targeted campaign analysis and tracking · targeted campaign analysis and ... –custom sandbox...

36
TARGETED CAMPAIGN ANALYSIS AND TRACKING Christopher Witter, Sr. Strategic Intrusion Analyst ARE YOU AT THE TIP OF THE SPEAR OR THE BACK OF THE BUS?

Upload: vanmien

Post on 11-Jun-2018

229 views

Category:

Documents


0 download

TRANSCRIPT

TARGETED CAMPAIGN ANALYSIS AND TRACKING

Christopher Witter, Sr. Strategic Intrusion Analyst

ARE YOU AT THE TIP OF THE SPEAR OR THE BACK OF THE BUS?

•Sr. Strategic Intrusion Analyst @ CrowdStrike

• IR Experience

– Defense

– Banking

– Service Providers

•Lifetime InfoSec professional

•Outdoor Enthusiast

2014 Crowdstrike, Inc. All rights reserved. 2

About Me:

•Types of Phishing

•Message Analysis

•Web Link Analysis

•Attachment Analysis

•Campaign Tracking \ Analysis

2014 Crowdstrike, Inc. All rights reserved. 3

Introduction

2014 CrowdStrike, Inc. All rights reserved. 4

2014 CrowdStrike, Inc. All rights reserved. 6

•Message Analysis

•Web link Analysis

•Attachment Analysis

2014 Crowdstrike, Inc. All rights reserved. 7

The Trifecta of Campaign Analysis…

•Subject

•Sender

•Date\Time:

•Recipient

•Sending IP

•Attachment Name

2014 Crowdstrike, Inc. All rights reserved. 8

Message Analysis: Email Header Analysis

•X-mailer

•Return-path

• In-reply-to

•User-agent

•References

•Sender display name

2014 Crowdstrike, Inc. All rights reserved. 9

Message Analysis: More Email Header…

Message Analysis: Email Example

x-rocket-received: from [10.0.0.16] ([email protected] with xymcookie [66.196.81.168]) by

smtp228.mail.gq1.yahoo.com with SMTP; 06 Apr 2014 13:41:19 +0000 UTC

references: <1725641872-1378324123-cardhu_decombobulator_blackberry.rim.net-772162753-

@b28.c7.bise6.blackberry>

mime-version: 1.0 (1.0)

in-reply-to: <1725641872-1378324123-cardhu_decombobulator_blackberry.rim.net-772162753-

@b28.c7.bise6.blackberry>

content-type: text/plain; charset=us-ascii

content-transfer-encoding: quoted-printable

message-id: <[email protected]>

x-mailer: iPhone Mail (11B511)

2014 Crowdstrike, Inc. All rights reserved. 10

x-rocket-received: from [10.0.0.16] ([email protected] with xymcookie [66.196.81.168]) by

smtp228.mail.gq1.yahoo.com with SMTP; 06 Apr 2014 13:41:19 +0000 UTC

references: <1725641872-1378324123-cardhu_decombobulator_blackberry.rim.net-772162753-

@b28.c7.bise6.blackberry>

mime-version: 1.0 (1.0)

in-reply-to: <1725641872-1378324123-cardhu_decombobulator_blackberry.rim.net-772162753-

@b28.c7.bise6.blackberry>

content-type: text/plain; charset=us-ascii

content-transfer-encoding: quoted-printable

message-id: <[email protected]>

x-mailer: iPhone Mail (11B511)

2014 Crowdstrike, Inc. All rights reserved. 11

Message Analysis: Email Example

•Social Cues

•Social Media Analysis

•User Interview

•Links

•Attachments

2014 Crowdstrike, Inc. All rights reserved. 12

Message Analysis: Email Body Analysis

•Drag and Drop Suspicious Emails into a folder/USB

•Strings:

– strings xyzfilename.msg (ASCII Files)

– strings –el xyzfilename.msg (UniCode Files)

•Extracting attachment from msg files

– uudeview –i –p xyzfilename.msg

2014 Crowdstrike, Inc. All rights reserved. 13

Message Analysis: Email Analysis Tricks

•Automatic:

– Virustotal.com

– Urlquery.net

– Custom Sandbox (Cuckoo, Norman, JoeBox, etc…)

•Manual

– Wget & curl

– Thug

2014 Crowdstrike, Inc. All rights reserved. 14

Wicked Web: Web Link Analysis

•OPSEC

•Staffing

•Budget

•Convenience

2014 Crowdstrike, Inc. All rights reserved. 15

Wicked Web: Automatic Analysis tradeoffs…

• Infrastucture

•Processes \ Procedure

•Staffing

2014 Crowdstrike, Inc. All rights reserved. 16

Wicked Web: Manual Analysis tradeoffs…

•Mirror your environment closely

– Use the proxy if you have one (X-forwarded-for)

– set the proper Referer

– Use an appropriate User agent (custom to match your workstations)

•Thug

– Mimic software configurations as closely as possible

– Use delays (people think)

– Use events (people move)

2014 Crowdstrike, Inc. All rights reserved. 17

Wicked Web: Manual Analysis Tips…

•AV \ YARA

•Malwr.com \ Virustotal.com

•Custom Sandbox (Cuckoo, Norman, JoeBox, etc…)

• In house reverse engineer\malware analyst

•ExifTool

2014 Crowdstrike, Inc. All rights reserved. 18

Attachment Analysis:

•ExifTool:

– Supports a ton of file formats (PE, Word, PPT, Excel, PDF…)

– Extracts more than just GPS coords

• Total Edit Time

• Words

• Paragraphs

• Slides

2014 Crowdstrike, Inc. All rights reserved. 19

Attachment Analysis: Metadata Analysis

Attachment Analysis: Metadata Example PPTX

2014 Crowdstrike, Inc. All rights reserved. 20

Attachment Analysis: Metadata Example PDF

2014 Crowdstrike, Inc. All rights reserved. 21

Attachment Analysis: Good or Evil

2014 Crowdstrike, Inc. All rights reserved. 22

Attachment Analysis: Good or Evil

2014 Crowdstrike, Inc. All rights reserved. 23

Attachment Analysis: Good or Evil

2014 Crowdstrike, Inc. All rights reserved. 24

Campaign Tracking

•Why track

•What to track

•How to track

2014 Crowdstrike, Inc. All rights reserved. 25

Campaign Tracking: Why track?

2014 Crowdstrike, Inc. All rights reserved. 26

0

1

2

3

4

5

# H

its

PO59782.rar

Product attention needs.rar

payment slip.zip

pdf.ex_

po_1320.rar

quote.rar

Marketing Copy.pdf

funds release.zip

product sample and invoice.rar

Orders.scr

Campaign Tracking: Why track?

2014 Crowdstrike, Inc. All rights reserved. 27

0123456789

1011121314151617181920212223

# H

its

PO59782.rar

Product attention needs.rar

payment slip.zip

pdf.ex_

po_1320.rar

quote.rar

Marketing Copy.pdf

funds release.zip

product sample and invoice.rar

Orders.scr

•Simple characteristics

– Hashes

– Filename

– VT Detections

– C2 Domains \ IPs

– X-Mailer

– Carrier File type

– Sender \ Recipient

– Theme

– Associated Threat

2014 Crowdstrike, Inc. All rights reserved. 28

Campaign Tracking: What to Track v1.0:

•Advanced characteristics

– Exploits used

– Droppers

– RAT

– Interesting Strings

– Interesting Routines

– Persistence mechanisms

– Domain registry information

2014 Crowdstrike, Inc. All rights reserved. 29

What to Track: What to Track v2.0:

•How did it happen

•Goal of the Campaign

•Detection \ Prevention

2014 Crowdstrike, Inc. All rights reserved. 30

Campaign Analysis:

•User interview

•Social Media Analysis

•Log Analysis

2014 Crowdstrike, Inc. All rights reserved. 31

Campaign Analysis: How did it happen…

•Trends

•Method of Targeting

•Context of the message

2014 Crowdstrike, Inc. All rights reserved. 32

Campaign Analysis: Goal of the Campaign…

This Page Left Intentional Blank

2014 Crowdstrike, Inc. All rights reserved. 33

Campaign Analysis: Detection \ Prevention

2014 CrowdStrike, Inc. All rights reserved. 34

CONTACT ME

EMAIL:

[email protected]

TWITTER:

mr_cwitter

For additional information, please

visit: response.crowdstrike.com/services

Thank You!

2014 CrowdStrike, Inc. All rights reserved. 35