Skip to content

Conversation

@car062636
Copy link

@car062636 car062636 commented Apr 29, 2020

I have added a new signature for Windows, this signature is based on https://car.mitre.org/analytics/CAR-2013-03-001/ which is an Analytic, it will be triggered when the built-in utility reg.exe is called from the command shell. According to CAR, I completed a signature code which can traverse the processtree by DFS to capture the reg.exe call from command shell event. 

I have verified this signature by the following method. First, I created a Windows application that adds a registry key by calling reg.exe from the cmd.exe and downloaded Sysmon to record its event log.
Secondly, by checking the event log manually, I confirmed that my windows application can trigger the analytic CAR-2013-03-001. After getting the cuckoo report of this application, I found that the processtree in the report indicates this analytic should have been triggered during the execution of the application.
I also tested my signature on the malware sample(MD5:b5d77d9e5a93848aaf59cd6115e54732)which contains the behavior of query the registry.   The cuckoo new recorded report shows that my signature can capture this event correctly.
擷取

What did you create/change?
I have added a new signature for windows, this signature is based on https://car.mitre.org/analytics/CAR-2013-03-001/ which is an Analytic, it will be triggered when the built-in utility reg.exe is called from the command shell. According to CAR, I completed a signature code which can traverse the processtree by DFS to capture the reg.exe call from command shell event. 

What is the goal of this addition/change?
I want to integrate the analytics of Cyber Analytics Repository into the Cuckoo report, but the analytics are based on the sensor like Sysmon, so I should map the event recorded by these sensors to the cuckoo report.

Did you test your addition/change?
I have verified this signature by the following method. First, I created a Windows application that adds a registry key by calling reg.exe from the command shell and downloaded Sysmon to record its event log. 
Secondly, by observing the event log manually, I confirmed that my windows application can trigger the analytic CAR-2013-03-001. After getting the cuckoo report of this application, I found that the processtree in the report indicates this analytic should have been triggered during the execution of the application. I also tested my signature on the malware sample(MD5:b5d77d9e5a93848aaf59cd6115e54732)which contains the behavior of query the registry.  
Thirdly, I submit these samples again, the cuckoo new recorded report shows that my signature can capture this event correctly.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant