APT Malware LOLBins & GTFOBins Attack users by Evading the Security Sysem

Discussion in 'malware problems & news' started by guest, Feb 4, 2019.

  1. guest

    guest Guest

    APT Malware LOLBins & GTFOBins Attack users by Evading the Security Sysem
    February 2, 2019
    https://gbhackers.com/apt-malware-lolbins-gtfobins-attack-users-by-evading-the-security-sysem/
     
  2. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    As far as PowerShell execution via SyncAppPublishinServer.vbs, I am sure most by now are monitoring/blocking script execution. The question is if WD for example monitors signed script execution via Win 10 AMSI? As far as third party AV's, I don't believe script signing plans any part in the scanning of the script via AMSI.

    What the article didn't mention was that SyncAppPublishinServer.exe can likewise be employed to execute PowerShell commands. You can read about that here: https://safe-cyberdefense.com/malware-can-use-powershell-without-powershell-exe/ . Article also covers GitHub PowerShell facsimile that executes Powershell commands via .Net usage. So OSArmor users, check out if this is covered.

    -EDIT- Also, one should always check out these articles for accuracy. As far as SyncAppPublishinServer goes, neither the script or executable are present in the System32 directory on my Win 10 x(64) Home build. I did find them in the Servicing directory, C:\Windows\servicing\LCU\Package_for_RollupFix~31bf3856ad364e35~amd64~~17763.253.1.4\amd64_microsoft-windows-a..nagement-appvclient_31bf3856ad364e35_10.0.17763.194_none_4103f04b4dfa5f5a\f. Trying to run them from there resulted in a Win 10 blue popup stating they won't run on the Win 10 version I have. Appears App-V has to be first install and the PublishingServer configured via Win PowerShell: http://virtualvibes.co.uk/installin...-and-configuring-it-with-a-publishing-server/
     
    Last edited: Feb 4, 2019
  3. Floyd 57

    Floyd 57 Registered Member

    Joined:
    Mar 17, 2017
    Posts:
    1,296
    Location:
    Europe
    It's funny that even the dlls that are listed here https://lolbas-project.github.io are only listed because of them being usable with rundll32, which is, guess what, an executable, and we know what happens when an executable goes against a properly configured anti-exe, that is, not automatically allowing stuff
     
  4. guest

    guest Guest

    and we didn't went to fileless malware, reflective dlls and co.
     
  5. shmu26

    shmu26 Registered Member

    Joined:
    Jul 9, 2015
    Posts:
    1,550
    I checked for the executable on Pro and Enterprise, Win10 x64 1809 , and I didn't find it in System32 directory.
     
  6. guest

    guest Guest

    of course you won't find it, it is a PoSh cmdlet...

    https://docs.microsoft.com/en-us/po...lient/sync-appvpublishingserver?view=win10-ps
     
  7. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Prior to this, you would first have to:
    Again, App-V must be installed.

    -EDIT- World Wide Web Publishing service is not installed by default on any Win client OS version. It should never be installed unless a need to interface with a local web server is required.
     
    Last edited: Feb 5, 2019
  8. guest

    guest Guest

    Hunting for LoLBins
    November 13, 2019
    https://blog.talosintelligence.com/2019/11/hunting-for-lolbins.html
     
  9. guest

    guest Guest

    Building a bypass with MSBuild
    Living-off-the-land binaries (LoLBins) continue to pose a risk to security defenders
    February 18, 2020

    https://blog.talosintelligence.com/2020/02/building-bypass-with-msbuild.html
     
  10. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Another startup execution to monitor with the HIPS:
     
  11. guest

    guest Guest

    Threat Actors Abuse MSBuild for Cobalt Strike Beacon Execution
    December 28, 2021
    SANS Internet Storm Center (ISC): Attackers are abusing MSBuild to evade defenses and implant Cobalt Strike beacons
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.