140. Hunting for Masqueraded Malicious Files: Adwind

Hello everyone!

Adversaries always try to masquerade malicious files to look like absolutely legitimate. Today we'll look at Adwind campaign, which was reported by CERT-AGID.

So, the malicious JAR file was disguised to look like an image:

"C:\Users\Public\InvoiceXpress\bin\java.exe" -jar -noverify "C:\Users\Public\InvoiceXpress\bin\InvoiceXpress.png"

It makes malicious file look like legitimate, but at the same time provides us detection opportunities! For example:

event_type: "processcreatewin"

AND

proc_file_name: "java.exe"

AND

cmdline: "png"

Of course, you can experiment with file extensions, as well as executables, for example, you can hunt for rundll32.exe and regsvr32.exe.

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge