363. That's How Arcane Werewolf Abuses Conhost
Hello everyone!
We often talk (and see, of course) LOLBAS. So, let's look at another one, which became really popular among adversaries this year.
So, our today's example - Arcane Werewolf. The adversary leverages conhost.exe to run the dropper:
conhost.exe C:\Users\<USER>\AppData\Local\Temp\icon2.png
One more example - running Loki 2.0 loader:
conhost.exe %TEMP%\chrome_proxy.pdf
As you can see, the threat actors quite suspicious file exensions, so we can use it to build a query:
event_type: "processcreatewin"
AND
proc_file_path: "conhost.exe"
AND
cmdline: (*png OR *pdf)
See you tomorrow!

Comments
Post a Comment