Cookie Consent by Free Privacy Policy Generator ๐Ÿ“Œ Turning Open Reporting Into Detections

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Turning Open Reporting Into Detections


๐Ÿ’ก Newskategorie: Windows Tipps
๐Ÿ”— Quelle: windowsir.blogspot.com

I saw this tweet from Ankit recently, and as soon as I read through it, I thought I was watching "The Matrix" again. Instead of seeing the "blonde, brunette, redhead" that Cypher saw, I was seeing actionable detection opportunities and pivot points. How you choose to use them...detections in EDR telemetry or from a SIEM, threat hunts, or specifically flagging/alerting on entries in DFIR parsing...is up to you, but there are some interesting...and again, actionable...opportunities, nonetheless.


From the tweet itself...

%Draft% is environment variable leading to PowerShell
Environment variables are good...because someone has to set that variable using...wait for it...wย  aย  iย  tย  ย fย  oย  rย  ย  iย  t...the 'set' command. This means that if the variable is set via the command line, the process can be detected.ย 

Reads another registry value's base64 blob
Blobs are good...because they're usually of a particular value type (i.e., binary) and usually pretty big. I wrote the RegRipper sizes.pl plugin some time ago to address this exact issue, to find values of a certain size or larger.

If the blob isn't binary and is a base64-encoded string, there are a number of ways to detect strings that are base64 encoded.

What's not stated in the body of the tweet, but instead visible in one of the images is that the Run key value written for persistence has interesting data. First, the type is "REG_EXPAND_SZ", which may be a good detection opportunity. This may take some research to determine how prevalent it is in your environment, or in your customers environments, but Microsoft's documentation says that values within the Run key contain a "command line no longer than 260 characters". From this, we can assume that the value data are strings, and of type REG_SZ. For my own use, I've updated one of my RegRipper plugins to specifically look for instances where values in the Run key (HKLM or HKCU) are other than "REG_SZ" types.

Next, the command line itself has a number of unique items you can hunt on. Even if another attack changes the name of the key and value in which the data blob is stored, the command line still offers ample opportunities for detections.

If you don't have EDR telemetry available, try parsing theย Microsoft-Windows-Shell-Core%4Operational Event Log, specifically event IDs 9707/9708. Or, if you're sending the data from that Windows Event Log to a SIEM, try searching on elements from within the command line.

The point of all this is that there is very often actionable info in open reporting, things that we can turn into detections via either EDR telemetry or SIEM searches, for threat hunting, or add to our automated DFIR parsing process as a means of retaining "corporate knowledge" and expanding the experience base of all analysts.
...



๐Ÿ“Œ Turning Open Reporting Into Detections


๐Ÿ“ˆ 58.4 Punkte

๐Ÿ“Œ FBI to World+Dog: Please, try turning it off and turning it back on


๐Ÿ“ˆ 28.1 Punkte

๐Ÿ“Œ Insights into Why Hyperbola GNU/Linux is Turning into Hyperbola BSD


๐Ÿ“ˆ 26.5 Punkte

๐Ÿ“Œ Meta leaving no stone unturned in turning WhatsApp into Instagram, testing channel post into status


๐Ÿ“ˆ 26.5 Punkte

๐Ÿ“Œ Valve Says Turning Away Researcher Reporting Steam Vulnerability Was a Mistake


๐Ÿ“ˆ 25.48 Punkte

๐Ÿ“Œ Oracle Hospitality Reporting/Analytics 9.1.0 Reporting information disclosure


๐Ÿ“ˆ 22.87 Punkte

๐Ÿ“Œ (g+) Microsoft SQL Server Reporting Services: Wie SSRS-Reporting funktioniert


๐Ÿ“ˆ 22.87 Punkte

๐Ÿ“Œ Your Reporting Matters: How to Improve Pen Test Reporting


๐Ÿ“ˆ 22.87 Punkte

๐Ÿ“Œ Microsoft SQL Server Reporting Services: Wie SSRS-Reporting funktioniert - Golem.de


๐Ÿ“ˆ 22.87 Punkte

๐Ÿ“Œ Improve Visibility, Reporting, and Automation With Veracodeโ€™s Reporting API


๐Ÿ“ˆ 22.87 Punkte

๐Ÿ“Œ Ransomware Sees Triple-Digit Spike in Corporate Detections


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Microsoft: Malware, ransomware, and cryptominer detections are down in 2019


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Antivirus & Multiple Detections, (Sun, May 17th)


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Elastic Security Opens Public Detections Rules Repo - James Spiteri - PSW #667


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ McAfee Labs Threats Report Reveals 605% Increase In COVID-19-Themed Attack Detections


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ iot malware detections soar 273% since 2017. kaspersky lab warns home users of growing threat


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Malware detections surge by 48% in 2019


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Shlayer Trojan Accounted for 30 Percent of Detections for macOS in 2019


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Want to see list of malware detections by Microsoft Defender? Here's how.


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Rediscovering Limitations of Stateful Firewalls: "NAT Slipstreaming" ? Implications, Detections and Mitigations , (Fri, Nov 6th)


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Different types of injection methods/detections explained - [ CreateRemoteThread, Process Hollowing, APC Injection, Thread Hijacking]


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ How Behavioral Detections Actually Discovered the SolarWinds Orion SUNBURST Attack


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Report highlights top 10 threat detections seen across Microsoft Azure AD and Office 365


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Top 10 threat detections seen across Microsoft Azure AD and Office 365


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Swift-Attack - Unit Tests For Blue Teams To Aid With Building Detections For Some Common macOS Post Exploitation Methods


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ COVID-19-themed cyberattack detections continue to surge


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Uptycs Introduces Detections that Correlate Threat Activity from the Kubernetes Control Plane and Container Runtime


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Leveraging the Apple ESF for Behavioral Detections


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Cyber-Threat Detections Surge 55% in 2022


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Writing Your Own Ticket to the Cloud Like APT: A Dive to AD FS Attacks, Detections, and Mitigations


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Android Stalkerware Rising: Research Indicates 48% More Android Stalkerware Detections in 2020 than in 2019


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ As Malware Dissemination Drops, Mobile Trojan Detections Grow.


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Skyhook - A Round-Trip Obfuscated HTTP File Transfer Setup Built To Bypass IDS Detections


๐Ÿ“ˆ 22.05 Punkte











matomo