meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

ISC StormCast for Tuesday, October 30th 2018

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 30 October 2018

⏱️ 6 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. PowerShell Cloning Maldoc; Unusual Malicious File Types; Crypto Tracker Backdoor

Transcript

Click on a timestamp to play from that location

0:00.0

Hello, welcome to the Tuesday, October 30th, 2018 edition of the Sandton and Storm Center's Stormcast.

0:07.3

My name is Johannes Ulrich, and I am recording from Denver, Colorado.

0:13.1

PowerShell is not just a great tool for Windows system administrators, but of course, Malver authors

0:19.6

also have discovered how useful it is and how it can be abused.

0:24.6

So then again, to fight this trend, we have a lot of tools that try to monitor what PowerShell is doing.

0:32.6

It appears that some Malver authors are now again trying to counter these countermeasures.

0:40.7

And in one example that DDA has looked at, it looks like that one way they're trying to

0:47.8

actually accomplish this is by just creating a renamed copy of PowerShell.

0:55.0

So in this example, they used a Visual Basic Macro in order to copy the complete PowerShell folder.

1:02.0

That way they can rename PowerShell, and then they're not no longer calling PowerShell itself,

1:09.0

but instead a random named binary that it turns out to be

1:14.0

this copy of PowerShell. As the DAE points out, it's actually a little bit questionable how

1:19.6

effective this strategy is. Since this is still the original legitimate PowerShell binary,

1:25.7

it will create all the usual log events and such that you're used to from PowerShell binary, it will create all the usual log events and such that

1:30.2

you're used to from PowerShell. So as a result, well, it may actually send the same alerts

1:36.7

or trigger the same alerts that the original copy would have sent. The other part to this

1:42.5

is if someone sees PowerShell running, they may actually

1:47.0

be not really all that suspicious, but if they're pulling up their process explorer and they're

1:53.1

seeing this random string of letters instead of PowerShell, this may actually raise more alerts,

2:00.5

not less.

2:02.0

So not sure how useful this technique is, but certainly something to look out for if you

2:06.9

all of a sudden see a copy of PowerShell running under a different name.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.