mttaggart / wtfbins

WTF are these binaries doing?! A list of benign applications that mimic malicious behavior.
MIT License
150 stars 12 forks source link

[New WTFBin]: Suspicious characters in command line arguments for Ivanti Endpoint Manager logging processes #22

Closed mbabinski closed 2 years ago

mbabinski commented 2 years ago

Contributor Name: Micah Babinski Application/Executable: Various Ivanti Endpoint Manager Logging Internals

WTF Behavior Description: The command-line arguments for the exes listed above occassionally contain fragmented, seemingly-random strings containing special unicode characters, what looks like bits of HTML or XML tags, and/or URL-enocoded strings. For example:

These processes all spawn instances of Console Host (conhost.exe) with the 0x4 flag, like \??\C:\Windows\system32\conhost.exe 0x4.

Link to Documentation of Behavior: None found. According to this page, the exes are components within Endpoint Manager's real time inventory and monitoring capabilities: https://forums.ivanti.com/s/article/How-to-turn-on-logging-for-collector-exe-Real-time-inventory-and-monitoring?language=en_US The -p flag matches with the expected communication port, but I was unable to find any documentation for the other flags in the command. This behavior will be detected by anyone using Sigma's Obfuscated Command Line Using Special Unicode Characters rule.

Please provide any images for additional evidence. 271c97b0-d83a-43a2-8cd8-0658b972eaa2

Thanks for considering my submission. I love the project btw!

mttaggart commented 2 years ago

Added in e8acedb9fb77d5d2e851ef7ab36e068276c56fde