In this February 2022 release, the Splunk Threat Research Team (STRT) focused on comparing currently created living off the land security content with Sigma and the LOLBas project. This provided a way for STRT to review current security content and identify any gaps. With the identified LOLBins that we did not have coverage for, we assessed the in the wild usage today and prioritized those over older novel LOLBins.
Here is a demo of Living Off The Land content:
In February we tagged 73 detections some of them brand new, distributed in a single Analytics Story. We also tagged all prior content with Living Off the Land.
Analytic stories are security use cases supported by our threat research team’s pre-built detections and responses. The following analytic stories focus on monitoring and investigating items that are related to Living Off The Land techniques. Living off the land plays an integral role in an adversaries playbook when landing in an environment. Instead of bringing in applications and new utilities, adversaries use utilities native to the operating system. This provides the adversary the ability to blend in better with native applications, providing flexibility in code execution and process behavior.
Living Off The Land Analytic Story
Name |
Technique |
Type |
TTP |
||
TTP |
||
TTP |
||
TTP |
||
None |
TTP |
|
TTP |
||
Hunting |
||
TTP |
||
TTP |
||
Hunting |
||
TTP |
||
TTP |
||
TTP |
||
TTP |
||
Hunting |
||
TTP |
||
TTP |
||
TTP |
||
TTP |
||
TTP |
||
TTP |
||
TTP |
||
TTP |
||
Detect Rundll32 Application Control Bypass - advpack |
TTP |
|
TTP |
||
TTP |
||
TTP |
||
TTP |
||
LSASS Memory, OS Credential Dumping |
TTP |
|
Hunting |
||
Bypass User Account Control, Abuse Elevation Control Mechanism |
TTP |
|
MacOS LOLbin |
TTP |
|
TTP |
||
TTP |
||
TTP |
||
Services Registry Permissions Weakness, Hijack Execution Flow |
TTP |
|
Anomaly |
||
Anomaly |
||
TTP |
||
Hunting |
||
TTP |
||
TTP |
||
TTP |
||
TTP |
||
TTP |
||
TTP |
||
TTP |
||
TTP |
||
TTP |
||
TTP |
||
TTP |
||
TTP |
||
TTP |
||
TTP |
||
TTP |
||
Masquerading, Trusted Developer Utilities Proxy Execution, Rename System Utilities |
Hunting |
|
TTP |
||
Masquerading, Trusted Developer Utilities Proxy Execution, Rename System Utilities, MSBuild |
TTP |
|
Masquerading, Trusted Developer Utilities Proxy Execution, Rename System Utilities, MSBuild |
TTP |
|
TTP |
||
TTP |
||
TTP |
||
TTP |
||
TTP |
||
Anomaly |
||
TTP |
||
TTP |
||
Masquerading, Rename System Utilities, Signed Binary Proxy Execution, InstallUtil |
TTP |
|
TTP |
||
TTP |
||
TTP |
||
TTP |
||
Bypass User Account Control, Abuse Elevation Control Mechanism |
TTP |
All of the previously listed detections create entries in the risk index by default, and can be used seamlessly with risk notables and the Risk Notable Playbook Pack. The following community Splunk SOAR playbooks below can also be used in conjunction with some of the previously described analytics:
Playbook |
Description |
Investigate an internal *nix host using SSH. This pushes a bash script to the endpoint and runs it, collecting generic information about the processes, user activity, and network activity. This includes the process list, login history, cron jobs, and open sockets. The results are zipped up in .csv files and added to the vault for an analyst to review. |
|
Performs a general investigation on key aspects of a windows device using windows remote management. Important files related to the endpoint are generated, bundled into a zip, and copied to the container vault. |
|
This playbook acts upon events where a file has been determined to be malicious (ie webshells being dropped on an end host). Before deleting the file, we run a “more” command on the file in question to extract its contents. We then run a delete on the file in question. |
Living Off The Land binaries are nothing new, however they continue to be abused, as they provide expedite means of executing actions against compromised hosts without triggering protections (LOLBins are native to operating system or downloaded from Microsoft).
Many of these actions such as compiling or executing code, pass through execution, UAC bypass, file operations such as download, copy or upload among others can provide native tools for an attacker to operate through compromised hosts. It is important for analysts to have tools that provide them visibility and monitoring capabilities that can help address any possible threats from the abuse of living off the land binaries.
For a full list of security content, check out the release notes on Splunk Docs
You can find the latest content about security analytic stories on GitHub and in Splunkbase. Splunk Security Essentials also has all these detections now available via push update.
Any feedback or requests? Feel free to put in an issue on GitHub, and we’ll follow up. Alternatively, join us on the Slack channel #security-research. Follow these instructions If you need an invitation to our Splunk user groups on Slack.
We would like to thank the whole threat research team Jose Hernandez, Teoderick Contreras, Rod Soto, Bhavin Patel, Mauricio Velazco, Michael Haag, Lou Stella, Eric McGinnis, and Patrick Bareiss for their contribution to this release.
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.