TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

Is This Thing On?

BHIS · 2021-05-26 · Read original ↗

ATT&CK techniques detected

7 predictions
T1003.001LSASS Memory
100%
"details ” button near the bottom of the window. then click the “ details ” tab and scroll down in the list until you find the “ lsass. exe ” process. right - click on “ lsass. exe ”, and then click on “ create dump file ” in the menu that appears. at this point, task manager will…"
T1059.001PowerShell
100%
"inside of commands and scripts that are executed inside of powershell processes, microsoft office macros, and windows - supported scripting languages like vbscript and javascript. this functionality is critical in a defensive product since many payloads can be downloaded into mem…"
T1564.004NTFS File Attributes
98%
"defender detected those files : 2. testing malware detection in alternate data streams on computers that use the ntfs filesystem, malware can also be stored in a file ’ s alternate data stream ( ads ) rather than inside the file itself. this technique has been used by malware aut…"
T1564.004NTFS File Attributes
92%
"##t : eicar ‘ x5o! p % @ ap [ 4 \ pzx54 ( p ^ ) 7cc ) 7 } $ eicar - standard - antivirus - test - file! $ h + h * ’ powershell commands for creating an ads containing the eicar string the screenshot below shows execution of these two commands, along with a “ get - content ” comma…"
T1059.001PowerShell
63%
"of each string when performing these tests. the test strings aren ’ t valid powershell syntax by default, so if you run them without the quotes, other error messages will be displayed that could cause some confusion. successful detection of the malicious strings will generate an …"
T1055.001Dynamic-link Library Injection
55%
"of each string when performing these tests. the test strings aren ’ t valid powershell syntax by default, so if you run them without the quotes, other error messages will be displayed that could cause some confusion. successful detection of the malicious strings will generate an …"
T1059.001PowerShell
45%
"##t : eicar ‘ x5o! p % @ ap [ 4 \ pzx54 ( p ^ ) 7cc ) 7 } $ eicar - standard - antivirus - test - file! $ h + h * ’ powershell commands for creating an ads containing the eicar string the screenshot below shows execution of these two commands, along with a “ get - content ” comma…"

Summary

How to make sure your antivirus is working without any malware  Michael Allen // Recently, a customer asked me if there was a way they could generate alerts from the new antivirus product they deployed without executing any actual […]

The post Is This Thing On? appeared first on Black Hills Information Security, Inc..