079. Hunting for DarkWatchman RAT
Hello everyone! How are your threat hunting missions going? Let's talk about DarkWatchman - a RAT leveraged by an activity cluster we track as Watch Wolf.
So, let's use it to generate a threat hunting hypothesis. Let's focus on the following behavior:
wscript.exe "C:\Users\user\AppData\Local\c784477d0.js" 188
As you can see, it abuses wscript.exe to execute a malicious JS-script located in the specific folder. So, we can hunt for suspicious JS-scripts executed from the same folder or subfolders:
event_type: "processcreatewin"
AND
proc_file_name: "wscript.exe"
AND
cmdline: "AppData\\Local" AND "js"
If you want to learn more about this RAT's behaviours - here's a sample for you.
See you tomorrow!
Comments
Post a Comment