341. Adversaries Abuse NSSM for Service Execution

Hello everyone!

We already looked at lots of legitimate tools, which are used by adversaries to solve various tasks. It's time for another one! It's commonly used for System Services: Service Execution (T1569.002).

I'm talking about the Non-sucking Service Manager (NSSM). It's used by various threat actors. For example, if we look into the report on Red Wolf, we can see that it was used to create two distinct Windows service entries pointing to the same Chisel binary (MSAProfileNotificationHandler.exe).

And yes, it's another great target for hunting:

event_type: "processcreatewin"

AND

proc_file_productname: "nssm"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge