<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>SolarWinds — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/solarwinds/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 09 Jan 2024 14:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/solarwinds/feed.xml" rel="self" type="application/rss+xml"/><item><title>Account Discovery Command via SYSTEM Account</title><link>https://feed.craftedsignal.io/briefs/2024-01-09-system-account-discovery/</link><pubDate>Tue, 09 Jan 2024 14:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-09-system-account-discovery/</guid><description>The rule identifies when the SYSTEM account uses an account discovery utility, potentially indicating discovery activity after privilege escalation, focusing on utilities like whoami.exe and net1.exe executed under the SYSTEM account.</description><content:encoded><![CDATA[<p>This detection rule identifies instances where the SYSTEM account is used to execute account discovery utilities, such as <code>whoami.exe</code> and <code>net1.exe</code>. This behavior is commonly observed after an attacker has successfully achieved privilege escalation within a Windows environment, or after exploiting a web application. The rule is designed to detect post-exploitation discovery activity where an adversary attempts to gain situational awareness by enumerating accounts and system information using the elevated SYSTEM context. The rule leverages data from Elastic Defend and Sysmon Event ID 1 to identify these behaviors, helping defenders spot potential privilege escalation and lateral movement attempts. The original rule was created 2020/03/18 and updated 2026/05/04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, potentially through exploiting a vulnerability in a web application or through phishing.</li>
<li>The attacker escalates privileges to the SYSTEM account, possibly by exploiting a local privilege escalation vulnerability.</li>
<li>The attacker executes <code>whoami.exe</code> or <code>net1.exe</code> via the SYSTEM account to enumerate user accounts and gather system information.</li>
<li>The <code>whoami.exe</code> or <code>net1.exe</code> process is spawned by a parent process such as a web server process (e.g., w3wp.exe) or a service process.</li>
<li>The attacker uses the discovered account information to plan further actions, such as lateral movement or credential theft.</li>
<li>The attacker may use <code>net1.exe</code> to query domain information.</li>
<li>The attacker leverages the gained information to identify valuable targets within the network.</li>
<li>The final objective is often data exfiltration, deployment of ransomware, or further compromise of the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to unauthorized access to sensitive data, lateral movement within the network, and potential data exfiltration or ransomware deployment. Although this rule has low severity, the execution of discovery commands by the SYSTEM account can be a critical indicator of compromise. Early detection of such activity can prevent more severe damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rules to detect account discovery commands executed via the SYSTEM account and tune for your environment.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to ensure the necessary data is available for detection.</li>
<li>Investigate any alerts generated by these rules, focusing on the process execution chain to identify the source of the SYSTEM account usage.</li>
<li>If the process tree includes a web-application server process, investigate suspicious file creation or modification to assess for webshell backdoors.</li>
<li>Review and harden web application security to prevent initial access and privilege escalation.</li>
</ul>
]]></content:encoded><category domain="severity">low</category><category domain="type">advisory</category><category>discovery</category><category>privilege-escalation</category><category>windows</category></item><item><title>Suspicious SolarWinds Child Process Execution</title><link>https://feed.craftedsignal.io/briefs/2024-01-solarwinds-child-process/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-solarwinds-child-process/</guid><description>Detection of unusual child processes spawned by SolarWinds processes may indicate malicious program execution, potentially bypassing security controls.</description><content:encoded><![CDATA[<p>This detection rule identifies suspicious child processes initiated by SolarWinds.BusinessLayerHost.exe or SolarWinds.BusinessLayerHostx64.exe, excluding known legitimate operations. Adversaries may exploit the trusted SolarWinds processes to execute unauthorized programs with elevated privileges, bypassing security controls. The rule focuses on Windows systems and is designed to detect activity indicative of post-compromise actions following a supply chain attack. This detection is crucial for organizations that utilize SolarWinds software, as malicious actors could leverage compromised SolarWinds installations to gain unauthorized access and execute arbitrary code within the network.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of the SolarWinds software supply chain (T1195.002).</li>
<li>Malicious code is injected into SolarWinds.BusinessLayerHost.exe or SolarWinds.BusinessLayerHostx64.exe.</li>
<li>The compromised SolarWinds process spawns a suspicious child process.</li>
<li>The child process executes a malicious command or binary, attempting to evade detection.</li>
<li>The child process leverages Native APIs (T1106) to perform privileged actions.</li>
<li>Lateral movement or data exfiltration may occur from the compromised host.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can lead to the execution of arbitrary code on systems running SolarWinds software. This can result in data theft, system compromise, and further propagation of the attack throughout the network. Organizations in various sectors utilizing SolarWinds products are potentially at risk. The impact may include loss of sensitive data, disruption of critical services, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Suspicious SolarWinds Child Process - CommandLine</code> to detect potentially malicious child processes of SolarWinds.BusinessLayerHost.exe or SolarWinds.BusinessLayerHostx64.exe.</li>
<li>Deploy the Sigma rule <code>Suspicious SolarWinds Child Process - Executable</code> to detect execution of unusual executables as child processes of SolarWinds.BusinessLayerHost.exe or SolarWinds.BusinessLayerHostx64.exe.</li>
<li>Enable process creation logging with command line details on Windows systems to ensure the Sigma rules have sufficient data.</li>
<li>Review and tune the rules for false positives based on legitimate SolarWinds child processes in your environment, updating the exclusion lists in the rules accordingly, referencing the &ldquo;false_positives&rdquo; section in the rule description.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>supply-chain</category><category>execution</category><category>solarwinds</category></item><item><title>SolarWinds Process Disabling Services via Registry Modification</title><link>https://feed.craftedsignal.io/briefs/2024-01-solarwinds-service-disable/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-solarwinds-service-disable/</guid><description>A SolarWinds binary is modifying the start type of a service to be disabled via registry modification, potentially to disable or impair security services.</description><content:encoded><![CDATA[<p>This threat brief focuses on the detection of SolarWinds processes attempting to disable services by modifying their registry start type. This activity is associated with defense evasion tactics, potentially linked to initial access via supply chain compromise, similar to the SUNBURST campaign. The behavior involves SolarWinds binaries, such as <code>SolarWinds.BusinessLayerHost*.exe</code> and <code>NetFlowService*.exe</code>, manipulating registry entries related to service start configurations. This technique can be used to impair or disable security tools and services, allowing attackers to operate more freely within a compromised environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial compromise of the SolarWinds Orion platform, potentially through a supply chain attack.</li>
<li>Deployment of a malicious module or payload within the SolarWinds environment.</li>
<li>Execution of a SolarWinds process, such as <code>SolarWinds.BusinessLayerHost*.exe</code>.</li>
<li>The SolarWinds process modifies the registry to change the start type of a service.</li>
<li>The registry modification targets the <code>HKLM\SYSTEM\ControlSet*\Services\*\Start</code> path.</li>
<li>The <code>Start</code> value is set to &ldquo;4&rdquo; or &ldquo;0x00000004&rdquo;, which disables the targeted service.</li>
<li>Disabling critical security services allows the attacker to evade detection and further compromise the system.</li>
<li>Attacker achieves persistence and performs lateral movement, exfiltrating data or deploying ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the disabling of critical security services, such as antivirus, endpoint detection and response (EDR) agents, or other monitoring tools. This can significantly reduce the visibility of malicious activity within the network, potentially leading to data breaches, ransomware deployment, or other severe security incidents. The SolarWinds supply chain compromise affected numerous organizations globally, underscoring the potential impact of this type of attack.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>SolarWinds Process Disabling Services via Registry</code> to your SIEM to detect registry modifications by SolarWinds processes aimed at disabling services.</li>
<li>Enable Sysmon registry event logging to provide the necessary data for the Sigma rule to function effectively.</li>
<li>Review and harden access controls for SolarWinds processes to restrict their ability to modify critical system settings.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the affected service and the timeline of events surrounding the registry modification.</li>
<li>Utilize threat intelligence platforms to stay informed about known SolarWinds-related attack patterns and indicators of compromise (IOCs).</li>
<li>Monitor endpoints for unusual behavior by SolarWinds processes, including network connections, file modifications, and process creations.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>solarwinds</category><category>defense-evasion</category><category>registry-modification</category><category>supply-chain</category></item></channel></rss>