191. Some Threat Actors Just Want to Be Detected

Hello everyone!

I'm sure, you saw cases where adversaries really wanted the defenders to catch them. Yes, in some cases they may call the payload malware.exe or...

Let's look at the example I spotted today:

Figure 4. PowerShell script containing Russian comments, outlining steps typically used to disable security features and retrieve the ransomware payload.

You got it right. The filename is payload.exe. That's it. So, why not to hunt for such suspicious filenames? For example:

event_type: "processcreatewin"

AND

proc_file_path: "payload"

Another interesting example - PDB paths. In some cases, they may be REALLY suspicious, for example:

Y:\Hack\backdoor\3-exe-attack\temp\UAC_Elevated\win32\UAC_Elevated.pdb

So, if your EDR solution supports collecting PDB paths, you can also use it for detection and hunting:

event_type: "processcreatewin"

AND

proc_file_pdb_path: ("payload" OR "hack" OR "backdoor" OR "attack" OR "bypass" OR "dropper" OR "exploit" OR "keylog" OR "trojan" OR "spy")

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge