An easy to find possible indicator of compromise (IoC) for your SIEM, AEP or EDR could be a outbound network connection from Windows own register server regsvr32.exe (Microsoft Docs or Wiki). Normally the register server never establishes an outbound network connection to the internet. It is a commonly used evasion technique to avoid detection and has its own MITRE Att&ck technique with ID T1117 (or new sub-techniques T1218/010 and can be mapped to the MITRE Att&ck tactics Execution TA0002 and Defense Evasion TA0005.
A starting point can be searching your SIEM logs for network connections from regsvr32.exe to a not RFC1918 private ip address and your IPv6 address space.
Mitigations could be using the Windows firewall to block outbound network connections from regsvr32.exe or as MITRE Att&ck writes:
"Microsoft's Enhanced Mitigation Experience Toolkit (EMET) Attack Surface
Reduction (ASR) feature can be used to block regsvr32.exe from being
used to bypass whitelisting. Identify and block potentially malicious
software executed through regsvr32 functionality by using application
whitelisting tools, like Windows Defender Application Control,
AppLocker, or Software Restriction Policies where appropriate."
More useful searches for Splunk & Sysmon environments can be found on Github, example: https://github.com/mitre-attack/car/issues/11 and testing if your AEP/EDR/Sysmon or log-collection-tool actually logs regsvr32 events is described here: https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1117/T1117.md
Subscribe to:
Post Comments (Atom)
Azure Managed Identities (technical service accounts)
Explaination Azure Managed Identities = technical service accounts Password is automatically managed, as it was the case in managed service ...
-
Howto add a route with a specific interface into the windows routing-table. This can be useful for example if you have a tunnel-all vpn...
-
If you are running a Windows Server 2016, are using the integrated Windows Server Backup utility and you want to save the backup to a remote...
-
You can either use the GUI of the FortiGate to list all certificates, or use the CLI. Either using the commands: Using the "get...
No comments:
Post a Comment