socAnalystRoomTwo
socAnalystRoomTwo
socAnalystRoomTwo
The Cyber Kill Chain will help you understand and protect against ransomware
attacks, security breaches as well as Advanced Persistent Threats (APTs). You can
use the Cyber Kill Chain to assess your network and system security by identifying
missing security controls and closing certain security gaps based on your company's
infrastructure.
-Reconnaissance
-Weaponization
-Delivery
-Exploitation
-Installation
-Command & Control
-Actions on Objectives
Malware: This refers to the harmful software that performs malicious actions once
it is successfully deployed on the target system (e.g., stealing data, encrypting
files, etc.).
Exploit: This refers to the method or code that takes advantage of vulnerabilities
in software or systems to gain unauthorized access or perform unintended actions.
Combination: The weaponizer integrates these two components. The exploit is used to
gain access to the target system, and once access is achieved, the malware is
delivered and executed to achieve the attacker's goals (such as data theft or
system disruption).
for learning about VBA and macros "https://www.trustedsec.com/blog/intro-to-macros-
and-vba-for-script-kiddies"
Once the attacker gets access to the system, he would want to reaccess the system
if he loses the connection to it or if he got detected and got the initial access
removed, or if the system is later patched. He will no longer have access to it.
That is when the attacker needs to install a persistent backdoor. A persistent
backdoor will let the attacker access the system he compromised in the past.
Installing a web shell on the webserver. A web shell is a malicious script written
in web development programming languages such as ASP, PHP, or JSP used by an
attacker to maintain access to the compromised system. Because of the web shell
simplicity and file formatting (.php, .asp, .aspx, .jsp, etc.) can be difficult to
detect and might be classified as benign. You may check out this great article
released by Microsoft on various web shell attacks.
Installing a backdoor on the victim's machine. For example, the attacker can use
Meterpreter to install a backdoor on the victim's machine. Meterpreter is a
Metasploit Framework payload that gives an interactive shell from which an attacker
can interact with the victim's machine remotely and execute the malicious code.
Creating or modifying Windows services. This technique is known as T1543.003 on
MITRE ATT&CK (MITRE ATT&CK® is a knowledge base of adversary tactics and techniques
based on real-world scenarios). An attacker can create or modify the Windows
services to execute the malicious scripts or payloads regularly as a part of the
persistence. An attacker can use the tools like sc.exe (sc.exe lets you Create,
Start, Stop, Query, or Delete any Windows Service) and Reg to modify service
configurations. The attacker can also masquerade the malicious payload by using a
service name that is known to be related to the Operating System or legitimate
software.
Adding the entry to the "run keys" for the malicious payload in the Registry or the
Startup Folder. By doing that, the payload will execute each time the user logs in
on the computer. According to MITRE ATT&CK, there is a startup folder location for
individual user accounts and a system-wide startup folder that will be checked no
matter what user account logs in.
Adversaries may modify file time attributes to hide new or changes to existing
files. Timestomping is a technique that modifies the timestamps of a file (the
modify, access, create, and change times), often to mimic files that are in the
same folder
In the C&C phase, the attacker would:
|
|>
The protocols HTTP on port 80 and HTTPS on port 443 - this type of beaconing blends
the malicious traffic with the legitimate traffic and can help the attacker evade
firewalls.
DNS (Domain Name Server). The infected machine makes constant DNS requests to the
DNS server that belongs to an attacker, this type of C2 communication is also known
as DNS Tunneling.
Indicators of C2 Beaconing:
The Insider Threat is the potential for an insider to use their authorized access
or understanding of an organization to harm that organization.