<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Splunk — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/splunk/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 14:17:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/splunk/feed.xml" rel="self" type="application/rss+xml"/><item><title>Potential Evasion via Windows Filtering Platform Blocking Security Software</title><link>https://feed.craftedsignal.io/briefs/2026-05-wfp-evasion/</link><pubDate>Mon, 04 May 2026 14:17:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wfp-evasion/</guid><description>Adversaries may add malicious Windows Filtering Platform (WFP) rules to prevent endpoint security solutions from sending telemetry data, impairing defenses, which this rule detects by identifying multiple WFP block events where the process name is associated with endpoint security software.</description><content:encoded><![CDATA[<p>The Windows Filtering Platform (WFP) provides APIs and system services for network filtering and packet processing. Attackers can abuse WFP by creating malicious rules to block endpoint security processes, hindering their ability to send telemetry. This can be achieved by tools like Shutter, EDRSilencer, and Nighthawk. This detection rule identifies patterns of blocked network events linked to security software processes, signaling potential evasion tactics. The rule specifically looks for blocked network events linked to processes associated with known security software, aiming to detect and alert on attempts to disable or modify security tools. This behavior is especially concerning as it allows attackers to operate with reduced visibility.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the target system (e.g., via compromised credentials or exploiting a vulnerability).</li>
<li>The attacker escalates privileges to gain administrative rights, necessary to interact with the Windows Filtering Platform.</li>
<li>The attacker uses a tool or script (e.g., leveraging the <code>netsh</code> command or custom WFP API calls) to create a new WFP filter.</li>
<li>The WFP filter is configured to block network traffic originating from specific processes associated with endpoint security software (e.g., <code>elastic-agent.exe</code>, <code>sysmon.exe</code>).</li>
<li>The system begins blocking network communication from the targeted security software.</li>
<li>The attacker executes malicious commands or malware on the system, knowing that security telemetry will be suppressed.</li>
<li>The attacker moves laterally within the network, repeating the WFP filter deployment on other systems to further impair defenses.</li>
<li>The attacker achieves their final objective, such as data exfiltration or ransomware deployment, with reduced risk of detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack using WFP to impair defenses can lead to a significant reduction in the effectiveness of endpoint security solutions. This can result in delayed detection of malicious activities, increased dwell time for attackers, and ultimately, a higher likelihood of successful data breaches or ransomware attacks. With endpoint telemetry blocked, organizations may remain unaware of the ongoing compromise until significant damage has occurred. The number of affected systems can vary depending on the attacker&rsquo;s scope and objectives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable and review Windows Audit Filtering Platform Connection and Packet Drop events to populate the logs required for the provided EQL rule (logs-system.security*, logs-windows.forwarded*, winlogbeat-*).</li>
<li>Deploy the provided EQL rule to your SIEM to detect suspicious WFP modifications and tune for your environment.</li>
<li>Investigate any alerts generated by the EQL rule, focusing on identifying the specific processes being blocked and the source of the WFP rule modifications.</li>
<li>Regularly review and audit WFP rules to identify any unauthorized or suspicious entries.</li>
<li>Implement strict access controls and monitoring for systems authorized to modify WFP rules.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>windows-filtering-platform</category><category>endpoint-security</category></item><item><title>Detection of Wevtutil.exe Used to Disable Event Logs</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-logs-wevtutil/</link><pubDate>Thu, 04 Jan 2024 16:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-logs-wevtutil/</guid><description>The execution of `wevtutil.exe` with parameters to disable event logs is a tactic commonly employed by ransomware to evade detection and hinder forensic investigations, leading to a significant reduction in visibility for defenders.</description><content:encoded><![CDATA[<p>Attackers, particularly ransomware groups, often disable or manipulate event logs to cover their tracks and hinder forensic investigations. This activity typically occurs post-compromise as part of an attacker&rsquo;s defense evasion strategy. The use of <code>wevtutil.exe</code>, a legitimate Windows command-line utility, makes this technique challenging to detect without specific monitoring. Ransomware actors disable logging to operate undetected, making it difficult for security teams to trace malicious activities and respond effectively. This can prolong the dwell time of the attacker within the environment and increase the potential for widespread damage, data exfiltration, or system encryption.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained through typical methods like phishing or exploiting public-facing vulnerabilities.</li>
<li>The attacker executes code on the compromised system, achieving initial foothold.</li>
<li>Privilege escalation techniques are employed to gain elevated permissions (e.g., using exploits, token manipulation).</li>
<li>The attacker uses <code>wevtutil.exe</code> with specific commands to disable or clear event logs. Example commands include <code>wevtutil.exe sl &lt;logname&gt; false</code> or <code>wevtutil.exe set-log &lt;logname&gt; /enabled:false</code>.</li>
<li>The attacker disables specific event channels to remove evidence of their activity.</li>
<li>Persistence mechanisms are established to maintain access across reboots (e.g., creating scheduled tasks, modifying registry keys).</li>
<li>Lateral movement is initiated to compromise additional systems within the network using tools like PsExec or SMB shares.</li>
<li>The final objective, such as ransomware deployment or data exfiltration, is executed, with logging disabled to minimize the chances of detection.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful disabling of event logs allows attackers to operate undetected, hindering forensic investigations and incident response efforts. This can lead to delayed detection of breaches, prolonged dwell time for attackers, and increased damage to affected organizations. Ransomware groups frequently use this technique to maximize the impact of their attacks, resulting in data encryption, exfiltration, and significant financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging (Event ID 1) to detect the execution of <code>wevtutil.exe</code> with suspicious parameters.</li>
<li>Deploy the Sigma rules provided below to your SIEM to detect specific command-line arguments used to disable event logs.</li>
<li>Monitor Windows Event Log Security (4688) for process creation events of <code>wevtutil.exe</code> with arguments related to disabling or clearing logs.</li>
<li>Investigate any instances where <code>wevtutil.exe</code> is executed with parameters like <code>sl</code> or <code>set-log</code> and <code>/e:false</code> or <code>/enabled:false</code> in the command line, as highlighted in the provided Sigma rules.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>ransomware</category><category>windows</category></item><item><title>PowerShell P/Invoke Process Injection API Chain Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-powershell-pinvoke-process-injection/</link><pubDate>Wed, 03 Jan 2024 18:23:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-powershell-pinvoke-process-injection/</guid><description>This analytic detects PowerShell code that uses P/Invoke to call Windows API functions associated with process injection, such as VirtualAlloc, WriteProcessMemory, and CreateRemoteThread, indicating potential malicious activity.</description><content:encoded><![CDATA[<p>This detection identifies PowerShell scripts leveraging the P/Invoke (Platform Invoke) technology to perform process injection. P/Invoke allows managed code (like PowerShell) to call unmanaged functions exported from DLLs, including critical Windows API functions. Attackers use this to inject malicious code into legitimate processes for evasion and persistence. The detection focuses on identifying specific API chains commonly used in process injection techniques, such as allocating memory in a target process (VirtualAlloc), writing malicious code into the allocated memory (WriteProcessMemory), and executing the injected code (CreateRemoteThread). This activity is often associated with malware deployment, privilege escalation, and defense evasion. The detection logic is designed to identify these API chains either at the compile phase using Add-Type or during the execution phase, alerting on suspicious PowerShell behavior.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains initial access to the system, potentially through phishing or exploiting a vulnerability.</li>
<li>PowerShell is invoked to execute a malicious script.</li>
<li>The PowerShell script uses Add-Type and DllImport to declare external functions from Windows DLLs, including kernel32.dll and ntdll.dll.</li>
<li>The script uses functions such as OpenProcess to gain a handle to a target process.</li>
<li>VirtualAllocEx is called to allocate memory within the target process.</li>
<li>WriteProcessMemory is used to write malicious code into the allocated memory region of the target process.</li>
<li>CreateRemoteThread is called to create a new thread within the target process, pointing to the injected code.</li>
<li>The injected code executes within the context of the target process, achieving code execution and potential privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful process injection allows attackers to execute arbitrary code within the context of a trusted process, bypassing security controls and potentially gaining elevated privileges. This can lead to data theft, system compromise, or further propagation within the network. The use of PowerShell and P/Invoke makes detection more challenging, as the activity can blend in with legitimate system administration tasks. A successful attack could lead to the deployment of a VIP Keylogger or other malware, as noted in the provided references.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging (Event ID 4104) to provide the necessary data for detection (data_source).</li>
<li>Deploy the Sigma rule <code>PowerShell PInvoke Process Injection</code> to your SIEM and tune the rule to your environment (rules).</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the specific API chains identified in the <code>detection</code> section of the rule.</li>
<li>Review PowerShell execution policies and restrict the execution of unsigned scripts to reduce the attack surface.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>process-injection</category><category>powershell</category><category>pinvoke</category><category>defense-evasion</category></item><item><title>Suspicious PowerShell Script Using Cryptography Namespace</title><link>https://feed.craftedsignal.io/briefs/2024-01-powershell-cryptography/</link><pubDate>Wed, 03 Jan 2024 18:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-powershell-cryptography/</guid><description>The analytic detects suspicious PowerShell script execution involving the cryptography namespace (excluding SHA and MD5) via EventCode 4104, often associated with malware that decrypts or decodes additional malicious payloads leading to further code execution, privilege escalation, or persistence.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting suspicious PowerShell activity involving the System.Security.Cryptography namespace, excluding common hashing algorithms like SHA and MD5. The detection leverages Windows PowerShell Script Block Logging (EventCode 4104) to identify scripts using cryptographic functions. This is significant because malware often uses cryptography to decrypt or decode additional malicious payloads, which can lead to further code execution, privilege escalation, or persistence within the compromised environment. The technique is commonly used by malware families like AsyncRAT, XWorm, and VIP Keylogger. Defenders should investigate the parent process of such scripts, the decrypted data, network connections established by the script, and the user context in which the script is executed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, possibly through phishing or exploiting a vulnerability.</li>
<li>The attacker executes a PowerShell script on the compromised system.</li>
<li>The PowerShell script utilizes the <code>System.Security.Cryptography</code> namespace to perform cryptographic operations.</li>
<li>The script decrypts or decodes a malicious payload (e.g., a second-stage executable or configuration file).</li>
<li>The decrypted payload is written to disk or loaded directly into memory.</li>
<li>The attacker executes the decrypted payload, potentially establishing persistence via registry keys or scheduled tasks.</li>
<li>The malware leverages the established persistence mechanism for long-term access.</li>
<li>The attacker performs malicious actions such as data exfiltration, lateral movement, or remote command execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to bypass security measures by hiding malicious code within encrypted payloads. This can lead to data theft, system compromise, and further propagation within the network. Malware families like AsyncRAT, XWorm, and VIP Keylogger use this technique to maintain persistence and perform malicious activities undetected. The impact can range from individual workstation compromise to large-scale data breaches depending on the attacker&rsquo;s objectives and the compromised system&rsquo;s role within the organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging on all endpoints to generate the necessary logs (EventCode 4104) for detection.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious PowerShell Cryptography Namespace Usage</code> to your SIEM to detect the described activity.</li>
<li>Investigate any alerts generated by the Sigma rule by examining the parent process, decrypted data, network connections, and the user executing the script.</li>
<li>Review and tune the Sigma rule <code>Detect Suspicious PowerShell Cryptography Namespace Usage</code> based on your environment&rsquo;s specific needs and known-good PowerShell usage to reduce false positives.</li>
<li>Implement application control policies to restrict the execution of unsigned or untrusted PowerShell scripts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>powershell</category><category>cryptography</category><category>malware</category><category>asyncrat</category><category>xworm</category><category>vip keylogger</category></item><item><title>Non-Firefox Process Accessing Firefox Profile Directory</title><link>https://feed.craftedsignal.io/briefs/2024-01-firefox-profile-access/</link><pubDate>Wed, 03 Jan 2024 15:22:32 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-firefox-profile-access/</guid><description>This analytic detects non-Firefox processes accessing the Firefox profile directory, potentially indicating malware attempting to harvest sensitive user data like login credentials, browsing history, and cookies.</description><content:encoded><![CDATA[<p>This detection focuses on identifying unauthorized access to Firefox profile directories. The Firefox profile directory stores sensitive user data, including login credentials, browsing history, and cookies. When a non-Firefox process accesses this directory, it could be an indicator of malicious activity, such as a Remote Access Trojan (RAT) or other malware attempting to steal user information. The analytic leverages Windows Security Event logs, specifically event code 4663, to monitor access attempts. This is relevant because successful credential theft can lead to account compromise, data breaches, and further propagation of malware within the network. The threat encompasses a broad range of malware families, including stealers (Azorult, RedLine Stealer, 0bj3ctivity Stealer), RATs (Remcos, Quasar RAT, Warzone RAT), keyloggers (Snake Keylogger, VIP Keylogger), and other malware like DarkGate, NjRAT, AgentTesla, and Lokibot. The activity has been observed in campaigns such as CISA AA23-347A and the 3CX Supply Chain Attack.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The user executes a malicious file, potentially delivered via phishing or drive-by download (not covered in source).</li>
<li>The malicious file executes and establishes persistence on the system.</li>
<li>The malware attempts to access the Firefox profile directory, located at <code>*\AppData\Roaming\Mozilla\Firefox\Profiles*</code>.</li>
<li>Windows Security Event 4663 is generated, logging the access attempt to the Firefox profile directory.</li>
<li>The malware reads sensitive data, such as login credentials, cookies, and browsing history, from the profile directory.</li>
<li>The stolen data is exfiltrated to a command-and-control (C2) server.</li>
<li>The attacker uses the stolen credentials to gain unauthorized access to user accounts and sensitive systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation and credential theft can lead to a wide range of negative outcomes, including unauthorized access to sensitive data, financial fraud, and further compromise of systems within the organization. The impact can range from individual user account compromise to large-scale data breaches affecting thousands of users. Industries heavily reliant on web-based applications and sensitive user data, such as finance, healthcare, and e-commerce, are particularly vulnerable. The consequences include financial losses, reputational damage, and legal liabilities.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Object Access&rdquo; in Group Policy and configure it to log both success and failure events for object access to activate the underlying log source required for this detection.</li>
<li>Deploy the provided Sigma rule to your SIEM to detect non-Firefox processes accessing Firefox profile directories.</li>
<li>Investigate any alerts generated by the Sigma rule, paying close attention to the <code>ProcessName</code> and <code>ObjectName</code> to identify potentially malicious processes and the specific profile data being accessed.</li>
<li>Review and update your organization&rsquo;s security policies to restrict unauthorized access to sensitive user data.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>malware</category><category>firefox</category></item><item><title>Windows Time-Based Evasion via Choice Exec</title><link>https://feed.craftedsignal.io/briefs/2024-01-time-based-evasion-choice/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-time-based-evasion-choice/</guid><description>Detection of choice.exe used in batch files for time-based evasion, a technique observed in SnakeKeylogger malware, indicating potential stealthy code execution and persistence.</description><content:encoded><![CDATA[<p>This brief focuses on the detection of <code>choice.exe</code> being used within batch files as a time-delay tactic, a technique notably employed by the SnakeKeylogger malware. The analysis leverages data from Endpoint Detection and Response (EDR) agents, scrutinizing process names and command-line executions. This behavior is significant because it suggests the implementation of time-based evasion techniques designed to circumvent detection mechanisms. Successful evasion could enable attackers to execute malicious code covertly, remove incriminating files, and establish persistent access on compromised systems. The use of <code>choice.exe</code> for such purposes warrants immediate investigation by security operations center (SOC) analysts due to the potential for significant system compromise and data exfiltration.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access via an unknown vector.</li>
<li>A batch script is executed on the target system.</li>
<li>The batch script uses <code>choice.exe</code> with the <code>/T</code> and <code>/N</code> parameters to introduce a time delay. The <code>/T</code> parameter specifies a timeout period, and the <code>/N</code> parameter suppresses the display of choices.</li>
<li>This delay allows the malware to evade time-sensitive detection mechanisms.</li>
<li>After the delay, the script executes further commands, potentially downloading and executing a payload.</li>
<li>The payload executes, installing a keylogger such as SnakeKeylogger or 0bj3ctivity Stealer.</li>
<li>The keylogger captures sensitive information such as keystrokes and clipboard data.</li>
<li>The stolen data is exfiltrated to a remote server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised systems can lead to data theft, intellectual property loss, and financial fraud. SnakeKeylogger and similar malware have been used to steal credentials and sensitive information from various targets. Successful exploitation could result in significant financial losses, reputational damage, and legal liabilities. The number of victims and the extent of the damage depend on the attacker&rsquo;s objectives and the compromised systems&rsquo; value.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Choice.exe Time Delay</code> to your SIEM to detect the use of <code>choice.exe</code> with time-delay parameters (log source: <code>process_creation</code>).</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture the necessary process execution data for the Sigma rule.</li>
<li>Investigate any instances of <code>choice.exe</code> being used with the <code>/T</code> and <code>/N</code> parameters to determine if it is part of a malicious script.</li>
<li>Block the execution of unsigned or untrusted batch scripts to prevent the initial execution of the malicious code.</li>
<li>Monitor endpoint activity for suspicious processes and network connections originating from systems where <code>choice.exe</code> has been detected.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>time-based-evasion</category><category>malware</category><category>persistence</category><category>defense-evasion</category><category>windows</category></item><item><title>Windows Service Security Descriptor Tampering via sc.exe</title><link>https://feed.craftedsignal.io/briefs/2024-01-service-sd-tampering/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-service-sd-tampering/</guid><description>Adversaries may modify service security descriptors to deny access to specific groups, potentially escalating privileges and hindering security services, by using sc.exe to set new deny ACEs (Access Control Entries) on Windows services.</description><content:encoded><![CDATA[<p>This analytic detects changes in a service&rsquo;s security descriptor where a new deny ACE (Access Control Entry) has been added using <code>sc.exe</code>. The <code>sc.exe</code> utility is a command-line tool used for managing Windows services. Adversaries can use <code>sc.exe</code> with the <code>sdset</code> flag to modify the security descriptor of a service, adding a deny ACE to specific groups (e.g., Authenticated Users, Built-in Administrators, System). This can lead to privilege escalation by preventing legitimate administrators or services from managing the tampered service. The Sophos Glupteba report highlights similar techniques used for defense evasion. This activity is related to MITRE ATT&amp;CK T1564.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The adversary gains initial access to the target system.</li>
<li>The adversary identifies a target service with desirable characteristics for manipulation.</li>
<li>The adversary executes <code>sc.exe</code> with the <code>sdset</code> command to modify the service&rsquo;s security descriptor.</li>
<li>The <code>sdset</code> command includes a new deny ACE targeting specific groups like &ldquo;Authenticated Users&rdquo; (<code>IU</code>), &ldquo;Built-in Administrators&rdquo; (<code>BA</code>), or &ldquo;SYSTEM&rdquo; (<code>SY</code>).</li>
<li>The new ACE denies specific permissions (e.g., service start, stop, modify) to the targeted groups.</li>
<li>Legitimate administrators or services are now unable to manage the tampered service due to the deny ACE.</li>
<li>The adversary escalates privileges by exploiting the now-unmanaged service or disabling security products.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows adversaries to hinder or disable critical security services and gain persistence on the compromised endpoint. By adding deny ACEs to service security descriptors, attackers can effectively blind defenses, prevent remediation efforts, and potentially escalate privileges by abusing the tampered service. This can lead to full system compromise and data exfiltration.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging with command line arguments via Sysmon or Windows Event Logging (Security 4688) to capture <code>sc.exe</code> executions.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious sc.exe sdset Execution</code> to identify suspicious <code>sc.exe</code> commands modifying service security descriptors.</li>
<li>Investigate any detected instances of <code>sc.exe</code> modifying service security descriptors, especially those targeting sensitive services or using the &ldquo;sdset&rdquo; command with deny ACEs.</li>
<li>Tune the Sigma rule by adding legitimate applications (e.g., McAfee products) to the filter list to reduce false positives.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>privilege-escalation</category><category>windows</category></item><item><title>Suspicious MSIExec Remote Download</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-msiexec-remote-download/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-msiexec-remote-download/</guid><description>The analytic detects the execution of msiexec.exe with an HTTP or HTTPS URL, which indicates an attempt to download and execute potentially malicious software from a remote server, leading to potential unauthorized code execution, system compromise, or malware deployment.</description><content:encoded><![CDATA[<p>The detection focuses on identifying instances where <code>msiexec.exe</code> is used with an HTTP or HTTPS URL in the command line. This behavior is indicative of an attempt to download and execute potentially malicious software from a remote server. The detection leverages data from Endpoint Detection and Response (EDR) agents, focusing on process execution logs that include command-line details. This activity is significant as it may indicate an attempt to download and execute potentially malicious software from a remote server. If confirmed malicious, this could lead to unauthorized code execution, system compromise, or further malware deployment within the network. The activity is often used to bypass traditional security controls.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access through various means, such as phishing or exploiting a software vulnerability.</li>
<li>The attacker leverages <code>msiexec.exe</code>, a legitimate Windows utility, to download a malicious MSI package from a remote HTTP or HTTPS server.</li>
<li>The command line includes a URL pointing to a malicious MSI file hosted on a compromised or attacker-controlled server.</li>
<li><code>msiexec.exe</code> downloads the MSI package to the victim&rsquo;s machine.</li>
<li>The MSI package is executed, potentially installing malware, creating new files, or modifying system settings.</li>
<li>The installed malware establishes persistence through registry keys or scheduled tasks.</li>
<li>The malware initiates command and control (C2) communication to receive further instructions.</li>
<li>The attacker performs actions on the objective such as data exfiltration or lateral movement within the compromised network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized code execution, system compromise, or further malware deployment within the network. The use of <code>msiexec.exe</code> for remote downloads can bypass traditional security controls, allowing attackers to deliver and execute malicious payloads undetected. The dfirreport.com article references data exfiltration following exploitation via MSIExec.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process-creation logging to activate the rules below, capturing command-line details (Sysmon EventID 1).</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
<li>Monitor network traffic for connections originating from <code>msiexec.exe</code> to external HTTP/HTTPS URLs (Network Visibility Module Flow Data).</li>
<li>Investigate any instances of <code>msiexec.exe</code> executing with command-line arguments containing HTTP or HTTPS URLs.</li>
<li>Filter false positives by destination or parent process as needed based on your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>endpoint</category><category>msiexec</category><category>remote-download</category><category>windows</category></item><item><title>Suspicious Child Processes Spawned by WScript or CScript</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-wscript-cscript-suspicious-child-process/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-wscript-cscript-suspicious-child-process/</guid><description>Detects suspicious processes spawned by WScript or CScript, a common technique used by adversaries to execute LOLBINs, PowerShell, or inject code into suspended processes for defense evasion.</description><content:encoded><![CDATA[<p>This detection identifies suspicious child processes spawned by Windows Script Host (WScript) or CScript. Adversaries commonly leverage WScript and CScript to execute malicious scripts, LOLBINs (Living Off The Land Binaries), and PowerShell, or inject code into suspended processes as a form of defense evasion. While some legitimate scripts may utilize tools detected by this analytic, it serves as a valuable indicator that a script may be executing suspicious code. Notably, the WhisperGate malware and campaigns by FIN7 have employed similar techniques. This activity has been observed since at least 2022, and continues to be relevant for defenders.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user (unknowingly or through social engineering) executes a malicious script.</li>
<li>The malicious script is interpreted by either <code>wscript.exe</code> or <code>cscript.exe</code>.</li>
<li>The script executes a LOLBIN such as <code>regsvr32.exe</code>, <code>rundll32.exe</code>, <code>winhlp32.exe</code>, <code>certutil.exe</code>, <code>msbuild.exe</code>, <code>cmd.exe</code>, <code>powershell.exe</code>, <code>pwsh.exe</code>, <code>wmic.exe</code>, or <code>mshta.exe</code>.</li>
<li>The LOLBIN executes further commands or downloads additional payloads. <code>Certutil.exe</code> may be used to decode and install malicious binaries.</li>
<li>The attacker gains control over the compromised system.</li>
<li>The attacker uses the compromised system as a pivot for lateral movement.</li>
<li>The attacker attempts to escalate privileges and establish persistence.</li>
<li>The attacker may exfiltrate data or deploy ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to complete system compromise, data theft, and potential ransomware deployment. Organizations across various sectors are vulnerable, as this technique is commonly used by both commodity malware and advanced persistent threat (APT) groups. The WhisperGate malware targeting Ukrainian organizations in 2022 demonstrated the destructive potential of this technique.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging (Event ID 1) and Windows Event Log Security Auditing (4688) to capture process execution events necessary for the provided rules.</li>
<li>Deploy the Sigma rule <code>Suspicious Child Processes Spawned by WScript or CScript</code> to your SIEM to detect suspicious child processes. Tune the rule based on your environment&rsquo;s baseline activity, filtering out any legitimate use cases.</li>
<li>Investigate any alerts generated by this rule, focusing on the parent and child processes involved and the commands executed.</li>
<li>Monitor endpoint logs for unusual or unexpected process executions originating from WScript or CScript.</li>
<li>Block execution of the LOLBINs (<code>regsvr32.exe</code>, <code>rundll32.exe</code>, <code>winhlp32.exe</code>, <code>certutil.exe</code>, <code>msbuild.exe</code>, <code>cmd.exe</code>, <code>powershell.exe</code>, <code>pwsh.exe</code>, <code>wmic.exe</code>, or <code>mshta.exe</code>) if they are not required in your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>wscript</category><category>cscript</category><category>lolbin</category><category>malware</category><category>defense-evasion</category></item><item><title>Attrib.exe Used to Hide Files and Directories</title><link>https://feed.craftedsignal.io/briefs/2024-01-attrib-hide-files/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-attrib-hide-files/</guid><description>Detection of attrib.exe being used with the +h flag to hide files and directories on Windows systems, a technique used by attackers for defense evasion and persistence.</description><content:encoded><![CDATA[<p>This threat brief focuses on the abuse of the native Windows utility <code>attrib.exe</code> to hide files and directories. Attackers use this technique to conceal malicious payloads, tools, or command-and-control infrastructure from both users and security software. By setting the hidden attribute (+h flag), attackers make it more difficult to detect their presence and maintain persistence on compromised systems. This activity is typically observed post-exploitation and can be indicative of more advanced persistent threats. The detection specifically looks for <code>attrib.exe</code> command-line arguments including the &ldquo;+h&rdquo; flag. While legitimate uses of <code>attrib.exe</code> exist, the use of the &lsquo;+h&rsquo; flag, particularly in sensitive directories, should be investigated.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system, often through phishing, exploiting a vulnerability, or compromised credentials.</li>
<li>The attacker executes arbitrary code on the compromised system.</li>
<li>The attacker uploads or creates malicious files (e.g., backdoors, scripts) on the system.</li>
<li>The attacker uses <code>attrib.exe</code> with the &ldquo;+h&rdquo; flag to hide these malicious files and directories, evading detection. Example: <code>attrib +h C:\Windows\Temp\evil.exe</code></li>
<li>The attacker may also hide associated log files or other artifacts to further conceal their activities.</li>
<li>The attacker establishes persistence, ensuring continued access even after system reboots.</li>
<li>The attacker moves laterally within the network, compromising additional systems and escalating privileges.</li>
<li>The attacker achieves their objective, which may include data theft, ransomware deployment, or espionage.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to hide malicious files and directories, hindering incident response and forensic investigations. This can lead to prolonged periods of undetected malicious activity, increasing the risk of data breaches, financial loss, and reputational damage. The consequences can range from minor disruptions to significant operational impact, depending on the attacker&rsquo;s objectives and the scope of the compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect suspicious usage of <code>attrib.exe</code> with the &lsquo;+h&rsquo; flag.</li>
<li>Enable process-creation logging with command-line arguments on Windows endpoints to ensure the detection rules can be effectively applied (Sysmon Event ID 1 or Windows Event Log Security 4688).</li>
<li>Investigate any alerts generated by the Sigma rules, paying close attention to the parent processes and the context in which <code>attrib.exe</code> is being executed.</li>
<li>Implement file integrity monitoring (FIM) on critical system directories to detect unauthorized file modifications, including attribute changes.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>windows</category></item><item><title>MSIExec Spawning Discovery Commands</title><link>https://feed.craftedsignal.io/briefs/2024-01-msiexec-discovery/</link><pubDate>Wed, 03 Jan 2024 14:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-msiexec-discovery/</guid><description>Detection of msiexec.exe spawning discovery commands indicating potential reconnaissance activity by attackers for system information gathering and lateral movement.</description><content:encoded><![CDATA[<p>This detection focuses on identifying suspicious behavior where <code>msiexec.exe</code>, a legitimate Windows utility for installing, uninstalling, and configuring software, is used to spawn multiple discovery commands. This activity is often associated with attackers attempting to gather system information, enumerate the network, and identify potential targets for lateral movement. The technique is typically observed post-compromise, after initial access has been achieved through other means. This behavior matters to defenders as it is a key indicator of malicious activity and potential privilege escalation or data exfiltration attempts. The detection leverages Endpoint Detection and Response (EDR) data, specifically process creation events, to identify instances where <code>msiexec.exe</code> is the parent process of common discovery tools.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through a vulnerability, phishing, or other means.</li>
<li>The attacker leverages <code>msiexec.exe</code> to execute discovery commands.</li>
<li><code>msiexec.exe</code> spawns processes such as <code>ipconfig.exe</code>, <code>net.exe</code>, <code>systeminfo.exe</code>, or <code>wmic.exe</code> to gather network configuration, user information, and system details.</li>
<li>The attacker uses commands within <code>cmd.exe</code> or <code>powershell.exe</code> to execute the discovery commands. For example, <code>cmd.exe /c ipconfig /all</code> or <code>powershell.exe Get-NetIPConfiguration</code>.</li>
<li>The attacker filters the output of these commands to identify valuable information such as domain names, user accounts, and system architecture.</li>
<li>The attacker uses the gathered information to identify potential targets for lateral movement and privilege escalation.</li>
<li>The attacker attempts to move laterally to other systems using stolen credentials or exploits.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this technique can lead to a comprehensive understanding of the compromised environment. Attackers can leverage gathered information to escalate privileges, move laterally to other systems, and ultimately exfiltrate sensitive data or deploy ransomware. The impact could range from a single compromised workstation to a complete network breach, depending on the scope of the attacker&rsquo;s activity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process monitoring and command-line logging on all endpoints to capture the necessary data for detection.</li>
<li>Deploy the Sigma rule <code>MSIExec Spawning Discovery Commands</code> to your SIEM and tune it to your environment.</li>
<li>Investigate any instances of <code>msiexec.exe</code> spawning multiple discovery commands, as this behavior is unusual in normal system operations.</li>
<li>Implement least privilege principles to limit the impact of compromised accounts and prevent lateral movement.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>msiexec</category><category>discovery</category><category>windows</category></item><item><title>Suspicious Process Accessing Browser Password Store</title><link>https://feed.craftedsignal.io/briefs/2024-01-browser-credential-access/</link><pubDate>Wed, 03 Jan 2024 14:22:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-browser-credential-access/</guid><description>Detection of non-browser processes accessing browser user data folders, a tactic used by malware such as Snake Keylogger to steal credentials and sensitive information.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting unauthorized access to browser password stores, a technique commonly employed by credential-stealing malware such as Snake Keylogger. These attackers aim to exfiltrate sensitive information, including stored credentials and browsing history, by accessing browser user data profiles. This activity is detected by monitoring Windows Security Event logs (EventCode 4663) and comparing process access patterns against an expected list of browser applications via the <code>browser_app_list</code> lookup table. The detection identifies processes that are not recognized as legitimate browser applications but are attempting to access browser user data. This technique has been observed in trojan stealers, where credential access is a key component of their information-gathering strategy. This method allows defenders to quickly pivot and discover potentially malicious processes on the system, such as credential stealers.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user downloads and executes a malicious file, often disguised as a legitimate application or document.</li>
<li>The malicious file executes, dropping a stealer component into the system.</li>
<li>The stealer process initiates an attempt to access browser user data profiles.</li>
<li>Windows generates a Security Event Log (EventCode 4663) when the stealer attempts to access a browser data file.</li>
<li>The detection analytic identifies processes accessing the browser data folder not present in the <code>browser_app_list</code> lookup file.</li>
<li>The stealer process reads sensitive information, such as usernames, passwords, and browsing history, from the accessed files.</li>
<li>The collected data is staged for exfiltration, potentially compressed or encrypted.</li>
<li>The stolen credentials and information are exfiltrated to a command-and-control server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation leads to the theft of user credentials, potentially granting attackers unauthorized access to sensitive accounts and systems. This can result in data breaches, financial loss, and reputational damage. The Snake Keylogger, for example, is known to target credentials, potentially impacting a wide range of users and organizations. Other stealers like Meduza Stealer, 0bj3ctivity Stealer, and BlankGrabber Stealer also utilize similar techniques, showing the widespread impact. The impact spans across various sectors, as credential theft is a generic attack applicable to almost any environment.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Windows Security Event Logging, specifically event code 4663, with auditing enabled for both success and failure events, to capture object access attempts (reference: search description).</li>
<li>Populate and maintain the <code>browser_app_list</code> lookup table with known and allowed browser processes and their associated paths (reference: search description).</li>
<li>Deploy the provided Sigma rule to your SIEM to detect anomalous processes accessing browser password stores, and tune it for your specific environment (reference: rules).</li>
<li>Investigate any alerts generated by the Sigma rule to identify potentially compromised systems and user accounts (reference: rules).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>credential-access</category><category>stealer</category><category>windows</category></item><item><title>Windows Remote Desktop Network Bruteforce Attempt</title><link>https://feed.craftedsignal.io/briefs/2024-01-rdp-bruteforce/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-rdp-bruteforce/</guid><description>This detection identifies potential RDP brute force attacks by monitoring network traffic for RDP application activity by detecting source IPs that have made more than 10 connection attempts to the same RDP port on a host within a one-hour window.</description><content:encoded><![CDATA[<p>This analytic identifies potential Remote Desktop Protocol (RDP) brute force attacks by monitoring network traffic for RDP application activity. It detects potential RDP brute force attacks by identifying source IPs that have made more than 10 connection attempts to the same RDP port on a host within a one-hour window. The results are presented in a table that includes the source and destination IPs, destination port, number of attempts, and the times of the first and last connection attempts, helping to prioritize IPs based on the intensity of activity. This activity can lead to account compromise and potential ransomware deployment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker scans the network to identify systems with open RDP ports (TCP 3389).</li>
<li>The attacker initiates multiple RDP connection attempts to a target host, using a list of common usernames and passwords or compromised credentials.</li>
<li>The firewall logs each connection attempt, recording the source and destination IPs, ports, and timestamps.</li>
<li>Sysmon logs the network connections with Event ID 3.</li>
<li>The attacker continues to attempt connections, typically exceeding 10 attempts within an hour.</li>
<li>Upon successful authentication, the attacker gains unauthorized access to the target system.</li>
<li>The attacker may then install malware, move laterally, or exfiltrate sensitive data.</li>
<li>The attacker might deploy ransomware like SamSam or Ryuk, as referenced in external reports.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful RDP brute force attacks can lead to unauthorized access to systems, data breaches, malware infections, and ransomware deployment. Compromised systems can be used as a staging point for further attacks within the network. The references indicate that ransomware attacks have been delivered using RDP brute-force techniques.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Ensure network traffic data is populating the Network_Traffic data model to enable the provided search query.</li>
<li>Deploy the Sigma rule <code>RDP Bruteforce via Network Traffic</code> to detect brute force attempts based on network connection patterns.</li>
<li>Adjust the count and duration thresholds in the detection query to tune the sensitivity for your environment.</li>
<li>Investigate source IPs identified by the detection rule as potential attackers.</li>
<li>Monitor Sysmon EventID 3 for network connections to detect RDP brute-force attempts.</li>
<li>Review the referenced Zscaler and ReliaQuest articles for additional context and mitigation strategies.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>rdp</category><category>bruteforce</category><category>credential-access</category><category>windows</category><category>network</category></item><item><title>Windows Netsh Tool Used for Firewall Discovery</title><link>https://feed.craftedsignal.io/briefs/2024-01-netsh-firewall-discovery/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-netsh-firewall-discovery/</guid><description>The analytic detects the execution of the Windows built-in tool netsh.exe to display the state, configuration, and profile of the host firewall, potentially leading to unauthorized network access or data exfiltration.</description><content:encoded><![CDATA[<p>This detection focuses on identifying instances where the <code>netsh.exe</code> utility is used to query firewall configurations on a Windows system. While <code>netsh.exe</code> is a legitimate tool for network configuration, adversaries can leverage it to gather information about firewall rules and settings. This information can then be used to plan further attacks, such as bypassing firewall restrictions or identifying vulnerable network services. This activity is typically seen during the reconnaissance phase of an attack. The scope of this detection covers any Windows environment where Endpoint Detection and Response (EDR) logs are available.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a compromised system through various means, such as phishing or exploiting a vulnerability.</li>
<li>The attacker executes <code>netsh.exe</code> with specific commands to enumerate firewall rules and configurations (e.g., <code>netsh firewall show state</code>, <code>netsh firewall show config</code>).</li>
<li>The <code>netsh.exe</code> process retrieves the requested firewall information from the Windows operating system.</li>
<li>The collected firewall information is parsed to identify potential weaknesses or misconfigurations.</li>
<li>The attacker uses the gathered information to modify existing firewall rules or create new rules to allow unauthorized access.</li>
<li>The attacker leverages the modified firewall configuration to establish a covert communication channel or to move laterally within the network.</li>
<li>The attacker attempts to exfiltrate sensitive data or deploy ransomware.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to unauthorized network access, data exfiltration, or the deployment of ransomware. The enumeration of firewall configurations can provide attackers with valuable insights into the network&rsquo;s security posture, enabling them to bypass security controls and compromise critical assets. This can result in significant financial losses, reputational damage, and disruption of business operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious Netsh Firewall Discovery</code> to your SIEM and tune for your environment to detect netsh.exe executions with firewall discovery commands.</li>
<li>Enable Sysmon process-creation logging (Event ID 1) to capture the necessary command-line details.</li>
<li>Investigate any identified instances of <code>netsh.exe</code> being used to query firewall settings, especially when initiated from unusual processes or user accounts.</li>
<li>Monitor parent-child process relationships to identify suspicious process spawning, as highlighted by the <code>Processes.parent_process_name</code> field.</li>
<li>Review firewall configurations regularly to identify and remediate any misconfigurations or overly permissive rules.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>discovery</category><category>windows</category><category>netsh</category><category>firewall</category></item><item><title>Windows Files and Dirs Access Rights Modification via Icacls</title><link>https://feed.craftedsignal.io/briefs/2024-01-icacls-access-rights-modification/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-icacls-access-rights-modification/</guid><description>Detection of icacls.exe, cacls.exe, or xcacls.exe being used to modify file or directory permissions, often used by APTs and coinminers for defense evasion and persistence.</description><content:encoded><![CDATA[<p>This analytic detects the modification of file and directory security permissions through command-line tools like icacls.exe, cacls.exe, and xcacls.exe. These tools are legitimate Windows utilities but are often abused by threat actors, including APT groups and coinminer scripts, to evade detection, maintain persistence, and hinder incident response. The detection focuses on command-line arguments indicating modifications to access rights (e.g., granting full control or modifying permissions). Detecting this activity is crucial as it can lead to unauthorized access, data exfiltration, and system compromise, ultimately impeding remediation efforts and prolonging the attacker&rsquo;s presence on the compromised system. The detection leverages endpoint detection and response (EDR) data focusing on process execution and command-line analysis.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: The attacker gains initial access to the system through methods such as phishing, exploiting vulnerabilities, or compromised credentials.</li>
<li>Privilege Escalation: The attacker escalates privileges to obtain necessary permissions for modifying file and directory access rights. This can be achieved through exploiting system vulnerabilities or using stolen credentials with elevated privileges.</li>
<li>Tool Deployment: The attacker deploys or utilizes existing system tools like <code>icacls.exe</code>, <code>cacls.exe</code>, or <code>xcacls.exe</code> to modify access control lists (ACLs) on files and directories.</li>
<li>Access Rights Modification: The attacker uses the deployed tools to modify the ACLs of critical system files or directories, potentially granting themselves full control or restricting access for legitimate users and security software. Specific command-line arguments like <code>*:R*</code>, <code>*:W*</code>, <code>*:F*</code>, <code>*:C*</code>, <code>*:N*</code>, <code>*/P*</code>, and <code>*/E*</code> are used to manipulate access rights.</li>
<li>Defense Evasion: By modifying access rights, the attacker attempts to evade detection by security software and hinders incident response efforts by restricting access to forensic data or security tools.</li>
<li>Persistence: The attacker establishes persistence by modifying the access rights of startup scripts or registry keys, ensuring that their malicious code executes even after system reboots.</li>
<li>Lateral Movement: The attacker uses the modified access rights to access files and directories on other systems within the network, facilitating lateral movement and further compromise.</li>
<li>Impact: The attacker achieves their final objective, such as data exfiltration, system disruption, or deploying ransomware, by leveraging the modified access rights to access and manipulate sensitive data or critical system resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to persist on the system, evade detection, and potentially move laterally within the network. Modification of file and directory permissions can hinder investigation, impede remediation efforts, and maintain persistent access to the compromised environment. The impact ranges from data theft to complete system compromise and denial of service. This activity is often associated with APT groups and coinminer operations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon process creation logging (Event ID 1) to capture the execution of <code>icacls.exe</code>, <code>cacls.exe</code>, and <code>xcacls.exe</code>.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious Icacls Usage&rdquo; to your SIEM to identify instances of access right modifications via icacls.exe, cacls.exe, and xcacls.exe.</li>
<li>Investigate any instances where these tools are used to modify access rights, especially when command-line arguments include <code>*:R*</code>, <code>*:W*</code>, <code>*:F*</code>, <code>*:C*</code>, <code>*:N*</code>, <code>*/P*</code>, and <code>*/E*</code>.</li>
<li>Monitor Windows Event Log Security (4688) for process creation events to correlate with Sysmon data.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>windows</category><category>access-control</category></item><item><title>Unauthorized Access to Chrome Local State File</title><link>https://feed.craftedsignal.io/briefs/2024-01-chrome-localstate-access/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chrome-localstate-access/</guid><description>Detection of non-Chrome processes accessing the Chrome 'Local State' file, potentially leading to extraction of the master key used for decrypting saved passwords.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting unauthorized access to the Chrome &lsquo;Local State&rsquo; file, a critical component of the Chrome browser that stores settings and, more importantly, the encrypted master key used to protect saved passwords. The &lsquo;Local State&rsquo; file is typically accessed only by the Chrome browser itself. When other processes attempt to read this file, it&rsquo;s a strong indicator of malicious activity, potentially involving credential theft or reconnaissance by malware such as RedLine Stealer. This analytic leverages Windows Security Event logs, specifically event code 4663, to identify this behavior. Detecting and responding to this activity is crucial for preventing attackers from gaining access to sensitive user credentials stored within the Chrome browser.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the system, often through phishing or exploitation of a software vulnerability (not specified in this advisory).</li>
<li>Malware is deployed on the victim machine (e.g., RedLine Stealer).</li>
<li>The malware attempts to locate the Chrome &lsquo;Local State&rsquo; file, typically found at <code>*\\AppData\\Local\\Google\\Chrome\\User Data\\Local State</code>.</li>
<li>The malware process accesses the &lsquo;Local State&rsquo; file, triggering a Windows Security Event 4663.</li>
<li>The malware extracts the encrypted master key from the &lsquo;Local State&rsquo; file.</li>
<li>The malware decrypts the master key using attacker-controlled methods.</li>
<li>The decrypted master key is used to decrypt saved passwords stored by Chrome.</li>
<li>The stolen credentials are exfiltrated to the attacker&rsquo;s command and control server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to steal user credentials stored in the Chrome browser. This can lead to unauthorized access to email accounts, social media profiles, banking websites, and other sensitive online services. The impact could range from identity theft and financial fraud to corporate espionage and data breaches. The number of potential victims depends on the number of systems compromised and the extent of Chrome usage on those systems.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Object Access&rdquo; in Group Policy and configure auditing for both &ldquo;Success&rdquo; and &ldquo;Failure&rdquo; events to ensure Windows Security Event 4663 is generated for file access, as described in the &ldquo;how_to_implement&rdquo; section.</li>
<li>Deploy the Sigma rule &ldquo;Detect Chrome Local State File Access by Non-Chrome Processes&rdquo; to your SIEM to detect unauthorized access attempts (see &ldquo;rules&rdquo; section). Tune the rule&rsquo;s filter list to reduce false positives related to legitimate software uninstallers.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on identifying the process name and path involved in accessing the &lsquo;Local State&rsquo; file, as described in the rule&rsquo;s description.</li>
<li>Consider implementing network egress filtering to prevent exfiltration of stolen credentials to known malicious command and control servers.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>password-stealing</category><category>chrome</category></item><item><title>Suspicious Process Execution from Unusual File Paths</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-suspicious-process-path/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-suspicious-process-path/</guid><description>Attackers may execute malicious code from unusual file paths such as Windows fonts or debug directories to evade defenses and gain unauthorized access, as detected by endpoint detection and response (EDR) agents.</description><content:encoded><![CDATA[<p>This threat brief addresses the tactic of executing processes from suspicious file paths within Windows environments, a common technique used by adversaries to bypass security controls and execute malicious code without requiring elevated privileges. This activity is often observed in post-exploitation scenarios, where attackers have already gained initial access and are attempting to establish persistence or escalate their privileges. Attackers often leverage these unconventional locations to avoid detection by traditional security solutions that rely on whitelisting or reputation-based analysis. The detection focuses on identifying processes running from paths like <code>\Windows\Fonts\</code>, <code>\Users\Public\</code>, <code>\Windows\Debug\</code>, and others, as these are not typically associated with legitimate software execution. This technique has been associated with malware families like AsyncRAT, RedLine Stealer, and LockBit Ransomware.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access is gained through phishing, exploitation of a vulnerability, or other means.</li>
<li>The attacker uploads or creates a malicious executable or script (e.g., PowerShell script) in a suspicious directory such as <code>C:\Windows\Fonts\</code>.</li>
<li>The attacker uses a dropper or loader to execute the malicious file. This can be achieved through various methods, including command-line execution or scheduled tasks.</li>
<li>The malicious process begins execution from the unusual file path.</li>
<li>The process performs malicious activities, such as downloading additional payloads, establishing command and control (C2) communication, or conducting reconnaissance.</li>
<li>The attacker leverages the compromised process to escalate privileges or move laterally within the network.</li>
<li>Data exfiltration or encryption may occur, depending on the attacker&rsquo;s objectives.</li>
<li>The attacker attempts to maintain persistence by creating scheduled tasks or modifying registry keys to ensure the malicious process restarts upon system reboot.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of malicious code from unusual file paths can lead to a variety of negative impacts, including system compromise, data theft, and ransomware infection. Organizations may experience data breaches, financial losses, and reputational damage. The references indicate this technique is associated with various malware families, including information stealers, remote access trojans (RATs), and ransomware, affecting numerous organizations across different sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable process creation logging (Event ID 4688 or Sysmon Event ID 1) to capture process execution events, including the process path, command line, and parent process information to enable the rules below.</li>
<li>Deploy the Sigma rule &ldquo;Suspicious Process Executing from Common Non-Executable Paths&rdquo; to your SIEM to detect processes running from unusual file paths. Tune the rule to filter out any legitimate exceptions in your environment.</li>
<li>Investigate any alerts generated by the Sigma rule, paying close attention to the process name, command line, and parent process.</li>
<li>Implement application control policies to restrict the execution of unauthorized software in your environment.</li>
<li>Monitor network traffic for suspicious outbound connections originating from processes running from unusual file paths.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>defense-evasion</category><category>persistence</category><category>windows</category></item><item><title>Schtasks Run Task On Demand</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-schtasks-on-demand/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-schtasks-on-demand/</guid><description>Detection of on-demand execution of Windows Scheduled Tasks via the schtasks.exe command-line utility, a common technique for persistence and lateral movement.</description><content:encoded><![CDATA[<p>This analytic detects the execution of Windows Scheduled Tasks on demand using the <code>schtasks.exe</code> utility. The detection focuses on identifying <code>schtasks.exe</code> being executed with the <code>run</code> command, which is often used by adversaries to force the execution of previously created scheduled tasks. This activity is significant because attackers frequently leverage scheduled tasks for persistent access, privilege escalation, or lateral movement within a compromised network. Detecting this behavior can help defenders identify and respond to malicious activity before it leads to further compromise. The technique has been associated with various threat actors and malware families including Qakbot, XMRig, and Medusa Ransomware as well as campaigns such as CISA AA22-257A and Industroyer2.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through various means (e.g., exploiting a vulnerability, phishing).</li>
<li>The attacker establishes persistence by creating a new scheduled task using <code>schtasks.exe</code>.</li>
<li>The attacker uses <code>schtasks.exe</code> with the <code>run</code> command to trigger the malicious scheduled task on demand.</li>
<li>The scheduled task executes a malicious payload, such as a script or executable.</li>
<li>The payload may perform various malicious actions, such as downloading additional malware, escalating privileges, or gathering sensitive information.</li>
<li>The attacker moves laterally to other systems on the network by creating and running scheduled tasks remotely.</li>
<li>The attacker attempts to disable security controls or evade detection by modifying existing scheduled tasks.</li>
<li>The attacker achieves their final objective, such as data exfiltration, ransomware deployment, or system disruption.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to persistent access, lateral movement, and privilege escalation within the compromised environment. Attackers can use this technique to maintain a foothold on the system, spread malware to other systems on the network, and ultimately achieve their objectives, such as data theft, ransomware deployment, or disruption of critical services.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the provided Sigma rule to your SIEM to detect the execution of <code>schtasks.exe</code> with the <code>run</code> command, tuning it to exclude known legitimate uses.</li>
<li>Investigate any detected instances of <code>schtasks.exe</code> execution with the <code>run</code> command to determine if they are malicious.</li>
<li>Monitor process execution data for unusual or unexpected processes being launched by scheduled tasks.</li>
<li>Implement strict access controls and regularly review and audit scheduled tasks to prevent unauthorized modifications or creations.</li>
<li>Enable Sysmon process-creation logging (Event ID 1) to capture detailed information about process executions, including command-line arguments.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>schtasks</category><category>scheduled-task</category><category>persistence</category><category>execution</category></item><item><title>Regsvr32 Silent and Install Parameter DLL Loading</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-regsvr32-dll-loading/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-regsvr32-dll-loading/</guid><description>Detection of regsvr32.exe being used with the silent and DLL install parameter to load a DLL, a technique used by RATs like Remcos and njRAT to execute arbitrary code.</description><content:encoded><![CDATA[<p>This threat brief focuses on the abuse of <code>regsvr32.exe</code>, a legitimate Microsoft Windows utility, to load and execute malicious DLLs. Attackers, including those using Remote Access Trojans (RATs) like Remcos and njRAT, leverage <code>regsvr32.exe</code> with the <code>/s</code> (silent) parameter and the <code>DLLInstall</code> function call. The activity is observed by analyzing process command-line arguments and parent process details from Endpoint Detection and Response (EDR) agents. This technique allows attackers to bypass application whitelisting and execute arbitrary code, maintain persistence, and compromise the system further. The detection described was published in splunk-escu on 2026-05-04.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access via an unknown vector (e.g., phishing, exploit).</li>
<li>The attacker deploys a malicious DLL on the compromised system.</li>
<li>The attacker executes <code>regsvr32.exe</code> with the <code>/s</code> (silent) parameter and the <code>DLLInstall</code> function, for example: <code>regsvr32.exe /s /i:DLLInstall &lt;malicious_dll_path&gt;</code>.</li>
<li><code>Regsvr32.exe</code> loads the specified DLL.</li>
<li>The DLLInstall function within the DLL executes, performing malicious actions. This could involve installing services, modifying registry keys, or injecting code into other processes.</li>
<li>The attacker establishes persistence through registry modifications or scheduled tasks created by the DLL.</li>
<li>The attacker executes arbitrary commands on the system, potentially installing additional malware or exfiltrating data.</li>
<li>The attacker achieves their final objective, such as data theft, system disruption, or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can allow attackers to execute arbitrary code, bypass application whitelisting, and establish persistence on compromised systems. This can lead to data theft, system disruption, or ransomware deployment. The affected systems can be remotely controlled by the attacker, enabling further lateral movement within the network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Regsvr32 Silent and Install Param Dll Loading</code> to detect instances of <code>regsvr32.exe</code> being used with the <code>/s</code> and <code>/i</code> parameters.</li>
<li>Enable Sysmon process creation logging (Event ID 1) and Windows Event Log Security Auditing (Event ID 4688) to capture the necessary process and command-line information.</li>
<li>Investigate any instances of <code>regsvr32.exe</code> execution with the silent and DLLInstall parameters, paying close attention to the parent process and the DLL being loaded.</li>
<li>Implement application control policies to restrict the execution of <code>regsvr32.exe</code> or other LOLBins from untrusted locations.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>lolbin</category><category>dll-loading</category><category>regsvr32</category></item><item><title>Outbound SMB Traffic Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-outbound-smb/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-outbound-smb/</guid><description>This analytic detects outbound SMB connections from internal hosts to external servers, potentially indicating lateral movement and credential theft attempts.</description><content:encoded><![CDATA[<p>This detection identifies outbound Server Message Block (SMB) traffic from internal hosts to external servers. The activity is identified by monitoring network traffic for SMB requests directed towards the Internet, an unusual occurrence in standard operations. This analytic is crucial for Security Operations Centers (SOCs) as it can signal an attacker&rsquo;s attempt to retrieve credential hashes via compromised internal systems, a critical step in lateral movement and privilege escalation. The source mentions specific relevance to &ldquo;Hidden Cobra Malware&rdquo;, &ldquo;DHS Report TA18-074A&rdquo;, and &ldquo;NOBELIUM Group&rdquo;, suggesting possible connections to these threat actors or campaigns.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An internal host is compromised through an initial access vector (e.g., phishing, exploit).</li>
<li>The attacker attempts to enumerate network resources accessible from the compromised host.</li>
<li>The attacker leverages SMB to connect to external servers, typically on ports 139 or 445.</li>
<li>The SMB connection attempts to authenticate or negotiate with the external server.</li>
<li>The attacker may attempt to exploit vulnerabilities in the SMB protocol or server.</li>
<li>The attacker captures or relays credential hashes transmitted over the SMB connection.</li>
<li>The attacker uses the captured credentials to move laterally to other systems or escalate privileges.</li>
<li>The attacker achieves their final objective, such as data exfiltration or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of outbound SMB traffic can lead to unauthorized access to sensitive data and full system compromise. Lateral movement and privilege escalation are key goals. Confirmed malicious SMB traffic could enable attackers to move through the network, potentially impacting numerous systems and leading to significant data breaches. While the number of victims isn&rsquo;t specified, the detection&rsquo;s relevance to known threat actors suggests potentially widespread impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Outbound SMB Traffic Detected</code> to your SIEM and tune it for your environment, using the provided positive and negative test cases to ensure accurate detection.</li>
<li>Investigate and block any detected outbound SMB connections that are not explicitly authorized by legitimate business needs (reference <code>detect_outbound_smb_traffic_filter</code> macro in the original search).</li>
<li>Implement network segmentation to restrict internal hosts from directly accessing external SMB services.</li>
<li>Enforce strong password policies and multi-factor authentication to mitigate the impact of credential theft.</li>
<li>Categorize internal CIDR blocks as <code>internal</code> in your asset management system to reduce false positives (reference &ldquo;known_false_positives&rdquo; section).</li>
<li>Consider blocking external communications of all SMB versions and related protocols at the network boundary.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>network</category><category>smb</category><category>lateral-movement</category><category>privilege-escalation</category></item><item><title>Non-Chrome Process Accessing Chrome Login Data</title><link>https://feed.craftedsignal.io/briefs/2024-01-chrome-login-data-access/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-chrome-login-data-access/</guid><description>This analytic identifies non-Chrome processes accessing the Chrome user data file 'login data', which is an SQLite database containing sensitive information like saved passwords, potentially leading to credential theft.</description><content:encoded><![CDATA[<p>This threat brief focuses on detecting unauthorized access to Chrome&rsquo;s &ldquo;Login Data&rdquo; file, a local SQLite database that stores user credentials. Attackers, after gaining initial access to a Windows system, may attempt to steal these credentials by directly accessing and parsing this file. The &ldquo;Login Data&rdquo; file contains sensitive information, including usernames, passwords, and URLs. The technique is commonly associated with credential-stealing malware families like RedLine Stealer, DarkGate, and others listed below. Successful exploitation allows attackers to harvest credentials for lateral movement and further compromise. This detection is based on Windows Security Event logs, specifically event ID 4663, which records attempts to access objects like files.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains initial access to the target system, potentially through phishing or exploiting a software vulnerability.</li>
<li>The attacker executes a malicious executable or script on the compromised system.</li>
<li>The malicious process attempts to access the Chrome &ldquo;Login Data&rdquo; file, typically located at <code>*\\AppData\\Local\\Google\\Chrome\\User Data\\Default\\Login Data</code>.</li>
<li>Windows Security Event Log generates an event with EventCode 4663, recording the file access attempt.</li>
<li>The attacker&rsquo;s process reads the &ldquo;Login Data&rdquo; SQLite database.</li>
<li>The attacker extracts and potentially decrypts stored usernames and passwords from the &ldquo;Login Data&rdquo; file.</li>
<li>The attacker uses the stolen credentials for lateral movement within the network.</li>
<li>The attacker achieves their final objective, such as data exfiltration or ransomware deployment.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised Chrome &ldquo;Login Data&rdquo; files can lead to widespread credential theft, granting attackers unauthorized access to numerous online accounts. Depending on the user&rsquo;s browsing habits and password reuse, this can include access to sensitive corporate resources, financial accounts, and personal email. The impact can range from financial loss to significant data breaches and reputational damage. The references section in the original source mentions Redline Stealer which is used in various attacks, indicating a potentially large number of victims across different sectors.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Object Access&rdquo; in Group Policy and configure auditing for both &ldquo;Success&rdquo; and &ldquo;Failure&rdquo; events to generate Windows Security Event 4663, as described in the &ldquo;how_to_implement&rdquo; section.</li>
<li>Deploy the Sigma rule <code>Chrome Login Data Accessed by Non-Browser Process</code> to your SIEM and tune the <code>process_path</code> filter to exclude legitimate software in your environment.</li>
<li>Investigate any alerts generated by the <code>Chrome Login Data Accessed by Non-Browser Process</code> Sigma rule to determine if credential theft has occurred and remediate any affected accounts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>password-stealing</category><category>windows</category></item><item><title>Suspicious DNS Queries to Telegram API by Non-Telegram Processes</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-telegram-dns-query/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-telegram-dns-query/</guid><description>Detection of a process making DNS queries to the Telegram API domain, which is indicative of malware utilizing Telegram bots for command and control (C2) communications.</description><content:encoded><![CDATA[<p>This alert identifies systems querying the Telegram API domain (api.telegram.org) using processes other than the legitimate Telegram application. Threat actors frequently leverage Telegram bots for C2, due to their ease of use, encryption, and widespread availability. Malware can use these bots to receive commands, exfiltrate data, or perform other malicious activities. Detecting DNS queries for Telegram&rsquo;s API from unexpected processes can uncover compromised systems or unauthorized use of Telegram for covert communication. The detection focuses on non-standard Telegram clients resolving the api.telegram.org domain to filter out legitimate Telegram application traffic and focus on suspicious processes.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user inadvertently downloads and executes a malicious payload (e.g., via phishing or drive-by download).</li>
<li>The malware establishes persistence on the system (e.g., via registry keys or scheduled tasks).</li>
<li>The malware initiates a DNS query to resolve api.telegram.org to identify the Telegram API server IP address.</li>
<li>The malware establishes a communication channel with a Telegram bot controlled by the attacker using the resolved IP address.</li>
<li>The attacker sends commands to the bot, which are relayed to the compromised system.</li>
<li>The malware executes the received commands, potentially including data exfiltration or further malicious actions.</li>
<li>The malware exfiltrates sensitive data to the attacker via the Telegram bot.</li>
<li>The attacker maintains persistent access and control over the compromised system via the Telegram bot.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised systems can be remotely controlled by attackers, leading to data theft, system disruption, or further propagation of malware within the network. The use of Telegram bots enables covert communication, making it difficult to detect malicious activity using traditional methods. Multiple threat actors employ Telegram-based C2, including those associated with information stealers, keyloggers, and crypto-mining malware. A successful attack can lead to significant data breaches and financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Suspicious Telegram DNS Queries</code> to your SIEM to identify processes making DNS queries to the Telegram API (api.telegram.org) other than the legitimate Telegram application.</li>
<li>Investigate any alerts generated by the Sigma rule by examining the process execution history, network connections, and related system activity.</li>
<li>Block the domain <code>api.telegram.org</code> at the DNS resolver or firewall to prevent compromised systems from communicating with Telegram bots, unless legitimate business use requires it.</li>
<li>Enable Sysmon Event ID 22 (DNS Query) logging to capture DNS query events on endpoints.</li>
<li>Update Sysmon to at least version 6.0.4 to ensure comprehensive DNS event logging.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>telegram</category><category>command-and-control</category><category>dns</category><category>windows</category></item><item><title>Non-Chrome Process Accessing Chrome Default Directory</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-chrome-default-dir-access/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-chrome-default-dir-access/</guid><description>Detection of non-Chrome processes accessing the Chrome user data directory, potentially indicating credential theft or data exfiltration attempts by malware such as RATs or APT groups.</description><content:encoded><![CDATA[<p>This alert detects non-Chrome processes accessing the Chrome user data directory, a common tactic used by malware and threat actors to steal sensitive information. This activity is detected using Windows Security Event logs, specifically event ID 4663. The Chrome default folder contains sensitive user data, including login credentials, browsing history, and cookies. This makes it a prime target for attackers aiming to harvest credentials or gain access to user accounts. The detection is designed to identify unauthorized access attempts by processes not typically associated with Chrome. This behavior is often linked to Remote Access Trojans (RATs), trojans, and advanced persistent threats (APTs) like FIN7, known for their focus on financial theft and data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Malware gains initial access to the system, potentially through phishing or exploiting a software vulnerability.</li>
<li>The malware establishes persistence on the system.</li>
<li>The malware identifies the location of the Chrome user data directory.</li>
<li>The malware attempts to access files within the Chrome user data directory, triggering Windows Security Event 4663.</li>
<li>The malware copies or exfiltrates sensitive data from the Chrome directory, such as login credentials and cookies.</li>
<li>The malware may use stolen credentials to access other systems or services.</li>
<li>The attacker uses compromised accounts to perform unauthorized actions or move laterally within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful attack can result in the theft of sensitive user data, including login credentials, browsing history, and cookies. This data can be used to compromise user accounts, steal financial information, or gain unauthorized access to other systems and services. Multiple analytic stories relate this behavior to credential stealers, RATs, and APTs. Victims may experience financial losses, identity theft, or reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable &ldquo;Audit Object Access&rdquo; in Group Policy and configure auditing for both success and failure events as described in the &ldquo;how_to_implement&rdquo; section to ensure Event ID 4663 is captured.</li>
<li>Deploy the Sigma rule <code>Non Chrome Process Accessing Chrome Default Dir</code> to your SIEM to detect unauthorized access attempts to Chrome user data directories.</li>
<li>Investigate any alerts generated by this rule, focusing on the <code>ProcessName</code> and <code>ObjectName</code> to understand the context of the access as noted in the search query.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>credential-access</category><category>threat-type</category><category>windows</category></item><item><title>Logon Script Registry Modification for Persistence and Privilege Escalation</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-logon-script-registry-modification/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-logon-script-registry-modification/</guid><description>This brief details the detection of UserInitMprLogonScript registry entry modifications, a technique employed by threat actors for persistence and privilege escalation by ensuring payloads execute automatically at system startup.</description><content:encoded><![CDATA[<p>This brief focuses on the malicious modification of the <code>UserInitMprLogonScript</code> registry entry, a tactic frequently employed by attackers to achieve persistence and escalate privileges on compromised systems. This technique involves altering the registry to ensure that malicious payloads are automatically executed each time the system boots, enabling attackers to maintain persistent access and potentially gain elevated privileges. The original Splunk analytic was published on 2026-04-29 and leverages the Endpoint.Registry data model, making it crucial to have adequate data ingestion from systems monitoring registry events. This technique is attractive to both APT groups and malware operators because it provides a reliable mechanism to automatically execute code within a targeted environment.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the system through methods such as exploiting vulnerabilities or using compromised credentials.</li>
<li>The attacker elevates privileges to gain sufficient access to modify the registry.</li>
<li>The attacker modifies the <code>UserInitMprLogonScript</code> registry key under <code>HKCU</code> or <code>HKLM</code>.</li>
<li>The <code>registry_value_data</code> is changed to point to a malicious script or executable.</li>
<li>The system is rebooted, or a user logs in.</li>
<li>The operating system executes the script or executable specified in the modified <code>UserInitMprLogonScript</code> registry entry.</li>
<li>The malicious payload executes, allowing the attacker to establish persistence, install malware, or perform other malicious actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to establish persistent access to the compromised system. This can lead to data exfiltration, further compromise of the network, or the deployment of ransomware. The modification of the <code>UserInitMprLogonScript</code> registry entry can be used to execute malicious code every time a user logs in, making it difficult to eradicate the attacker&rsquo;s presence without proper detection and remediation. This technique enables adversaries to maintain long-term control over the affected system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon EventID 13 (registry events) with appropriate filtering to monitor changes to the <code>UserInitMprLogonScript</code> registry key (data_source).</li>
<li>Deploy the Sigma rule <code>Logon Script Registry Modification</code> to your SIEM and tune for your environment.</li>
<li>Investigate any modifications to the <code>UserInitMprLogonScript</code> registry key for unexpected executables or scripts.</li>
<li>Correlate suspicious registry modifications with other endpoint activity, such as network connections or process creation, to identify potential malicious behavior.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>persistence</category><category>privilege-escalation</category><category>windows</category></item><item><title>Braodo Stealer Screen Capture in TEMP Directory</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-braodo-screen-capture/</link><pubDate>Wed, 03 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-braodo-screen-capture/</guid><description>This analytic detects the creation of screen capture files in the TEMP directory, specifically targeting activity associated with the Braodo stealer malware, which captures screenshots of the victim's desktop as part of its data theft activities.</description><content:encoded><![CDATA[<p>The Braodo stealer malware is known for capturing screenshots of a victim&rsquo;s desktop as part of its data theft activities. This malware, often distributed through malicious campaigns, targets sensitive information by creating image files of the user&rsquo;s active screen. These screenshots are typically saved in directories that are easily accessible and commonly used by malware, such as temporary folders. This technique allows attackers to gather credentials, financial information, or other confidential data displayed on the screen. The stealer has been observed in campaigns originating from Vietnam, targeting users in the United States with malware, fraud, and dropshipping schemes. Detecting and responding to these types of screen capture attempts is crucial for preventing sensitive data from being compromised and exfiltrated.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The user unknowingly downloads and executes a malicious file, potentially delivered through a phishing email or drive-by download.</li>
<li>The Braodo stealer malware is executed on the victim&rsquo;s system.</li>
<li>The malware begins capturing screenshots of the victim&rsquo;s desktop using Windows APIs.</li>
<li>The screenshots are saved as .png, .jpg, or .bmp files.</li>
<li>The files are saved in the user&rsquo;s TEMP directory (e.g., C:\Users\<username>\AppData\Local\Temp\).</li>
<li>The malware may compress or encrypt the captured screenshots.</li>
<li>The malware exfiltrates the captured data to a command-and-control server.</li>
<li>The attacker gains access to sensitive information displayed on the victim&rsquo;s screen, such as credentials or financial data, and uses it for malicious purposes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation can lead to the theft of sensitive information, including credentials, financial data, and personally identifiable information (PII). This can result in financial loss, identity theft, and reputational damage for the victim. The Braodo stealer has been observed targeting users in the United States, indicating a broad scope of potential victims. The malware&rsquo;s ability to capture screenshots allows attackers to bypass multi-factor authentication and other security measures that rely on information displayed on the screen.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable Sysmon Event ID 11 (FileCreate) logging to monitor file creation events on endpoints (required for the Sigma rules below).</li>
<li>Deploy the provided Sigma rule <code>Detect Screen Capture Files Created in TEMP Directory</code> to identify potential screen capture activity in temporary directories.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on processes creating image files in the TEMP directory.</li>
<li>Review and update endpoint security policies to prevent the execution of malware from temporary directories.</li>
<li>Monitor network traffic for suspicious outbound connections from processes creating screen capture files (T1071).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>stealc-stealer</category><category>crypto-stealer</category><category>braodo-stealer</category><category>apt37</category><category>hellcat-ransomware</category><category>vip-keylogger</category><category>screen-capture</category><category>malware</category></item><item><title>Suspicious PowerShell Reconnaissance via WMI Queries</title><link>https://feed.craftedsignal.io/briefs/2024-01-wmi-reconnaissance/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-wmi-reconnaissance/</guid><description>Detection of suspicious PowerShell activity using Windows Management Instrumentation (WMI) to gather system information, indicative of reconnaissance efforts by adversaries potentially leading to further exploitation or lateral movement.</description><content:encoded><![CDATA[<p>This brief focuses on detecting reconnaissance activities performed through PowerShell using WMI queries. Adversaries often use WMI to gather detailed information about a compromised system, including hardware specifications, operating system details, and installed software. This information can be used to plan further attacks, such as privilege escalation or lateral movement. This detection leverages PowerShell Script Block Logging (EventCode 4104) to identify specific WMI queries that target system information classes like <code>Win32_Bios</code>, <code>Win32_OperatingSystem</code>, <code>Win32_Processor</code> and others. Identifying this behavior early can help defenders disrupt attack chains before significant damage occurs. The analytic is based on the detection logic from the Splunk Security Content project as of April 2026.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to the target system, potentially through phishing or exploiting a software vulnerability.</li>
<li>The attacker executes a PowerShell script, either directly or via a command-line interpreter like <code>cmd.exe</code>.</li>
<li>The PowerShell script uses the <code>Get-WmiObject</code> cmdlet or a direct WMI query with <code>SELECT</code> to query system information.</li>
<li>Specific WMI classes are targeted, including <code>Win32_Bios</code>, <code>Win32_OperatingSystem</code>, <code>Win32_Processor</code>, <code>Win32_ComputerSystem</code>, <code>Win32_PnPEntity</code>, <code>Win32_ShadowCopy</code>, <code>Win32_DiskDrive</code>, <code>Win32_PhysicalMemory</code>, <code>Win32_BaseBoard</code>, and <code>Win32_DisplayConfiguration</code>.</li>
<li>The script collects the data returned by the WMI queries.</li>
<li>The gathered information is used to profile the system and identify potential vulnerabilities or weaknesses.</li>
<li>The attacker uses the gathered information to plan subsequent stages of the attack, like lateral movement or privilege escalation.</li>
<li>The attacker executes further commands based on the gathered information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful reconnaissance can provide attackers with a comprehensive understanding of the target environment, enabling them to tailor their attacks for maximum impact. This can lead to successful privilege escalation, lateral movement, data exfiltration, or ransomware deployment. Organizations that fail to detect and prevent reconnaissance activities are at a higher risk of experiencing significant data breaches and financial losses. The Maze ransomware group, Industroyer2, and LockBit ransomware have been observed using similar reconnaissance techniques.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Enable PowerShell Script Block Logging on all endpoints to capture the necessary data for detection (<a href="https://help.splunk.com/en/security-offerings/splunk-user-behavior-analytics/get-data-in/5.4.1/add-other-data-to-splunk-uba/configure-powershell-logging-to-see-powershell-anomalies-in-splunk-uba.">PowerShell Script Block Logging 4104</a>).</li>
<li>Deploy the Sigma rule <code>Detect Suspicious WMI Reconnaissance via PowerShell</code> to identify PowerShell scripts querying sensitive WMI classes.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the user and process context to determine potential malicious intent.</li>
<li>Review and tune the <code>Recon Using WMI Class</code> detection filter (<code>recon_using_wmi_class_filter</code>) to reduce false positives in your environment.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>powershell</category><category>wmi</category><category>reconnaissance</category><category>lateral_movement</category><category>windows</category></item><item><title>Large ICMP Traffic Detection</title><link>https://feed.craftedsignal.io/briefs/2024-01-large-icmp-traffic/</link><pubDate>Tue, 02 Jan 2024 10:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-large-icmp-traffic/</guid><description>This analytic identifies excessive ICMP traffic to external IP addresses exceeding 1,000 bytes, potentially indicating command and control activity, data exfiltration, or covert communication channels.</description><content:encoded><![CDATA[<p>This detection focuses on identifying anomalous ICMP (Internet Control Message Protocol) traffic indicative of malicious activity. ICMP is typically used for network diagnostics but can be abused for covert communication, data exfiltration, or command-and-control (C2) by threat actors. This analytic identifies ICMP traffic exceeding 1,000 bytes directed toward external IP addresses, filtering out internal networks. The detection logic leverages the Network_Traffic data model. Validated malicious instances may signal ICMP tunneling, unauthorized data transfer, or compromised endpoints. The data sources for this analytic include Palo Alto Network Traffic and Cisco Secure Access Firewall logs.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker compromises a host within the network.</li>
<li>The compromised host initiates ICMP traffic to an external IP address.</li>
<li>The ICMP traffic exceeds 1000 bytes, evading default network monitoring thresholds.</li>
<li>The attacker uses ICMP to tunnel data, bypassing normal data transfer protocols.</li>
<li>The compromised host uses ICMP for command and control, receiving instructions from the external attacker.</li>
<li>The attacker establishes a covert communication channel using ICMP, masking their activity within normal network traffic.</li>
<li>Sensitive data is exfiltrated via ICMP packets to the attacker-controlled external server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation through large ICMP traffic can lead to data breaches, unauthorized access to internal resources, and the establishment of persistent command and control within the network. ICMP tunneling can bypass traditional security measures, allowing attackers to operate undetected. The impact of successful exploitation includes the potential compromise of sensitive data, disruption of network services, and financial loss.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Large ICMP Traffic</code> to your SIEM and tune the byte threshold (currently 1000 bytes) based on your network baseline to minimize false positives.</li>
<li>Investigate any alerts generated by the <code>Detect Large ICMP Traffic</code> rule, focusing on the source and destination IPs involved.</li>
<li>Examine network traffic logs for patterns indicative of ICMP tunneling or covert communication channels, using the provided data sources.</li>
<li>Utilize the provided search <code>View the detection results</code> to review related events and potential lateral movement.</li>
<li>Implement the provided search <code>View risk events</code> to look at risk factors for the involved assets.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>network-traffic</category><category>command-and-control</category><category>data-exfiltration</category></item><item><title>Detection of IIS HTTP Logging Disabled via AppCmd.exe</title><link>https://feed.craftedsignal.io/briefs/2024-01-disable-iis-logging/</link><pubDate>Mon, 01 Jan 2024 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-disable-iis-logging/</guid><description>This analytic detects the use of AppCmd.exe to disable HTTP logging on IIS servers, allowing adversaries to evade detection by removing evidence of their actions.</description><content:encoded><![CDATA[<p>This detection identifies the use of <code>AppCmd.exe</code> to disable HTTP logging on Internet Information Services (IIS) servers. The technique is significant as adversaries can use it to erase traces of their malicious activities. The detection focuses on process execution events logged by Endpoint Detection and Response (EDR) agents. By disabling HTTP logging, attackers can operate undetected, making it difficult to trace their actions and respond effectively to intrusions. The references indicate this technique has been observed in campaigns attributed to threat actors like OilRig, where IIS backdoors are used.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial access to the system via exploitation of a vulnerability or compromised credentials.</li>
<li>Attacker gains a foothold on the IIS server.</li>
<li>The attacker executes <code>appcmd.exe</code> to modify IIS settings.</li>
<li><code>appcmd.exe</code> is executed with parameters to disable HTTP logging, such as <code>httplogging</code> or <code>dontlog:true</code>.</li>
<li>The command modifies the IIS configuration, preventing HTTP request logs from being recorded.</li>
<li>The attacker performs malicious actions on the compromised server (e.g., web shell deployment, data theft).</li>
<li>With HTTP logging disabled, the attacker&rsquo;s activities are not recorded in standard IIS logs, hindering forensic analysis.</li>
<li>The attacker maintains persistence and continues to exploit the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of this attack can lead to a significant reduction in visibility into attacker activities on IIS servers. The lack of HTTP logs hinders incident response efforts, making it difficult to identify the scope and nature of the compromise. This could lead to prolonged attacker presence, further data exfiltration, or deployment of malicious software. This technique is a common step to evade defenses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect IIS HTTP Logging Disabled via AppCmd.exe</code> to your SIEM and tune for your environment.</li>
<li>Enable Sysmon process creation logging (Event ID 1) to capture command-line arguments of <code>appcmd.exe</code>.</li>
<li>Monitor process execution events for <code>appcmd.exe</code> with command-line arguments related to <code>httplogging</code> or <code>dontlog:true</code>.</li>
<li>Investigate any instances of <code>appcmd.exe</code> being executed by non-administrator accounts or unusual parent processes.</li>
<li>Review IIS configuration regularly for any unauthorized changes to HTTP logging settings.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>iis</category><category>logging</category><category>defense-evasion</category><category>windows</category></item></channel></rss>