Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add signature for reg.exe called from command shell #474

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

car062636
Copy link

@car062636 car062636 commented Apr 29, 2020

I have added a new signature for Windows, this signature is based on https://car.mitre.org/analytics/CAR-2013-03-001/ which is an Analytic, it will be triggered when the built-in utility reg.exe is called from the command shell. According to CAR, I completed a signature code which can traverse the processtree by DFS to capture the reg.exe call from command shell event. 

I have verified this signature by the following method. First, I created a Windows application that adds a registry key by calling reg.exe from the cmd.exe and downloaded Sysmon to record its event log.
Secondly, by checking the event log manually, I confirmed that my windows application can trigger the analytic CAR-2013-03-001. After getting the cuckoo report of this application, I found that the processtree in the report indicates this analytic should have been triggered during the execution of the application.
I also tested my signature on the malware sample(MD5:b5d77d9e5a93848aaf59cd6115e54732)which contains the behavior of query the registry.   The cuckoo new recorded report shows that my signature can capture this event correctly.
擷取

What did you create/change?
I have added a new signature for windows, this signature is based on https://car.mitre.org/analytics/CAR-2013-03-001/ which is an Analytic, it will be triggered when the built-in utility reg.exe is called from the command shell. According to CAR, I completed a signature code which can traverse the processtree by DFS to capture the reg.exe call from command shell event. 

What is the goal of this addition/change?
I want to integrate the analytics of Cyber Analytics Repository into the Cuckoo report, but the analytics are based on the sensor like Sysmon, so I should map the event recorded by these sensors to the cuckoo report.

Did you test your addition/change?
I have verified this signature by the following method. First, I created a Windows application that adds a registry key by calling reg.exe from the command shell and downloaded Sysmon to record its event log. 
Secondly, by observing the event log manually, I confirmed that my windows application can trigger the analytic CAR-2013-03-001. After getting the cuckoo report of this application, I found that the processtree in the report indicates this analytic should have been triggered during the execution of the application. I also tested my signature on the malware sample(MD5:b5d77d9e5a93848aaf59cd6115e54732)which contains the behavior of query the registry.  
Thirdly, I submit these samples again, the cuckoo new recorded report shows that my signature can capture this event correctly.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant