
$win2003_win7_u1 = "svchost.exe" wide nocase Not ( $upd_magic at 0 ) and not 1 of ( $win * ) and filename matches /iexplore\.exe/isĭescription = "Abnormal svchost.exe - typical strings not found in file" $win2003_win7_u4 = "varfileinfo" wide fullword nocase $win2003_win7_u3 = "translation" wide fullword nocase

$win2003_win7_u2 = "Internet Explorer" wide fullword $win2003_win7_u1 = "IEXPLORE.EXE" wide nocase It is not ready yet but I’ll inform you as soon as there is something to show.įollow me on Twitter via Smart DLL execution for Malware Analysis in Sandbox Systemsĭescription = "Abnormal iexplore.exe - typical strings not found in file" I hope you enjoyed the article and found it inspiring even if you don’t use Splunk or the other mentioned tools.īesides: I am working on a RESTful web service with the working title “TRON” that allows to query for threat intel indicators and supports different comparison modes including including the missing “contains” supporting OpenIOC and STIX as input files. I’ll improve the Threat Intel Receivers in the coming weeks and add the “–siem” option to the MISP Receiver as well.

This is no problem in case of the C2 server definitions but for the filename definitions, which can be e.g. The only small downer is that Lookups can only be used for “equal” matches and don’t allow to search for elements that “contain” certain fields of the CSV file. The two other files create by the threat intel receiver contain information on filenames and C2 server (hostnames, IPs) that can be applied in a similar way. (avoid realtime searches/alerts in Splunk)įurthermore the threat intel receiver should be scheduled via cron in order to run hourly/daily. I would define this search as an “Alert” that runs every 15 minutes and searches in log data of the last 15 minutes in order to get immediately informed if a blacklisted executable had been used. This weekend I added a new option called “–siem” that instructs the receiver to generate a CSV file with header line and the correct format for a lookup definition in Splunk. One of them fetches all IOC (indicator of compromise) elements from AlienVault’s Open Threat Exchange platform OTX and saves them to a subfolder in the LOKI program folder in order to be initialized during startup.
Osk exe command line parameters free#
I recently integrated two different threat intel receivers in my free IOC scanner LOKI. In this article I would like to describe a method to apply threat intel information to log data in Splunk using simple lookup definitions.

Therefore one of the main tasks of security monitoring today is to combine these different data sources, which means to apply the threat intel information to the data that is already available in SIEM systems or scan for it on-demand using tools like my free IOC scanner LOKI or our APT Scanner THOR. On the other hand they receive threat information from different sources like APT reports, public or private feeds or derive those indicators from their own investigations and during incident response. On the one hand they collect log data from different sources and try to correlate them in a useful way in so-called SIEM systems. Today most security teams have access to a lot of different information sources.
