096. Hunting for Canon IJ Printer Assistant Tool Abuse

Hello everyone! Let's talk about Mustang Panda (we track this cluster as Horned Werewolf, as you remember) one more time. 


The adversary enjoys DLL Side-Loading, and always finds new vulnerable binaries. For example, this time the cluster used Canon IJ Printer Assistant Tool. Can we hunt for such activity? Of course!

Let's start from running Canon IJ Printer Assistant Tool (cnmpaui.exe) from uncommon locations:

event_type: "processcreatewin"

AND

proc_file_originalfilename: "cnmpaui.exe"

AND NOT

proc_file_path: "Canon\\Canon IJ Printer Assistant Tool"

Another notable behavior is spawning winword.exe from cnmpaui.exe to display a decoy document:

event_type: "processcreatewin"

AND

proc_p_file_path: "cnmpaui.exe"

AND

proc_file_path: "winword.exe"

As always, you can find more if you want! Happy hunting!

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge