Sveriges mest populära poddar

The Incident Response Podcast

Ep 012 - Laughing at Binaries - LOLBin/LOLBas

50 min • 17 maj 2020

Formerly the Brakeing Down Incident Response Podcast

Recorded Oct 2019

TOPIC: Laughing at Binaries - LOLBin/LOLBas

OUR GUEST WILL BE:

  • Oddvar Moe, Sr. Security Consultant TrustedSec - Red Teamer

  • @Oddvarmoe

  • Blog - https://oddvar.moe/

  • lolbas-project.com

  • https://github.com/api0cradle/UltimateAppLockerByPassList

  • https://github.com/api0cradle/PowerAL

OUR SPONSORS:

NEWS-WORTHY:

Cyber Security Awareness Month

  • Share something that can help SMBs, your family or friends 

Flaw with SUDO that lets you get admin priv when denied

  • Patch patch patch...

Microsoft Enables Tamper Protection by Default for all Windows 10 Users to Defend Against Attacks

Most Americans do not know what MFA is????

Hackers bypassing some types of 2FA security FBI warns

SITE-WORTHY:

Guest - LolBin/LolBas - api0cradle - aka Oddvar Moe

TOOL-WORTHY:

Guest:

MALWARE OF THE MONTH:

New Dridex version

  1. Delivered via Office document or Email with URL

  2. wscript/csript downloads bad binary named Chrome.exe

  3. Calls Scheduled task for persistence

  4. Chrome calls msra.exe for comms

    1. C:\Windows\syswow64\Msra.exe chrome.exe

  1. So another LOLBin ?  This is what prompted this podcast

TOPIC OF THE DAY:

Laughing at Binaries - LOLBin/LOLBas

What is a LOLBin and LOLBas?

  1. It stands for Living off the Land Binary and Scripts

  2. Libraries too, Dlls

What started all this?

  1. @SubTee Casey Smith efforts on Application Whitelisting bypasses from 2015 ish where he found ways to use existing binaries on the system to do bad things like RegSvr32, RegAsm, RunDll32, and several others

Why are these an issue for us Defenders?

  1. Well Pentesters and Red Teams use them to get around security solutions like AV, EDR and App Whitelisting

Do these normally execute?  If so how noisy are they?

  1. Some are noisy

What do we need to watch out for?

  1. Command line parameters are key

  2. What is are the parameters they are executing with these utilities

Are there any lists people can use?

  1. Malware Archaeology Logging page has a list and link to Oddvar’s page

What about security solutions, do we need to be concerned with these?

  1. Yes, many AV and EDRs will not have alerts for these items

  2. You will need to build some alerts and filter out the good/noise

What about logging theme?

  1. Use the list(s) and build a lookup list that you can add to 4688 events or Sysmon 1 and 7 events and monitor them

What about MITRE ATT&CK, do they reference these?

  1. Yes, there are several of these mentioned in MITRE ATT&CK, so map your tools to ATT&CK Techniques

Are there ways to test for these LOLs

What else do people need to watch out for?

Other Articles:

-------------------

Casey Smith @SubTee - Red Canary

Bypassing Application Whitelisting

SHMOOCon 2015 -

SANS

DerbyCon 2016 - 

DerbyCon 2019 - 

Oddvar Moe talk on LOLBin at DerbyCon 2018

Alternate Data Streams:

Förekommer på
00:00 -00:00