289. Hunting for Masquerading

Hello everyone!

We already talked about interesting staging folders, but today we look at another similar thing we can use for hunting - Masquerading: Match Legitimate Resource Name or Location (T1036.005).

As always, let's start from an example. The adversary leveraged PowerShell scripts to download and run malicious files. For example, such file were saved under the following names and locations:

C:\ProgramData\Intel\ping.exe

C:\Users\Public\ping.exe

As you can see, the threat actors masqueraded malicious files to look like ping utility. You can document such cases and use it both for detection or hunting, for example:

event_type: "processcreatewin"

AND

proc_file_path: "ping.exe"

AND NOT

proc_file_path: ("windows\\system32" OR "windows\\syswow64")

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge