Starting with just one successful phishing email, an attacker can quickly hide, pivot, persist, and exfiltrate from our networks. Shouldn’t our defensive systems have the same level of flexibility and automation?
Martin Ohl from McAfee answered those questions and more when he submitted this playbook to the Phantom Community. The playbook allows us to leverage McAfee Advanced Threat Defense (ATD), McAfee OpenDXL, and a suite of other McAfee and non-McAfee products for a wide-ranging investigation using both on-premises and cloud services.
The use case behind this playbook involves a suspected phishing email attachment as the trigger, but the same investigation workflow could be used for any potentially malicious file found entering the network, such as a file uploaded or downloaded using HTTP(S) or FTP, a file transferred in on a USB stick, or a file on a computer that is joining the network.
This first step is what allows us to do more than just hunt for other observations of the attachment file hash. McAfee ATD attempts to unpack the file, record any intermediate hashes as it mutates and expands, and extract any IP addresses used during execution. At the end, we get a verdict that is crucial to understanding how likely it is that the file is malicious. We use that to determine whether we should continue our investigation, because we are assuming that investigating every file attachment will lead to too many false positives.
If the ATD verdict indicates a malicious attachment, we launch into a wide array of investigative actions. The IP addresses are investigated with geolocation and reputation services to enrich our understanding of how they are used. The hashes observed by ATD are used to do an internal hunt using McAfee Active Response (MAR). MAR looks for the hashes in filesystems, Windows registries, network traffic, and live processes. Any sightings are used to create informative tickets for further analysis and remediation.
The OpenDXL actions used in this playbook are highly-flexible integration points. The way those messages are received and used will vary depending on what is on the other side of the message bus. For example, if McAfee Threat Intelligence Exchange (TIE) is used to ingest the hashes and IP addresses sent out from this playbook then the TIE policy will be compared against the indicator to determine the appropriate response. Any number of other McAfee or non-McAfee systems could also be listening on the OpenDXL message bus.
McAfee Advanced Threat Defense (ATD)
This playbook was designed to be set to active mode and run automatically when a potential phishing email with an attachment is ingested with the label “Email.” Other types of file ingestions would require minor playbook changes.
Note that this is an example playbook. As mentioned earlier, you can easily customize this playbook to cover additional use cases and tailor the workflow to your needs.
You can download this playbook from either the Phantom Community or access it via the Phantom Platform. The platform automatically synchronizes Phantom Community Playbooks to your installation, if configured. If you don’t currently use the Phantom Platform, we invite you to download the free Community Edition today.
----------------------------------------------------
Thanks!
Philip Royer
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.