Threat Thursday - Red Canary October Detection Opportunities
Hi, and welcome to our #ThreatThursday covering recent detection opportunities published by Red Canary in their blog Intelligence Insights: October 2021. The Cyber Threat Intelligence (CTI) from Red Canary contains detection logic for specific threat procedures. We reviewed the methods and developed emulation plans where applicable to help test and validate the detection opportunities in your environment. These emulations help answer the questions:
The first detection opportunity mentioned by Red Canary is for PowerShell writing an LNK file shortcut to the startup directory. An LNK file is a shortcut that point points to an original file or application. When an LNK is placed in the startup folder an adversary can achieve persistence by having the LNK execute the command and control payload at start up. Multiple adversaries have used the procedure of creating an LNK file in the startup folder. Red Canary states a trending threat named Yellow Cockatoo is leveraging this procedure.
To emulate this procedure, SCYTHE customers can import the Atomic test from our Community Threats Library. Others can generate this activity manually via the test from Atomic Red Team.
Red Canary recommended using the following detection logic to detect the current threat:
Alternatively, leverage the SIGMA Rule based on Red Canary’s recommendation.
The incident responder should seek to determine the source of this activity and the depth of the attack by answering the following.
The second opportunity attempts to catch a Ransomware precursor. Ransomware is known to leverage enterprise remote management solutions in its campaigns. These solutions are leveraged to achieve persistence and conduct actions on objectives. Therefore, if the solutions listed here aren’t approved for your organization, consider proactively detecting them. This opportunity focuses on detecting installations of the ATERA remote management agent.
To emulate this procedure, SCYTHE customers can import the test from our Community Threats Library. Others can generate this activity manually via the test below:
Set Registry Key:
reg ADD "HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent"
Clean up:
reg DELETE "HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks" /f
Red Canary recommends the following detection logic:
Please note that if you are using Sysmon, you likely need to add a target object that contains ATERA Networks.
If the account owner did not conduct the installation, this indicates a malicious actor running actions on objectives, and the organization should enact its incident response plan.
The final emulation plan replicates downloading a VHD (Virtual Hard Disk) file from a web browser. This procedure is related to the Mark-of-the-Web Bypass technique, where adversaries leverage container files like VHD to subvert controls and detections. Red Canary observed Zloader conducting this procedure and highlighted a detection opportunity.
To emulate this procedure, SCYTHE customers can import the test from our Community Threats Library. Unfortunately, at this time, we do not have a non-SCYTHE emulation for this procedure.
In Red Canary’s blog post, they recommend the following logic:
We recommend leveraging the following SIGMA rule as well. Please note to include all browsers observed in your environment, as these rules may not cover them all. If leveraging Sysmon, you will likely have to update the configuration to contain a target filename ending with “.vhd”.
The responding analyst should seek to answer the following.
We’d like to give a special thanks to Red Canary for all they contribute to the community. These emulation plans would not be possible without Red Canary publishing the detection opportunities in their Intelligence Insights: October 2021.
This Threat Thursday post discusses active research by SCYTHE and other cited third parties into an ongoing threat. The information in this post should be considered preliminary and may be updated as research continues. This information is provided “as-is” without any warranty or condition of any kind, either express or implied.