363. That's How Arcane Werewolf Abuses Conhost

Hello everyone!

We often talk (and see, of course) LOLBAS. So, let's look at another one, which became really popular among adversaries this year.

So, our today's example - Arcane Werewolf. The adversary leverages conhost.exe to run the dropper:

conhost.exe C:\Users\<USER>\AppData\Local\Temp\icon2.png

One more example - running Loki 2.0 loader:

conhost.exe %TEMP%\chrome_proxy.pdf

As you can see, the threat actors quite suspicious file exensions, so we can use it to build a query:

event_type: "processcreatewin"

AND

proc_file_path: "conhost.exe"

AND

cmdline: (*png OR *pdf)

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge