079. Hunting for DarkWatchman RAT

Hello everyone! How are your threat hunting missions going? Let's talk about DarkWatchman - a RAT leveraged by an activity cluster we track as Watch Wolf.


So, let's use it to generate a threat hunting hypothesis. Let's focus on the following behavior:

wscript.exe "C:\Users\user\AppData\Local\c784477d0.js" 188

As you can see, it abuses wscript.exe to execute a malicious JS-script located in the specific folder. So, we can hunt for suspicious JS-scripts executed from the same folder or subfolders:

event_type: "processcreatewin"

AND

proc_file_name: "wscript.exe"

AND

cmdline: "AppData\\Local" AND "js"

If you want to learn more about this RAT's behaviours - here's a sample for you.

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge