289. Hunting for Masquerading
Hello everyone!
We already talked about interesting staging folders, but today we look at another similar thing we can use for hunting - Masquerading: Match Legitimate Resource Name or Location (T1036.005).
As always, let's start from an example. The adversary leveraged PowerShell scripts to download and run malicious files. For example, such file were saved under the following names and locations:
C:\ProgramData\Intel\ping.exe
C:\Users\Public\ping.exe
As you can see, the threat actors masqueraded malicious files to look like ping utility. You can document such cases and use it both for detection or hunting, for example:
event_type: "processcreatewin"
AND
proc_file_path: "ping.exe"
AND NOT
proc_file_path: ("windows\\system32" OR "windows\\syswow64")
See you tomorrow!
Comments
Post a Comment