Skip to content

Latest commit

 

History

History
48 lines (38 loc) · 2.12 KB

nf_mal_ttp_cve-2023-36025_phemedroneStealer.md

File metadata and controls

48 lines (38 loc) · 2.12 KB

CVE-2023-36025 Exploited for Defense Evasion in Phemedrone Stealer Campaign

Query Information

MITRE ATT&CK Technique(s)

Technique ID Title Link
T1218.002​ Signed Binary Proxy Execution: Control Panel Control Panel

Description

This set of hunt queries delve into the Phemedrone Stealer campaign's exploitation of CVE-2023-36025, the Windows Defender SmartScreen Bypass vulnerability, addressing its defense evasion and faciolitating investigation of the malware's payload behaviours and TTPs.

Risk

This collection of hunt queries aim to detect behaviours associated with malware exploitation of CVW-2023-36025 and subsequent TTPs as part of its intrusion set or attack flow.

Author

References

Defender For Endpoint

Signed Binary Proxy Execution: Control Panel (T1218.002)​

// source FalconForce https://medium.com/falconforce/falconfriday-process-injection-and-malicious-cpl-files-0xff03-8ba1ee5da64
// https://github.com/FalconForceTeam/FalconFriday/blob/master/Defense%20Evasion/T1218-WIN-001.md
//Fairly accurate. Depends on ATP for "Global Prevalence" to filter out false positives.
let suspiciousCPLs = DeviceImageLoadEvents
| where FileName endswith ".cpl"
| summarize by SHA1
| invoke FileProfile(SHA1, 1000)
| where ((isempty(Signer) or not(IsCertificateValid)) and GlobalPrevalence < 100) or GlobalPrevalence < 50;
DeviceImageLoadEvents
| where SHA1 has_any (suspiciousCPLs) and ActionType == "ImageLoaded"

Sentinel

// N/A due to functions being limited to MDE Advanced Hunting