325. Can We Use Discovery Techniques for Hunting?

Hello everyone!

A very typical behaviour marker for many malware families - executing system discovery commands. And, of course, we can use it for threat hunting!

Let's look at TamperedChef campaign. The adversary performs registry query to look for the victim's machine ID:

reg.exe QUERY "HKLM\Software\Microsoft\Cryptography" /v MachineGuid

If we use it for hunting, we'll have to filter lots and lots of false positives, but still it may be a good hypothesis - just focus on parent processes.

In our example - it's quite suspicious as it's node.exe, so we can use it to build a query:

event_type: "processcreatewin"

AND

proc_p_file_path: "node.exe"

AND

proc_file_path: "reg.exe"

AND

cmdline: "machineguid"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge