Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

MD5 Hash algorithm for Crowdstrike #3

Closed
mthcht opened this issue Apr 19, 2023 · 3 comments
Closed

MD5 Hash algorithm for Crowdstrike #3

mthcht opened this issue Apr 19, 2023 · 3 comments

Comments

@mthcht
Copy link
Contributor

mthcht commented Apr 19, 2023

MD5 is only calculated on some events, i can see the following fields containing MD5 hashes:

  • behaviors{}.md5
  • behaviors{}.parent_details.parent_md5
  • event.MD5String (event streams logs)
  • properties.MD5HashData (vertex_type=module)

it's a little part of the detections but it is partially logged.

for the behaviors{} detections for example, i can see the following behaviors detected with md5 hashes:

  • A file appears to be imitating a standard OS or otherwise benign filename and/or launched from an unusual location. This might be to masquerade malware. Review the file.
  • A file classified as Adware/PUP based on its SHA256 hash was written to the file-system.
  • A file written to the file-system meets the File Analysis ML algorithm's high-confidence threshold for malware.
  • A file written to the file-system meets the File Analysis ML algorithm's low-confidence threshold for malware.
  • A file written to the file-system meets the File Analysis ML algorithm's lowest-confidence threshold for malware.
  • A file written to the file-system meets the machine learning-based on-sensor AV protection's high confidence threshold for malicious files.
  • A file written to the file-system meets the machine learning-based on-sensor AV protection's medium confidence threshold for malicious files.
  • A file written to the file-system surpassed a high-confidence adware detection threshold.
  • A file written to the file-system surpassed a low-confidence adware detection threshold.
  • A file written to the file-system surpassed a lowest-confidence adware detection threshold.
  • A file written to the file-system surpassed a medium-confidence adware detection threshold.
  • A module was loaded from an unusual path or with an unusual file name. Review the DLLs loaded by the process.
  • A process appears to be tampering with the Falcon sensor configuration. If this is unexpected, it might be an adversary trying to disable the Falcon sensor. Review the process tree.
  • A process associated with a known ransomware campaign launched. Investigate the host for signs of a ransomware attack.
  • A process attempted to delete a Volume Shadow Snapshot.
  • A process attempted to hide a Volume Shadow Snapshot.
  • A process attempted to modify Falcon sensor auxiliary driver files. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.
  • A process attempted to modify Falcon sensor core driver files. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.
  • A process attempted to modify Falcon sensor installer related files. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.
  • A process attempted to modify Falcon sensor related service binaries. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.
  • A process attempted to modify a Falcon sensor folder. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.
  • A process attempted to modify a registry key or value used by Falcon sensor. This is indicative of an attempt to tamper with Falcon sensor. Investigate the registry operation and process tree.
  • A process attempted to modify files used for Falcon sensor dynamic configuration. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.
  • A process attempted to modify injected libraries used by Falcon sensor. This is indicative of an attempt to tamper with Falcon sensor. Investigate the file system operation and process tree.
  • A process attempted to uninstall the Falcon sensor in an unusual way. If this is unexpected, it might be an adversary trying to disable the Falcon sensor. Review the process tree.
  • A process gathered information about the operating system or hardware. Adversaries can use this to identify system vulnerabilities. Review the process tree.
  • A process launched that shares characteristics with mimikatz, a password dumping utility. mimikatz's primary purpose is to steal passwords. If credentials were dumped, change your passwords and investigate the process tree.
  • A process loaded a module associated with known malware. Malware might have hijacked a benign process and loaded the malicious module to evade detection. Review the DLLs the process loaded.
  • A process loaded a module that shares characteristics with a known malicious file. Review the modules loaded by the process.
  • A process monitored keystrokes using the SetWindowsHook API. Adversaries often use this to intercept passwords and other sensitive information. Review the process tree
  • A script launched from a location associated with a remote administration tool (RAT). RATs often blend in with other benign applications and might be used by adversaries to remotely control the host. Review the script.
  • A suspicious process appears to be issuing commands indicative of VM or Sandbox checks. If this activity is unexpected, review the process tree.
  • A suspicious process launched that might be related to a malicious file. If this activity is unexpected, review the file.
  • An IP Address matched a Custom Intelligence Indicator (Custom IOC) with critical severity.
  • An executable appears to have been manipulated to evade detection. Adversaries can abuse file names, paths, and headers to masquerade malware as a safe or legitimate file. Review the executable and process tree.
  • An unexpected process ran svchost.exe. Adversaries can masquerade malware as a system process to evade detection. Review the executable.
  • An unusual process accessed lsass. This might indicate an attempt to dump credentials. Investigate the process tree.
  • Detected and blocked a heap spray attempt, which was likely part of an attempted exploit.
  • Mshta attempted to launch a likely malicious payload from a remote path. Review the command line.
  • Rundll32 has likely been abused by malware to launch a malicious payload. While the rundll32 process is benign, the DLL file it's loading is likely malicious. Review the file loaded by rundll32.
  • This file is classified as Adware/PUP based on its SHA256 hash.
  • This file meets the Adware/PUP Anti-malware ML algorithm's low-confidence threshold.
  • This file meets the Adware/PUP Anti-malware ML algorithm's lowest-confidence threshold.
  • This file meets the Adware/PUP algorithm's high-confidence threshold.
  • This file meets the Adware/PUP algorithm's lowest-confidence threshold.
  • This file meets the Behavioral Analysis ML algorithm's lowest-confidence threshold for malware. It might be malicious and/or part of an adversary's toolkit. Review the file.
  • This file meets the File Analysis ML algorithm's high-confidence threshold for malware.
  • This file meets the File Analysis ML algorithm's lowest-confidence threshold for malware.
  • This file meets the machine learning-based on-sensor AV protection's high confidence threshold for malicious files.
  • This file meets the machine learning-based on-sensor AV protection's low confidence threshold for malicious files.
  • This file meets the machine learning-based on-sensor AV protection's lowest-confidence threshold for malicious files.
  • This file meets the machine learning-based on-sensor AV protection's medium confidence threshold for malicious files.
  • This file written to disk meets the Behavioral Analysis ML algorithm's lowest-confidence threshold for malware. It might be malicious and/or part of an adversary's toolkit. Review the file.
  • Your IOC management action for this SHA256 hash is set to detect and/or block
@inodee
Copy link
Collaborator

inodee commented Apr 24, 2023

Hey @mthcht aren't some behaviors relying on a 'detection' to fire? Would they fit 'raw telemetry' concept?

I guess the main target event categories here are Process Activity and File Manipulation.

@mthcht
Copy link
Contributor Author

mthcht commented Apr 24, 2023

Hey @mthcht aren't some behaviors relying on a 'detection' to fire? Would they fit 'raw telemetry' concept?

I guess the main target event categories here are Process Activity and File Manipulation.

they do not rely on an crowdstrike alert to be triggered, it's a raw telemetry, i see it is mentionned here also for other events #14 (should close this issue)

@tsale
Copy link
Owner

tsale commented Apr 24, 2023

I will be implementing the proposed change via PR #14. I'll close this issue. Thanks again @mthcht!

@tsale tsale closed this as completed Apr 24, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants