Module 5: Hunting on Endpoints
Endpoints for Threat Hunters
Types of Endpoint IoCs
Typical types of endpoint IoCs we rely on for intelligence-based threat hunting:
Network-related IoCs
IPs
Domains
URLs
File-related IoCs
Hashes
Names
Behavioral IoCs
Anomalies in user activities
Irregular commands entered by users
Sources of Endpoint Data
Not much to add, talking about event logs, sysmon, EDR, etc.
Endpoint IoC Considerations
Nothin' to add. Consider TTPs, feeding intelligence into the hunt, enrichment, etc.
Practical Endpoint Threat Hunting
The Akira Ransomware Incident
Context for the hands-on.
Ransomware Artifacts
Honestly, not much to add still. Couple new searches in Splunk...
index="*" "akira_readme.txt" host=DB1
index="*" "akira" NOT "akira_readme.txt"
index="*" "passwords.kdbx" host=CLIENT3
File Artifacts
Getting a file hash with PowerShell:
PS C:\Resources> Get-FileHash -Path .\l9k1JEYlHZ.exe
Searching multiple filenames in splunk:
index="*" ("l9k1JEYlHZ.exe" OR "image_slider.exe" OR "db_update.exe")
Using threat intelligence, let's search for the other hashes of files known to be used by Akira ransomware variants:
index="*" ("337d21f964091417f22f35aee35e31d94fc3f35179c36c0304eef6e4ae983292" OR
"3c92bfc71004340ebc00146ced294bc94f49f6a5e212016ac05e7d10fcb3312c" OR
"637e28b38086ff9efd1606805ff57aaf6cdec4537378f019d6070a5efdc9c983" OR
"67afa125bf8812cd943abed2ed56ed6e07853600ad609b40bdf9ad4141e612b4" OR
"678ec8734367c7547794a604cc65e74a0f42320d85a6dce20c214e3b4536bb33" OR
"7b295a10d54c870d59fab3a83a8b983282f6250a0be9df581334eb93d53f3488" OR
"8631ac37f605daacf47095955837ec5abbd5e98c540ffd58bb9bf873b1685a50" OR
"1d3b5c650533d13c81e325972a912e3ff8776e36e18bca966dae50735f8ab296" OR
"094d1476331d6f693f1d546b53f1c1a42863e6cde014e2ed655f3cbe63e5ecde" OR
"35415d97038e091744e9cab3b88c78c1a7ca87f78d2b4a363f72f2c28d65932b" OR
"6192beb56de670de902193a33380e5eb0f3b4b2e3e848e7eea8950075f00f2e5" OR
"d1aa0ceb01cca76a88f9ee0c5817d24e7a15ad40768430373ae3009a619e2691" OR
"f157090fd3ccd4220298c06ce8734361b724d80459592b10ac632acc624f455e")
Adapting our Methodology
Just walking through searching via Splunk for IoCs.
Last updated