140. Hunting for Masqueraded Malicious Files: Adwind
Hello everyone!
Adversaries always try to masquerade malicious files to look like absolutely legitimate. Today we'll look at Adwind campaign, which was reported by CERT-AGID.
So, the malicious JAR file was disguised to look like an image:
"C:\Users\Public\InvoiceXpress\bin\java.exe" -jar -noverify "C:\Users\Public\InvoiceXpress\bin\InvoiceXpress.png"
It makes malicious file look like legitimate, but at the same time provides us detection opportunities! For example:
event_type: "processcreatewin"
AND
proc_file_name: "java.exe"
AND
cmdline: "png"
Of course, you can experiment with file extensions, as well as executables, for example, you can hunt for rundll32.exe and regsvr32.exe.
See you tomorrow!
Comments
Post a Comment