
The Incident Response podcast
Fireless Malware, we think not - Ep 014
Recorded June 2020
TOPIC: Fileless Malware, we think NOT
OUR SPONSORS:
OUR GUESTS WILL BE:
Tyler Hudak - Practice Lead, Incident Response - TrustedSec
@secshoggoth
www.trustedsec.com
Martin Brough - Cybersecurity Expert for Acronis
@TheHackerNinja
Website - infosec512.com
Upcoming Training:
SANS DFIR Summit - Running Processes, the Red Team and Bad Actors are using them
July 17-18
Article in eForensics Magazine on ARTHIR covered in Episode 011
Visit the website and register to get the free edition
BSides Cleveland - Tyler’s Forensic Analysis
Friday June 19th - Tactical WIndows Forensics
https://www.bsidescleveland.com/training
Will be held and/or released at another event soon
Preparing for an Incident - NCC Group webinar.. Free to all
July 22nd
newsroom.nccgroup.com/events
Job Opp:
NCC Group has a position, remote, Incident Response engineer, with AWS, GCP, Azure experience. You get to work with ME.
https://nccgroup.wd3.myworkdayjobs.com/en-US/NCC_Group/job/Manchester/Senior-Cyber-Incident-Response_R2595
NEWS-WORTHY:
Cylance blocks LOG-MD-Premium Running Process check
Ticket opened, users must exclude LOG-MD from being checked
Windows malware opens RDP ports on PCs for future remote access
https://www-zdnet-com.cdn.ampproject.org/c/s/www.zdnet.com/google-amp/article/windows-malware-opens-rdp-ports-on-pcs-for-future-remote-access/
Exploit code for wormable flaw on unpatched Windows devices published online
(SMBGhost) - Processing of a malformed compressed message - Eternal Darkness/SMBGhost affects version 3.11 of the protocol, which as ThreatPost points out, is the same version that was targeted by the WannaCry ransomware a couple of years ago
The US Cybersecurity and Infrastructure Security Agency (CISA) strongly recommends using a firewall to block SMB ports from the internet and to apply patches to critical- and high-severity vulnerabilities as soon as possible
ENABLE THE WINDOWS FIREWALL !!!! BLock SMB to workstations, and you will get better logging too ;-)
https://arstechnica.com/information-technology/2020/06/exploiting-wormable-flaw-on-unpatched-windows-devices-is-about-to-get-easier/
Microsoft warns of vulnerabilities in SMBv3 (Eternal Darkness)
Microsoft warns of vulnerabilities in SMBv3
Netwalker Fileless Ransomware Injected via Reflective Loading
https://blog.trendmicro.com/trendlabs-security-intelligence/netwalker-fileless-ransomware-injected-via-reflective-loading/
80% of hacking-related breaches leverage compromised credentials
https://securityboulevard.com/2020/06/80-of-hacking-related-breaches-leverage-compromised-credentials/
SITE-WORTHY:
THE IR Crew
MITRE ATTACK
https://attack.mitre.org/
Guest - Tyler
Guest - Martin
Sandbox - https://app.any.run
TOOL-WORTHY:
The IR crew
LOG-MD-Professional
Volatility
Guest 1 - Tyler
MFTECmd
KAPE, or rawcopy, or other tools to capture MFT before processing
Guest 2 - Martin
NetworkMiner
MALWARE OF THE MONTH:
Dridex fileless malware:
Key Detection points
Well… in memory only “fileless”
Rundll32 calling malicious DLL
Parent Child relationship
Rundll32.exe calling SysWow64\Rundll32.exe
PREVENTION
Scan email attachments
Block Macro execution
Block uncategorized websites
Application Whitelist Users directory
Lock down PowerShell
EDR
TOPIC OF THE DAY:
Fileless Malware, we don’t think so
What is “Fileless Malware”?
Cyberreason - Unlike file-based attacks, fileless malware does not leverage traditional executable files. Fileless attacks abuse tools built-in to the operating system to carry out attacks. Essentially, Windows is turned against itself.
Without an executable, there is no signature for antivirus software to detect. This is part of what makes fileless attacks so dangerous - they are able to easily evade antivirus products.
McAfee - Fileless malware is a type of malicious software that uses legitimate programs to infect a computer. It does not rely on files and leaves no footprint, making it challenging to detect and remove.
CarbonBlack - Fileless malware refers to a cyberattack technique that uses existing software, allowed applications, and authorized protocols to carry out malicious activities.
WikiPedia - Fileless malware is a variant of computer related malicious software that exists exclusively as a computer memory-based artifact i.e. in RAM.
It does not write any part of its activity to the computer's hard drive meaning that it's very resistant to existing Anti-computer forensic strategies that incorporate file-based whitelisting, signature detection, hardware verification, pattern-analysis, time-stamping, etc., and leaves very little by way of evidence that could be used by digital forensic investigators to identify illegitimate activity.
As malware of this type is designed to work in-memory, its longevity on the system exists only until the system is rebooted.
MGs definition
So what do WE think Fileless Malware is?
The IR crew
Tyler
Martin
A better way to define Fileless Malware and WHY
Memware
Regware
WMIware
PowerShellware
Wormware
LolBin/LolBasware
And malware
.NETware compile on the fly (compileware)
bootware
How does this change our evaluation of malware?
How does this change our IR or THreat Hunting process?
How does this change how we detect and alert on malware?
Final thoughts
Other Articles:
-------------------
Cybereason - FILELESS MALWARE 101: UNDERSTANDING NON-MALWARE ATTACKS
https://www.cybereason.com/blog/fileless-malware
McAfee - What Is Fileless Malware?
https://www.mcafee.com/enterprise/en-us/security-awareness/ransomware/what-is-fileless-malware.html
Getting back to basics, IR 101 - Episode 013
Recorded May 2020
TOPIC: Getting back to basics, IR 101
OUR SPONSORS:
NEWS-WORTHY:
Best EDR Security Services In 2020 for Endpoint Protection
How to Avoid Spam—Using Disposable Contact Information
Shiny new Azure login attracts shiny new phishing attacks
Upgrading from EDR to MDR is Critical but Easier than You Think
The ransomware that attacks you from inside a virtual machine
SITE-WORTHY:
Malware Archaeology - Cheat Sheets
TOOL-WORTHY:
LOG-MD - The Log anD Malicious Discovery tool
“LOG-MD -a” will give you how you compare against the cheat sheets
MALWARE OF THE MONTH:
Qakbot
Typical delivery via a Office doc or URL
Created a folder in C:\Users
Key Detection points
Enable better logging AutoRuns - Uses Run key and Scheduled Task
WMIPrvSe launch binary in C:\Users
Binary in root of \Username directory C:\Users\<username>\<random long filename>.exe
C:\Users\<username>\AppData\Roaming\Microsoft\<random_foldername> Syswow64\Explorer.exe used Parent of Explorer.exe is NEVER a binary in C:\Users
Process injection of Syswow64\Explorer.exe
Ping 127.0.0.1
Scheduled Task created by a binary in C:\Users
Syswow64\Explorer,exe opening all the browsers
Binary in C:\User calling out to foreign country
PREVENTION
Block Office macros
Don’t allow uncategorized websites
EDR Software
Whitelisting C:\Users
TOPIC OF THE DAY:
Getting back to basics, IR 101
What is getting back to basics - IR 101
This will likely be multiple episodes
We will start with Windows
Why is this important?
WHEN you have an incident, data we, and you need will be available
This is probably the #1 finding and recommendation we have made to organizations we have been involved with over the years
Security tools fail, so other data you collect can help discover what happened where, when, and how
What is the problem we are wanting our listeners to solve?
To be better prepared in the event of an incident to speed up investigations
Give your SOC, IT, or Security people the data they need to investigate events
Make log management data better if you are collecting all the things
And of course… help your IR Consultancy do a better job FASTER
Other Articles:
-------------------
CIS Benchmarks
DerbyCon talk on EDR
DerbyCon talk on Winnti
Ep 012 - Laughing at Binaries - LOLBin/LOLBas
Formerly the Brakeing Down Incident Response Podcast
Recorded Oct 2019
TOPIC: Laughing at Binaries - LOLBin/LOLBas
OUR GUEST WILL BE:
Oddvar Moe, Sr. Security Consultant TrustedSec - Red Teamer
@Oddvarmoe
Blog - https://oddvar.moe/
lolbas-project.com
https://github.com/api0cradle/UltimateAppLockerByPassList
https://github.com/api0cradle/PowerAL
OUR SPONSORS:
NEWS-WORTHY:
Cyber Security Awareness Month
Share something that can help SMBs, your family or friends
Flaw with SUDO that lets you get admin priv when denied
Patch patch patch...
Microsoft Enables Tamper Protection by Default for all Windows 10 Users to Defend Against Attacks
Most Americans do not know what MFA is????
Hackers bypassing some types of 2FA security FBI warns
SITE-WORTHY:
Malware Archaeology Logging tips - List of Binaries to monitor
Guest - LolBin/LolBas - api0cradle - aka Oddvar Moe
TOOL-WORTHY:
HUMIO - Free 2GB/day 7 day retention
Guest:
https://github.com/PowerShellMafia/CimSweep - Matt Graeber – Agentless using CIM/WMI
http://nirsoft.net/ (DLL Export viewer, Reg DLL View, Password recovery, network tools +++)
Get injected-thread by Jared Atkinson - https://gist.github.com/jaredcatkinson/23905d34537ce4b5b1818c3e6405c1d2
https://github.com/Neo23x0/sigma - Standardized ruleset for SIEMs
MALWARE OF THE MONTH:
New Dridex version
Delivered via Office document or Email with URL
wscript/csript downloads bad binary named Chrome.exe
Calls Scheduled task for persistence
Chrome calls msra.exe for comms
C:\Windows\syswow64\Msra.exe chrome.exe
So another LOLBin ? This is what prompted this podcast
TOPIC OF THE DAY:
Laughing at Binaries - LOLBin/LOLBas
What is a LOLBin and LOLBas?
It stands for Living off the Land Binary and Scripts
Libraries too, Dlls
What started all this?
@SubTee Casey Smith efforts on Application Whitelisting bypasses from 2015 ish where he found ways to use existing binaries on the system to do bad things like RegSvr32, RegAsm, RunDll32, and several others
Why are these an issue for us Defenders?
Well Pentesters and Red Teams use them to get around security solutions like AV, EDR and App Whitelisting
Do these normally execute? If so how noisy are they?
Some are noisy
What do we need to watch out for?
Command line parameters are key
What is are the parameters they are executing with these utilities
Are there any lists people can use?
Malware Archaeology Logging page has a list and link to Oddvar’s page
What about security solutions, do we need to be concerned with these?
Yes, many AV and EDRs will not have alerts for these items
You will need to build some alerts and filter out the good/noise
What about logging theme?
Use the list(s) and build a lookup list that you can add to 4688 events or Sysmon 1 and 7 events and monitor them
What about MITRE ATT&CK, do they reference these?
Yes, there are several of these mentioned in MITRE ATT&CK, so map your tools to ATT&CK Techniques
Are there ways to test for these LOLs
What else do people need to watch out for?
Other Articles:
-------------------
Casey Smith @SubTee - Red Canary
Bypassing Application Whitelisting
SHMOOCon 2015 -
SANS
DerbyCon 2016 -
DerbyCon 2019 -
Oddvar Moe talk on LOLBin at DerbyCon 2018
Alternate Data Streams:
Ep 011 - ARTHIR - ATT&CK Remote Threat Hunting Incident Response tool
Formerly the Brakeing Down Incident Response Podcast
Recorded Sept 2019
TOPIC: ARTHIR - ATT&CK Remote Threat Hunting Incident Response tool
OUR GUEST WILL BE:
Olaf Hartong, Co-Founder Falcon Force
@olafhartong and @FalconForceTeam
Blog - https://medium.com/@olafhartong
Github - https://github.com/olafhartong/ThreatHunting
Website - https://www.falconforce.nl
OUR SPONSORS:
NEWS-WORTHY:
ISO Files via EMAIL???
https://blog.emsisoft.com/en/32373/beware-new-wave-of-malware-spreads-via-iso-file-email-attachments/
French Police take dowN Botnet
850,000 PCs involved - shuts down two-year-old Retadup malware operation
Over 10 billion malware attacks detected in 2018
https://www.techradar.com/news/over-10-billion-malware-attacks-detected-in-2018
New research from SonicWall has revealed that a record high of 10.52bn malware attacks occurred in 2018 indicating an escalation in the volume of cyberattacks as well as new targeted threat tactics used by cybercriminals
91% Of Cyberattacks Start With A Phishing Email
According to a new report from PhishMe that found that 91% of cyberattacks start with a phish, the top reasons people are duped by phishing emails are curiosity (13.7%), fear (13.4%), and urgency (13.2%), followed by reward/recognition, social, entertainment, and opportunity.
GUEST Story - Dutch helped with Stuxnet
https://news.yahoo.com/revealed-how-a-secret-dutch-mole-aided-the-us-israeli-stuxnet-cyber-attack-on-iran-160026018.html
SITE-WORTHY:
Guest - LOLBAS
TOOL-WORTHY:
Ummm ARTHIR
MALWARE OF THE MONTH:
URSNif
https://www.sentinelone.com/blog/ursnif-polymorphic-delivery-mechanism-explained/
https://www.vmray.com/cyber-security-blog/analyzing-ursnif-behavior-malware-sandbox/
This analysis list the MITRE ATT&CK used - very nice
SentinelOne did a good write up about it
Typical Word document delivery
Winword calling PowerShell - Always BAD
Base64 PowerShell executed - Always Bad
VBScript then downloads the payload
Stores it where else, under the User directory structure
Mutates on download, so you won’t find the same hash if multiple users open the document
Key Detection points
AutoRuns of course, but created on shutdown like Dridex
So File and Registry auditing might help catch it on shutdown and boot up… there is a Cheat Sheet for that ;-)
Winword calling PowerShell
PowerShell Base64 encoding
Random named executable
Injects into the browsers
PREVENTION
Scan email attachments
Block Macro execution
Application Whitelist Users directory
Lock down PowerShell
EDR
TOPIC OF THE DAY:
ARTHIR - ATT&CK Remote Threat Hunting Incident Response Tool
What is the problem ARTHIR is trying to solve?
Run LOG-MD remotely and get back the reports is how it started without using an enterprise type solution.
How do you run one or more of your favorite tools remotely against a system and get back the results?
During Incident Response this is an easy tweak to GPO to get it enabled on all machines, nothing to purchase, you already have it
It’s FREEEEeeeeeeee
What project was this forked from?
What improvements were added to make it ARTHIR?
Notes for MITRE ATT&CK Technique IDs
Scheduled task creation on remote systems running PS v2 thru v6
Push a binary to a folder other than the Kansa default C:\Windows
Cleanup module to delete the stuff you run, leave no trace
Run any binary tool you want and get back the native reports
Of course all the old Kansa capabilities
It is fairly easy to use
Why did you take this on and how did you solve the shortcomings of Kansa?
Shout-out to Olaf Hartong and Josh Ricard for their parts in this
Olaf on the report retrieval
Josh on the Schedule Task portion
Get back reports of utility or tool, in our case LOG-MD
Kansa only pulls back PowerShell console output
ARTHIR can do PS console as Kansa did, or the native reports in the native format of the tool, and Kansa is no longer supported by the creator.
What are the requirements for someone wanting to use ARTHIR in a domain and no domain?
Windows Remote Management or WinRM, aka PowerShell Remoteing which is built into all versions of Windows 7 and later
Uses the power of PowerShell v2 thru v5
Domain creds for Domain
Local creds with Authentication being Negotiate for non-domain
What are some use cases for ARTHIR?
Incident Response obviously
Auditing
Threat Hunting
Configuration validation
Manual tweaks, security improvements
Remediation
A way to schedule one of more tasks of your favorite tools, like LOG-MD
Documentation?
WinRm guide
And how to use info too
LOG-MD Professional you get a more detailed guide and all the modules for all the features of LOG-MD Professional and Consulting ships with LOG-MD Pro
Where do people get it?
You can find ARTHIR HERE:
Try it
Contribute
And MAP things to MITRE ATT&CK
Other Articles:
-------------------
Original Kansa Project