Stories from the SOC: Registry Clues to PDF Blues: A Tale of…

Summary:
This article discusses the importance of monitoring persistence indicators in cybersecurity, particularly through techniques like AutoStart Execution and scheduled tasks. It details a case involving a potentially unwanted application (PUA) that established persistence on a system, leading to further investigations and remediation actions. The incident underscores the necessity of expert analysis in identifying and mitigating threats.
#PersistenceMonitoring #ThreatAnalysis #IncidentResponse


Keypoints:

  • Persistence techniques allow threat actors continued access to systems across restarts.
  • Common techniques include AutoStart Execution (T1547) and scheduled tasks (T1053).
  • A recent incident involved a PUA masquerading as a PDF conversion application.
  • The application created a double layer of persistence using both scheduled tasks and Autorun registry keys.
  • OSINT tools identified the application as potentially malicious, leading to its removal.
  • Another customer had previously added a related file hash to an exclusion list, which was later recommended to be removed.
  • Investigations revealed the application was anomalous and not authorized in the customer’s environment.
  • Expert analysis and monitoring are crucial for identifying and responding to threats effectively.

MITRE Techniques

  • AutoStart Execution (T1547): Establishes persistence by executing programs during system boot or logon.
  • Scheduled Task (T1053): Creates scheduled tasks to maintain persistence on the system.
  • Abuse of Browser Extensions (T1176): Malicious extensions can be used for infostealing and other malicious activities.

IoC:

  • [domain] pdfflex.io
  • [file name] FreePDF_49402039.msi
  • [file hash] 9c5d756045fd479a742b81241ccf439d02fc668581a3002913811a341278de43


Full Research: https://levelblue.com/blogs/security-essentials/stories-from-the-soc-registry-clues-to-pdf-blues-a-tale-of-pua-persistence