Structured hunt scenario
Purpose
CostaRicto was a suspected cyber-espionage compaign that targeted multiple industries worldwide, with a large number being financial institutions
Your senior management is concerned that this is a potential threat to your organization, and your threat hunting teamwas summoned to hunt for this compaignand to report back
The purpose for your threat hunt is to determine if there is any indication that your organization is being targeted or if it is a victim
The goal is to uncover presence of CostaRicto in your environments and determine where you have gaps in your protection/detection
The hunting ground is the locations of sensitive data that the threat actors are interested in exfiltrating
Identify any assumptions for your threat hunt in terms of the locations where data is and what normal usage is
Identify any limitations for the hunt like data or resource availability
The desired outcome is to successfully accomplish the goals set forth for the hunt
Scope
You review the tactics and techniques used by this campaign to understand how the campaihn operates during each phase of the attack life cycle to determine the Scope
This is what differentiates structured hunts from other type of hunts
Here are some of the techniques used by the campaign:
Data from local system: Data and files collected from compromised networks
Develop capabilities: Custom malware PS1, CostaBricks and SombRAT used
External remote services: Remote tunneling using SSH tool to maintain access
Ingress tool transfer: Downloaded malware and tools onto a compromised host
Network service discovery: Employed nmap and pscan to scan target environments
Obtain capabilities: Obtained open-source tools to use in their operations
Proxy: Used a layer of proxies to manage C2 communications
Scheduled task/job: Scheduled tasks created to download backdor tools
Here are some of the tools used by the campaign:
CostaBricks
PowerSploit
PS1
PsExec
SombRAT
Tor
Determine what techniques and tools you would focus on and identify the network/systems involved
Identify data that is needed for the hunt at a high level, based on the techniques/tools in scope
Hypothesis development
Based on intelligence gathered, you could select a specific tool for your hunt or focus on all phases of the attack life cycle and consider TTPs for each phase
There are several hash files, file names, domain names and IP addresses you could collect for SombRAT from your threat intelligence
The analytic question is if SombRAT is used during the campaign, the set of observables associated with SombRAT malware will be present
Expected outcome is to be able to prove the hypotheses by locating the artifacts in your environment
Formulate
The hunter should formulate a plan to conduct the hunt, based on the scope
Identify data sources needed for the hunt based on the hypothesis:
EDR/AV/IDS logs to see if there are any alerts for this specific malware
You need proxy logs to identify URLs/domains
Firewall logs to search for IP addresses
Endpoint logs are needed to determine execution of specific file
Determine analysis techniquest needed to answer questions from the hypothesis:
You certainly need searching to look for the artifacts
Understand the tools required to gather and analyze data:
You need a EDR solution to scan for the hashes and file names on endpoins
A proxy solution is needed to log the URL visits
Firewall to log connections to IP adresses
Execute
After planning, the hunt needs to be executed by collecting and analyzing relevant data to answer questions from the hypotheses
Gather data from all the sources identified in the previous stage:
EDR/AV/IDS logs
Proxy logs
Firewall logs
Endpoint logs
Utilize analysis techniquest to prove or disprove hypotheses:
Search EDR/AV/IDS logs to see if there are any laerts for this specific malware
Review proxy logs to identify URLs/domains
Search firewall logs to search for UP addresses
Review endpoint logs to determine execution of specific file
Employ additional tools/techniques/data sets as needed:
Data from a packet capture solution may be utilized to determine what occuring in the network communication
Identify if any additional data is required for analysis or if any other tools are required to capture additional data
Capture results as you proceed with the hunt:
As you are reviewing each element, document the results
If there any challenges, identify and document them
Develop threat hunt report that capture all essential details of hunt along with any additional observations:
Summarize findings for each analytic question from the hypotheses
Outline results from each data set analyzed
Document any gaps identified that limited your ability to gather or analyze data
Feeedback
Identify lessons from each stage of the hunt to use in the Feedback stage to improve the hunting process
Involve all parties from the hunt and seek their feedback for the different stages:
What went well during each stage of the hunt?
What could we improve for each stage of the hunt?
Did we select the right TTPs to focus on in the Scope stage?
Did we consider all data sources for analysis?
Were there any gaps in logging?
Were there any tools that we were missing to collect and analyze data?
Was there a knowledge gap?
Last updated