You have been hired as a junior security analyst. As part of your training, you were tasked to determine any malicious activity associated with the Pushdo trojan.
You will have access to the internet to learn more about the events. You can use websites, such as VirusTotal, to upload and verify threat existence.
The tasks below are designed to provide some guidance through the analysis process.
You will practice and be assessed on the following skills:
o Evaluate event alerts using Squil and Kibana.
o Use Google search as a tool to obtain intelligence on a potential exploit.
o Use VirusTotal to upload and verify threat existence.
CyberOps Associates
Full Answer Section
-
- Network connections from infected machines to known Pushdo command and control (C2) servers.
- Suspicious registry modifications or process injections pointing to Pushdo activity.
- Visualize Findings in Kibana: Import your Squil-generated data into Kibana and create visualizations to analyze trends and patterns. Look for spikes in events, frequent connections to specific IP addresses, and correlations between different types of activities.
- Refine Your Search: Armed with specific details from your event analysis, formulate targeted Google searches. Include keywords like "Pushdo IOCs," "Pushdo latest campaigns," or "Pushdo analysis reports."
- Vet Your Sources: Prioritize reputable sources like security blogs, threat intelligence vendors, and incident response reports. Be wary of personal blogs or forums with unverified information.
- Extract Key Insights: Identify relevant indicators of compromise (IOCs) like Pushdo file hashes, C2 server domains, and malware signatures. Look for insights into Pushdo's attack vectors, targeted vulnerabilities, and potential mitigation strategies.
- Upload Suspicious Files: Identify any suspicious files identified during your analysis, such as downloaded executables or modified system files. Upload them to VirusTotal for scanning by multiple antivirus engines and analysis tools.
- Interpret Scan Results: Analyze the scan results for Pushdo detections. Look for high detection rates, associated malware families, and additional details like file type and origin.
- Correlate Findings: Combine VirusTotal results with your other analysis to determine the level of risk and potential impact of the identified Pushdo activity.
- Explore additional threat intelligence platforms like MITRE ATT&CK, Crowdstrike Falcon X, and AlienVault OTX to further enrich your analysis and understanding of Pushdo behavior.
Sample Answer
Welcome to CyberOps Associates, Junior Analyst! Your first mission involves investigating potential malicious activity linked to the Pushdo trojan. Buckle up, this is where analytical skills and detective work collide!
Task 1: Evaluating Event Alerts with Squil and Kibana
-
Gather Event Data: Access your company's security information and event management (SIEM) system. Using Squil, craft queries to search for events related to:
- File execution, specifically executables with names or paths associated with Pushdo.