11/26/2024 | News release | Distributed by Public on 11/26/2024 13:26
Introduction
In today's cyber threat landscape, proactive approaches such as threat hunting have become key in any organization's defense strategy, identifying and tackling threats before they become an incident.
That is why Qualys is delighted to introduce Advanced Hunting, our threat-hunting functionality in the Endpoint Detection and Response (EDR) platform that allows security teams to actively search for potential threats, identify potential breaches, and uncover malicious activities that might have bypassed traditional detection methods. To further streamline the hunting process, our Threat Research Unit has developed a set of curated, predefined hunting queries, allowing teams to jump-start their investigations with insights based on the latest threat intelligence.
Qualys EDR Advanced Hunting
Advanced Hunting is based on Qualys Query Language (QQL). It provides an expressive and flexible way for analysts to perform various operations like Search by Field, String matching, Exact matching, Full Text Search, etc.
This blog explores Advanced Hunting and how it empowers cybersecurity professionals to enhance their environment's overall security.
Qualys's TRU offers a curated collection of custom pre-built hunting queries tailored to hunt for trending threats, MITRE ATT&CK TTPs, and common use cases. These queries help analysts search for anomalies in their endpoints and eliminate potential threats.
Advanced Hunting is located at Qualys > Endpoint Detection and Response > Hunting > Advanced Hunting. In the next section, we will briefly examine advanced hunting in action while investigating a ransomware attack.
Use-Case: Investigation using Advanced Hunting
The following scenario elaborates on how hunting queries can be used. The malware is executed in the Qualys Research Environment in "Detect Only" mode to capture relevant events.
An analyst ran a predefined advanced hunting query - "Registry Run Keys Modification" and found a suspicious registry modification.
The Process Tree of this event shows "powershell.exe" has created this registry entry with the following arguments -
Thus, using Advanced Hunting, we have identified the threat and its activities. The user can explore further and find more information about the threat using Advanced Hunting.
Hunting and documenting help us piece together attacker activity like the one below.
Hunting Queries Examples
In this section, we have listed some examples of hunting queries:
1. Processes or Executables: Querying for a specific process that is running on certain endpoints.
2. Suspicious PowerShell Scripts: Query that can help detect the execution of encoded PowerShell commands that might indicate potential compromise.
3. Scheduled Task Created: Search for abnormal scheduled tasks created in system that point to temp. This may suggest an attacker is trying to maintain persistence on the system after initial access.
4. File Hashes: Searching for known malicious hash values (MD5, SHA256) across all endpoints.
5. Network Connections: Identify endpoints that have made suspicious outbound connections to suspicious IP addresses.
6. Winlogon registry Changes: Detecting unusual changes in the Windows Registry that could be malware persistence.
7. System Information Discovery: Query for commands that are used for getting system information in the last 24 hours.
8. Inhibit System Recovery: Identify deletion of Shadow Copy using VSSAdmin
9. Archive Collected Data: Data is archived using utilities like 7z, WinRAR, etc.
10. Suspicious File Downloads via Curl: Detects the execution of curl.exe with arguments indicative of file downloads, often used in malicious activities for downloading files.
Conclusion
Qualys' Advanced Hunting offers a powerful approach for identifying and responding to emerging threats in real time. With curated, predefined hunting queries created by our Threat Research Unit, security teams can quickly and effectively launch targeted investigations, maximizing the efficiency and impact of their threat-hunting efforts. By enabling teams to proactively search for and address potential risks, Advanced Hunting enhances incident response capabilities and helps prevent costly security breaches. Advanced hunting within the Qualys EDR platform is an invaluable tool for organizations seeking a proactive and flexible approach to endpoint security.
Contributors
Related