Interpreting the action tables and execution graphs

Action tables and execution graphs show 15 days of telemetry associated with each detection made by advanced protection. This telemetry shows the actions taken by the programs involved in an attack. A certain degree of technical knowledge is necessary to be able to extract activity patterns and key information in each situation.

The following section provides some basic guidelines to interpret the action tables with some real-life examples of threats.

The names of the threats indicated herein might vary across security vendors. We recommend that you use a hash to identify malware.

Example 1: Trj/OCJ.A malware activity

The Details tab provides key information about the malware found. In this case, the most important data is as follows:

  • Threat: Trj/OCJ.A

  • Computer: XP-BARCELONA1

  • Detection path: TEMP|\Rar$EXa0.946\appnee.com.patch.exe

Activity

The Activity tab shows a number of actions because Advanced EDR was configured in Hardening mode and the malware already resided on the computer when Advanced EDR was installed. The malware was unknown at the time of running.

Hash

Use the hash string to obtain more information on sites such as VirusTotal and get a general idea of the threat and how it works.

Detection path

The path where the malware was detected for the first time on the computer belongs to a temporary directory and contains the 'RAR' string. Therefore, the threat comes from a RAR file temporarily uncompressed into the directory, and which resulted in the appnee.com.patch.exe executable.

Activity tab
Step Date Action Path

1

3:17:00

Is created by

PROGRAM_FILES|\WinRAR\WinRAR.exe

2

3:17:01

Is run by

PROGRAM_FILES|\WinRAR\WinRAR.exe

3

3:17:13

Creates

TEMP|\bassmod.dll

4

3:17:34

Creates

PROGRAM_FILES|\Adobe\ACROBAT 11.0\Acrobat\AMTLIB.DLL.BAK

5

3:17:40

Modifies

PROGRAM_FILES|\Adobe\ACROBAT 11.0\Acrobat\amtlib.dll

6

3:17:40

Deletes

PROGRAM_FILES|\ADOBE\ACROBAT 11.0\ACROBAT\AMTLIB.DLL.BAK

7

3:17:41

Creates

PROGRAM_FILES|\Adobe\ACROBAT 11.0\Acrobat\ACROBAT.DLL.BAK

8

3:17:42

Modifies

PROGRAM_FILES|\Adobe\ACROBAT 11.0\Acrobat\amtlib.dll

9

3:17:59

Runs

PROGRAM_FILES|\Google\ Chrome\Application\chrome.exe

List of actions performed by Trj/OCJ.A

Steps 1 and 2 indicate that the malware was uncompressed by WinRAR.exe and run from that program. The user opened the compressed file and clicked its binary.

After being run, in step 3 the malware created a DLL file (bassmod.dll) in a temporary folder, and another one (step 4) in the installation directory of the Adobe Acrobat 11 program. In step 5, it modified an Adobe DLL file, to take advantage perhaps of a program vulnerability.

After modifying other DLL files, it launched an instance of Google Chrome which is when the timeline finishes. Advanced EDR classified the program as a threat after that string of suspicious events and stopped its execution.

The timeline shows no actions on the Windows registry, so it is very likely that the malware is not persistent or was not able to modify the Windows registry to make sure it could survive a computer restart.

The Adobe Acrobat 11 software was compromised, so a reinstall is recommended. Thanks to the fact that Advanced EDR monitors both goodware and malware executables, the execution of a compromised program is detected as soon as it triggers dangerous actions, and is blocked.

Example 2: Communication with external computers by BetterSurf

BetterSurf is a potentially unwanted program that modifies the web browser installed on user computers, injecting ads in the web pages they visit.

The Details tab provides key information about the malware found. In this case, it shows this data:

  • Name: PUP/BetterSurf

  • Computer: MARTA-CAL

  • Detection path: PROGRAM_FILES|\VER0BLOCKANDSURF\N4CD190.EXE

  • Dwell time: 11 days 22 hours 9 minutes 46 seconds

Dwell time

In this case, the dwell time is very long: The malware remained dormant on the customer network for almost 12 days. This is increasingly normal behavior and can be due to various reasons. For example, the malware did not carry out any suspicious actions until very late, or the user downloaded the file but did not run it at the time. In any case, the threat was unknown to the security service, so there was no malware signature to compare it to.

Activity tab
Step Date Action Path

1

3/8/2015 11:16

Is created by

TEMP|\08c3b650-e9e14f.exe

2

3/18/2015 11:16

Is created by

SYSTEM|\services.exe

3

3/18/2015 11:16

Loads

PROGRAM_FILES|\VER0BLOF\N4Cd190.dll

4

3/18/2015 11:16

Loads

SYSTEM|\BDL.dll

5

3/18/2015 11:16

Communicates with

127.0.0.1/13879

6

3/18/2015 11:16

Communicates with

37.58.101.205/80

7

3/18/2015 11:17

Communicates with

5.153.39.133/80

8

3/18/2015 11:17

Communicates with

50.97.62.154/80

9

3/18/2015 11:17

Communicates with

50.19.102.217/80

List of actions performed by PUP/BetterSurf

In this case, you can see how the malware communicated with different IP addresses. The first address (step 5) is the infected computer itself, and the rest are external IP addresses to which it connected through port 80 and from which the advertising content was probably downloaded.

The main preventive measure in this case should be to block those IP addresses in the corporate firewall.

Before adding rules to block IP addresses in the corporate firewall, you should consult those IP addresses in the associated RIR (RIPE, ARIN, APNIC, etc.) to see the networks to which they belong. In many cases, the remote infrastructure used by malware is shared with legitimate services housed in providers such as Amazon and similar, so blocking certain IP addresses would be the same as blocking access to legitimate web pages.

Example 3: Access to the Windows registry by PasswordStealer.BT

PasswordStealer.BT is a Trojan that logs the user activity on the infected computer and sends the information obtained to an external server. Among other things, it captures screens, logs keystrokes, and sends files to a C&C (Command & Control) server.

The Details tab provides key information about the malware found. In this case, it shows this data:

Detection path: APPDATA|\microsoftupdates\micupdate.exe

The name and location of the executable file indicate that the malware poses as a Microsoft update. This particular malware cannot infect computers by itself; it requires the user to run it manually.

Activity tab

Advanced EDR was configured in Hardening mode and the malware already resided on the computer when Advanced EDR was installed. The malware was unknown at the time of running.

Action table
Step Date Action Path

1

03/31/2015 23:29

Is run by

PROGRAM_FILESX86|\internet explorer\iexplore.exe

2

03/31/2015 23:29

Is created by

INTERNET_CACHE|\Content.IE5\ QGV8PV80\ index[1].php

3

03/31/2015 23:30

Creates key pointing to EXE file

\REGISTRY\USER\S-1-5[...]9- 5659\Software\Microsoft\Windows\ CurrentVersion\Run?MicUpdate

4

03/31/2015 23:30

Runs

SYSTEMX86|\notepad.exe

5

03/31/2015 23:30

Thread injected by

SYSTEMX86|\notepad.exe

List of actions performed by PasswordStealer.BT

In this case, the malware was generated in step 2 by a web page and run by Internet Explorer.

The sequence of actions has a granularity of one microsecond. For this reason, the actions executed within the same microsecond might not appear in order on the timeline, as in step 1 and step 2.

After being run, the malware became persistent in step 3, adding a branch to the Windows registry to run every time the computer started up. It then started to execute typical malware actions such as opening the notepad and injecting code in one of its threads.

As a remediation action in this case and in the absence of a known disinfection method, you can minimize the impact of the malware by deleting the malicious Windows registry entry. However, it is quite possible that the malware might prevent you from modifying that entry on infected computers; in that case, you would have to either start the computer in safe mode or with a bootable CD to delete the entry.

Example 4: Access to confidential data by Trj/Chgt.F

Trj/Chgt.F was uncovered by WikiLeaks at the end of 2014 as a tool used by government agencies in some countries for selective espionage.

In this example, we go directly to the Activity tab to show you the behavior of this advanced threat.

Action table
Step Date Action Path

1

4/21/2015 2:17:47

Is run by

SYSTEMDRIVE|\Python27\pythonw.exe

2

4/21/2015 2:18:01

Accesses data

#.XLS

3

4/21/2015 2:18:01

Accesses data

#.DOC

4

4/21/2015 2:18:03

Creates

TEMP|\doc.scr

5

4/21/2015 2:18:06

Runs

TEMP|\doc.scr

6

4/21/2015 2:18:37

Runs

PROGRAM_FILES|\Microsoft Office\Office12\WINWORD.EXE

7

4/21/2015 8:58:02

Communicates with

192.168.0.1/2042

List of actions performed by Trj/Chgt.F

The malware was initially run by the Python interpreter (step 1), and later accessed an Excel file and a Word document (steps 2 and 3). In step 4, a file with an SCR extension was run, probably a screensaver with some type of flaw or error that could be exploited by the malware.

In step 7 the malware established a TCP connection. The IP address is private, so the malware connected to the customer own network.

In a case such as this, it is important to check the content of the files accessed by the threat to assess the loss of information. However, the timeline of this particular attack shows that no information was extracted from the customer network.

Advanced EDR disinfected the threat and blocked any subsequent execution of the malware on this and other customers systems.