083. Detecting Ransomware Affiliate's Toolkit: HRSword

Hello everyone! Let's talk about another tool in ransomware affiliate's arsenal. This time it's going to be HRSword! Usually adversaries use it to disable the target machine’s defenses.

For example, according to this report, the tool was used by Helldown ransomware affiliates to monitor and terminate security-related processes.

Let's start from the binary itself, and create a detector based on its metadata:

event_type: "processcreatewin" 

AND 

proc_file_originalfilename: "HRSword.exe"

It also abuses cmd.exe to copy multiple files to "C:\Windows\System32\drivers\", for example:

cmd.exe /S /D /c" copy Drivers\x32\sysdiag.sys "C:\Windows\System32\drivers\"

Here we can use the following logic:

event_type: "processcreatewin" 

AND

proc_file_name: "cmd.exe"

AND

cmdline: ("copy" AND "drivers")

Want more detection opportunities? Check the sample!

See you tomorrow!


Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge