Skip to main content

Carbon Black Response: Intel Tester


In this blog post, I’m releasing another tool for Carbon Black Response called “CBR: Intel Tester”. This is a very simple script that takes a list of Carbon Black Response queries and a specified start time as arguments inside the config.json file. The script will then take each query and run a daily search in CBR starting from the specified start time until it reaches the day you executed the script. I usually set the start date to 30-45 days prior, but it all depends on your CBR setup for retention. The output of this script yields a file called metrics.csv, which is a pipe separated file, showing the following results:

  • Date the query was run
  • Total results for the query for the date it was run
  • The query
  • Title of the query
  • Query description
  • Query reference link


When you run the script, you will see some standard out, including the name of the query running, the date the query pulled data and the CBR query. Below shows two separate outputs during script execution.
Standard output for the query "powershell usage"

Standard output for the query "jp cert reconnaissance"

Currently, the script is single threaded, so depending on the number of queries you have, the script may take a while. After completion, your output file should look like the following:



Example output for metrics.csv

We can review this output file in its current form, but most of the time I create a bar chart for the query of interest or a pivot table to identify any potential anomalies. Let’s check out the bar chart first. I will use the example query provided in the Intel Tester GitHub project (see the
config.json file for other examples) named jp_cert_spread_of_infection.

Daily results for the query "Spread of Infection"

We can see that within our current Carbon Black Response instance, this query has a handful of results on some days while zero results on others. The second example, we take the results of all the queries and create a pivot table to see the results together.

The results vary depending on the queries you use, but simple questions like “How frequent is powershell used in my organization and on which days?” or “What days is this user account running the process evil.exe?” or “How often is a specific user account active based on process executions”. We won’t get into stacking the results, as that topic needs its own blog post ;).

I hope this script comes in use for those using Carbon Black Response. Happy Hunting!

Acknowledgements

Special thanks to Mike Scutt (@OMGAPT), Jason Garman and the CB team for all the help.

Comments

Popular posts from this blog

Revealing malware relationships with GraphDB: Part 1

In this post, we will learn how using a Graph Database like Neo4j can help visualize malware relationships and extend these relationships to identify patterns between samples. Before we dig into Neo4j, let’s start with some fundamental graph terminologies:   
Nodes represent entities such as a human, car, laptop or phone. Properties are attributes nodes can contain. A steering wheel or tires would be a property of the “car” node. Labels are a way to group together nodes of a similar type. For example, a label of “FastFood” may include nodes such as “Taco Bell, McDonald’s, and Chipotle”. Edges (or vertices) represent the relationship connection between two nodes. Relationships can also have their own properties. Getting started with Neo4jLink: https://neo4j.com/
Neo4j is a Graph Database commonly known for its pure simplicity and easy to use interface. I find the structure of a graph database quite fascinating, on top of learning how to normalize malware analysis data for each sample into a …

Analyzing and detecting web shells

Of the various pieces of malware i’ve analyzed, I still find web shells to be the most fascinating. While this not a new topic, i've been asked by others to do a write up on web shells, so here it is ;). 
For those new to web shells, think of this type of malware as code designed to be executed by the web server - instead of writing a backdoor in C, for example, an attacker can write malicious PHP and upload the code directly to a vulnerable web server. Web shells span across many different languages and server types. Let's take a looks at some common servers and some web extensions:
Operating System Service Binary Name Extensions Windows IIS (Internet Information Services) w3wp.exe .asp/.aspx Windows/Linux apache/apache2/nginx httpd/httpd.exe/nginx .php Windows/Linux Apache Tom

Introduction to Malware Analysis

Why malware analysisMalware analysis (“MA”) is a fun and excited journey for anyone new or seasoned in the career field. Taking a specimen (malware sample) and reverse engineering it to better understand its inner workings can be a long, tedious adventure. With the sheer number of malware samples circulating the internet, in addition to the various formats specimens are found in, makes malware analysis a good challenge. Outside of learning MA as a hobby, here are some other reasons why we perform malware analysis:To better understand how a specimen works. This may yield certain unique attributes about how the malware was written, methods it performs or its dependencies.To collect intelligence and build Indicators of Compromise (“IOCs”), usually comprised of Host Based Indicators (“HBIs”) and/or Network Based Indicators (“NBIs”).For general knowledge or research purposes.How do I get started?!If you’re new to malware analysis, you want to ensure you’ve taken the right precautions befor…