291. Adversaries Keep Abusing Microsoft Console Debugger
Hello everyone!
Today we'll look how adversaries abuse Microsoft Console Debugger, and how it may help you during threat identification phase.
And we'll look at Jewelbug. This threat actor is known to use this utility for quite some time, and as it's not very popular among adversaries, it may also help you to identify the group.
It's also interesting that the adversary uses a renamed version of the tool, for example:
CSIDL_PROFILE\public\downloads\7zup.exe -d -remote up
The tool can be used to run shellcode, executables, DLLs, or terminate security solutions. For example, we can hunt for renamed executables:
event_type: "processcreatewin"
AND
proc_file_originalfilename: "cdb.exe"
AND NOT
proc_file_path: "cdb.exe"
See you tomorrow!
Comments
Post a Comment