114. Adversaries Abuse Magnet RAM Capture to Extract Credentials

Hello everyone! Forensic tools help us during incident response engagements, but such tools also may help adversaries to solve various tasks!

For example, ToyMaker abused Magnet RAM Capture to obtain a memory dump of the compromised host, and used it to extract credentials:

MRCv120.exe /accepteula /silent /go

We can use both metadata and command line parameters for detection:

event_type: "processcreatewin"

AND

proc_file_productname: "Magnet RAM Capture"

AND

cmdline: ("accepteula" AND "silent" AND "go")

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge