Incident Response Training Course, Malicious Document Analysis, Day 15

preview_player
Показать описание
In this full series we will talk about Incident Response and it will be a Free Training Course for everyone. Today is Day-15 and I will show you how can you analyze a malicious document file which might come to you via any incident/report or by any means. If you are upladoing them for a analysis in VirusTotal/JoeSandbox or any online Sandbox tool, that's a BIG NO! You have to learn the skills to analyze these files manually inhouse. You can create automation workflow out of it, but that should be done inhouse.

So, in this episode, I will show you from scratch how can you analyze one such document to identify what are the static properties of it, how can you easily extract IOCs/IOAs to take immediate action and how can you even understand what are the probable TTPs of that document, if any macro is hidden on it or not.

WATCH BELOW Playlists as well, if you want to make your career in DFIR and Security Operations!!
-------------------------------------------------------------------------------------------------------------------------


Timelines
-------------------------------------------------------------------------------------------------------------------------
0:00 ⏩ Introduction
1:09 ⏩ Identify static properties
3:46 ⏩ Load the file in VM
10:36 ⏩ Decode PowerShell Code
16:01 ⏩ Any other IOC?
19:09 ⏩ Summarize

📞📲
FOLLOW ME EVERYWHERE-
-------------------------------------------------------------------------------------------------------------------------
✔ Twitter: @blackperl_dfir

SUPPORT BLACKPERL
-------------------------------------------------------------------------------------------------------------------------
╔═╦╗╔╦╗╔═╦═╦╦╦╦╗╔═╗
║╚╣║║║╚╣╚╣╔╣╔╣║╚╣═╣
╠╗║╚╝║║╠╗║╚╣║║║║║═╣
╚═╩══╩═╩═╩═╩╝╚╩═╩═╝
➡️ SUBSCRIBE, Share, Like, Comment

-------------------------------------------------------------------------------------------------------------------------
🙏 Thanks for watching!! Be CyberAware!! 🤞
Рекомендации по теме
Комментарии
Автор

In this full series we will talk about Incident Response and it will be a Free Training Course for everyone. Today is Day-15 and I will show you how can you analyze a malicious document file which might come to you via any incident/report or by any means. If you are upladoing them for a analysis in VirusTotal/JoeSandbox or any online Sandbox tool, that's a BIG NO! You have to learn the skills to analyze these files manually inhouse. You can create automation workflow out of it, but that should be done inhouse.

So, in this episode, I will show you from scratch how can you analyze one such document to identify what are the static properties of it, how can you easily extract IOCs/IOAs to take immediate action and how can you even understand what are the probable TTPs of that document, if any macro is hidden on it or not.


WATCH BELOW Playlists as well, if you want to make your career in DFIR and Security Operations!!



Timelines

0:00 ⏩ Introduction
1:09 ⏩ Identify static properties
3:46 ⏩ Load the file in VM
10:36 ⏩ Decode PowerShell Code
16:01 ⏩ Any other IOC?
19:09 ⏩ Summarize


📞📲
FOLLOW ME EVERYWHERE-

✔ Twitter: @blackperl_dfir

SUPPORT BLACKPERL

╔═╦╗╔╦╗╔═╦═╦╦╦╦╗╔═╗
║╚╣║║║╚╣╚╣╔╣╔╣║╚╣═╣
╠╗║╚╝║║╠╗║╚╣║║║║║═╣
╚═╩══╩═╩═╩═╩╝╚╩═╩═╝
➡️ SUBSCRIBE, Share, Like, Comment


🙏 Thanks for watching!! Be CyberAware!! 🤞

BlackPerl
Автор

learning so much from this playlist. sharing it with all my network.

nitroxicated
Автор

Quick and Smart steps. Fiddler is a new addition to the arsenal.

futurebuddies
Автор

Its a great video and i love it.. thank you for that dude and i had a query here.
You have mentioned in the last that to use this 267.exe ioc in the edr or av to stop this threat but what if the attacker has changed the name from 267.exe to someother so how can we catch that now… because there is no hash value right so is there any chance of capturing that ioc in other ways other than name..

mohanveeradurgarao
Автор

This is great.
Please make a Video or series for creating rules in QRADAR.

Thanks

narendermahur
Автор

Great video as always Archan! I have a question for you. In a real life corporate scenario where a user has received an email with a suspicious attachment, how do you recommend moving this particular attachment to the malware analysis sandbox without using a memory stick, email, or opening ports?

samwebb
Автор

loved it. was waiting to see the usage of the tools from vm lab.

zivakhan
Автор

Can you make on videos where computers are already compermised like ransomware or exchange server proxy login compermise. And client is new to you. You do not have any control yet. How you will start IR in this scenario.

cyberwarriorall
Автор

excellent content. fiddler is really a nice tool to intercept traffic.

jamescullins
Автор

every time blackperl says "this particular sucker" i smile xD

manfrombritain
Автор

Dada pls provide this sample for practice

sayankumardey