SlideShare a Scribd company logo
1 of 31
The Indicators of Compromise
Finding the footprints that attackers leave
behind when they breach your defenses
Tomasz Jakubowski, CISM, CISSP
@perunhimself
FEB 2017
How it all starts
At day – superhero director and CCO, leading biggest software
programming company...
At night all-things-Apple fan.
How it all starts
I can’t believe my luck!
Now let’s just fill out this form...
...and we are done 
INSTALLATION
What just happened?
WEAPONIZATION
RECON DELIVERY EXPLOITATION
ACTIONS ON OBJ.
C&C
Monday in SOC...
0
5
10
15
20
25
30
35
40
1:00
AM
5:00
AM
9:00
AM
1:00
PM
5:00
PM
9:00
PM
1:00
AM
5:00
AM
9:00
AM
1:00
PM
5:00
PM
9:00
PM
1:00
AM
5:00
AM
9:00
AM
1:00
PM
5:00
PM
9:00
PM
1:00
AM
5:00
AM
9:00
AM
1:00
PM
5:00
PM
9:00
PM
1:00
AM
5:00
AM
9:00
AM
1:00
PM
5:00
PM
9:00
PM
1:00
AM
5:00
AM
9:00
AM
Traffic outgoing
WED THU FRI SAT SUN MON
Picture from: ”WarGames”
http://www.mgm.com/#/our-titles/2117/WarGames/
Oh, what do we have here?
0
10
20
30
40
50
Top 10 most visited sites
facebook.ru
visited only by
10.0.2.4
10.0.2.4
host that belongs to
thomas.a.anderson
@metacortex.com
NETWORK LOGS PROXY LOGS ASSET MNGM. CORP INVESTIG.
Picture from: ”The Matrix”
https://www.facebook.com/TheMatrixMovie
10.0.2.4
Incident investigation
thomas.a.anderson
@metacortex.com
Network
Forensics
Host
Forensics
Memory
Dump
Suspicious
processes
Network
Connections
Files
DOC in
Downloads
PCAPs (or
metadata) of
files
EXE in Temp
User info
METACORTEX
OUTSIDE
Proxy logs
FW logs
Browser
history
Registry
Metacortex
Dir and CCO
Static analysis of hack_metacortex.exe
STRINGS
 Static analysis of found
malware sample
 Sometimes most simple
methods will give results
 adminJoshua – login and
password to somewhere?
 www.facebook.ru
 metacortex.ru – a potential
for future phishing atack?
 hack_metacortex.exe
 Registry keys - persistance
FQD
File hash
Registry
FQD
N
Static analysis of hack_metacortex.exe
PE Analysis
 Continuing static analysis of
found malware sample
 Imported DLLs and
methods suggest, that:
 Registry entries will be read
and created
 Files will be created on the
drive
 Potentialy the malware will
run in the backround and
check for changes on
regular basis
Registry
Checking for the keys found in hack_metacortex.exe
 Registry keps Windows
config
 Look for:
 Autostart items
 Scheduled tasks
 Added file extensions, eg.
I
PUsername and PasswordFile name and Path
Static analysis of hack_metacortex.exe
DISSASSEMBLY
 Continuing static analysis of
found malware sample
 Depending on the amount
of time available you can get
a lot of info about how the
malware works and what it
capabilities are
 If you are lucky, you can get
some useful IoCs easily
I
PFile name
Registry
In search of info.txt
HARD DRIVE FORENSICS
 Looking through the files on
the hard drive
 Can get malware samples
and tools left behind by the
attacker for further analysis
 Can understand what the
attacker was after
Dynamic analysis of hack_metacortex.exe
eg. PROCMON
 Moving on from static
analysis into dynamic
 Trying to understand how
the malware operates by
observing its behaviour
I
PFile name
Registry
Network traffic analysis from the host
PCAP
 Attacker:
 Used port 443 which means
they used SSL and that the
communication is encrypted
 Do you use SSL decryption?
Network traffic analysis from the host
PCAP
 Hands-on-keyboard
 Attacker:
 Checks the host name and
user name
 Creates directories and
hides them
 Gatheres info about the
environment (user info,
lists local drives,
lists contents of
drive C)
File names and Paths
Network traffic analysis from the host
PCAP
 Hands-on-keyboard
 Attacker:
 Uses standard OS tools
 Successfully downloads
further tools from attackers
infrastructure servers
I
PFile name and Path
Standard OS admin tool
URL
Network traffic analysis from the host
PCAP
 Hands-on-keyboard
 Attacker:
 Uses standard OS tools
 Successfully downloads
further tools from
legitimate sites
Network traffic analysis from the host
PCAP
 Hands-on-keyboard
 Attacker:
 Gets their tools on the host
and is able to run them
File names and Path
Network traffic analysis from the host
PCAP
 Hands-on-keyboard
 Attacker:
 Copies
Thomas.A.Anderson’s
Outlook.ost file
 Copies all the intel they got
to a single location
 Uses 7zip to pack the loot
Network traffic analysis from the host
PCAP
 Hands-on-keyboard
 Attacker:
 Uses their tool
uploader.exe to upload
the packed file to their
server
I
P
Network traffic analysis from the host
PCAP
 Hands-on-keyboard
 Attacker:
 After successful upload, the
attacker tries to cover their
tracks by deleting tools
they used
 The attacker disconnects
Attacker tools
Pivot
For a start - things to look for
 Other hosts connecting to:
 metacortex.ru
 facebook.ru
 213.24.76.23 - C2 server
 213.24.76.28 - server where data was uploaded
 213.24.76.56 – attacker’s infrastructure server with tools
 Or maybe anything in the whole 213.24.76.0/24 or /16 network?
 Emails from xyz@metacortex.ru
 On the host:
 Registry keys
HKLMSoftwareMicrosoftWindowsCurrentVersionRunhack_metacortex.exe -u admin -p joshua -ip 213.24.76.23
 Files OR hashes
AppleMysteryDevice.zip
c:Windowssystem32hack_metacortex.exe
%PATH%packer.exe
%PATH%uploader.exe
%PATH%backdoor.exe
%PATH%info.txt
Damage Report and Risk Assessment
 CKC7 - Hands-on-keyboard
 Environment information gathered by the attacker:
 Host and Network environment
 List of files on disk for further extraction (likely the attacker will try to connect again)
 CIO’s host compromised, various files and Outlook.ost extracted
 What was in CIOs mailbox?
 What files are on CIOs disk?
 Any other hosts compromised?
 Any other information extracted?
Indicators from Inside and Outside
METACORTEX OUTSIDE
 From the Host
 Malware and attacker tools
samples
 File hashes for DOC and EXE
 File locations
 File names
 From the Network
 Domain names
 IPs
 Copies of data extracted
 From external sources
 Threat group objectives
 TTPs of that threat group
 Other domains on the same
IP
 Other IPs and domains used
by the same threat group
 Other file hashes known to
be used by that group
Where to next (the TOOLSET)
CKS
PHASE
COURSE OF
ACTION
DETECT DENY DISRUPT DEGRADE DECEIVE CONTAIN
RECONNAISSANCE
|C H A| THREAT INTELLIGENCE
|C| WEB ANALYTICS
|C| WEB LOGS
|C| ROUTER LOGS
|C| NIDS
|C| FIREWALL ACL |C H A| ACTIVE DEFENSES |C H A| ACTIVE DEFENSES
|C| HONEYPOT
|C| REDIRECT LOOP
|C H A| ACTIVE DEFENSES
|C| HONEYPOT
|C| REDIRECT LOOPS
|C| FIREWALL ACL
WEAPONIZATION
THREAT INTELLIGENCE
|C| NIDS
|C| NIPS |C| NIPS
DELIVERY
EDUCATED USER
|C| NIDS
|H| HIDS
|C H| AV
|C| WEB FILTER
|C| MAIL FILTER
|A| APP WHITELISTING
|C| INLINE AV
|C| MAIL FILTER
|C| WEB FILTER
|C| QUEUING
|C| SINKHOLE
|C H A| COMBINATION OF
DENY/DISRUPT
|C| HONEYPOT |C| APP-AWARE FIREWALL
|C| HONEYPOT
EXPLOITATION
|H| HIDS
|C| NIDS
|C H| AV
PATCH
|C H| AV
|H| HIPS
|H| DEP
|H| PATCH
|C H| AV
|H| HIPS
|A| HIGHLY RESTRICTED USER
ACCOUNTS
|C| HONEYPOT |C| INTER-ZONE NIPS
INSTALLATION
|H| HIDS
|A| APPLICATION LOGS
|C H| AV
|C| NETFLOW
|H| ‘CHROOT’ JAIL
|A| APP WHITELISTING
|A| BLOCKED EXECUTION
|C H| AV
|H| HIPS
|C H A| COMBINATION OF
DENY/DISRUPT
|C| HONEYPOT |C| EPP
COMMAND &
CONTROL
|C| NIDS
|H| HIDS
|C H| AV
|C| FIREWALL ACL
|C| EGRESS FILTER
|C| SINKHOLE
|C| NIPS
|H| DEP
|C| SINKHOLE
|C| TARPIT
|C| SINKHOLE
|C| DNS REDIRECT
|C| SINKHOLE
|C| TRUST ZONES
ACTION ON
OBJECTIVES
|C H A| AUDIT LOGS
|H| DEP
|C H| AV
|C| NIDS
|H| HIDS
|C| FIREWALL ACL
|C| EGRESS FILTER
|C| NETWORK SEGMENTATION
|C H A| ENCRYPTION
|C H| DLP
|C| NETWORK
SEGMENTATION
|H| DEP
|H| HIPS
|C| QUALITY OF SERVICE
|C| NETWORK SEGMENTATION
|C| HONEYPOT |C| TRUST ZONES
Monitoring tools effectiveness
© Lockheed Martin
Corporation
Monitoring activity
Campaign 16-Jan 16-Feb 16-Mar 16-Apr16-May 16-Jun 16-Jul 16-Aug 16-Sep 16-Oct16-Nov16-Dec 17-Jan
Total
Incidents
Months
Active
[APT] MetaCortex 3 3 1
Campaign B 0 0
Campaign C 1 4 7 3 1 16 5
Campaign D 6 12 11 8 37 4
Campaign E 1 1 1 3 3
Pending Attribution 0 0
Ransomware 2 3 1 1 3 2 1 2 9 4 2 2 1 33 13
Total Incidents 8 16 13 2 3 3 2 2 9 4 6 2 13
Active Campaigns 3 4 3 3 1 3 1 1 1 3 3 0 2
Summary
REACTIVE
PROACTIVE
PREVENTIVE

More Related Content

What's hot

Module 2 Foot Printing
Module 2   Foot PrintingModule 2   Foot Printing
Module 2 Foot Printing
leminhvuong
 

What's hot (20)

Privilege escalation from 1 to 0 Workshop
Privilege escalation from 1 to 0 Workshop Privilege escalation from 1 to 0 Workshop
Privilege escalation from 1 to 0 Workshop
 
Application Security
Application SecurityApplication Security
Application Security
 
Understanding the Event Log
Understanding the Event LogUnderstanding the Event Log
Understanding the Event Log
 
Module 2 Foot Printing
Module 2   Foot PrintingModule 2   Foot Printing
Module 2 Foot Printing
 
Dmz
Dmz Dmz
Dmz
 
Detection and Response Roles
Detection and Response RolesDetection and Response Roles
Detection and Response Roles
 
Passwords#14 - mimikatz
Passwords#14 - mimikatzPasswords#14 - mimikatz
Passwords#14 - mimikatz
 
Vulnerabilities in modern web applications
Vulnerabilities in modern web applicationsVulnerabilities in modern web applications
Vulnerabilities in modern web applications
 
Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)
 
Network Access Control (NAC)
Network Access Control (NAC)Network Access Control (NAC)
Network Access Control (NAC)
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
The ATT&CK Latin American APT Playbook
The ATT&CK Latin American APT PlaybookThe ATT&CK Latin American APT Playbook
The ATT&CK Latin American APT Playbook
 
certified-ethical-hacker-cehv12_course_content.pdf
certified-ethical-hacker-cehv12_course_content.pdfcertified-ethical-hacker-cehv12_course_content.pdf
certified-ethical-hacker-cehv12_course_content.pdf
 
Intro to Web Application Security
Intro to Web Application SecurityIntro to Web Application Security
Intro to Web Application Security
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
 
Threat hunting for Beginners
Threat hunting for BeginnersThreat hunting for Beginners
Threat hunting for Beginners
 
Security in Windows operating system
Security in Windows operating systemSecurity in Windows operating system
Security in Windows operating system
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 
Présentation ELK/SIEM et démo Wazuh
Présentation ELK/SIEM et démo WazuhPrésentation ELK/SIEM et démo Wazuh
Présentation ELK/SIEM et démo Wazuh
 

Similar to The Indicators of Compromise

Windows Command Line Tools
Windows Command Line ToolsWindows Command Line Tools
Windows Command Line Tools
love4upratik
 

Similar to The Indicators of Compromise (20)

Malware Analysis Made Simple
Malware Analysis Made SimpleMalware Analysis Made Simple
Malware Analysis Made Simple
 
Uncovering and Visualizing Botnet Infrastructure and Behavior
Uncovering and Visualizing Botnet Infrastructure and BehaviorUncovering and Visualizing Botnet Infrastructure and Behavior
Uncovering and Visualizing Botnet Infrastructure and Behavior
 
Anton Chuvakin on Discovering That Your Linux Box is Hacked
Anton Chuvakin on Discovering That Your Linux Box is HackedAnton Chuvakin on Discovering That Your Linux Box is Hacked
Anton Chuvakin on Discovering That Your Linux Box is Hacked
 
Hunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentationHunting for APT in network logs workshop presentation
Hunting for APT in network logs workshop presentation
 
ENPM808 Independent Study Final Report - amaster 2019
ENPM808 Independent Study Final Report - amaster 2019ENPM808 Independent Study Final Report - amaster 2019
ENPM808 Independent Study Final Report - amaster 2019
 
Integrated Tools in OSSIM
Integrated Tools in OSSIMIntegrated Tools in OSSIM
Integrated Tools in OSSIM
 
0xsp mongoose RED - DragonCon HK
0xsp mongoose RED - DragonCon HK0xsp mongoose RED - DragonCon HK
0xsp mongoose RED - DragonCon HK
 
Join the phishing dots to detect suspicious mobile apps
Join the phishing dots to detect suspicious mobile appsJoin the phishing dots to detect suspicious mobile apps
Join the phishing dots to detect suspicious mobile apps
 
'Malware Analysis' by PP Singh
'Malware Analysis' by PP Singh'Malware Analysis' by PP Singh
'Malware Analysis' by PP Singh
 
Malware Analysis -an overview by PP Singh
Malware Analysis -an overview by PP SinghMalware Analysis -an overview by PP Singh
Malware Analysis -an overview by PP Singh
 
New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0
 
Two-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for EveryoneTwo-For-One Talk: Malware Analysis for Everyone
Two-For-One Talk: Malware Analysis for Everyone
 
InfoSec Taiwan 2023: APNIC Community Honeynet Project — Observations and Insi...
InfoSec Taiwan 2023: APNIC Community Honeynet Project — Observations and Insi...InfoSec Taiwan 2023: APNIC Community Honeynet Project — Observations and Insi...
InfoSec Taiwan 2023: APNIC Community Honeynet Project — Observations and Insi...
 
Windows Command Line Tools
Windows Command Line ToolsWindows Command Line Tools
Windows Command Line Tools
 
Building your Open Source Security stack
Building your Open Source Security stackBuilding your Open Source Security stack
Building your Open Source Security stack
 
JAKU Botnet Analysis
JAKU Botnet AnalysisJAKU Botnet Analysis
JAKU Botnet Analysis
 
Indicators of compromise: From malware analysis to eradication
Indicators of compromise: From malware analysis to eradicationIndicators of compromise: From malware analysis to eradication
Indicators of compromise: From malware analysis to eradication
 
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
44CON London 2015 - Indicators of Compromise: From malware analysis to eradic...
 
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network SecurityMMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
 
Adversary Emulation - DerpCon
Adversary Emulation - DerpConAdversary Emulation - DerpCon
Adversary Emulation - DerpCon
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

The Indicators of Compromise

  • 1. The Indicators of Compromise Finding the footprints that attackers leave behind when they breach your defenses Tomasz Jakubowski, CISM, CISSP @perunhimself FEB 2017
  • 2. How it all starts At day – superhero director and CCO, leading biggest software programming company... At night all-things-Apple fan.
  • 3. How it all starts
  • 4. I can’t believe my luck!
  • 5. Now let’s just fill out this form...
  • 6. ...and we are done 
  • 7. INSTALLATION What just happened? WEAPONIZATION RECON DELIVERY EXPLOITATION ACTIONS ON OBJ. C&C
  • 9. Oh, what do we have here? 0 10 20 30 40 50 Top 10 most visited sites facebook.ru visited only by 10.0.2.4 10.0.2.4 host that belongs to thomas.a.anderson @metacortex.com NETWORK LOGS PROXY LOGS ASSET MNGM. CORP INVESTIG. Picture from: ”The Matrix” https://www.facebook.com/TheMatrixMovie
  • 10. 10.0.2.4 Incident investigation thomas.a.anderson @metacortex.com Network Forensics Host Forensics Memory Dump Suspicious processes Network Connections Files DOC in Downloads PCAPs (or metadata) of files EXE in Temp User info METACORTEX OUTSIDE Proxy logs FW logs Browser history Registry Metacortex Dir and CCO
  • 11. Static analysis of hack_metacortex.exe STRINGS  Static analysis of found malware sample  Sometimes most simple methods will give results  adminJoshua – login and password to somewhere?  www.facebook.ru  metacortex.ru – a potential for future phishing atack?  hack_metacortex.exe  Registry keys - persistance FQD File hash Registry FQD N
  • 12. Static analysis of hack_metacortex.exe PE Analysis  Continuing static analysis of found malware sample  Imported DLLs and methods suggest, that:  Registry entries will be read and created  Files will be created on the drive  Potentialy the malware will run in the backround and check for changes on regular basis
  • 13. Registry Checking for the keys found in hack_metacortex.exe  Registry keps Windows config  Look for:  Autostart items  Scheduled tasks  Added file extensions, eg. I PUsername and PasswordFile name and Path
  • 14. Static analysis of hack_metacortex.exe DISSASSEMBLY  Continuing static analysis of found malware sample  Depending on the amount of time available you can get a lot of info about how the malware works and what it capabilities are  If you are lucky, you can get some useful IoCs easily I PFile name Registry
  • 15. In search of info.txt HARD DRIVE FORENSICS  Looking through the files on the hard drive  Can get malware samples and tools left behind by the attacker for further analysis  Can understand what the attacker was after
  • 16. Dynamic analysis of hack_metacortex.exe eg. PROCMON  Moving on from static analysis into dynamic  Trying to understand how the malware operates by observing its behaviour I PFile name Registry
  • 17. Network traffic analysis from the host PCAP  Attacker:  Used port 443 which means they used SSL and that the communication is encrypted  Do you use SSL decryption?
  • 18. Network traffic analysis from the host PCAP  Hands-on-keyboard  Attacker:  Checks the host name and user name  Creates directories and hides them  Gatheres info about the environment (user info, lists local drives, lists contents of drive C) File names and Paths
  • 19. Network traffic analysis from the host PCAP  Hands-on-keyboard  Attacker:  Uses standard OS tools  Successfully downloads further tools from attackers infrastructure servers I PFile name and Path Standard OS admin tool URL
  • 20. Network traffic analysis from the host PCAP  Hands-on-keyboard  Attacker:  Uses standard OS tools  Successfully downloads further tools from legitimate sites
  • 21. Network traffic analysis from the host PCAP  Hands-on-keyboard  Attacker:  Gets their tools on the host and is able to run them File names and Path
  • 22. Network traffic analysis from the host PCAP  Hands-on-keyboard  Attacker:  Copies Thomas.A.Anderson’s Outlook.ost file  Copies all the intel they got to a single location  Uses 7zip to pack the loot
  • 23. Network traffic analysis from the host PCAP  Hands-on-keyboard  Attacker:  Uses their tool uploader.exe to upload the packed file to their server I P
  • 24. Network traffic analysis from the host PCAP  Hands-on-keyboard  Attacker:  After successful upload, the attacker tries to cover their tracks by deleting tools they used  The attacker disconnects Attacker tools
  • 25. Pivot For a start - things to look for  Other hosts connecting to:  metacortex.ru  facebook.ru  213.24.76.23 - C2 server  213.24.76.28 - server where data was uploaded  213.24.76.56 – attacker’s infrastructure server with tools  Or maybe anything in the whole 213.24.76.0/24 or /16 network?  Emails from xyz@metacortex.ru  On the host:  Registry keys HKLMSoftwareMicrosoftWindowsCurrentVersionRunhack_metacortex.exe -u admin -p joshua -ip 213.24.76.23  Files OR hashes AppleMysteryDevice.zip c:Windowssystem32hack_metacortex.exe %PATH%packer.exe %PATH%uploader.exe %PATH%backdoor.exe %PATH%info.txt
  • 26. Damage Report and Risk Assessment  CKC7 - Hands-on-keyboard  Environment information gathered by the attacker:  Host and Network environment  List of files on disk for further extraction (likely the attacker will try to connect again)  CIO’s host compromised, various files and Outlook.ost extracted  What was in CIOs mailbox?  What files are on CIOs disk?  Any other hosts compromised?  Any other information extracted?
  • 27. Indicators from Inside and Outside METACORTEX OUTSIDE  From the Host  Malware and attacker tools samples  File hashes for DOC and EXE  File locations  File names  From the Network  Domain names  IPs  Copies of data extracted  From external sources  Threat group objectives  TTPs of that threat group  Other domains on the same IP  Other IPs and domains used by the same threat group  Other file hashes known to be used by that group
  • 28. Where to next (the TOOLSET) CKS PHASE COURSE OF ACTION DETECT DENY DISRUPT DEGRADE DECEIVE CONTAIN RECONNAISSANCE |C H A| THREAT INTELLIGENCE |C| WEB ANALYTICS |C| WEB LOGS |C| ROUTER LOGS |C| NIDS |C| FIREWALL ACL |C H A| ACTIVE DEFENSES |C H A| ACTIVE DEFENSES |C| HONEYPOT |C| REDIRECT LOOP |C H A| ACTIVE DEFENSES |C| HONEYPOT |C| REDIRECT LOOPS |C| FIREWALL ACL WEAPONIZATION THREAT INTELLIGENCE |C| NIDS |C| NIPS |C| NIPS DELIVERY EDUCATED USER |C| NIDS |H| HIDS |C H| AV |C| WEB FILTER |C| MAIL FILTER |A| APP WHITELISTING |C| INLINE AV |C| MAIL FILTER |C| WEB FILTER |C| QUEUING |C| SINKHOLE |C H A| COMBINATION OF DENY/DISRUPT |C| HONEYPOT |C| APP-AWARE FIREWALL |C| HONEYPOT EXPLOITATION |H| HIDS |C| NIDS |C H| AV PATCH |C H| AV |H| HIPS |H| DEP |H| PATCH |C H| AV |H| HIPS |A| HIGHLY RESTRICTED USER ACCOUNTS |C| HONEYPOT |C| INTER-ZONE NIPS INSTALLATION |H| HIDS |A| APPLICATION LOGS |C H| AV |C| NETFLOW |H| ‘CHROOT’ JAIL |A| APP WHITELISTING |A| BLOCKED EXECUTION |C H| AV |H| HIPS |C H A| COMBINATION OF DENY/DISRUPT |C| HONEYPOT |C| EPP COMMAND & CONTROL |C| NIDS |H| HIDS |C H| AV |C| FIREWALL ACL |C| EGRESS FILTER |C| SINKHOLE |C| NIPS |H| DEP |C| SINKHOLE |C| TARPIT |C| SINKHOLE |C| DNS REDIRECT |C| SINKHOLE |C| TRUST ZONES ACTION ON OBJECTIVES |C H A| AUDIT LOGS |H| DEP |C H| AV |C| NIDS |H| HIDS |C| FIREWALL ACL |C| EGRESS FILTER |C| NETWORK SEGMENTATION |C H A| ENCRYPTION |C H| DLP |C| NETWORK SEGMENTATION |H| DEP |H| HIPS |C| QUALITY OF SERVICE |C| NETWORK SEGMENTATION |C| HONEYPOT |C| TRUST ZONES
  • 29. Monitoring tools effectiveness © Lockheed Martin Corporation
  • 30. Monitoring activity Campaign 16-Jan 16-Feb 16-Mar 16-Apr16-May 16-Jun 16-Jul 16-Aug 16-Sep 16-Oct16-Nov16-Dec 17-Jan Total Incidents Months Active [APT] MetaCortex 3 3 1 Campaign B 0 0 Campaign C 1 4 7 3 1 16 5 Campaign D 6 12 11 8 37 4 Campaign E 1 1 1 3 3 Pending Attribution 0 0 Ransomware 2 3 1 1 3 2 1 2 9 4 2 2 1 33 13 Total Incidents 8 16 13 2 3 3 2 2 9 4 6 2 13 Active Campaigns 3 4 3 3 1 3 1 1 1 3 3 0 2

Editor's Notes

  1. Being a defender is fighting a loosing battle – you are always a step behind I will try to show you how you can use simple IoC to try to shift that situation and over time – maybe even try to start winning – first those will be just small battles but later - who knows... 
  2. - At this point in time you are not ready yet to contact the external services to use them for getting more information about this attack
  3. - Different IP than previously, which suggests bigger infrastructure than just 1 server
  4. Information gathering by the attacker – thi sis where the attacker will try to get better understanding on the environment they got into: What is the template used for user accounts What sort of machines are used What IP addressing is used What other machines are online Where are the AD servers etc...
  5. Here we try to understand where: The malware will create its files What files will be deleted What registry keys will be opened, written and deleted What connections will be made For an easy start look at „Cuckoo malware sandbox” or some commercial ones or – better - create your own. Customize it: Make sure the VM doesn’t give right away it’s a virtual environment (CD drivers, no. of CPU, ram etc.) Make sure you have the most popular apps insalled – eg. Office, Acrobat Reader etc. If you use a corporate desktop build – use that build in the sandbox to better replicate your environment Make sure you can capture network traffic
  6. This is a new, different IP Attackers very often use standard OS tools to avoid detection, this is why usage of admin tools should be monitored (ISO 27001 also says that) Attackers are just humans – they make mistakes
  7. - You can’t really block that, as you will block legitimate websites
  8. again, the attacker uses standard, legitimate tools like 7zip Was able to get the CIO mailbox – wonder what’s inside...
  9. - New IP as an indicator
  10. Lucky you – the attacker used a Linux command instead on DOS – if you hurry, you still might get a copy of their tools for further analysis
  11. Source is Lockheed Martin Corp.: http://lockheedmartin.com/content/dam/lockheed/data/corporate/documents/Seven_Ways_to_Apply_the_Cyber_Kill_Chain_with_a_Threat_Intelligence_Platform.PDF Will review testing results like NSS labs Will listen to vendors sales engineers Maybe will even do internal proof-of-concepts to test how the solution works in your environment measure return on investment for security products
  12. Ransomware hits in September – possible that people are comming back form holidays and click on stuff in their mailboxes Campaign D was active in Jan-Mar A way to manage your resources