Netconn from suspicious directories


Suspicious directories are an interesting topic and I am always on the lookout for them as a TTP.  The premise may be that directories like temp and downloads are already under review so some other directory should be used. That is fine for a while but once known it is easy to detect. The problem is noticing the unusual directory and adding it to your detection. I have no idea where I got most of these so if you have a post similar to this I will be happy to reference it.

Number one is the recycle bin, nothing should run from here, be referenced from here and certainly not netconn. I also do a signature for $recycle.bin in the command line just to catch anything non-netconn related.

These are locations to look for processes doing netconn.  Additional filtering is possible looking for activity from the root of these locations if you have a noisy one or it is a legit higher level path like C:\.

A search query for only the root would look something like this:

index=edr process_path=c:\\users\\public\\* process_path!=c:\\users\\public\\*\\*


$recycle.bin

c:\  ( netconn from the root only )
c:\users\public
c:\perflogs
c:\intel\logs
c:\users\default
c:\users\networkservice
c:\windows\fonts
c:\windows\debug
c:\windows\media
c:\windows\help
c:\windows\addins

c:\windows\security
c:\windows\repair
c:\windows\system32\config\systemprofile

HarddiskVolumeShadowCopy
c:\programdata\  (root only)

References:

https://twitter.com/SBousseaden/status/1133030955407630336
https://twitter.com/GossiTheDog/status/864957122114715653
http://blog.talosintelligence.com/2018/01/korea-in-crosshairs.html#more
https://twitter.com/cyb3rops/status/1098557657894531072






Comments

Popular posts from this blog

Misleading extensions Xls.exe Doc.exe Pdf.exe

Powershell DNS C2 Notes