mastodon.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
The original server operated by the Mastodon gGmbH non-profit

Administered by:

Server stats:

344K
active users

#cmstp

0 posts0 participants0 posts today

🚨 #XWorm leverages LOLBAS techniques to abuse #CMSTPLUA

CMSTPLUA is a legitimate Windows tool that can be exploited for system binary proxy execution using #LOLBAS techniques, bypassing security controls like #UAC, and executing #malicious code, putting organizations at risk.

⚙️ With Script Tracer in #ANYRUN Sandbox, a SOC team can analyze scripts more efficiently. It simplifies script breakdowns, making it easier to understand their behavior and get key insights.
The #script embedded in the INF file is used to coordinate an execution chain:
1️⃣ EXE starts cmstp.exe which is used to launch a #malicious script from an #INF file.

2️⃣ CMSTPLUA ➡️ mshta.exe ➡️ cmd.exe ➡️ EXE ➡️ PowerShell
#MSHTA loads a #VBScript from memory to run an executable and shuts down the #CMSTP process.
– EXE launches #PowerShell to add itself to #MicrosoftDefender exceptions.

3️⃣ Finally, it runs the XWorm #payload from the #System32 directory and adds itself to the Scheduled Task for persistence.

👨‍💻 Check out the analysis and see Script Tracer in action:
app.any.run/tasks/9352d612-8ea

Living-off-the-Land techniques have been leveraged for years to execute malicious operations using legitimate system utilities.
Use these TI Lookup search queries to find similar samples and improve the efficiency of your organization's security response:
🔍 intelligence.any.run/analysis/
🔍 intelligence.any.run/analysis/

Analyze latest #malware and #phishing threats with #ANYRUN 🚀