meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Monday, May 8th, 2023

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 8 May 2023

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. Decoding PPAMs; Exploratory Analysis; Colorcpl.exe LOLBIN; Leaked MSI Keys; PHP Packages Compromised;

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Monday, May 8, 2003 edition of the Sand and its Stormontas Stormcast.

0:08.1

My name is Johannes Ulrich, and today I'm recording from Jacksonville, Florida.

0:14.1

We've got a number of interesting diaries to talk about from this weekend.

0:18.6

The last one was one by D.D. where he's taking part, a revenge rat,

0:24.7

a PPM file. PPM, these are these PowerPoint macros that are sometimes used for malware.

0:32.8

This particular sample came from Malware Bazaar, but the reason did he pick the sample because it nicely

0:38.9

showcased how the built-in decoders and other decoders that are sort of part of the DDA's

0:45.8

tool set can be used in order to not just extract the malicious content here, but also quickly

0:52.6

decoded.

1:02.1

And if you're looking for some good datasets in order to test your analysis tools, Russ has a nice diary about the use of the cyber attack database.

1:05.5

That's something maintained by the University of Maryland.

1:10.9

And then he sort of shows how various tools can be used to basically make sense of that data.

1:19.0

It's the first of a two-part diary, so the second part will hopefully come soon and give you a little bit sort of an idea about what different

1:28.0

tools can do with this kind of data. Living off the land still alive and well, the latest

1:36.1

example comes from Renato and this was Friday's diary. Renato noticed the use of colorcpl.e.e. being used. As typical for living

1:49.3

of the land techniques, colorcpl.l.exe is a normal Windows binary. It's used for color management.

1:57.2

So why are attackers interested in it? Well, apparently it is used as a replacement for good old copy.

2:05.1

The destination directory is always the System 32 spool driver's color directory,

2:12.3

so probably also a good place to sort of tuck away dangerous binaries.

2:17.7

But other than that, no-proage escalation here,

2:20.8

probably just trying to sort of hide the use of the copy command,

2:25.7

which may trigger under some circumstances.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.