Download presentation
Presentation is loading. Please wait.
Published byVictor Benedict Johnston Modified over 8 years ago
1
Chapter 5 Initial Development of Leads Spring 2016 - Incident Response & Computer Forensics
2
Defining Leads of Value Three characteristics of a lead Relevant Detailed Actionable To start with, perform the following operations Clarify the data Verify the accuracy Determine the context
3
Acting on Leads Turning leads into indicators Property-based indicators Methodology-based / Anomaly-based indicators Lifecycle of indicator generation Data from initial lead Create/Edit Verify Data Relevant to Indicator Data Common to Environment Loop to Create/Edit step Publish
4
Editing Host-based Indicators Helps in determining if a host is compromised An example - Property-based indicators : Lab03-02.dll file from Practical Malware Analysis (practicalmalwareanalysis.com/labs) The file’s MD5 hash is used
5
Editing Host-based Indicators
6
Extremely low false positive A match must be a good indicator What if there is no match? If it is the same file, the functionality remains the same The PE file header can be checked Compile Time and Date File size
7
Editing Host-based Indicators
8
What if the attacker has modified the file? The file size will not match. Look for what the file does when executed
9
Editing Host-based Indicators
10
Another example - Methodology -based indicators : The Sticky Keys: Provides accessibility features to users with disability Executes sethc.exe file in Windows Activated by pressing the Shift key quickly five times
11
Editing Host-based Indicators Attackers can replace the sethc.exe file With Cmd.exe Any other file To detect this compromise Search for characteristics of sethc.exe file Use known values in sethc.exe header
12
Editing Host-based Indicators
13
If an organization has many systems, they all need to be searched So, we need to check for all MD5 hashes and other parameters
14
Editing Host-based Indicators
15
This can be very complicated if the organization has thousands of computers Instead, use methodology based indicators If we anticipate the attacker replaced the sethc.exe by cmd.exe or a similar file: We can look for cmd.exe file size parameters
16
Editing Host-based Indicators
17
Editing Network-based Indicators The goal: Determining quickly if a particular session is relevant to the investigation These indicators may have a limited lifespan Consider the same example as before Lab03-02.dll file The malware looks up the host name practicalmalwareanalysis.com A network monitor should be able to detect this DNS lookup
18
Editing Network-based Indicators Monitor UDP port 53 The query format: See section 4.1.2 “Question Section Format” (page 28) in RFC 1035 “Domain Names – Implementation and Specification” Build a signature of data format Searching for “practicalmalwareanalysis.com” will not work The QNAME portion of query would contain: Length:0x18 String: practicalmalwareanalysis Length:0x03 String:com Terminating octet: 0x00
19
Editing Network-based Indicators Using Snort manual, a signature can be built to raise an alert when the sensor finds the following query:
20
Verification Run indicators against a representative sample of systems Data Relevant to Indicator: Test that the indicator performs as intended What if the attacker has already deleted what we are looking for? Example: A dropper Data Common to Environment: Make sure the indicator properties do not match against the environment and results in numerous false positives To test, select a set of clean systems as sample and run the test on the sample to make sure there is no match. If there are matches, go to “Edit” step to modify the indicator and then test again.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.