096. Hunting for Canon IJ Printer Assistant Tool Abuse
Hello everyone! Let's talk about Mustang Panda (we track this cluster as Horned Werewolf, as you remember) one more time.
The adversary enjoys DLL Side-Loading, and always finds new vulnerable binaries. For example, this time the cluster used Canon IJ Printer Assistant Tool. Can we hunt for such activity? Of course!
The adversary enjoys DLL Side-Loading, and always finds new vulnerable binaries. For example, this time the cluster used Canon IJ Printer Assistant Tool. Can we hunt for such activity? Of course!
Let's start from running Canon IJ Printer Assistant Tool (cnmpaui.exe) from uncommon locations:
event_type: "processcreatewin"
AND
proc_file_originalfilename: "cnmpaui.exe"
AND NOT
proc_file_path: "Canon\\Canon IJ Printer Assistant Tool"
Another notable behavior is spawning winword.exe from cnmpaui.exe to display a decoy document:
event_type: "processcreatewin"
AND
proc_p_file_path: "cnmpaui.exe"
AND
proc_file_path: "winword.exe"
As always, you can find more if you want! Happy hunting!
See you tomorrow!
Comments
Post a Comment