I’ve been saving some things up in this draft blog post, adding new things, removing some older stuff that, after a few days, didn’t quite hit the same as when I first read them. Most who know me know that I’m not so much about just dropping a link, as sharing my why for dropping the link. Dropping a list of links on a weekly or monthly basis is great, but sharing fewer links along with thoughts and perspective as to why seems to me to much more intentional and engaging.
File Formats
I ran across this LinkedIn post a bit ago, and it caught my attention because it had to do with revision history in the Word docs, based on the current file format. That LinkedIn post led to this blog post, which provides a really good demonstration of how to access revision save identifiers (RSIDs) within the new(er) DOCX file format. This is pretty interesting; while it does not include timestamp information, it can be correlated with other data to demonstrate when/by whom MSWord was launched and the document opened, likely providing some indicators of when the document may have been modified.
In a lot of ways, this is similar to the issue found with the Blair document in 2003, where the older OLE/structured storage style .doc files retained a bit different, but no less damning revision information. Along similar lines, I’ve been working on a file metadata/”slack” space within files/deleted record blog post for a bit, one that I hope will one day be published. 😉
Note that in the DOCX blog post, the author (Ross) also references “previous research” regarding plagiarism detection using RSIDs. Be sure to read that research thoroughly, as well, to develop a better understanding of the artifact. One of the issues we tend to see historically with artifacts (re: ShimCache, AmCache, etc.) is too few analysts going for the “easy win” (i.e., “…<artifact> demonstrates program execution…”) without understanding the nuances of the artifact, and not reading the published and available research on the artifact.
XstReader
BeerCow recently forked/updated XstReader to handle larger files, so if you’re in need of parsing OST/PST files, take a look at this tool. I personally haven’t had a need to parse such files lately; when I did, there were other tools available, and usually involved extracting just an email or two, or someone simply posted a screen capture of their tool output.
In 2008 or so, when I first released RegRipper, someone asked me to have it parse PST files, so…if you’re still out there…here, try this tool instead. 😉
Bad Affiliates
Apparently, not long ago, some ransomware RaaS groups got together and agreed to “out” bad affiliates.
In Feb 2006, I read Brian Krebs’ article about a hacker/botherder known as “0x80”, and later that year, I heard about the USSS presentations regarding credit card theft and “carder planet”, and specifically how the cybercrime eco-system was structured. Since then, we’ve read reporting as to how ransomware threat actors have followed a similar evolution, starting out managing the entire ransomware attack life cycle, to breaking apart and compartmentalizing various aspects of the attacks as a means of monetization. Instead of managing the entire life cycle the way we saw Samas do it in 2016, some (albeit not all) ransomware groups have opted to move to a Ransomware-as-a-Service (RaaS) model, allowing affiliates to engage with initial access brokers (IABs), steal data, deploy ransomware, and profit. Some RaaS groups have reportedly also provided legal services to assist affiliates in determining the value of the stolen data.
Now, there seems to be an effort to add a “Yelp-for-affiliates” aspect to the model, almost like rating your ride-share driver. And why not? If you, as a RaaS, say your ransomware will not be deployed against, say, hospitals and some affiliate hits a hospital, your brand is damaged.
Artifacts
Arun has been posting on his blog recently, and as of this writing, has 3 articles up (maybe more by the time I finally hit the ”
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: