<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[thecyber.dad]]></title><description><![CDATA[The ramblings of a cybersecurity professional and proud dad. If you want to read about security operations, threat hunting, detection engineering, digital forensics & incident response, or random dad things, this site may be for you.]]></description><link>https://www.thecyber.dad</link><image><url>https://substackcdn.com/image/fetch/$s_!Ozp0!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2715e513-add2-4070-a066-c5df1b6b9ea4_1280x1280.png</url><title>thecyber.dad</title><link>https://www.thecyber.dad</link></image><generator>Substack</generator><lastBuildDate>Fri, 17 Apr 2026 09:00:04 GMT</lastBuildDate><atom:link href="https://www.thecyber.dad/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Luke Rusten]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[thecyberdad@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[thecyberdad@substack.com]]></itunes:email><itunes:name><![CDATA[Luke Rusten]]></itunes:name></itunes:owner><itunes:author><![CDATA[Luke Rusten]]></itunes:author><googleplay:owner><![CDATA[thecyberdad@substack.com]]></googleplay:owner><googleplay:email><![CDATA[thecyberdad@substack.com]]></googleplay:email><googleplay:author><![CDATA[Luke Rusten]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Detecting Fake CAPTCHA Campaigns: ClickFix, ClearFake, and Etherhide]]></title><description><![CDATA[Summary]]></description><link>https://www.thecyber.dad/p/detecting-fake-captcha-campaigns</link><guid isPermaLink="false">https://www.thecyber.dad/p/detecting-fake-captcha-campaigns</guid><dc:creator><![CDATA[Luke Rusten]]></dc:creator><pubDate>Tue, 22 Apr 2025 00:11:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Fi4L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fb3760c-a4bd-46ae-a7af-7a59b80e6e81_573x509.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2>Summary</h2><p>Our team recently observed a significant uptick in malware campaigns leveraging <strong>fake CAPTCHA pages</strong> to deploy info-stealers, loaders and remote access trojans (RATs). These lures are part of evolving social engineering chains that culminate in the delivery of threats like <strong>Lumma Stealer</strong>, <strong>Sliver</strong>, and <strong>Emmenhtal</strong>.</p><p>Some variants including <strong>ClickFix</strong> and <strong>ClearFake</strong>, which utilize a novel technique known as <strong>Etherhiding, </strong>demonstrate how threat actors are innovating in their use of obfuscation, blockchain infrastructure, and clipboard-based payload execution. This post offers a brief technical breakdown of these campaigns and focuses on <strong>behavioral detection opportunities</strong> relevant to defenders.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecyber.dad/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading thecyber.dad! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h2>Threat Overview</h2><p>These fake CAPTCHA pages are often part of <strong>malvertising chains</strong> or <strong>SEO poisoning tactics</strong> designed to lure users searching for specific types of content. Some common examples were from users searching for:</p><p><strong>ClickFix:</strong></p><ul><li><p><strong>Free/Pirated Movies</strong>: Torrent sites, streaming mirrors, or forums linking to "free" content often serve as initial redirectors.</p></li><li><p><strong>Manuals or Technical Documentation</strong>: Especially obscure or niche product manuals, user guides, and troubleshooting PDFs. These are frequently SEO-optimized to rank high in Google searches.</p></li><li><p><strong>Travel Booking and Reservations</strong>: Sites mimicking airlines, hotels, or booking confirmations that ask the user to "verify they&#8217;re human" before showing blurred booking details.</p></li><li><p><strong>Storage and Shipping Service: </strong>Mimicked storage or courier service platforms.</p></li></ul><p><strong>ClearFake + Etherhiding:</strong></p><ul><li><p><strong>Infected WordPress websites</strong>: Cases of ClearFake typically involve legitimate WordPress websites that have been infected with malicious JavaScript.</p></li></ul><p><strong>The fake CAPTCHA pages are convincingly designed and typically include:</strong></p><ul><li><p>A blurred document or video frame behind a CAPTCHA widget.</p></li><li><p>Phrases like "Click to verify you're human" or &#8220;Complete these Verification Steps.&#8221;</p></li><li><p>Often hosted on recently registered domains with names that mimic legitimate services or tech brands.</p></li><li><p>Sometimes embedded in PDFs or accessed via shortened links in phishing emails.</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Fi4L!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fb3760c-a4bd-46ae-a7af-7a59b80e6e81_573x509.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Fi4L!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fb3760c-a4bd-46ae-a7af-7a59b80e6e81_573x509.png 424w, https://substackcdn.com/image/fetch/$s_!Fi4L!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fb3760c-a4bd-46ae-a7af-7a59b80e6e81_573x509.png 848w, https://substackcdn.com/image/fetch/$s_!Fi4L!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fb3760c-a4bd-46ae-a7af-7a59b80e6e81_573x509.png 1272w, https://substackcdn.com/image/fetch/$s_!Fi4L!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fb3760c-a4bd-46ae-a7af-7a59b80e6e81_573x509.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Fi4L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fb3760c-a4bd-46ae-a7af-7a59b80e6e81_573x509.png" width="573" height="509" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4fb3760c-a4bd-46ae-a7af-7a59b80e6e81_573x509.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:509,&quot;width&quot;:573,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Fi4L!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fb3760c-a4bd-46ae-a7af-7a59b80e6e81_573x509.png 424w, https://substackcdn.com/image/fetch/$s_!Fi4L!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fb3760c-a4bd-46ae-a7af-7a59b80e6e81_573x509.png 848w, https://substackcdn.com/image/fetch/$s_!Fi4L!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fb3760c-a4bd-46ae-a7af-7a59b80e6e81_573x509.png 1272w, https://substackcdn.com/image/fetch/$s_!Fi4L!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4fb3760c-a4bd-46ae-a7af-7a59b80e6e81_573x509.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">An example of a malicious CAPTCHA</figcaption></figure></div><p></p><h2>Campaign Architecture</h2><h3>1. JavaScript-Based Delivery (ClearFake/ClickFix)</h3><p>Malicious JavaScript is embedded in compromised sites:</p><ul><li><p>Encoded using Base64</p></li><li><p>Windows OS detection before CAPTCHA render</p></li><li><p>Obfuscation via multiple techniques such as:</p><ul><li><p>Indirect function calls</p></li><li><p>Arithmetic decoding</p></li><li><p>Random variable names</p></li><li><p>Hex-based string reconstruction</p></li></ul></li></ul><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!U9Vp!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21784d54-cd08-42db-b829-7d9e2cf135d8_666x52.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!U9Vp!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21784d54-cd08-42db-b829-7d9e2cf135d8_666x52.png 424w, https://substackcdn.com/image/fetch/$s_!U9Vp!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21784d54-cd08-42db-b829-7d9e2cf135d8_666x52.png 848w, https://substackcdn.com/image/fetch/$s_!U9Vp!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21784d54-cd08-42db-b829-7d9e2cf135d8_666x52.png 1272w, https://substackcdn.com/image/fetch/$s_!U9Vp!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21784d54-cd08-42db-b829-7d9e2cf135d8_666x52.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!U9Vp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21784d54-cd08-42db-b829-7d9e2cf135d8_666x52.png" width="666" height="52" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/21784d54-cd08-42db-b829-7d9e2cf135d8_666x52.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:52,&quot;width&quot;:666,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!U9Vp!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21784d54-cd08-42db-b829-7d9e2cf135d8_666x52.png 424w, https://substackcdn.com/image/fetch/$s_!U9Vp!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21784d54-cd08-42db-b829-7d9e2cf135d8_666x52.png 848w, https://substackcdn.com/image/fetch/$s_!U9Vp!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21784d54-cd08-42db-b829-7d9e2cf135d8_666x52.png 1272w, https://substackcdn.com/image/fetch/$s_!U9Vp!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F21784d54-cd08-42db-b829-7d9e2cf135d8_666x52.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">JavaScript embedded in Wordpress site (ClearFake)</figcaption></figure></div><p></p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!hToq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b3820a4-20e1-4bf4-b5d5-9882a474479e_696x133.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!hToq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b3820a4-20e1-4bf4-b5d5-9882a474479e_696x133.png 424w, https://substackcdn.com/image/fetch/$s_!hToq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b3820a4-20e1-4bf4-b5d5-9882a474479e_696x133.png 848w, https://substackcdn.com/image/fetch/$s_!hToq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b3820a4-20e1-4bf4-b5d5-9882a474479e_696x133.png 1272w, https://substackcdn.com/image/fetch/$s_!hToq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b3820a4-20e1-4bf4-b5d5-9882a474479e_696x133.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!hToq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b3820a4-20e1-4bf4-b5d5-9882a474479e_696x133.png" width="696" height="133" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/4b3820a4-20e1-4bf4-b5d5-9882a474479e_696x133.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:133,&quot;width&quot;:696,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!hToq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b3820a4-20e1-4bf4-b5d5-9882a474479e_696x133.png 424w, https://substackcdn.com/image/fetch/$s_!hToq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b3820a4-20e1-4bf4-b5d5-9882a474479e_696x133.png 848w, https://substackcdn.com/image/fetch/$s_!hToq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b3820a4-20e1-4bf4-b5d5-9882a474479e_696x133.png 1272w, https://substackcdn.com/image/fetch/$s_!hToq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F4b3820a4-20e1-4bf4-b5d5-9882a474479e_696x133.png 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a><figcaption class="image-caption">Script embedded in HTML that is obfuscated with phpkobo html obfuscator. (ClickFix)</figcaption></figure></div><h3>2. Blockchain-Based Payload Hosting (Etherhiding)</h3><p><strong>ClearFake</strong> variants now embed payload references directly in <strong>Binance Smart Chain (BSC)</strong> contracts:</p><ul><li><p>PowerShell/MSHTA command embedded in BSC smart contract</p></li><li><p>Webpage fetches and auto-copies payload to clipboard</p></li><li><p>The same contract address observed in multiple cases from this <a href="https://www.atea.no/siste-nytt/it-sikkerhet/investigating-a-clearfake-clickfix-etherhide-campaign/">Atea Report</a></p></li></ul><p></p><h2>Exploitation Techniques</h2><h3>ClickFix: Clipboard Abuse for Execution</h3><p>ClickFix leverages clipboard manipulation:</p><ul><li><p>Payload auto-copied to clipboard</p></li><li><p>User instructed to paste into the Run dialog using <strong>Win + R</strong></p></li><li><p>Delivered command executes MSHTA or PowerShell</p></li></ul><h3>The Payload: MSHTA + Homoglyph Social Engineering</h3><p>The command payload is disguised to look like a CAPTCHA verification:</p><ul><li><p>In many cases the attack uses <strong>homoglyphs</strong>&#8212;characters that look legit but evade static detection.</p></li><li><p>There are no html file extensions being executed in the command which is likely another attempt to evade detection.</p></li><li><p>In every case <strong>Explorer.exe</strong> is the parent when using the run dialogue (This can be advantageous in detection writing).</p></li></ul><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!5pqS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93d946ec-744d-4ad4-8b12-5f32d9b5b41c_691x359.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!5pqS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93d946ec-744d-4ad4-8b12-5f32d9b5b41c_691x359.png 424w, https://substackcdn.com/image/fetch/$s_!5pqS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93d946ec-744d-4ad4-8b12-5f32d9b5b41c_691x359.png 848w, https://substackcdn.com/image/fetch/$s_!5pqS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93d946ec-744d-4ad4-8b12-5f32d9b5b41c_691x359.png 1272w, https://substackcdn.com/image/fetch/$s_!5pqS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93d946ec-744d-4ad4-8b12-5f32d9b5b41c_691x359.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!5pqS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93d946ec-744d-4ad4-8b12-5f32d9b5b41c_691x359.png" width="691" height="359" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/93d946ec-744d-4ad4-8b12-5f32d9b5b41c_691x359.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:359,&quot;width&quot;:691,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!5pqS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93d946ec-744d-4ad4-8b12-5f32d9b5b41c_691x359.png 424w, https://substackcdn.com/image/fetch/$s_!5pqS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93d946ec-744d-4ad4-8b12-5f32d9b5b41c_691x359.png 848w, https://substackcdn.com/image/fetch/$s_!5pqS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93d946ec-744d-4ad4-8b12-5f32d9b5b41c_691x359.png 1272w, https://substackcdn.com/image/fetch/$s_!5pqS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F93d946ec-744d-4ad4-8b12-5f32d9b5b41c_691x359.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">MSHTA command that is utilizing homoglyphs</figcaption></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!rN8b!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa26c22b8-79eb-404c-8bc7-d98d70c0f3c6_655x396.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!rN8b!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa26c22b8-79eb-404c-8bc7-d98d70c0f3c6_655x396.png 424w, https://substackcdn.com/image/fetch/$s_!rN8b!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa26c22b8-79eb-404c-8bc7-d98d70c0f3c6_655x396.png 848w, https://substackcdn.com/image/fetch/$s_!rN8b!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa26c22b8-79eb-404c-8bc7-d98d70c0f3c6_655x396.png 1272w, https://substackcdn.com/image/fetch/$s_!rN8b!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa26c22b8-79eb-404c-8bc7-d98d70c0f3c6_655x396.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!rN8b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa26c22b8-79eb-404c-8bc7-d98d70c0f3c6_655x396.png" width="655" height="396" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a26c22b8-79eb-404c-8bc7-d98d70c0f3c6_655x396.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:396,&quot;width&quot;:655,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!rN8b!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa26c22b8-79eb-404c-8bc7-d98d70c0f3c6_655x396.png 424w, https://substackcdn.com/image/fetch/$s_!rN8b!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa26c22b8-79eb-404c-8bc7-d98d70c0f3c6_655x396.png 848w, https://substackcdn.com/image/fetch/$s_!rN8b!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa26c22b8-79eb-404c-8bc7-d98d70c0f3c6_655x396.png 1272w, https://substackcdn.com/image/fetch/$s_!rN8b!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa26c22b8-79eb-404c-8bc7-d98d70c0f3c6_655x396.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">MSHTA command that is utilizing homoglyphs</figcaption></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!ectx!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c896ad-3aa4-45c0-909c-208413f88d60_648x358.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!ectx!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c896ad-3aa4-45c0-909c-208413f88d60_648x358.png 424w, https://substackcdn.com/image/fetch/$s_!ectx!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c896ad-3aa4-45c0-909c-208413f88d60_648x358.png 848w, https://substackcdn.com/image/fetch/$s_!ectx!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c896ad-3aa4-45c0-909c-208413f88d60_648x358.png 1272w, https://substackcdn.com/image/fetch/$s_!ectx!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c896ad-3aa4-45c0-909c-208413f88d60_648x358.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!ectx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c896ad-3aa4-45c0-909c-208413f88d60_648x358.png" width="648" height="358" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/92c896ad-3aa4-45c0-909c-208413f88d60_648x358.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:358,&quot;width&quot;:648,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!ectx!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c896ad-3aa4-45c0-909c-208413f88d60_648x358.png 424w, https://substackcdn.com/image/fetch/$s_!ectx!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c896ad-3aa4-45c0-909c-208413f88d60_648x358.png 848w, https://substackcdn.com/image/fetch/$s_!ectx!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c896ad-3aa4-45c0-909c-208413f88d60_648x358.png 1272w, https://substackcdn.com/image/fetch/$s_!ectx!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F92c896ad-3aa4-45c0-909c-208413f88d60_648x358.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">MSHTA command that is not utilizing homoglyphs</figcaption></figure></div><h3>Obfuscated PowerShell Download Cradles</h3><p>Dynamic download techniques (TL;DR):</p><ul><li><p>Uses <strong>[Net.WebClient]::New()</strong> object<br>Avoids hardcoded methods like <strong>DownloadString</strong></p></li><li><p>Applies Get-Member with fuzzy logic (e.g., <strong>-clike '*wn*g'</strong>)</p></li><li><p>Fully in-memory execution with <strong>Invoke-Expression</strong> or <strong>InvokeScript</strong></p></li></ul><p>Dynamic download techniques (Long Version):</p><p>The script creates a WebClient object and uses fuzzy logic to identify the method used for downloading content&#8212;<strong>DownloadString</strong>&#8212;without referencing it by name. It does this by calling <strong>Get-Member</strong> to list available methods on the object, then filters them using the -clike operator (case-insensitive wildcard match) to find something resembling <strong>&#8220;*wn*g&#8221;</strong> (matching &#8220;<strong>DownloadString</strong>&#8221;).</p><p>This approach helps evade static detection by avoiding hardcoded method names and relying on dynamic discovery instead. Ultimately, it builds a download cradle that fetches and executes a remote payload in memory, without writing anything to disk.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Cnvl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3234de73-99e0-44aa-965c-9a9c383da927_677x513.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Cnvl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3234de73-99e0-44aa-965c-9a9c383da927_677x513.png 424w, https://substackcdn.com/image/fetch/$s_!Cnvl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3234de73-99e0-44aa-965c-9a9c383da927_677x513.png 848w, https://substackcdn.com/image/fetch/$s_!Cnvl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3234de73-99e0-44aa-965c-9a9c383da927_677x513.png 1272w, https://substackcdn.com/image/fetch/$s_!Cnvl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3234de73-99e0-44aa-965c-9a9c383da927_677x513.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Cnvl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3234de73-99e0-44aa-965c-9a9c383da927_677x513.png" width="677" height="513" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3234de73-99e0-44aa-965c-9a9c383da927_677x513.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:513,&quot;width&quot;:677,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Cnvl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3234de73-99e0-44aa-965c-9a9c383da927_677x513.png 424w, https://substackcdn.com/image/fetch/$s_!Cnvl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3234de73-99e0-44aa-965c-9a9c383da927_677x513.png 848w, https://substackcdn.com/image/fetch/$s_!Cnvl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3234de73-99e0-44aa-965c-9a9c383da927_677x513.png 1272w, https://substackcdn.com/image/fetch/$s_!Cnvl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3234de73-99e0-44aa-965c-9a9c383da927_677x513.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Variant using Get-Member and 13,36,48 to utilize Invoke-Expression</figcaption></figure></div><p>Another interesting variation using the same technique, but using a slightly different way of running <strong>Get-Member </strong>and execution parameters of the encoded PowerShell. Finding the similarities between each variant will be helpful for building detections.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!XrRU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed8c8b80-ec52-4ce8-8bfb-087185f38f59_671x546.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!XrRU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed8c8b80-ec52-4ce8-8bfb-087185f38f59_671x546.png 424w, https://substackcdn.com/image/fetch/$s_!XrRU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed8c8b80-ec52-4ce8-8bfb-087185f38f59_671x546.png 848w, https://substackcdn.com/image/fetch/$s_!XrRU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed8c8b80-ec52-4ce8-8bfb-087185f38f59_671x546.png 1272w, https://substackcdn.com/image/fetch/$s_!XrRU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed8c8b80-ec52-4ce8-8bfb-087185f38f59_671x546.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!XrRU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed8c8b80-ec52-4ce8-8bfb-087185f38f59_671x546.png" width="671" height="546" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ed8c8b80-ec52-4ce8-8bfb-087185f38f59_671x546.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:546,&quot;width&quot;:671,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!XrRU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed8c8b80-ec52-4ce8-8bfb-087185f38f59_671x546.png 424w, https://substackcdn.com/image/fetch/$s_!XrRU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed8c8b80-ec52-4ce8-8bfb-087185f38f59_671x546.png 848w, https://substackcdn.com/image/fetch/$s_!XrRU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed8c8b80-ec52-4ce8-8bfb-087185f38f59_671x546.png 1272w, https://substackcdn.com/image/fetch/$s_!XrRU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fed8c8b80-ec52-4ce8-8bfb-087185f38f59_671x546.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Variant using InvokeScript and GM for Get-Member</figcaption></figure></div><p>One more variation where PowerShell uses the <strong>-like </strong>function to call <strong>DownloadString</strong> without case sensitive matching. You can also spot multiple interesting ways the script calls <strong>Invoke-Expression</strong> (or <strong>InvokeScript</strong>) in these events. All of which are spawned from <strong>Base64 encoded PowerShell commands</strong> (which is important for detection opportunities later).</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!aOIF!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07f019f6-a023-4d9a-8189-055e5119d678_650x510.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!aOIF!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07f019f6-a023-4d9a-8189-055e5119d678_650x510.png 424w, https://substackcdn.com/image/fetch/$s_!aOIF!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07f019f6-a023-4d9a-8189-055e5119d678_650x510.png 848w, https://substackcdn.com/image/fetch/$s_!aOIF!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07f019f6-a023-4d9a-8189-055e5119d678_650x510.png 1272w, https://substackcdn.com/image/fetch/$s_!aOIF!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07f019f6-a023-4d9a-8189-055e5119d678_650x510.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!aOIF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07f019f6-a023-4d9a-8189-055e5119d678_650x510.png" width="650" height="510" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/07f019f6-a023-4d9a-8189-055e5119d678_650x510.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:510,&quot;width&quot;:650,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!aOIF!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07f019f6-a023-4d9a-8189-055e5119d678_650x510.png 424w, https://substackcdn.com/image/fetch/$s_!aOIF!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07f019f6-a023-4d9a-8189-055e5119d678_650x510.png 848w, https://substackcdn.com/image/fetch/$s_!aOIF!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07f019f6-a023-4d9a-8189-055e5119d678_650x510.png 1272w, https://substackcdn.com/image/fetch/$s_!aOIF!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F07f019f6-a023-4d9a-8189-055e5119d678_650x510.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Variant using -like command and Invoke-Expression via fuzzy match</figcaption></figure></div><h3>AMSI Bypass Technique Modifying CLR.DLL in Memory</h3><p>Some variants dynamically disable AMSI:</p><ul><li><p>Builds byte signature for <strong>AmsiScanBuffer</strong></p></li><li><p>Locates and modifies <strong>clr.dll</strong> in memory</p></li><li><p>Effectively disables AV scanning of PowerShell scripts</p></li></ul><p><a href="https://practicalsecurityanalytics.com/new-amsi-bypss-technique-modifying-clr-dll-in-memory/">Reference: AMSI Bypass Research</a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vykm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99205c38-6537-4199-8c5b-0d468f23bd07_717x762.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vykm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99205c38-6537-4199-8c5b-0d468f23bd07_717x762.png 424w, https://substackcdn.com/image/fetch/$s_!vykm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99205c38-6537-4199-8c5b-0d468f23bd07_717x762.png 848w, https://substackcdn.com/image/fetch/$s_!vykm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99205c38-6537-4199-8c5b-0d468f23bd07_717x762.png 1272w, https://substackcdn.com/image/fetch/$s_!vykm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99205c38-6537-4199-8c5b-0d468f23bd07_717x762.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vykm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99205c38-6537-4199-8c5b-0d468f23bd07_717x762.png" width="717" height="762" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/99205c38-6537-4199-8c5b-0d468f23bd07_717x762.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:762,&quot;width&quot;:717,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vykm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99205c38-6537-4199-8c5b-0d468f23bd07_717x762.png 424w, https://substackcdn.com/image/fetch/$s_!vykm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99205c38-6537-4199-8c5b-0d468f23bd07_717x762.png 848w, https://substackcdn.com/image/fetch/$s_!vykm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99205c38-6537-4199-8c5b-0d468f23bd07_717x762.png 1272w, https://substackcdn.com/image/fetch/$s_!vykm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F99205c38-6537-4199-8c5b-0d468f23bd07_717x762.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Snippet of PowerShell used to bypass AMSI via CLR.DLL</figcaption></figure></div><p></p><h2>Post-Exploitation Behavior</h2><p>Across all variants, there was consistent use of one or more of the following:</p><ul><li><p><strong>Info Stealers (Lumma, Vidar, etc)</strong>: Credential theft, session tokens, browser data, crypto wallets</p></li><li><p><strong>Remote Browser Debugging</strong>: PowerShell initiating debug mode on Edge/Chrome</p></li><li><p><strong>Sliver RAT</strong>: Open-source C2 framework for persistent access</p></li><li><p><strong>Loaders</strong>: Including <strong>Emmenthal</strong>, with others reported in the wild</p></li><li><p><strong>RunOnce Persistence</strong>: Lengthy binaries (&#8805;26 characters) creating <strong>RunOnce</strong> keys with known <strong>Lumma Stealer</strong></p></li></ul><h3>Remote Browser Debugging:</h3><p>Many samples initiate <strong>remote debugging sessions</strong> on all installed browsers. This allows them to extract cookies, session tokens, and other sensitive artifacts without triggering typical browser protections.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4ULZ!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a44a0c6-d7e6-42f2-8c52-1b434ddf4353_706x376.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4ULZ!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a44a0c6-d7e6-42f2-8c52-1b434ddf4353_706x376.png 424w, https://substackcdn.com/image/fetch/$s_!4ULZ!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a44a0c6-d7e6-42f2-8c52-1b434ddf4353_706x376.png 848w, https://substackcdn.com/image/fetch/$s_!4ULZ!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a44a0c6-d7e6-42f2-8c52-1b434ddf4353_706x376.png 1272w, https://substackcdn.com/image/fetch/$s_!4ULZ!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a44a0c6-d7e6-42f2-8c52-1b434ddf4353_706x376.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4ULZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a44a0c6-d7e6-42f2-8c52-1b434ddf4353_706x376.png" width="706" height="376" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3a44a0c6-d7e6-42f2-8c52-1b434ddf4353_706x376.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:376,&quot;width&quot;:706,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4ULZ!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a44a0c6-d7e6-42f2-8c52-1b434ddf4353_706x376.png 424w, https://substackcdn.com/image/fetch/$s_!4ULZ!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a44a0c6-d7e6-42f2-8c52-1b434ddf4353_706x376.png 848w, https://substackcdn.com/image/fetch/$s_!4ULZ!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a44a0c6-d7e6-42f2-8c52-1b434ddf4353_706x376.png 1272w, https://substackcdn.com/image/fetch/$s_!4ULZ!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3a44a0c6-d7e6-42f2-8c52-1b434ddf4353_706x376.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">PowerShell running remote debugging on port 9200 for Microsoft Edge</figcaption></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MuOI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20e092fb-0ac7-4142-b6d9-35b8b3abd766_703x381.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MuOI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20e092fb-0ac7-4142-b6d9-35b8b3abd766_703x381.png 424w, https://substackcdn.com/image/fetch/$s_!MuOI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20e092fb-0ac7-4142-b6d9-35b8b3abd766_703x381.png 848w, https://substackcdn.com/image/fetch/$s_!MuOI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20e092fb-0ac7-4142-b6d9-35b8b3abd766_703x381.png 1272w, https://substackcdn.com/image/fetch/$s_!MuOI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20e092fb-0ac7-4142-b6d9-35b8b3abd766_703x381.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MuOI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20e092fb-0ac7-4142-b6d9-35b8b3abd766_703x381.png" width="703" height="381" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/20e092fb-0ac7-4142-b6d9-35b8b3abd766_703x381.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:381,&quot;width&quot;:703,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MuOI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20e092fb-0ac7-4142-b6d9-35b8b3abd766_703x381.png 424w, https://substackcdn.com/image/fetch/$s_!MuOI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20e092fb-0ac7-4142-b6d9-35b8b3abd766_703x381.png 848w, https://substackcdn.com/image/fetch/$s_!MuOI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20e092fb-0ac7-4142-b6d9-35b8b3abd766_703x381.png 1272w, https://substackcdn.com/image/fetch/$s_!MuOI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F20e092fb-0ac7-4142-b6d9-35b8b3abd766_703x381.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">PowerShell running remote debugging on port 9203 for Google Chrome</figcaption></figure></div><h3>Execution of Lumma Stealer via RunOnce key</h3><p>In a couple of instances we observed very lengthy executables creating <strong>RunOnce</strong> registry keys for executables that have been identified as <strong>Lumma Stealer</strong>. The character length does appear to vary, but this does create a detection opportunity for us as well as it does appear to be over 26 characters in length which should be rare.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bD3q!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F585f8195-51f5-49fc-a891-2c62e23d30f6_694x396.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bD3q!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F585f8195-51f5-49fc-a891-2c62e23d30f6_694x396.png 424w, https://substackcdn.com/image/fetch/$s_!bD3q!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F585f8195-51f5-49fc-a891-2c62e23d30f6_694x396.png 848w, https://substackcdn.com/image/fetch/$s_!bD3q!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F585f8195-51f5-49fc-a891-2c62e23d30f6_694x396.png 1272w, https://substackcdn.com/image/fetch/$s_!bD3q!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F585f8195-51f5-49fc-a891-2c62e23d30f6_694x396.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bD3q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F585f8195-51f5-49fc-a891-2c62e23d30f6_694x396.png" width="694" height="396" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/585f8195-51f5-49fc-a891-2c62e23d30f6_694x396.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:396,&quot;width&quot;:694,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bD3q!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F585f8195-51f5-49fc-a891-2c62e23d30f6_694x396.png 424w, https://substackcdn.com/image/fetch/$s_!bD3q!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F585f8195-51f5-49fc-a891-2c62e23d30f6_694x396.png 848w, https://substackcdn.com/image/fetch/$s_!bD3q!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F585f8195-51f5-49fc-a891-2c62e23d30f6_694x396.png 1272w, https://substackcdn.com/image/fetch/$s_!bD3q!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F585f8195-51f5-49fc-a891-2c62e23d30f6_694x396.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">RunOnce registry key added by 26 character ParentImage</figcaption></figure></div><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CFCm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facbc95b9-a113-4353-bcc6-9d49a3fb6de4_1372x790.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CFCm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facbc95b9-a113-4353-bcc6-9d49a3fb6de4_1372x790.png 424w, https://substackcdn.com/image/fetch/$s_!CFCm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facbc95b9-a113-4353-bcc6-9d49a3fb6de4_1372x790.png 848w, https://substackcdn.com/image/fetch/$s_!CFCm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facbc95b9-a113-4353-bcc6-9d49a3fb6de4_1372x790.png 1272w, https://substackcdn.com/image/fetch/$s_!CFCm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facbc95b9-a113-4353-bcc6-9d49a3fb6de4_1372x790.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CFCm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facbc95b9-a113-4353-bcc6-9d49a3fb6de4_1372x790.png" width="1372" height="790" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/acbc95b9-a113-4353-bcc6-9d49a3fb6de4_1372x790.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:790,&quot;width&quot;:1372,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CFCm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facbc95b9-a113-4353-bcc6-9d49a3fb6de4_1372x790.png 424w, https://substackcdn.com/image/fetch/$s_!CFCm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facbc95b9-a113-4353-bcc6-9d49a3fb6de4_1372x790.png 848w, https://substackcdn.com/image/fetch/$s_!CFCm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facbc95b9-a113-4353-bcc6-9d49a3fb6de4_1372x790.png 1272w, https://substackcdn.com/image/fetch/$s_!CFCm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Facbc95b9-a113-4353-bcc6-9d49a3fb6de4_1372x790.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">RunOnce registry key added by 28 character ParentImage</figcaption></figure></div><p></p><h2>Detection &amp; Hunting Opportunities</h2><p>While these techniques leverage some sneaky tactics and heavy obfuscation there are several detection opportunities. Below are some useful Sigma rules that can be used for detection and hunting (you can convert some of these to queries using something like uncoder.io for validation and tuning). Each rule should be carefully evaluated and assigned a threat level based on your validation process.</p><div><hr></div><p><strong>Homoglyph Social Engineering</strong></p><p>The following Sigma rule detects the use of homoglyphs in conjunction with highly suspicious binaries. It is unlikely to have many false positives in regions that do not frequently use Cyrillic text. This rule eliminates some of the false positives from the Sigma project's <strong><a href="https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_susp_homoglyph_cyrillic_lookalikes.yml">Potential Homoglyph Attack Using Lookalike Characters</a> </strong>by pairing it with often-abused binaries.</p><pre><code>title: Homoglyph Attack Using Lookalike Characters Used With Highly Suspicious Binary
id: 2bd01836-ab65-4897-b3f9-9981e7c04394
status: experimental
description: Detects homoglyphs being used with highly suspicious binaries. 
references:
    - https://www.joesandbox.com/analysis/search?threatname=clickfix
    - http://www.irongeek.com/homoglyph-attack-generator.php
author: Luke Rusten
date: 2025/04/07
tags:
    - attack.defense_evasion
    - attack.t1036
    - attack.t1036.003

logsource:
    category: process_creation
    product: windows
detection:
    suspicious_binary:
        CommandLine|contains:
            - 'powershell'
            - 'cmd'
            - 'wscript'
            - 'cscript'
            - 'mshta'
            - 'rundll32'
            - 'regsvr32'
            - 'wmic'
            - 'schtasks'
            - 'certutil'
            - 'msiexec'
            - 'bitsadmin'
    selection_upper:
        CommandLine|contains:
            - "\u0410" # &#1040;/A
            - "\u0412" # &#1042;/B
            - "\u0415" # &#1045;/E
            - "\u041a" # &#1050;/K
            - "\u041c" # &#1052;/M
            - "\u041d" # &#1053;/H
            - "\u041e" # &#1054;/O
            - "\u0420" # &#1056;/P
            - "\u0421" # &#1057;/C
            - "\u0422" # &#1058;/T
            - "\u0425" # &#1061;/X
            - "\u0405" # &#1029;/S
            - "\u0406" # &#1030;/I
            - "\u0408" # &#1032;/J
            - "\u04ae" # &#1198;/Y
            - "\u04c0" # &#1216;/I
            - "\u050C" # &#1292;/G
            - "\u051a" # &#1306;/Q
            - "\u051c" # &#1308;/W
            - "\u0391" # &#913;/A
            - "\u0392" # &#914;/B
            - "\u0395" # &#917;/E
            - "\u0396" # &#918;/Z
            - "\u0397" # &#919;/H
            - "\u0399" # &#921;/I
            - "\u039a" # &#922;/K
            - "\u039c" # &#924;/M
            - "\u039d" # &#925;/N
            - "\u039f" # &#927;/O
            - "\u03a1" # &#929;/P
            - "\u03a4" # &#932;/T
            - "\u03a5" # &#933;/Y
            - "\u03a7" # &#935;/X
    selection_lower:
        CommandLine|contains:
            - "\u0430" # &#1072;/a
            - "\u0435" # &#1077;/e
            - "\u043e" # &#1086;/o
            - "\u0440" # &#1088;/p
            - "\u0441" # &#1089;/c
            - "\u0445" # &#1093;/x
            - "\u0455" # &#1109;/s
            - "\u0456" # &#1110;/i
            - "\u04cf" # &#1231;/l
            - "\u0458" # &#1112;/j
            - "\u04bb" # &#1211;/h
            - "\u0501" # &#1281;/d
            - "\u051b" # &#1307;/q
            - "\u051d" # &#1309;/w
            - "\u03bf" # &#959;/o
    condition: suspicious_binary and (1 of selection_*)
falsepositives:
    - Commandlines with legitimate Cyrillic text; will likely require tuning (or not be usable) in countries where these alphabets are in use.
level: low</code></pre><div><hr></div><p><strong>MSHTA/PowerShell</strong></p><p>The following Sigma rule detects Mshta.exe getting launched with Explorer as the parent and no HTML file specified which is highly suspicious. In addition, the Sigma project's <a href="https://blog.reconinfosec.com/detecting-fake-captcha-campaigns/%20%C2%A0https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_mshta_http.yml">Remotely Hosted HTA File Executed Via Mshta.EXE </a>will detect mshta.exe reaching out over common internet protocols (http, https, or ftp).</p><pre><code>title: Highly Suspicious MSHTA.exe Execution From Explorer Parent
id: 5fa3b3df-7bed-4bea-b144-22d7b8f59af1
status: experimental
description: Detects MSHTA.exe being launched from explorer without specifying an html file which is highly unusual
references:
   - https://www.joesandbox.com/analysis/search?threatname=clickfix
tags:
   - attack.execution
   - attack.defense_evasion
   - attack.t1218.005
author: Luke Rusten
date: 2025/04/10
logsource:
   category: process_creation
   product: windows
detection:
   selection:
       Image|endswith: '\mshta.exe'
       ParentImage|endswith: '\explorer.exe'

   filter:
       CommandLine|contains:
         - '.hta'
         - '.htm'

   condition: selection and not filter
falsepositives:
   - Unknown
level: low</code></pre><div><hr></div><p><strong>PowerShell Download Cradles</strong></p><p>Our <strong>PowerShell Webclient With Get-Member Matching Launched From Encoded PowerShell </strong>detection is great to start off as a threat hunt in your environment to develop a baseline and start to tune. You will not likely find many encoded PowerShell scripts running this combination of commands if at all.</p><pre><code>title: PowerShell Webclient With Get-Member Matching Launched From Encoded PowerShell
id: 5068d424-4d35-412f-aa8b-9a49bf8183dd
status: experimental
description: PowerShell Webclient With Get-Member Matching Launched From Encoded PowerShell
references:
   - https://www.joesandbox.com/analysis/search?threatname=clickfix
tags:
   - attack.execution
   - attack.defense_evasion
   - attack.t1218.005
author: Luke Rusten
date: 2025/04/10
logsource:
   category: process_creation
   product: windows
detection:
   selection_webclient:
       CommandLine|contains:
           - 'Net.WebClient]::New()'

   selection_get_member:
       CommandLine|contains:
           - '|GM|'
           - 'Get-Member'
           - '|GM)'

   selection_like:
       CommandLine|contains:
           - 'Value.Name -clike'
           - 'Value.Name -like'
           - '$_.Name -clike'
           - '$_.Name -like'

   selection_parent:
       ParentCommandLine|contains:
           - 'powershell'

   selection_parent_encoded:
       ParentCommandLine|contains:
           - ' -e '
           - ' -en '
           - ' -enc '
           - ' -enco '
           - ' -encod '
           - ' -encoded '
           - ' -encodedcommand '

   condition: all of selection*
falsepositives:
   - Unknown
level: low</code></pre><div><hr></div><p><strong>AMSI Bypass</strong></p><p>This detection is pretty specific and has only had minor tweaks to make it resilient for variable changes.</p><pre><code>title: Potential AMSI Bypass Technique Modifying CLR.DLL in Memory
id: b9cfffb2-f4f8-455d-a167-21f59495f8f4
status: experimental
description: Detects use of AMSI Bypass Technique Modifying CLR.DLL in Memory
references:
   - https://practicalsecurityanalytics.com/new-amsi-bypss-technique-modifying-clr-dll-in-memory/
   - https://github.com/S3cur3Th1sSh1t/Amsi-Bypass-Powershell
author: Luke Rusten
date: 2025/04/12
tags:
   - attack.execution
   - attack.t1059.001
   - attack.t1106
logsource:
   product: windows
   category: ps_script
   definition: 'Requirements: Script Block Logging must be enabled'
detection:
   selection:
       ScriptBlockText|contains|all:
           - '0x02'      # PAGE_READONLY
           - '0x04'      # PAGE_READWRITE
           - '0x40'      # PAGE_EXECUTE_READWRITE
           - '0x20'      # PAGE_EXECUTE_READ
           - '0x100'     # PAGE_GUARD
           - '0x1000'    # MEM_COMMIT
           - '260'       # MAX_PATH
           - 'if ($path.EndsWith("clr.dll"))' # We want to look for clr.dll in the script. This may be too specific for variations, but it works in every case we observed
           - '$signature = [System.Text.Encoding]::UTF8.GetBytes' # Matches variations of $signature = [System.Text.Encoding]::UTF8.GetBytes($a + $b + $c + $d)

   condition: selection
falsepositives:
   - Unknown
level: low</code></pre><div><hr></div><p><strong>PowerShell spawning remote debugging</strong></p><p>This detection may require some tuning for your environment, but it is unlikely to have a high false positive rate. If your detection engine supports it, you could supercharge this detection by alerting on 2 or more browsers with remote debugging initiated by PowerShell in a 30 second period. That would be highly unusual in most environments. In addition, the <a href="https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_browsers_chromium_headless_debugging.yml">Potential Data Stealing Via Chromium Headless Debugging</a> Sigma rule looks for similar behavior but may be more false positive prone.</p><pre><code>title: Browser Started with Remote Debugging Initiated By PowerShell
id: 3dfa8836-67c8-4658-bf6f-01d26cec6b4f
status: experimental
description: Detects browsers starting with the remote debugging flags initiated by PowerShell. This is a technique often used to perform browser injection and infostealer attacks
references:
   - https://www.joesandbox.com/analysis/search?threatname=clickfix
   - https://github.com/defaultnamehere/cookie_crimes/
   - https://github.com/wunderwuzzi23/firefox-cookiemonster
author: Luke Rusten
date: 2025/04/10
tags:
   - attack.credential_access
   - attack.t1185
logsource:
   category: process_creation
   product: windows
detection:
   parent:
       ParentImage|endswith: '\powershell.exe'
   selection_chromium_based:
       CommandLine|contains: ' --remote-debugging-'
   selection_firefox:
       Image|endswith: '\firefox.exe'
       CommandLine|contains: ' -start-debugger-server'
   condition: parent and 1 of selection_*
falsepositives:
   - Unknown
level: low</code></pre><div><hr></div><p><strong>Run Key Persistence From a Lengthy Parent</strong></p><p>This rule may generate some false positives although it should not be many. <strong>Verify that your detection engine supports this type of regex</strong> and tune for your environment. The binaries observed in the Lumma Stealer cases were 26 and 28 characters, but baselining showed 23 was a pretty good sweet spot and only required a couple of tunes. You should baseline this in your environment and decide if you should increase the character count and tune out false positives.</p><pre><code>title: Potential Persistence Attempt Via Run Keys Using Reg.EXE With Lengthy Parent
id: a6d9b48b-4394-4d5e-b026-9df096bfa186
status: experimental
description: Potential Persistence Attempt Via Run Keys Using Reg.EXE With Lengthy Parent
references:
   - https://www.joesandbox.com/analysis/search?threatname=clickfix


author: Luke Rusten
date: 2025/04/10
tags:
   - attack.persistence
   - attack.t1547.001
logsource:
   category: process_creation
   product: windows
detection:
   selection:
       CommandLine|contains|all:
           - 'reg'
           - ' ADD '
           - 'Software\Microsoft\Windows\CurrentVersion\Run'
       ParentImage|re: '\\[a-zA-Z0-9]{23,}\.exe'

   condition: selection
falsepositives:
   - Some legitimate software although executable names are not typically that long


level: low</code></pre><p></p><h2>Recommendations</h2><p><strong>User Awareness &amp; Training: </strong>Educate users on recognizing deceptive prompts and CAPTCHA-like lures. Encourage hesitation before pasting clipboard content into <strong>Win + R</strong>.</p><p><strong>Behavioral-Based Detection: </strong>Static IOCs change quickly. Behavioral detections will likely provide more resilience across several variants.</p><p><strong>Restrict Use of Run Dialog: </strong>Disable or restrict<strong> Win + R </strong>functionality for non-administrative users using Group Policy. <strong>(This should be thoroughly researched and tested before implementing). </strong><a href="https://www.auslogics.com/en/articles/enable-or-disable-run-command-winr-box/">Guide: Disable Run Command</a></p><h2>References</h2><ul><li><p><a href="https://www.hhs.gov/sites/default/files/clickfix-attacks-sector-alert-tlpclear.pdf">HHS Alert on ClickFix</a></p></li><li><p><a href="https://www.joesandbox.com/analysis/search?threatname=clickfix">Joe Sandbox Analysis - ClickFix</a></p></li><li><p><a href="https://www.microsoft.com/en-us/security/blog/2025/03/13/phishing-campaign-impersonates-booking-com-delivers-a-suite-of-credential-stealing-malware/">Microsoft Security Blog: Booking.com Phishing</a></p></li><li><p><a href="https://rhisac.org/threat-intelligence/clearfake-malicious-framework-updates-tactics-with-binance-smart-chain-obfuscation/">ClearFake + Etherhiding Deep Dive</a></p></li><li><p><a href="https://www.packetlabs.net/posts/etherhiding-a-new-tactic-for-hiding-malware-on-the-blockchain/">Etherhiding on Blockchain</a></p></li></ul><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecyber.dad/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading thecyber.dad! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Effective Threat Hunting]]></title><description><![CDATA[A Cyber-Dads Approach To Threat Hunting]]></description><link>https://www.thecyber.dad/p/effective-threat-hunting</link><guid isPermaLink="false">https://www.thecyber.dad/p/effective-threat-hunting</guid><dc:creator><![CDATA[Luke Rusten]]></dc:creator><pubDate>Mon, 23 Sep 2024 22:49:21 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!soFV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b8eb468-2771-4976-b87e-7ccf1ee5f438_1024x576.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h4><strong>Introduction</strong></h4><p>Over the years, I&#8217;ve had the privilege of speaking with many Security Analysts and Threat Hunters, each with their own approach to threat hunting. Some methods have been truly impressive, and others have been a little less so. While I don&#8217;t believe there is necessarily a <em>wrong</em> way to perform threat hunting, there are certainly ways that are <em>more effective</em>. In this post, I will outline some concepts that make for an efficient and impactful threat hunt.</p><p>Before we dive into the mechanics of effective threat hunting and work through an example, it&#8217;s essential to understand why threat hunting is so important. Framing this will help guide how we approach our hunts. Here are some reasons threat hunting is critical:</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecyber.dad/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading thecyber.dad! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><ul><li><p><strong>Threats are often discovered after a compromise has occurred or a vulnerability is disclosed.</strong></p></li><li><p><strong>Detections are typically based on past observations, leaving gaps for novel attacks.</strong></p></li><li><p><strong>Threats can linger undetected for days, weeks, months, or even years before they&#8217;re uncovered.</strong></p></li></ul><p>While there are other reasons, these three points lead to one crucial concept: <strong>we won&#8217;t always detect new threats before they&#8217;ve been discovered</strong>. Knowing this helps us become more strategic in our approach to finding malicious activity, and in this post, I&#8217;ll explain how to hunt with these concepts in mind.</p><h4><strong>The Pyramid of Pain</strong></h4><p>If you are unfamiliar with The Pyramid of Pain by <a href="https://x.com/DavidJBianco">David Bianco</a> you are in for an earth shattering revelation in your threat hunting! Okay, maybe not earth shattering, but if your threat hunting is based strictly off searching for hashes, IPs and domains, you may benefit from understanding the concepts behind it.</p><p>If you want to read more about it you can read about it<a href="https://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html"> here</a>, but the TL;DR: &#8220;This simple diagram shows the relationship between the types of indicators you might use to detect an adversary's activities and how much pain it will cause them when you are able to deny those indicators to them.&#8221;</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!soFV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b8eb468-2771-4976-b87e-7ccf1ee5f438_1024x576.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!soFV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b8eb468-2771-4976-b87e-7ccf1ee5f438_1024x576.jpeg 424w, https://substackcdn.com/image/fetch/$s_!soFV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b8eb468-2771-4976-b87e-7ccf1ee5f438_1024x576.jpeg 848w, https://substackcdn.com/image/fetch/$s_!soFV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b8eb468-2771-4976-b87e-7ccf1ee5f438_1024x576.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!soFV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b8eb468-2771-4976-b87e-7ccf1ee5f438_1024x576.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!soFV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b8eb468-2771-4976-b87e-7ccf1ee5f438_1024x576.jpeg" width="1024" height="576" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/2b8eb468-2771-4976-b87e-7ccf1ee5f438_1024x576.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:576,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!soFV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b8eb468-2771-4976-b87e-7ccf1ee5f438_1024x576.jpeg 424w, https://substackcdn.com/image/fetch/$s_!soFV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b8eb468-2771-4976-b87e-7ccf1ee5f438_1024x576.jpeg 848w, https://substackcdn.com/image/fetch/$s_!soFV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b8eb468-2771-4976-b87e-7ccf1ee5f438_1024x576.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!soFV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F2b8eb468-2771-4976-b87e-7ccf1ee5f438_1024x576.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>When applied to threat hunting, we understand that searching for an IP address or Hash, may not be the best way to find the threat as these things frequently (and easily) change. Instead, focusing your threat hunting on indicators toward the top of the pyramid is far more productive.</p><h4><strong>Prioritizing The Hunt</strong></h4><p>Another common mistake I see threat hunters make is looking for a shiny object without really considering whether or not the threat is actually relevant or just something they personally found interesting. If there is some scary sounding Linux exploit out there, but your organization has one Linux server in the basement that isn&#8217;t exposed to the internet, it may not be the most important place to hunt.</p><p>Consider - Does this threat target my sector or industry? Is there a high probability I may be impacted? Do I have a lot of exposure to this threat?</p><p>If the answers to these questions are &#8220;no,&#8221; it might be worth re-prioritizing your hunt. Of course, if you have the resources to investigate more obscure threats, go for it&#8212;but for most, focusing on high-probability, high-impact threats is the most effective use of time and resources.</p><h4><strong>Continuous Improvement</strong></h4><p>The last and one of the most important components of threat hunting is ensuring that each hunt has some form of output and a way to measure them. These should be part of a continuous improvement philosophy that drives your hunts. If you are simply hunting for a threat and not building new detections, improving telemetry, or improving your controls - you are doing it wrong.</p><p>I recommend tracking the following at a minimum:</p><ul><li><p>Hunt Environment: (Windows, MacOS, Linux, Cloud, etc)</p></li><li><p>Number of new detections added</p></li><li><p>Number of telemetry improvements</p></li><li><p>Threat found (Yes/No)</p></li></ul><p>Also, be sure to document your hunt and what you&#8217;ve learned. Your documentation will help describe what is normal for your environment, which can be valuable if you&#8217;re ever investigating an incident. Documenting your hunts is also important for both rerunning them in the future and continuously improving them over time.&nbsp;</p><h4><strong>Putting It Together: A Practical Example</strong></h4><p>So we have covered why we hunt, what to hunt for, and how to prioritize our hunts. Next let's walk through an example hunt.</p><p>First let's pretend we are the threat hunters responsible for protecting a hospital. We receive<a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-061a"> this advisory related to BlackSuit (Royal) Ransomware</a> who is known to target healthcare. That checks one of our priority boxes!</p><p>In this report there are tons of IOCs (indicators of compromise) and TTPs (tactics, techniques and procedures) that are utilized by the ransomware group. Should we search for the hashes, filenames, IPs or domains? That might work. Instead I am going to focus on something at the top of the pyramid of pain.</p><p>In the report we see the threat actors use a tool called<a href="https://github.com/jpillora/chisel"> Chisel</a>.</p><div class="captioned-image-container"><figure><a class="image-link image2" target="_blank" href="https://substackcdn.com/image/fetch/$s_!xVZb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb100a1e4-7c5a-44f9-a0fc-60fc987247be_1456x238.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!xVZb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb100a1e4-7c5a-44f9-a0fc-60fc987247be_1456x238.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xVZb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb100a1e4-7c5a-44f9-a0fc-60fc987247be_1456x238.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xVZb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb100a1e4-7c5a-44f9-a0fc-60fc987247be_1456x238.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xVZb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb100a1e4-7c5a-44f9-a0fc-60fc987247be_1456x238.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!xVZb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb100a1e4-7c5a-44f9-a0fc-60fc987247be_1456x238.jpeg" width="1456" height="238" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b100a1e4-7c5a-44f9-a0fc-60fc987247be_1456x238.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:238,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!xVZb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb100a1e4-7c5a-44f9-a0fc-60fc987247be_1456x238.jpeg 424w, https://substackcdn.com/image/fetch/$s_!xVZb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb100a1e4-7c5a-44f9-a0fc-60fc987247be_1456x238.jpeg 848w, https://substackcdn.com/image/fetch/$s_!xVZb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb100a1e4-7c5a-44f9-a0fc-60fc987247be_1456x238.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!xVZb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb100a1e4-7c5a-44f9-a0fc-60fc987247be_1456x238.jpeg 1456w" sizes="100vw" loading="lazy"></picture><div></div></div></a></figure></div><p>Chisel is a tool that can be used by attackers for various nefarious purposes. It can be used for C2 (command and control), data exfiltration, bypassing firewalls, etc. A few TTPs that map back to <a href="https://attack.mitre.org/">MITRE</a> are:</p><p><strong>T1071.001 - Application Layer Protocol: Web Protocols</strong></p><ul><li><p><strong>Description</strong>: Adversaries may communicate using the application layer protocols associated with web traffic to avoid detection/network filtering by blending in with legitimate traffic. They often use port 443 (HTTPS).</p></li><li><p><strong>Relevance</strong>: Since the connection is happening over port 443, the use of a common web protocol like HTTPS to conceal malicious traffic is a common technique.</p></li></ul><p><strong>T1090.002 - Proxy: External Proxy</strong></p><ul><li><p><strong>Description</strong>: Adversaries may use external proxies to obfuscate their command and control communications by routing traffic through an external proxy such as a SOCKS proxy.</p></li><li><p><strong>Relevance</strong>: The command includes :socks, indicating the use of a SOCKS proxy to relay traffic, which is common for masking communications between an infected host and the attacker&#8217;s infrastructure.</p></li></ul><p><strong>T1036.005 - Masquerading: Match Legitimate Name or Location</strong></p><ul><li><p><strong>Description</strong>: Adversaries may use masquerading by placing an executable in a legitimate path, using a legitimate-sounding name, or leveraging built-in system executables (e.g., conhost.exe).</p></li><li><p><strong>Relevance</strong>: The path C:\Users\Public\ combined with a legitimate-sounding executable like conhost.exe suggests potential masquerading.</p></li></ul><p><strong>Observations and Focus Areas</strong></p><p>With these techniques in mind, here are some key indicators to investigate for this threat hunt:</p><ul><li><p><strong>Network connections</strong> initiated from binaries in C:\Users\Public\ or its subfolders. In my experience, very few legitimate executables should be making network connections from this location. Common false positives may include certain VPN clients or educational tools.</p></li><li><p><strong>SOCKS client commands</strong> that are running throughout your environment.</p></li><li><p><strong>Common Windows binaries</strong> executing from unusual directories.</p></li></ul><p><strong>Continuous Improvement: Close Visibility Gaps</strong></p><p>For this threat hunt, we must confirm our visibility into these activities:</p><ul><li><p>Do we have <strong>process creation/process tracking events</strong> that include command-line activity?</p></li><li><p>Are we monitoring <strong>network connection events</strong>, specifically those originating from our areas of concern?</p></li></ul><p>While performing your threat hunt, you may find that you do not have the visibility, telemetry, or access required to answer important questions. That&#8217;s a great finding! Threat hunting will force you to identify and confront these types of gaps before an incident.</p><p><strong>Continuous Improvement: Implement Better Detections</strong></p><p>For detections, I highly recommend utilizing <strong><a href="https://github.com/SigmaHQ/sigma">SigmaHQ</a></strong>&#8212;a fantastic resource for threat research and detection development. Each detection is mapped to the <a href="https://attack.mitre.org/">MITRE ATT&amp;CK</a> framework and comes with references for further exploration. Here are some relevant detections that could enhance our coverage against the threat from our example:</p><ul><li><p><a href="https://github.com/SigmaHQ/sigma/blob/master/rules-threat-hunting/windows/network_connection/net_connection_win_susp_initaited_public_folder.yml">Network Connection Initiated From Users\Public Folder</a></p></li><li><p><a href="https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_susp_system_exe_anomaly.yml">System File Execution Location Anomaly</a></p></li><li><p><a href="https://github.com/SigmaHQ/sigma/blob/master/rules/windows/process_creation/proc_creation_win_pua_chisel.yml">PUA - Chisel Tunneling Tool Execution</a></p></li></ul><p>Useful tip: Tools like<a href="http://uncoder.io"> uncoder.io</a> or<a href="http://sigconverter.io"> sigconverter.io</a> will allow you to input a Sigma rule and output a hunting query that works with various tools. Check them out!</p><h4><strong>Conclusion</strong></h4><p>Threat hunting is about more than just chasing down the latest exploit or investigating novel malware. It&#8217;s about focusing your efforts where they matter most&#8212;on threats that pose a legitimate risk to your environment. By understanding the <strong>Pyramid of Pain</strong>, prioritizing relevant threats, and approaching each hunt with a structured strategy, you can vastly improve the effectiveness of your threat hunting program.</p><p>As I mentioned earlier <strong>we won&#8217;t always detect new threats before they&#8217;ve been discovered. </strong>Using the above methodology, we may find Chisel, or we may find any number of tools used by threat actors that share similar TTPs (regardless of hash, filename, destination IP, etc). We've also improved our detection capabilities, so whether it's Chisel or an entirely new tool, if it shares the same TTPs, we have a strong chance of detecting it.</p><p>By being methodical and purposeful in your hunts, you'll not only improve your detection capabilities, but also increase the difficulty for adversaries to operate undetected in your environment.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecyber.dad/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading thecyber.dad! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Welcome To TheCyber.Dad]]></title><description><![CDATA[A Little About My Cybersecurity Journey]]></description><link>https://www.thecyber.dad/p/welcome-to-thecyberdad</link><guid isPermaLink="false">https://www.thecyber.dad/p/welcome-to-thecyberdad</guid><dc:creator><![CDATA[Luke Rusten]]></dc:creator><pubDate>Sun, 14 Jul 2024 23:09:48 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/c53f5a37-53e8-4f23-822b-68ab24b50e47_4576x3051.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>My name is Luke, and I am a cybersecurity professional and father of two wonderful boys. When I am not battling hackers in the digital realm, I am doing some sort of fun activity with my kids. Sometimes balancing the two can be difficult because, as most of us know all too well, &#8220;the bad guys always have a say.&#8221; This blog is my attempt to share things I have learned and hopefully help people in this space.</p><p>I started my journey working in IT for many years. Fixing computers was cool. Building them was even cooler (who doesn&#8217;t love building a monster computer?!). I have done everything from setting up O365 tenants to running all of the Cat6 cables from the wall plate to the switch.</p><p>Then one day, a customer got phished and needed our help. Going through the sign-in logs and finding the bad guy&#8217;s IP was exciting. It was an aha! moment. I felt like a digital Sherlock Holmes, and I had just defeated Professor Moriarty! Okay, maybe I am exaggerating a little, but I was hooked. After that, I started learning what I could about hacker techniques and cybersecurity.</p><p>Fast forward a year or so, and an opportunity to work with my good friend (and cyber-rockstar) <a href="https://blog.ecapuano.com/">Eric</a> at his cybersecurity company fell into my lap. I started off as a Security Analyst and got to learn from some of the best people in this space. I am so grateful for the experience and knowledge I gained from such a great mentor.</p><p>Now it&#8217;s my turn to pay it forward. I hope you enjoy the ramblings of a cyber-dad.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://www.thecyber.dad/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading thecyber.dad! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item></channel></rss>