094. Detecting ClickOnce Abuse

Hello everyone! Today I've spotted another technique I don't see used ITW very often. I'm talking about ClickOnce. It's a Microsoft technology that enables the user to install and run a Windows-based smart client application by clicking a link in a web page.

I've see this technique in the report on APT-C-47. The adversary leveraged phishing to deliver a link to a malicious ClickOnce file (.appref-ms), which starts the kill chain.

Of course, you can hunt for execution of such files from suspicious locations, for example, Outlook-related folders:

event_type: "processcreatewin"

AND

cmdline: ("appref-ms" AND "Content.Outlook")

If you want to learn more about ClickOnce abuse, here's a great presentation by William Joseph Burke IV.

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge