5C. Analyse Host-related IoCs Flashcards

1
Q

Malicious processes (to monitor/be aware of)

A
  • process baseline (to detect deviations)
  • scan running processes for malicious code
  • registry changes (unexpected changes/access)
  • open files (Linux ‘lsof’ command)
  • network traffic
  • high resource usage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Fileness malware

A

malware code that executes without having to be launched from an .exe file saved somewhere on the file system. Fileless detection require analysis of the contents of system memory and process behaviour.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Disk and File System IoCs

A
  • excessive log information (e.g., due to brute force attempt, downloading content)
  • use of temp file/folders, user profile locations, data masked as log file, alternate data streams, recycle bin usage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data staging and detection technique

A

the process of preparing and organising data for exfiltration from a target system or network. To detect, scan host file systems for file archive, compression, and encryption (e.g., RAR), look for files in system folders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

File system viewers

A
  • Tool that allows you to search the file system for keywords quickly e.g., system areas such as the Recycle Bin and NTFS shadow copy
  • analysing file metadata allows for the reconstruction of a timeline of events
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Linux File System analysis tool

A
  • lsof (displays currently opened files)
  • df (displays disk space being used)
  • du (display how much disk space each directory is using)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Windows File System analysis tool

A
  • dir /Ax (filters all files/folder types that match the given parameter (x) (e.g., /AH displays only hidden files/folders)
  • dir /Q (displays owner of each file)
  • dir /R (displays alternate streams for a file)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Unauthorised privilege IoCs

A
  • unauthorised sessions
  • failed logins
  • new user accounts showing up
  • guest account activity
  • privilege usage outside of working hrs
  • security policy integrity (changes being made to)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Unauthorised Software IoCs

A
  • presence of unknown software (or unexpected security tools or DNS servers installed on host)
  • absence or disabling of prefetch files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Prefetch files are…

A

files that record the names of applications that have been run plus other information (date and time, file path, run count, and DLLs used by the executable)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Unauthorised Change/Hardware IoCs

A
  • system config changes
  • hardware peripherals that have been attached to host
  • application behaviour changes (e.g., attacker may open ports, start services, directory exclusion to scanning software)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Persistence IoCs

A
  • Registry changes (e.g., Outrun items, Services, File associations, Scheduled tasks)
  • startup tasks
  • Hidden files/directories (where malware/data may be stored)
  • Boot sector malware
  • Rootkits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly