboot. The registry keys of interest are <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\Security Packages</code> and <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\OSConfig\Security Packages</code>. Successful exploitation allows the attacker to intercept and manipulate authentication credentials.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through an exploit or compromised credentials (not detailed in source).</li>
<li>The attacker escalates privileges to gain administrative rights on the system.</li>
<li>The attacker modifies the registry key <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\Security Packages</code> to include a path to a malicious DLL.</li>
<li>Alternatively, the attacker modifies the registry key <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\OSConfig\Security Packages</code> to include a path to a malicious DLL.</li>
<li>The attacker triggers a system reboot, or restarts the LSASS process, causing the malicious SSP DLL to be loaded.</li>
<li>The malicious DLL intercepts authentication credentials and exfiltrates them or performs other malicious actions.</li>
<li>The attacker maintains persistent access to the system, even after reboots.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to achieve persistence and potentially compromise sensitive credentials handled by LSASS. This can lead to lateral movement within the network, data exfiltration, and further system compromise. The impact is significant as it bypasses standard security measures and provides a persistent foothold for malicious activities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Suspicious SSP Registry Modification&rdquo; to your SIEM to detect unauthorized modifications to SSP registry keys.</li>
<li>Enable Sysmon registry event logging to provide the necessary data for the Sigma rule to function.</li>
<li>Continuously monitor for unexpected processes writing to the <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\Security Packages</code> and <code>HKLM\SYSTEM\*\ControlSet*\Control\Lsa\OSConfig\Security Packages</code> registry keys.</li>
<li>Review and whitelist legitimate software installers that frequently modify these registry entries to reduce false positives as mentioned in the brief.</li>
<li>Ensure access controls and permissions are strictly enforced to limit unauthorized modification of critical registry paths related to Security Support Providers.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>defense-evasion</category><category>registry-modification</category><category>ssp</category></item><item><title>Suspicious Execution via Windows Subsystem for Linux</title><link>https://feed.craftedsignal.io/briefs/2024-01-wsl-bash-exec/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wsl-bash-exec/</guid><description>Adversaries may leverage the Windows Subsystem for Linux (WSL) to execute malicious Linux commands, bypassing traditional Windows security measures, detected by monitoring process execution and command-line arguments.</description><content:encoded><![CDATA[<p>The Windows Subsystem for Linux (WSL) enables users to run Linux binaries natively on Windows, creating an opportunity for adversaries to evade detection by executing malicious Linux commands without triggering traditional Windows security alerts. This technique involves leveraging WSL&rsquo;s bash shell to perform actions that might otherwise be flagged if executed directly within the Windows environment. This alert focuses on detecting suspicious behaviors indicative of malicious use of WSL, such as unauthorized access to sensitive files, use of network tools, or unusual command-line arguments. This can be used to facilitate lateral movement, data exfiltration, or other malicious activities. The Qualys blog post &ldquo;Implications of Windows Subsystem for Linux for Adversaries &amp; Defenders&rdquo; (2022-03-22) describes this attack vector in detail.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system.</li>
<li>The attacker enables WSL if it is not already enabled.</li>
<li>The attacker executes <code>wsl.exe</code> to start a Linux environment.</li>
<li>Inside the WSL environment, the attacker uses <code>bash</code> to execute malicious commands.</li>
<li>The attacker attempts to access sensitive files such as <code>/etc/shadow</code> or <code>/etc/passwd</code> to gather credentials.</li>
<li>The attacker uses network tools like <code>curl</code> to download or upload malicious payloads.</li>
<li>The attacker executes scripts to establish persistence within the WSL environment.</li>
<li>The attacker uses the compromised WSL environment to move laterally to other systems or exfiltrate data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via WSL can lead to a variety of negative outcomes, including unauthorized access to sensitive information, credential compromise, and lateral movement within the network. While specific victim counts are unavailable, this technique can significantly increase the attack surface and reduce the effectiveness of traditional Windows-based security measures, affecting organizations across various sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging to capture <code>wsl.exe</code> and <code>bash.exe</code> executions (reference: Sysmon Event ID 1 setup in rule setup section).</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious WSL Activity&rdquo; to your SIEM and tune for your environment.</li>
<li>Monitor process command lines for suspicious arguments used with <code>wsl.exe</code>, such as access to <code>/etc/shadow</code> or <code>/etc/passwd</code> (reference: Sigma rule selection criteria).</li>
<li>Investigate and whitelist legitimate uses of WSL within your environment to reduce false positives (reference: False positive analysis in the rule description).</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>defense-evasion</category><category>execution</category><category>credential-access</category><category>windows</category></item><item><title>Suspicious Endpoint Security Parent Process Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-suspicious-endpoint-parent/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-suspicious-endpoint-parent/</guid><description>This rule detects suspicious parent processes of endpoint security solutions such as Elastic Defend, Microsoft Defender, and SentinelOne, indicating potential process hollowing or code injection attempts to evade detection.</description><content:encoded><![CDATA[<p>This detection identifies potentially malicious attempts to evade endpoint security solutions by monitoring the parent processes of security executables. Adversaries may employ process hollowing or other code injection techniques to inject malicious code into legitimate processes, such as <code>esensor.exe</code> or <code>elastic-endpoint.exe</code>, to avoid detection. The rule flags unexpected parent processes based on deviations from expected behavior, excluding known benign paths and arguments to minimize false positives. This activity is important for defenders as successful evasion can lead to significant compromise of systems and data. The rule supports various data sources, including Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, and Sysmon, providing broad coverage across different security ecosystems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through an unknown vector.</li>
<li>The attacker attempts to inject malicious code into a legitimate endpoint security process (<code>esensor.exe</code> or <code>elastic-endpoint.exe</code>).</li>
<li>The malicious code is injected using process hollowing or similar techniques.</li>
<li>The endpoint security process is launched by a suspicious parent process outside of known legitimate paths (e.g., not in <code>C:\Program Files\Elastic\*</code> or <code>C:\Windows\System32\*</code>).</li>
<li>The injected code executes within the context of the endpoint security process, potentially disabling or bypassing security controls.</li>
<li>The attacker leverages the compromised endpoint security process to perform further malicious activities, such as lateral movement or data exfiltration.</li>
<li>The endpoint security solution&rsquo;s ability to detect and respond to threats is impaired, allowing the attacker to operate undetected.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation via process injection can lead to a significant degradation of endpoint security posture. Attackers can disable or bypass security controls, allowing them to perform malicious activities such as data theft, ransomware deployment, or lateral movement undetected. The impact can range from individual system compromise to widespread network breaches, depending on the scope of the attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Suspicious Endpoint Security Parent Process</code> to your SIEM to detect anomalous parent-child process relationships involving endpoint security executables.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to provide detailed process execution data for the Sigma rule.</li>
<li>Investigate any alerts generated by the Sigma rule by reviewing the parent process executable path, command-line arguments, and historical activity.</li>
<li>Add legitimate but unusual parent process paths to the Sigma rule&rsquo;s exclusion list to reduce false positives, as described in the rule&rsquo;s <code>False positive analysis</code> section.</li>
<li>Correlate alerts from this rule with other security events from data sources like Elastic Endgame, Microsoft Defender XDR, or Sysmon, as recommended in the rule&rsquo;s <code>Possible investigation steps</code> section.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>process-injection</category><category>windows</category></item><item><title>SolarWinds Process Disabling Services via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-solarwinds-service-disable/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-solarwinds-service-disable/</guid><description>A SolarWinds binary is modifying the start type of a service to be disabled via registry modification, potentially to disable or impair security services.</description><content:encoded><![CDATA[<p>This threat brief focuses on the detection of SolarWinds processes attempting to disable services by modifying their registry start type. This activity is associated with defense evasion tactics, potentially linked to initial access via supply chain compromise, similar to the SUNBURST campaign. The behavior involves SolarWinds binaries, such as <code>SolarWinds.BusinessLayerHost*.exe</code> and <code>NetFlowService*.exe</code>, manipulating registry entries related to service start configurations. This technique can be used to impair or disable security tools and services, allowing attackers to operate more freely within a compromised environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of the SolarWinds Orion platform, potentially through a supply chain attack.</li>
<li>Deployment of a malicious module or payload within the SolarWinds environment.</li>
<li>Execution of a SolarWinds process, such as <code>SolarWinds.BusinessLayerHost*.exe</code>.</li>
<li>The SolarWinds process modifies the registry to change the start type of a service.</li>
<li>The registry modification targets the <code>HKLM\SYSTEM\ControlSet*\Services\*\Start</code> path.</li>
<li>The <code>Start</code> value is set to &ldquo;4&rdquo; or &ldquo;0x00000004&rdquo;, which disables the targeted service.</li>
<li>Disabling critical security services allows the attacker to evade detection and further compromise the system.</li>
<li>Attacker achieves persistence and performs lateral movement, exfiltrating data or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the disabling of critical security services, such as antivirus, endpoint detection and response (EDR) agents, or other monitoring tools. This can significantly reduce the visibility of malicious activity within the network, potentially leading to data breaches, ransomware deployment, or other severe security incidents. The SolarWinds supply chain compromise affected numerous organizations globally, underscoring the potential impact of this type of attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>SolarWinds Process Disabling Services via Registry</code> to your SIEM to detect registry modifications by SolarWinds processes aimed at disabling services.</li>
<li>Enable Sysmon registry event logging to provide the necessary data for the Sigma rule to function effectively.</li>
<li>Review and harden access controls for SolarWinds processes to restrict their ability to modify critical system settings.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the affected service and the timeline of events surrounding the registry modification.</li>
<li>Utilize threat intelligence platforms to stay informed about known SolarWinds-related attack patterns and indicators of compromise (IOCs).</li>
<li>Monitor endpoints for unusual behavior by SolarWinds processes, including network connections, file modifications, and process creations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>solarwinds</category><category>defense-evasion</category><category>registry-modification</category><category>supply-chain</category></item><item><title>Signed Proxy Execution via MS Work Folders</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-workfolders-control-execution/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-workfolders-control-execution/</guid><description>Attackers can abuse Windows Work Folders to execute a masqueraded control.exe file from untrusted locations, potentially bypassing application controls for defense evasion and privilege escalation.</description><content:encoded><![CDATA[<p>Windows Work Folders is a Microsoft file server role that allows users to sync work files between their PCs and a central server. The WorkFolders.exe process, when called, will automatically execute any Portable Executable (PE) named control.exe as an argument before accessing the synced share. Attackers can abuse this functionality by placing a malicious executable renamed to control.exe in a location synced by Work Folders, and then triggering WorkFolders.exe. This can lead to the execution of arbitrary code in a manner that bypasses application control policies, as WorkFolders.exe is a signed Microsoft binary. This technique has been observed in the wild and documented by security researchers. This allows attackers to execute code from locations outside the standard Windows directories, evading traditional detection mechanisms.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system through an unspecified means (e.g., phishing, exploiting a vulnerability).</li>
<li>The attacker places a malicious executable and renames it to <code>control.exe</code> in a directory accessible to Work Folders.</li>
<li>The attacker configures Windows Work Folders to synchronize the directory containing the malicious <code>control.exe</code>.</li>
<li>The victim system synchronizes with the Work Folders server, copying the malicious <code>control.exe</code> to the local machine.</li>
<li>The attacker triggers the <code>WorkFolders.exe</code> process.</li>
<li><code>WorkFolders.exe</code> executes the <code>control.exe</code> binary from the synced folder.</li>
<li>The malicious <code>control.exe</code> executes, performing attacker-defined actions such as establishing persistence, escalating privileges, or deploying additional malware.</li>
<li>The attacker achieves code execution in a potentially elevated context, leveraging a signed Microsoft binary (<code>WorkFolders.exe</code>) to bypass security controls.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary code on a victim&rsquo;s machine, potentially bypassing application control and other security measures. This can lead to a range of malicious activities, including data theft, system compromise, and lateral movement within the network. Given the legitimate use of Work Folders, identifying malicious executions can be challenging, potentially allowing attackers to maintain a persistent foothold. The lack of specific victim counts or industry targeting details in the source material limits a complete assessment of impact scope.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations where <code>WorkFolders.exe</code> is the parent process and <code>control.exe</code> is the child process, but <code>control.exe</code> is not located in a standard Windows system directory (Sigma rule: &ldquo;Detect Suspicious WorkFolders Control Execution&rdquo;).</li>
<li>Investigate any instances where <code>control.exe</code> is executed from unusual or user-writable locations, especially if <code>WorkFolders.exe</code> is involved (see Attack Chain step 6).</li>
<li>Enable Sysmon process creation logging (Event ID 1) on Windows systems to capture the necessary data for the provided Sigma rules.</li>
<li>Review the Microsoft documentation on Windows Information Protection (WIP) and consider implementing it to encrypt data on PCs using Work Folders.</li>
<li>Implement application control policies that restrict the execution of <code>control.exe</code> to authorized locations (e.g., <code>C:\Windows\System32</code>).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>masquerading</category><category>windows</category></item><item><title>Remote File Download via Desktopimgdownldr Utility</title><link>https://feed.craftedsignal.io/briefs/2024-01-desktopimgdownldr-remote-file-copy/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-desktopimgdownldr-remote-file-copy/</guid><description>The desktopimgdownldr utility can be abused to download remote files, potentially bypassing standard download restrictions and acting as an alternative to certutil for malware or tool deployment.</description><content:encoded><![CDATA[<p>The <code>desktopimgdownldr.exe</code> utility, a legitimate Windows tool for configuring lock screen and desktop images, can be misused by adversaries to download arbitrary files from remote locations. This is achieved by leveraging the <code>/lockscreenurl</code> argument followed by an HTTP or HTTPS URL. This technique allows attackers to bypass traditional download restrictions and can be used to retrieve malicious payloads, tools, or scripts directly onto a compromised system. This method is particularly effective because <code>desktopimgdownldr.exe</code> is a signed Microsoft binary, potentially evading initial detection based on process name or file reputation. The detection rule was initially created in September 2020 and updated in May 2026. This technique is valuable for attackers seeking to transfer files without using common tools like <code>certutil</code>, <code>powershell</code>, or <code>bitsadmin</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system through an existing vulnerability, credential compromise, or social engineering.</li>
<li>The attacker executes <code>desktopimgdownldr.exe</code> with the <code>/lockscreenurl</code> argument, specifying a URL from which to download a malicious file.</li>
<li><code>desktopimgdownldr.exe</code> initiates an HTTP or HTTPS request to the specified URL.</li>
<li>The remote server responds with the file content, which <code>desktopimgdownldr.exe</code> saves to disk.</li>
<li>The attacker then executes the downloaded file (e.g., a malicious script or executable).</li>
<li>The malicious code performs actions such as establishing persistence, escalating privileges, or deploying further malware.</li>
<li>The attacker uses the compromised system to move laterally within the network, accessing sensitive data and systems.</li>
<li>The attacker achieves their final objective, such as data exfiltration, ransomware deployment, or disruption of services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to download and execute arbitrary files on a Windows system, leading to potential compromise of the host and the network. This can result in data theft, system damage, or ransomware infection. Due to the legitimate nature of the <code>desktopimgdownldr.exe</code> utility, this technique can bypass security controls and detection mechanisms, increasing the likelihood of successful exploitation. While the exact number of victims is unknown, any Windows system where an attacker can execute commands is potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Remote File Download via Desktopimgdownldr Utility&rdquo; to your SIEM to detect the execution of <code>desktopimgdownldr.exe</code> with the <code>/lockscreenurl</code> argument.</li>
<li>Monitor process creation events for <code>desktopimgdownldr.exe</code> to identify suspicious command-line arguments.</li>
<li>Enable Sysmon process creation logging to ensure sufficient data is available for the provided Sigma rules.</li>
<li>Investigate any instances of <code>desktopimgdownldr.exe</code> downloading files from external URLs to determine if they are malicious.</li>
<li>Implement application control policies to restrict the execution of unauthorized or unknown executables in sensitive environments.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>command-and-control</category><category>file-download</category><category>windows</category><category>desktopimgdownldr</category></item><item><title>Remote File Copy to a Hidden Share</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-remote-file-copy-hidden-share/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-remote-file-copy-hidden-share/</guid><description>This rule detects remote file copy attempts to hidden network shares, which may indicate lateral movement or data staging activity, by identifying suspicious file copy operations using command-line tools like cmd.exe and powershell.exe focused on hidden share patterns.</description><content:encoded><![CDATA[<p>This detection rule identifies attempts to copy files to hidden network shares in Windows environments, which can be indicative of lateral movement or data staging by malicious actors. Attackers may leverage hidden shares, typically used for legitimate administrative purposes, to move laterally within a network or to stage data for exfiltration without being easily detected. The rule focuses on detecting the use of command-line tools such as cmd.exe and powershell.exe with arguments that specify the copying of files to network paths that match a hidden share pattern (e.g., <code>\\\\*\\\\*$</code>). This activity helps identify suspicious file transfer operations that deviate from normal administrative or user behavior. The rule was last updated on 2026/05/04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised host within the network.</li>
<li>The attacker uses cmd.exe or powershell.exe to execute a file copy command.</li>
<li>The command line includes arguments to copy files to a hidden network share (e.g., <code>\\\\&lt;server&gt;\\&lt;hidden_share&gt;$</code>).</li>
<li>The <code>copy</code>, <code>move</code>, <code>cp</code>, or <code>mv</code> commands are used to transfer the file.</li>
<li>The target hidden share is accessed using the compromised account&rsquo;s credentials.</li>
<li>The file is successfully copied to the hidden share.</li>
<li>The attacker may then access the copied file from another compromised host.</li>
<li>The attacker proceeds to exfiltrate the staged data or uses the copied files for lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive data, lateral movement to other systems within the network, and potential data exfiltration. While the number of victims and specific sectors targeted are not specified, a successful compromise can significantly impact an organization&rsquo;s data security and overall network integrity. The impact includes potential data loss, reputational damage, and disruption of normal business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the &ldquo;Detect Remote File Copy to Hidden Share&rdquo; Sigma rule to your SIEM and tune for your environment to detect suspicious file copy activities.</li>
<li>Enable Sysmon process-creation logging to capture the command-line arguments used in file copy operations, activating the rule above.</li>
<li>Review and restrict permissions on network shares, especially hidden shares, to ensure only authorized users have access, as described in the investigation guide.</li>
<li>Investigate any alerts generated by the Sigma rule by examining the process details (cmd.exe, powershell.exe) and the network share path, as outlined in the investigation guide.</li>
<li>Correlate events with other logs or alerts from the same host or user to identify any additional suspicious activities, enhancing the detection capabilities.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>data-staging</category><category>windows</category><category>hidden-share</category></item><item><title>Registry Persistence via AppInit DLL Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-appinit-dll-persistence/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-appinit-dll-persistence/</guid><description>Modification of the AppInit DLLs registry keys on Windows systems allows attackers to execute code in every process that loads user32.dll, establishing persistence and potentially escalating privileges.</description><content:encoded><![CDATA[<p>The AppInit DLLs mechanism allows dynamic-link libraries (DLLs) to be loaded into every process that creates a user interface (loads user32.dll) on Microsoft Windows operating systems. This mechanism is intended for customization of the user interface and behavior of Windows-based applications. However, attackers can abuse this by adding malicious DLLs to the registry locations associated with AppInit DLLs. This enables them to execute code with elevated privileges, similar to process injection, and maintain a persistent presence on the compromised machine. This technique is often used to maintain access after initial compromise. Detection focuses on registry modifications to the relevant keys, excluding known legitimate processes to minimize false positives. The referenced Elastic rule was last updated on 2026/05/04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through a vulnerability, phishing, or other means.</li>
<li>The attacker identifies the AppInit DLLs registry keys: <code>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows</code> or <code>HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Windows</code>.</li>
<li>The attacker modifies the <code>AppInit_DLLs</code> registry value to include the path to their malicious DLL.</li>
<li>The attacker&rsquo;s DLL is placed on the filesystem, typically in a location where it will persist across reboots.</li>
<li>Any new process that loads user32.dll will automatically load the attacker&rsquo;s malicious DLL.</li>
<li>The malicious DLL executes arbitrary code within the context of the newly created process.</li>
<li>The attacker can use this code execution to perform further actions, such as installing backdoors or escalating privileges.</li>
<li>The attacker maintains persistent access to the system through the malicious DLL loaded into every user interface process.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to execute arbitrary code within the context of any process that loads <code>user32.dll</code>. This provides a persistent mechanism for maintaining access to the compromised system. The attacker gains code execution with elevated privileges, similar to process injection. This can lead to data theft, system compromise, or further lateral movement within the network. While no specific victim counts are mentioned, the widespread use of Windows makes this a potentially high-impact vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor registry modifications to the <code>AppInit_DLLs</code> value in <code>HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows</code> and <code>HKEY_LOCAL_MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Windows</code> using the &ldquo;Registry Persistence via AppInit DLL Modification&rdquo; Sigma rule.</li>
<li>Enable Sysmon registry event logging to provide the data required for the Sigma rule to function correctly.</li>
<li>Deploy the &ldquo;Registry Persistence via AppInit DLL Modification&rdquo; Sigma rule to your SIEM and tune the filter to exclude known-good DLL paths in your environment.</li>
<li>Investigate any alerts triggered by the Sigma rule, focusing on the parent process and the DLL being loaded.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>defense-evasion</category><category>appinit-dlls</category><category>registry</category><category>windows</category></item><item><title>Registry Persistence via AppCert DLL Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-appcert-dll-persistence/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-appcert-dll-persistence/</guid><description>Detection of registry modifications related to AppCert DLLs, a persistence mechanism where malicious DLLs are loaded by every process using common API functions.</description><content:encoded><![CDATA[<p>The rule detects attempts to maintain persistence by creating or modifying registry keys associated with AppCert DLLs on Windows systems. AppCert DLLs are loaded by every process that uses common API functions to create processes, making them a viable target for persistence. Adversaries can exploit this by inserting malicious DLL paths into the registry, ensuring their code executes persistently across system reboots. This technique is often used for privilege escalation and persistence. The rule specifically looks for changes in the registry path <code>HKLM\SYSTEM\ControlSet*\Control\Session Manager\AppCertDLLs\*</code>, as well as the equivalent <code>\\REGISTRY\\MACHINE\\SYSTEM\...</code> path. This activity matters because it can lead to stealthy and persistent malware infections. The rule is designed for use with data from Elastic Defend, Microsoft Defender XDR, SentinelOne Cloud Funnel, Crowdstrike, and Sysmon. The detection logic was last updated on 2026/05/04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system (e.g., through phishing or exploiting a vulnerability).</li>
<li>The attacker obtains necessary privileges to modify the Windows Registry, potentially requiring administrator rights.</li>
<li>The attacker creates or modifies a registry key under <code>HKLM\SYSTEM\ControlSet*\Control\Session Manager\AppCertDLLs\*</code> to point to a malicious DLL.</li>
<li>The malicious DLL is placed on the file system, often in a location that appears legitimate or is easily accessible.</li>
<li>Any process that uses the standard Windows API to create new processes will load the specified DLL.</li>
<li>The malicious DLL executes its payload, which could include establishing persistence, injecting into other processes, or performing other malicious activities.</li>
<li>The attacker maintains persistence by ensuring the malicious DLL is loaded every time a new process is created.</li>
<li>The final objective is to maintain long-term access to the compromised system, potentially escalating privileges and moving laterally within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to achieve persistent code execution on the system. This can lead to complete system compromise, data theft, or further propagation of malware within the network. The use of AppCert DLLs allows the malicious code to run in the context of nearly every process, making detection and removal more challenging. Without proper detection and response mechanisms, an attacker can maintain control of the system indefinitely.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon registry event logging and configure it to monitor the relevant AppCertDLLs registry paths to capture the necessary events for the rules (Data Source: Sysmon).</li>
<li>Deploy the provided Sigma rule <code>Detect AppCert DLL Registry Modification</code> to your SIEM to detect unauthorized modifications to the AppCertDLLs registry keys (Rule: Detect AppCert DLL Registry Modification).</li>
<li>Investigate any alerts generated by the rule <code>Detect AppCert DLL Registry Modification</code> to determine the legitimacy of the registry modifications, using the provided triage steps as a guide.</li>
<li>Regularly scan systems for malicious DLLs located in the file system using updated antivirus and anti-malware tools, focusing on DLLs referenced in the AppCertDLLs registry keys.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>privilege-escalation</category><category>appcert-dll</category></item><item><title>RDP Enabled via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-rdp-registry-enabled/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rdp-registry-enabled/</guid><description>An adversary may enable Remote Desktop Protocol (RDP) access by modifying the `fDenyTSConnections` registry key, potentially indicating lateral movement preparation or defense evasion.</description><content:encoded><![CDATA[<p>Attackers may enable Remote Desktop Protocol (RDP) to facilitate lateral movement within a compromised network. By modifying the <code>fDenyTSConnections</code> registry key to a value of <code>0</code>, attackers can enable remote desktop connections, allowing them to access systems remotely. This technique can be employed using remote registry manipulation or tools like PsExec. The modification of the registry key is a common tactic used by ransomware operators and other threat actors to gain unauthorized access to victim servers. This activity can be performed to enable remote access for initial access or to regain access after persistence mechanisms have failed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system via an exploit or compromised credentials.</li>
<li>The attacker uses a tool like PsExec or leverages remote registry modification capabilities.</li>
<li>The attacker modifies the <code>fDenyTSConnections</code> registry key, setting its value to <code>0</code>. This key is typically located in <code>HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server</code>.</li>
<li>The system&rsquo;s RDP service is enabled or re-enabled as a result of the registry change.</li>
<li>The attacker attempts to connect to the now-enabled RDP service using valid or brute-forced credentials.</li>
<li>Upon successful authentication, the attacker gains interactive access to the system via RDP.</li>
<li>The attacker performs reconnaissance, elevates privileges, and moves laterally to other systems.</li>
<li>The attacker deploys ransomware, exfiltrates data, or achieves other objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful modification of the <code>fDenyTSConnections</code> registry key allows unauthorized remote access to systems, potentially leading to lateral movement, data theft, or ransomware deployment. Organizations could suffer significant financial losses, reputational damage, and operational disruption. The scope of the impact depends on the attacker&rsquo;s objectives and the level of access they gain within the environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;RDP Enabled via Registry&rdquo; to detect modifications to the <code>fDenyTSConnections</code> registry key (rules).</li>
<li>Monitor process creation events for suspicious use of <code>reg.exe</code> or PowerShell to modify registry keys related to RDP (rules).</li>
<li>Implement network segmentation and firewall rules to restrict RDP traffic to authorized hosts (overview).</li>
<li>Review the privileges assigned to users and ensure the principle of least privilege is enforced (overview).</li>
<li>Enable Sysmon registry event logging to capture registry modifications (setup).</li>
<li>Investigate any alerts related to registry modifications on critical systems (overview).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>lateral-movement</category><category>defense-evasion</category><category>rdp</category><category>registry-modification</category></item><item><title>PsExec Lateral Movement via Network Connection</title><link>https://feed.craftedsignal.io/briefs/2024-01-psexec-lateral-movement/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-psexec-lateral-movement/</guid><description>The rule identifies the use of PsExec.exe making a network connection, indicative of potential lateral movement by adversaries executing commands with SYSTEM privileges on Windows systems to disable defenses.</description><content:encoded><![CDATA[<p>This detection identifies the execution of PsExec, a dual-use tool commonly employed for both legitimate administration and malicious lateral movement. PsExec, part of the Sysinternals Suite, allows for remote command execution with elevated privileges, often abused by attackers to disable security controls and move laterally within a network. This rule specifically detects the creation of <code>PsExec.exe</code> followed by a network connection initiated by the process, which is a strong indicator of potential malicious activity. While PsExec has legitimate uses, its prevalence in attack scenarios necessitates careful monitoring. The rule is designed to work with data from Elastic Defend, SentinelOne Cloud Funnel, and Sysmon.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system within the network (e.g., via phishing or exploiting a vulnerability).</li>
<li>The attacker uploads or transfers the PsExec tool (<code>PsExec.exe</code>) to the compromised host, potentially using SMB shares or other file transfer methods.</li>
<li>The attacker executes PsExec with the <code>-accepteula</code> flag, which suppresses the license dialog, potentially indicating a first-time execution on the machine.</li>
<li>PsExec establishes a network connection to a remote target system, leveraging SMB/Windows Admin Shares (T1021.002) to facilitate remote command execution.</li>
<li>The attacker uses PsExec to execute commands on the remote system, potentially with SYSTEM privileges, to install malware, gather credentials, or perform reconnaissance.</li>
<li>The attacker leverages the newly compromised system as a pivot point to move laterally to other systems within the network, repeating the process.</li>
<li>The attacker escalates privileges on multiple systems.</li>
<li>The attacker achieves their objective, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to widespread compromise across the network. Attackers can leverage PsExec to gain control over critical systems, disable security controls, and exfiltrate sensitive data. Lateral movement facilitated by PsExec can enable attackers to rapidly expand their footprint within an organization, impacting numerous systems and services. While the rule&rsquo;s severity is low due to the dual-use nature of PsExec, the potential impact of unchecked lateral movement is significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>PsExec Network Connection</code> to your SIEM and tune the <code>process.executable</code> and <code>process.parent.executable</code> filters for your environment to reduce false positives.</li>
<li>Enable Sysmon Event ID 1 (Process Creation) and Event ID 3 (Network Connection) logging for enhanced visibility into PsExec activity.</li>
<li>Review and enforce the principle of least privilege to limit the accounts that can run PsExec and access sensitive systems.</li>
<li>Investigate any alerts generated by the <code>PsExec Network Connection</code> rule promptly to determine if the activity is legitimate or malicious.</li>
<li>Monitor network connections originating from systems where PsExec is executed using the <code>PsExec Outbound Network Connection</code> Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>psexec</category><category>lateral-movement</category><category>windows</category></item><item><title>Potential DNS Tunneling via NsLookup</title><link>https://feed.craftedsignal.io/briefs/2024-01-dns-tunneling-nslookup/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-dns-tunneling-nslookup/</guid><description>Detection of multiple nslookup.exe executions with explicit query types from a single host, potentially indicating command and control activity via DNS tunneling, where attackers abuse DNS for data infiltration or exfiltration.</description><content:encoded><![CDATA[<p>Attackers can abuse DNS protocol for command and control and/or data exfiltration by exploiting network rules that allow DNS communication with external resources. This technique, known as DNS tunneling, involves encoding data within DNS queries to transmit commands, malicious files, or exfiltrate sensitive information to attacker-controlled DNS servers. Detection focuses on identifying anomalous patterns of nslookup.exe usage, specifically a high volume of executions with explicit query types originating from a single host within a short timeframe. This activity may bypass traditional security controls that monitor standard network traffic, enabling covert communication channels.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker compromises a host within the network.</li>
<li>The attacker executes <code>nslookup.exe</code> to perform DNS queries with specific query types (e.g., <code>-querytype=TXT</code>, <code>-qt=A</code>).</li>
<li>The attacker encodes data (commands, files, or exfiltrated data) into the DNS query.</li>
<li>The compromised host sends multiple DNS requests to a rogue DNS server controlled by the attacker.</li>
<li>The attacker receives the DNS queries and decodes the data.</li>
<li>The attacker uses the tunneled command to further compromise the internal network.</li>
<li>The attacker exfiltrates data to the attacker-controlled server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful DNS tunneling allows attackers to establish covert communication channels, bypassing traditional security measures. This can lead to command and control of compromised systems, exfiltration of sensitive data, and further propagation within the network. The impact includes potential data breaches, system compromise, and prolonged attacker presence due to the difficulty in detecting covert DNS traffic.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Suspicious Nslookup DNS Tunneling Activity&rdquo; to your SIEM to detect potential DNS tunneling attempts.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture <code>nslookup.exe</code> executions and their command-line arguments.</li>
<li>Inspect network traffic logs for unusually high volumes of DNS queries originating from individual hosts.</li>
<li>Monitor DNS query logs for encoded or unusual data patterns within DNS query names.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>dns-tunneling</category><category>command-and-control</category><category>windows</category></item><item><title>Potential Credential Access via Windows Utilities</title><link>https://feed.craftedsignal.io/briefs/2024-01-potential-credential-access-windows-utilities/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-potential-credential-access-windows-utilities/</guid><description>This rule detects the execution of known Windows utilities often abused to dump LSASS memory or the Active Directory database (NTDS.dit) in preparation for credential access by identifying specific command-line arguments and process names associated with credential dumping activities.</description><content:encoded><![CDATA[<p>This rule identifies the execution of Windows utilities commonly abused to dump LSASS memory or the Active Directory database (NTDS.dit) in preparation for credential access. Attackers often leverage these tools to extract sensitive information, such as user credentials and domain secrets. The utilities of interest include procdump, ProcessDump.exe, WriteMiniDump.exe, RUNDLL32.EXE, RdrLeakDiag.exe, SqlDumper.exe, TTTracer.exe, ntdsutil.exe, and diskshadow.exe. The rule focuses on detecting specific command-line arguments and process names indicative of credential dumping activities. This activity is typically associated with post-exploitation phases, where attackers aim to escalate privileges and move laterally within a network. This detection is crucial for defenders as it can reveal ongoing credential theft attempts, allowing for prompt intervention and mitigation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to a Windows system through various means, such as phishing, exploiting vulnerabilities, or using compromised credentials.</li>
<li>The attacker executes a privileged process, such as <code>cmd.exe</code> or <code>powershell.exe</code>, to perform reconnaissance and identify potential targets for credential dumping.</li>
<li>The attacker uses a utility like <code>procdump.exe</code> with the <code>-ma</code> flag to dump the LSASS process memory (<code>procdump.exe -ma lsass.exe</code>).</li>
<li>Alternatively, the attacker uses <code>ntdsutil.exe</code> to create an IFM (Install From Media) snapshot of the Active Directory database (<code>ntdsutil.exe &quot;ac i ntds&quot; &quot;ifm&quot; &quot;cr fu c:\\temp&quot; q q</code>).</li>
<li>The attacker may use <code>diskshadow.exe</code> with a script (<code>/s</code>) to create shadow copies of the system volume, potentially including the NTDS.dit file.</li>
<li>The attacker stages the dumped credentials or database files in a temporary directory.</li>
<li>The attacker compresses the staged data using archiving tools for easier transfer.</li>
<li>Finally, the attacker exfiltrates the compressed data to an external server for further analysis and credential harvesting.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to widespread credential compromise, allowing attackers to gain unauthorized access to sensitive systems and data. Credential theft can enable lateral movement within the network, privilege escalation, and ultimately, data exfiltration or ransomware deployment. The targeted dumping of LSASS memory exposes user credentials, while the extraction of the Active Directory database can compromise the entire domain. The severity of the impact depends on the scope of the compromise and the sensitivity of the affected data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect suspicious process execution patterns indicative of credential dumping (Sigma rule: &ldquo;Potential Credential Access via Procdump&rdquo;).</li>
<li>Monitor process creation events for the execution of known credential dumping utilities with suspicious command-line arguments using the provided Sigma rules, enabling process creation logging via Sysmon (Sigma rule: &ldquo;Potential Credential Access via NTDSUtil&rdquo;).</li>
<li>Implement application control policies to restrict the execution of unauthorized or untrusted binaries, especially those associated with credential dumping, referencing the list of tools described in the Overview.</li>
<li>Review and harden Active Directory security configurations to prevent unauthorized access to the NTDS.dit file, using Microsoft&rsquo;s security guidance.</li>
<li>Regularly audit and monitor systems for suspicious file creation and modification events, particularly those involving potential credential dumps, and ensure proper file integrity monitoring is enabled.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>defense-evasion</category><category>windows</category></item><item><title>Persistence via WMI Event Subscription</title><link>https://feed.craftedsignal.io/briefs/2024-01-wmi-persistence/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wmi-persistence/</guid><description>Adversaries can leverage Windows Management Instrumentation (WMI) to establish persistence by creating event subscriptions that trigger malicious code execution when specific events occur, using tools like wmic.exe to create event consumers.</description><content:encoded><![CDATA[<p>Windows Management Instrumentation (WMI) provides a powerful framework for managing Windows systems, but adversaries can abuse its capabilities to establish persistence. By creating WMI event subscriptions, attackers can execute arbitrary code in response to defined system events. This technique involves creating event filters, providers, consumers, and bindings that automatically run malicious code. This can be achieved through tools like <code>wmic.exe</code>, which allows the creation of event consumers such as <code>ActiveScriptEventConsumer</code> or <code>CommandLineEventConsumer</code>. Successful exploitation of WMI for persistence allows attackers to maintain unauthorized access to a compromised system, even after reboots or other system changes. This activity has been observed across various environments, highlighting the need for robust detection mechanisms to identify and prevent WMI-based persistence.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a Windows system through unspecified means.</li>
<li>The attacker uses <code>wmic.exe</code> to create a WMI event filter that defines a specific event to monitor.</li>
<li>A WMI event consumer, such as <code>ActiveScriptEventConsumer</code> or <code>CommandLineEventConsumer</code>, is created using <code>wmic.exe</code> specifying the malicious code or script to execute when the event occurs.</li>
<li>A WMI binding is established between the event filter and the event consumer using <code>wmic.exe</code>, linking the event to the action.</li>
<li>The malicious WMI event subscription is activated, monitoring for the defined event.</li>
<li>When the specified event occurs, the WMI service triggers the execution of the associated malicious code or script through the event consumer.</li>
<li>The attacker gains persistent access to the system, as the WMI event subscription will re-activate after reboots.</li>
<li>The attacker can then perform additional malicious activities, such as lateral movement or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of WMI for persistence can allow an attacker to maintain long-term, unauthorized access to a compromised system. This can result in data theft, system compromise, and further malicious activities. While the exact number of victims is not specified in the source, the broad applicability of this technique means that many Windows systems are potentially at risk. If the attack succeeds, the attacker gains a foothold on the system that is difficult to detect and remove, which can lead to significant operational disruption and financial loss.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging and monitor for <code>wmic.exe</code> with command-line arguments related to creating event consumers, specifically <code>ActiveScriptEventConsumer</code> or <code>CommandLineEventConsumer</code>, to trigger the Sigma rule &ldquo;Detect Suspicious WMIC Process&rdquo;.</li>
<li>Deploy the provided Sigma rule to your SIEM to detect suspicious WMI event subscription creation.</li>
<li>Review the investigation steps outlined in the provided documentation to triage and analyze potential WMI persistence attempts.</li>
<li>Monitor Windows Security Event Logs and Sysmon for events related to WMI activity for broader coverage.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>persistence</category><category>execution</category><category>windows</category><category>wmi</category></item></channel></rss>