291. Adversaries Keep Abusing Microsoft Console Debugger

Hello everyone!

Today we'll look how adversaries abuse Microsoft Console Debugger, and how it may help you during threat identification phase.

And we'll look at Jewelbug. This threat actor is known to use this utility for quite some time, and as it's not very popular among adversaries, it may also help you to identify the group.

It's also interesting that the adversary uses a renamed version of the tool, for example:

CSIDL_PROFILE\public\downloads\7zup.exe -d -remote up

The tool can be used to run shellcode, executables, DLLs, or terminate security solutions. For example, we can hunt for renamed executables:

event_type: "processcreatewin"

AND

proc_file_originalfilename: "cdb.exe"

AND NOT

proc_file_path: "cdb.exe"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge