用户执行是指攻击者通过社会工程等手段诱导目标用户主动运行恶意代码的攻击技术,通常作为初始访问或权限提升的重要手段。传统防御措施主要依赖检测异常进程创建、监控敏感命令行参数、分析文档宏行为特征等方法,结合终端防护软件进行实时拦截。然而随着攻击者匿迹技术的演进,单纯依赖静态特征检测或单点行为分析的防御策略面临失效风险。
为规避传统检测机制,现代用户执行攻击呈现深度场景融合与动态行为适配特征。攻击者通过解构恶意代码执行链,将其嵌入合法软件操作流程,并引入环境感知与智能触发机制,构建出"表面合规、内在恶意"的新型攻击范式。现有匿迹技术的核心突破在于建立攻击行为与正常业务操作的深度关联性:多阶段诱导式攻击通过分步授权机制逐步瓦解用户戒备;文档隐写技术则突破传统文件格式限制,实现零交互触发;环境感知机制确保攻击行为仅在安全监控盲区激活。这些技术的共性在于突破传统"恶意-合法"的二元对立范式,通过多维度的行为特征融合与动态环境适配,使得攻击链每个环节都具备表面合法性。
匿迹技术的升级迫使防御体系向多维行为建模方向演进,需构建用户行为基线分析、软件操作链完整性校验、动态环境风险评估等新型检测能力,同时强化终端防护系统的上下文感知与协同分析能力,才能有效应对深度隐蔽的用户执行攻击。
| 效应类型 | 是否存在 |
|---|---|
| 特征伪装 | ✅ |
| 行为透明 | ❌ |
| 数据遮蔽 | ✅ |
| 时空释痕 | ✅ |
攻击者通过深度仿冒合法软件功能链、伪造数字签名、匹配正常文档格式标准等手段,使恶意载荷在文件特征、进程行为、网络通信等维度与合法对象高度一致。例如将恶意代码嵌入经过签名的安装程序,或构造符合行业规范的办公文档,使得传统基于特征库匹配的检测机制失效。
采用多层加密和隐写技术保护恶意载荷,例如在文档中通过Unicode控制字符嵌入加密代码段,或利用网络协议冗余字段传输控制指令。部分高级变种使用TLS加密通道与C2服务器通信,并结合流量伪装技术模仿合法云服务交互,有效遮蔽攻击链关键数据特征。
通过动态加载和延迟触发恶意代码的匿迹手段,攻击者有效稀释了攻击行为在时间和空间上的特征。动态加载和延迟触发恶意代码使攻击行为在文件执行后并非立即显现,分散了攻击特征,从而降低了防御系统的实时检测能力,增加了防御方检测用户执行攻击的难度。
| ID | Name | Description |
|---|---|---|
| G1004 | LAPSUS$ |
LAPSUS$ has recruited target organization employees or contractors who provide credentials and approve an associated MFA prompt, or install remote management software onto a corporate workstation, allowing LAPSUS$ to take control of an authenticated system.[1] |
| S1130 | Raspberry Robin |
Raspberry Robin execution can rely on users directly interacting with malicious LNK files.[2] |
| G1015 | Scattered Spider |
Scattered Spider has impersonated organization IT and helpdesk staff to instruct victims to execute commercial remote access tools to gain initial access.[3] |
| C0037 | Water Curupira Pikabot Distribution |
Water Curupira Pikabot Distribution requires users to interact with malicious attachments in order to start Pikabot installation.[4] |
| ID | Mitigation | Description |
|---|---|---|
| M1040 | Behavior Prevention on Endpoint |
On Windows 10, enable Attack Surface Reduction (ASR) rules to prevent executable files from running unless they meet a prevalence, age, or trusted list criteria and to prevent Office applications from creating potentially malicious executable content by blocking malicious code from being written to disk. Note: cloud-delivered protection must be enabled to use certain rules. [5] |
| M1038 | Execution Prevention |
Application control may be able to prevent the running of executables masquerading as other files. |
| M1031 | Network Intrusion Prevention |
If a link is being visited by a user, network intrusion prevention systems and systems designed to scan and remove malicious downloads can be used to block activity. |
| M1021 | Restrict Web-Based Content |
If a link is being visited by a user, block unknown or unused files in transit by default that should not be downloaded or by policy from suspicious sites as a best practice to prevent some vectors, such as .scr, .exe, .pif, .cpl, etc. Some download scanning devices can open and analyze compressed and encrypted formats, such as zip and rar that may be used to conceal malicious files. |
| M1017 | User Training |
Use user training as a way to bring awareness to common phishing and spearphishing techniques and how to raise suspicion for potentially malicious events. |
| ID | Data Source | Data Component | Detects |
|---|---|---|---|
| DS0015 | Application Log | Application Log Content |
Monitor logs from applications to detect user-initiated actions such as opening malicious documents, clicking on phishing links, or executing downloaded malware. Analytic 1 - Logs showing unexpected user actions triggering unusual processes.
|
| DS0017 | Command | Command Execution |
Detect commands triggered by users, especially related to decompression tools (e.g., zip files) that may unpack malicious payloads. This includes compression applications, such as those for zip files, that can be used to Deobfuscate/Decode Files or Information in payloads. Analytic 1 - Command lines showing decompression or decoding actions.
|
| DS0032 | Container | Container Creation |
Monitor for newly constructed containers that may use an existing, legitimate external Web service to exfiltrate data rather than their primary command and control channel. Analytic 1 - Containers communicating with unexpected external services.
|
| Container Start |
Monitor for the activation or invocation of a container (ex: docker start or docker restart) |
||
| DS0022 | File | File Creation |
Anti-virus can potentially detect malicious documents and files that are downloaded and executed on the user's computer. Endpoint sensing or network sensing can potentially detect malicious events once the file is opened (such as a Microsoft Word document or PDF reaching out to the internet or spawning powershell.exe). |
| DS0007 | Image | Image Creation |
Monitor for newly constructed image that may use an existing, legitimate external Web service to exfiltrate data rather than their primary command and control channel. |
| DS0030 | Instance | Instance Creation |
Monitor for newly constructed instances that may use an existing, legitimate external Web service to exfiltrate data rather than their primary command and control channel. |
| Instance Start |
Monitor for the activation or invocation of an instance (ex: instance.start within GCP Audit Logs) |
||
| DS0029 | Network Traffic | Network Connection Creation |
Monitor network traffic patterns associated with web-based user actions, such as clicking on phishing links or executing malware that tries to establish C2 communication. Analytic 1 - Web-based network connections to suspicious destinations.
|
| Network Traffic Content |
Monitor and analyze traffic patterns and packet inspection associated with web-based network connections that are sent to malicious or suspicious detinations (e.g. destinations attributed to phishing campaigns). Consider correlation with process monitoring and command line to detect anomalous processes execution and command line arguments (e.g. monitor anomalies in use of files that do not normally initiate network connections or unusual connections initiated by regsvr32.exe, rundll.exe, .SCF, HTA, MSI, DLLs, or msiexec.exe). |
||
| DS0009 | Process | Process Creation |
Identify processes spawned by user actions, especially from Office documents, PDFs, or web browsers that could lead to malicious execution. Analytic 1 - Processes created from user interaction with files.
|