248. That's How Adversaries Abuse Netsh for Discovery

Hello everyone!

Stealers and discovery, one more time. This time we'll look at Stealerium, and learn how it misuses netsh.exe for System Network Configuration Discovery: Wi-Fi Discovery (T1016.002), and, of course, how to hunt for such activity.

So, if we look into this report, we can see that the stealer used netsh.exe to collect information about Wi-Fi networks:

netsh wlan show profile

netsh wlan show networks mode=bssid

Discovery commands are always great targets for threat hunting, just look for susicious parent processes. Ok, let's build a query:

event_type: "processcreatewin"

AND

proc_file_path: "netsh.exe"

AND

cmdline: (("wlan" AND "show") AND ("networks" OR "profile"))

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge