4.4 C
United States of America
Saturday, November 23, 2024

Tales from the SOC: Registry Clues to PDF Blues: A Story of PUA Persistence


Government Abstract

Establishing persistence on a system permits a risk actor continued entry or course of execution throughout system restarts or different adjustments. Because of this, monitoring for and investigating persistence indicators are key elements of any strong cybersecurity platform.

Two frequent persistence strategies are utilizing AutoStart Execution of applications throughout system boot or logon (T1547) and abusing scheduled job features (T1053). Nevertheless, professional utility exercise additionally steadily includes AutoStart Execution and scheduled job features, so defending in opposition to these strategies requires not solely detection monitoring but additionally evaluation by a cybersecurity skilled. 

Throughout a current incident involving a LevelBlue MDR SOC buyer, an alarm that triggered for a Home windows Autorun registry key for persistence was traced again to a doubtlessly undesirable utility (PUA). The PUA purportedly was appearing as a PDF conversion utility. A assessment of the preliminary alarm and related occasions revealed that the appliance had established a double layer of persistence by utilizing each Scheduled Activity creation and Autorun registry keys to execute JavaScript beneath the guise of a Chrome browser extension. Extra open-source intelligence (OSINT) instruments recognized the appliance as both a PUA or a doubtlessly malicious file. An investigation was created for the shopper with remediation suggestions and finally it was confirmed that the appliance was neither anticipated nor approved throughout the buyer’s surroundings, and it was eliminated.

The identical utility was later detected in one other buyer’s surroundings, however on this case, the shopper had added a associated file hash to an exclusion record. As a result of the LevelBlue MDR SOC analyst had not too long ago investigated the appliance and recognized it as doubtlessly malicious, they have been in a position to suggest eradicating the hash from the exclusion record and as an alternative including it to a blocklist.

Investigation

Preliminary Alarm Overview

The investigation started with the LevelBlue analyst receiving an alarm {that a} Home windows Autorun registry key named “ChromeBrowserAutoLaunch” had been added on an endpoint within the buyer surroundings. Whereas at first look this gave the impression to be a key set to auto-launch Chrome with a browser extension loaded, evaluation of the supply course of command line revealed a number of gadgets that warranted additional investigation.

levelblue soc alarm

Determine 1: The preliminary alarm for the autorun registry key creation

  • The “–no-startup-window” choice: though that is generally used for professional functions, it could possibly additionally point out an try to cover exercise from the top consumer. The pathway of the extension being loaded confirmed it was not an extension that the consumer had put in from the Chrome webstore. The anticipated pathway for extensions from the webstore could be “C:Customers<username>AppDataLocalGoogleChromeUser DataDefaultExtensions”. Whereas a sideloaded extension may nonetheless be professional, this gave extra trigger to establish the origin of the registry key and extension.
  • No verifiable browser extension with the identify “Extension Optimizer” was present in OSINT queries. 
  • Abuse of browser extensions (T1176) is a recognized method and malicious extensions have a historical past of getting used for infostealing, adware, and browser hijack or redirect behaviors. 

Expanded Investigation

Occasions Search

The analyst carried out an occasion search to establish the origin of the browser extension “ExtensionOptimizer”. This search returned course of creation occasions that exposed the registry key was being added by a node.exe JavaScript course of executing from an AppData folder named “PDFFlex” within the pathway “C:Customers<username>AppDataLocalPDFFlexnode.exe”.  An extra occasion was logged on the similar time exhibiting that node.exe was additionally getting used to load the extension manually.

Initial alarm

levelblue soc 3 events

Determine 2: Occasions exhibiting the registry keys origin and guide loading of the extension

The analyst looked for “PDFFlex” to grasp if the appliance was frequent within the buyer’s surroundings and to acquire extra artifacts concerning its origin or nature. The search revealed the appliance’s presence was anomalous and in addition uncovered occasions that may very well be used for additional analysis.

The analyst obtained the filename of the appliance’s MSI installer, the model and writer of the appliance, and an occasion that confirmed the creation of a each day scheduled job. This job was configured to execute “node.exe replace.js –check-update” from the identical “PDFFlex” folder pathway seen within the registry creation occasions. Additional evaluation confirmed that this job was chargeable for executing the method that was creating the Autorun registry key in an obvious double layer of persistence established on the endpoint. 

Levelblue soc

Determine 3: Scheduled job created to persistently add the registry key every day

Levelblue soc

Determine 4: Occasion exhibiting the identify of the appliance’s MSI installer file discovered within the consumer’s downloads folder

Levelblue soc

Determine 5: Set up occasion exhibiting the model and writer of the appliance “PDFFlex”

Occasion Deep-Dive

The analyst then carried out a number of OSINT searches utilizing the knowledge obtained in occasion searches to confirm the use case and potential legitimacy of the appliance. 

  • No verifiable info was discovered for the MSI file “FreePDF_49402039.msi” or the writer PDFFlex.io. 
  • The analyst carried out a Whois search of the area “pdfflex.io” and located that it was not registered.  
  • An internet seek for “PDFFlex 3.202.1208.0” returned a verdict of “malicious exercise” from the sandbox device ANY.RUN, which offered a SHA256 file hash of 9c5d756045fd479a742b81241ccf439d02fc668581a3002913811a341278de43. 
  • A search of the hash on VirusTotal revealed that it had been flagged as doubtlessly malicious by a number of safety distributors, together with Sophos and Fortinet. 
  • The analyst leveraged SentinelOne Deep Visibility to verify that the hash for the MSI file on the shopper’s endpoint matched the hash within the ANY.RUN report. On the time of the alarm, incidents weren’t being triggered on the hash. The SentinelOne device additionally confirmed that the MSI file was signed by “Eclipse Media Inc,” which proved key in a later incident for an additional LevelBlue buyer. 

levelblue soc

Determine 6:Deep Visibility search in SentinelOne exhibiting the file hash for the MSI file discovered on the endpoint

Response

Constructing the Investigation

The analyst’s investigation and OSINT analysis returned a number of factors to point that the “PDFFlex” utility was doubtless not a desired utility within the surroundings:

  • The presence of the appliance on the endpoint was anomalous for the surroundings as occasions for it weren’t noticed for different endpoints.
  • The appliance had established what gave the impression to be a double layer of persistence by utilizing a scheduled job and autorun registry key to create and launch an unverified browser extension “ExtensionOptimizer.”
  • OSINT reviews for the MSI file indicated doubtlessly malicious habits.

Collectively, these information factors indicated that the appliance was neither desired nor anticipated within the buyer surroundings and may very well be categorised as a PUA/PUP, if not as outright malicious, and thus needs to be faraway from the endpoint.

Buyer Interplay

The analyst created an investigation that detailed the findings concerning the appliance “PDFFlex,” the browser extension “ExtensionOptimizer,” the noticed persistence behaviors, and the findings of the OSINT analysis. They really useful that the shopper reimage the endpoint or take away the related AppData folders for “PDFFlex” and “ExtensionOptimizer” the scheduled duties, and the related registry keys. Shortly after the preliminary investigation, the LevelBlue MDR SOC recognized one other endpoint within the buyer’s surroundings that was exhibiting the identical persistence indicators beneath the appliance identify “PDFTool.” The client confirmed that the functions weren’t approved and finally elected to take away the endpoints from service and exchange them.

Whereas the MSI file initially didn’t set off an alarm, a number of days after the investigation, its hash was added to the SentinelOne Cloud world blocklist and started to set off alarms. Throughout assessment of considered one of these for an additional buyer, a LevelBlue analyst discovered that the shopper had added a hash-based exclusion for a equally named pdf-related MSI file with a unique file hash but additionally signed by “Eclipse Media Inc.” 

This buyer had beforehand noticed the risk however added the hash to the exclusion record in SentinelOne resulting from no adverse reviews noticed whereas researching the file utilizing OSINT instruments. The LevelBlue crew’s information of the signer “Eclipse Media Inc” together with their current evaluation of the appliance allowed them to tell the shopper in regards to the dangers of the appliance. Primarily based on the analyst’s suggestion, the exclusion was eliminated and a blocklist motion for the alternate hash was added as an alternative.

Conclusion

This incident highlights not solely the necessity for monitoring and alerting on scheduled job and Autorun registry key creation but additionally the worth of getting professional evaluation of those occasions. On this investigation, the analyst’s use of OSINT and sandboxing instruments similar to ANY.RUN offered the essential context wanted to guard the shopper’s surroundings from threats. As well as, the analyst’s analysis and prior information of the file signer “Eclipse Media Inc” later proved key in defending one other LevelBlue buyer that had created an exclusion for what was doubtless the identical PUA beneath a unique file hash.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles