Host-based threats
The endpoint is a valuable source of intelligence for threat hunters
Malware installs and executes on the endpoint but can be lost in the noise of the many benign programs running as well
Some of the important places to look for data while threat hunting include:
Processes
File systems
Windows registry
Windows processes
Examining the current and historical processes running on a system can give a threat hunter a feel for the helth of the system
Malware may try to disguise itself as a normal process or openly run as something anomalous
Knowledge of common processes and how they behave is essential
Tools like Task Manager, Process Monitor and Process Hacker can b invaluable for identifying threats on Windows systems
Linux processes
Linux also uses the concept of processes for currently-running programs
Command line tools like ps
and pstree
given visibility into the current state of the machines
These commands can also be included in scripts and run as cronjobs to provide automated monitoring and alerting
File systems
Malware authors and hackers also use and abuse the filesystem to achieve their goals
Taking advantage of how to filesystem operates can enable some attacks like DLL hijacking
Placing and running malicious executables out of unexpected directories can also help conceal malware from detection
Who would look for malware in the Recycle Bin?
Windows registry
The Windows Registry stores a variety of configuration data used by the operating system
This includes the list of processes to run upon startup and other useful tidbits
Malware authors take advantage of the registry to enable persistence and develop fileless malware
This makes detection and removal of malware more difficult
Hunting tools
When threat hunting on the endpoint, a variety of different tools exist
Both platforms have options for searching for each type of threat
The tool to use depends on both the environment that you're searching in (registry, file system, processes, etc) and the threat that you are searching for
Many tools allow automation, making it easier to perform threat hunting at scale
Last updated