4.9 • 696 Ratings
🗓️ 27 June 2022
⏱️ 8 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Monday, June 27, 22 edition of the Sands and the Storm Center's Stormcast. |
0:07.9 | My name is Johannes Ulrich, and then I'm recording from Stockholm, Germany. |
0:13.6 | You had a couple of interesting diaries over the weekend. |
0:17.6 | Let me start with Xavier that analyze an interesting Python script that actually uses |
0:24.7 | Python GUI libraries in order to interact with the user. I personally suspect that this may be done |
0:31.9 | to make reverse analysis more difficult by adding that user interaction. The script will display a brief notice to ask the user to click that notice. |
0:43.3 | Now once the user clicks per web browser is being opened and the predetermined web page is loaded. |
0:51.3 | Likely malicious in this particular sample, that page was not available. Could be a |
0:58.0 | fishing page, could be some additional malware. The idea here may be that by adding that |
1:05.4 | user interaction, any automated script analyzing this particular malware, like running in a sandbox or such, |
1:12.5 | may not be able to interact with it so the malware doesn't run and the analysis fails. |
1:20.1 | I've got sort of a second interesting diary with PowerShell scripts again, |
1:25.1 | where the malicious PowerShell script is actually passed to PowerShe |
1:30.1 | via the clipboard uses the clip.e.exe binary that comes with Windows in order to copy standard |
1:41.1 | out to the clipboard, and then this clipboard essentially being executed using |
1:47.0 | PowerShell. Reasoning behind, this trick is likely to avoid writing anything to a file, so |
1:54.0 | that way you're able to again evade some analysis. Now, a lot of anti-malware tools are looking at memory, but think about it from an instant |
2:04.1 | response point of view. |
2:05.6 | You will not be able to recover that data that was briefly written to memory if you discover |
2:14.9 | this compromised system. |
2:17.8 | And then some other interesting tricks here to interact with web applications, |
2:23.1 | in particular in order to bypass some two-factor or a multi-factor authentication scheme. |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.