Total Endpoint Protection: #1 in EDR & Next-Gen AV
Threat Hunting 102: Beyond The Basics,
Maturing Your Threat Hunting Program
Total Endpoint Protection: #1 in EDR & Next-Gen AV
Who Am I?
Jayson Wehrend
Senior Sales Engineer, Cybereason
Former Tech Consultant, RSA
Total Endpoint Protection: #1 in EDR & Next-Gen AV
Why We’re Here Today
o Quick hunting refresher
o I’m hunting! Now what?
o Giving back & process integration
o Expanded PowerShell use case
Total Endpoint Protection: #1 in EDR & Next-Gen AV
REFRESHER: HUNTING DEFINED.
The process of proactively discovering
undesirable activity to illicit a positive
outcome.
Total Endpoint Protection: #1 in EDR & Next-Gen AV
REFRESHER: WHY?
Prepare? It’s very hard to defend what you can’t
see and don’t understand.
Be proactive? Don’t wait for the bad to happen,
then have to react to fix.
Fix stuff? Especially before it breaks!
Total Endpoint Protection: #1 in EDR & Next-Gen AV
Time to Change.
Intelligence is the ability to adapt
to change.
-- Stephen Hawking
Total Endpoint Protection: #1 in EDR & Next-Gen AV
The
Hunting
Process
Motivation
+
Hypothesis
Data
Collection
Tooling /
Analysis
Outcomes
Automation
Total Endpoint Protection: #1 in EDR & Next-Gen AV
I’m Hunting! Now What?
o We’re Giving Back!
– Incidents
– Detection improvements / new collection techniques
– Prevention with confidence
– Improve response / triage
– Configuration management / compliance / audit
Total Endpoint Protection: #1 in EDR & Next-Gen AV
Incident
Response
Process
Prepare
Detect
Respond
Contain /
Eradicate
Post-
Mortem /
Prevent
Total Endpoint Protection: #1 in EDR & Next-Gen AV
Prepare
Detect
Respond
Contain /
Eradicate
Post-
Mortem /
Prevent
Motivation
+
Hypothesis
Data
Collection
Tooling /
Analysis
Outcomes
Automation*
Incident Response Process Hunting Process
Use blind spots/gaps as
sources of motivation +
hypothesis
High
fidelity
detections
Escalated
incident
New data collection & analysis techniques
improve triage & response SOPs
Total Endpoint Protection: #1 in EDR & Next-Gen AV
Hunting: A Deeper Dive
o Previous outcomes create new motivation +
hypothesis’
o Introducing new datasets to expand previous
outcomes
o Data stacking becomes more crucial to the
journey to analysis/data science
Total Endpoint Protection: #1 in EDR & Next-Gen AV
EXPANDED HUNTING: POWERSHELL
Total Endpoint Protection: #1 in EDR & Next-Gen AV
File-less
Techniques
PowerShell Process
Execution
Persistence
Network
Comms
Service
Registry
Hidden
Obfuscated
Encoded
Download
Commands
Shellcode DLL
Execution
Parent/child
Profiling
Int2Ext
Profiling
DNS Queries
Service =
commandline:powershell or
.ps*
Registry =
commandline:powershell or
.ps*
commandLine:hidden|1|-nop|iex|-
invoke|ICM|scriptblock,
commandLine:`|1|^|+|$|*|&|.
commandLine:nop|nonl|nol|bypass|e|enc|ec
commandLine:DownloadFile|IWE|Invoke-WebRequest|IRM|Invoke-
RestMethod|DownloadString|BITS
commandLine:dllimport|
virtualalloc
Parent:wscript|mshta|M
SOffice|Browser|WMI*
Connections à Filter:isExternalConnection:True
URL: .ps*
DNS Query: TXT C2
DNS Query: Received vs. Transmitted Ratios
Total Endpoint Protection: #1 in EDR & Next-Gen AV
Giving Back…Incident Escalation
o Incident 1: PowerShell
Web Client – Downloading
Stage 2 Payload
o Incident 2: Remote .ps
file execution /
invoking shellcode
o Incident 3: Mismatched
Services – Adversarial
use of .ps
o Incident 4: Data Exfil –
Powershell BITSTransfer
Total Endpoint Protection: #1 in EDR & Next-Gen AV
Giving Back…Prevention
o Block execution of PowerShell.exe on all systems where it’s not in use for
administrative purposes
o Force specific Parent/Child Process Relationships –
MSOffice|Wscript|Mshta|Browsers|WMI spawning Powershell.exe
o Anchor PowerShell scripts to a specific server directories, block .ps* from
running directly on a system
o Use endpoint firewall to prevent PowerShell.exe from connecting to non-
approved Ips
o Block “Bypass” “Hidden” “Download String” “WebClient” “DLLImport”
“VirtualAlloc” as a command line argument for execution by an unauthorized
user
o See #2 for allowing valid applications
Total Endpoint Protection: #1 in EDR & Next-Gen AV
Thank you! Questions?
jayson.wehrend@cybereason.com
@cybereason

More Related Content

PDF
Protecting the healthcare industry
PDF
The attack lifecycle. Cybereason can help you answer: Are you under attack?
PDF
The Cyber Attack Lifecycle
PDF
The Incident Response Checklist - 9 Steps Your Current Plan Lacks
PDF
Protecting the manufacturing industry
PPTX
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
 
PDF
Deception Technology: Use Cases & Implementation Approaches
PPTX
Purple team is awesome
Protecting the healthcare industry
The attack lifecycle. Cybereason can help you answer: Are you under attack?
The Cyber Attack Lifecycle
The Incident Response Checklist - 9 Steps Your Current Plan Lacks
Protecting the manufacturing industry
Hunting The Shadows: In Depth Analysis of Escalated APT Attacks
 
Deception Technology: Use Cases & Implementation Approaches
Purple team is awesome

What's hot (20)

PDF
2018 CISSP Mentor Program- Session 6
PDF
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
PDF
2018 CISSP Mentor Program Session 3
PDF
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
PDF
FRSecure 2018 CISSP Mentor Program Session 10
PPTX
Worst-Case Scenario: Being Detected without Knowing You are Detected
PPTX
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
PPTX
Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013
PPTX
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
PDF
MITRE ATT&CKcon 2018: From Red VS Blue to Red ♥ Blue, Olaf Hartong and Vincen...
PPTX
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
PDF
Vulnerability Assessment, Physical Security, and Nuclear Safeguards
PDF
2018 FRSecure CISSP Mentor Program Session 8
PPTX
Extracting the Malware Signal from Internet Noise
PPT
Sp Security 101 Primer 2 1
PDF
2019 FRSecure CISSP Mentor Program: Class Nine
PDF
2019 FRecure CISSP Mentor Program: Session Two
PPTX
Advanced persistent threat (apt)
PDF
MITRE ATT&CKcon 2018: From Automation to Analytics: Simulating the Adversary ...
PPTX
Pen Testing Explained
2018 CISSP Mentor Program- Session 6
Birds of a Feather 2017: 邀請分享 Glance into the Enterprise InfoSec Field - Howard
2018 CISSP Mentor Program Session 3
Birds of a Feather 2017: 邀請分享 Place of Attribution in Threat Intelligence - F...
FRSecure 2018 CISSP Mentor Program Session 10
Worst-Case Scenario: Being Detected without Knowing You are Detected
Slide Deck – Session 5 – FRSecure CISSP Mentor Program 2017
Seeing Purple: Hybrid Security Teams for the Enterprise - BSides Jackson 2013
The Inmates Are Running the Asylum: Why Some Multi-Factor Authentication Tech...
MITRE ATT&CKcon 2018: From Red VS Blue to Red ♥ Blue, Olaf Hartong and Vincen...
Slide Deck – Session 12 – FRSecure CISSP Mentor Program 2017
Vulnerability Assessment, Physical Security, and Nuclear Safeguards
2018 FRSecure CISSP Mentor Program Session 8
Extracting the Malware Signal from Internet Noise
Sp Security 101 Primer 2 1
2019 FRSecure CISSP Mentor Program: Class Nine
2019 FRecure CISSP Mentor Program: Session Two
Advanced persistent threat (apt)
MITRE ATT&CKcon 2018: From Automation to Analytics: Simulating the Adversary ...
Pen Testing Explained
Ad

Similar to Maturing your threat hunting program (20)

PPTX
The Best Just Got Better, Intercept X Now With EDR
PDF
Threat Hunting 102: Beyond the Basics
PDF
Next Generation War: EDR vs RED TEAM
PDF
Fidelis Endpoint® - Live Demonstration
PDF
How to not fail at security data analytics (by CxOSidekick)
PPTX
Foundations_Optimum_Security_Overview_AP_Marketing_EN_GLB.pptx
PPTX
panw-cortex-xdr-customer-presentation.pptx
PDF
Endpoint Protection Comparison.pdf
PDF
Three Considerations To Amplify Your Detection and Response Program
PPTX
Ask me anything: A Conversational Interface to Augment Information Security w...
PPTX
Protecting endpoints from targeted attacks
PDF
DevOps or DevSecOps
PPTX
Best Practices for Preventing and Recovering from Ransomware
PPTX
Filar seymour oreilly_bot_story_
PDF
Offensive malware usage and defense
PDF
Laura Bell (SafeStack)
PPTX
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
PDF
Cyber Attack Lifecycle
PPTX
12 Crucial Windows Security Skills for 2017
PDF
Increasing DevSecOps Maturity Level in 2021
The Best Just Got Better, Intercept X Now With EDR
Threat Hunting 102: Beyond the Basics
Next Generation War: EDR vs RED TEAM
Fidelis Endpoint® - Live Demonstration
How to not fail at security data analytics (by CxOSidekick)
Foundations_Optimum_Security_Overview_AP_Marketing_EN_GLB.pptx
panw-cortex-xdr-customer-presentation.pptx
Endpoint Protection Comparison.pdf
Three Considerations To Amplify Your Detection and Response Program
Ask me anything: A Conversational Interface to Augment Information Security w...
Protecting endpoints from targeted attacks
DevOps or DevSecOps
Best Practices for Preventing and Recovering from Ransomware
Filar seymour oreilly_bot_story_
Offensive malware usage and defense
Laura Bell (SafeStack)
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
Cyber Attack Lifecycle
12 Crucial Windows Security Skills for 2017
Increasing DevSecOps Maturity Level in 2021
Ad

More from Cybereason (7)

PDF
Antifragile Cyber Defense
PDF
An Introduction to the Agile SoC
PDF
Protecting the financial services industry
PDF
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
PDF
Avoiding Sophisticated Targeted Breach Critical Guidance Healthcare
PDF
Some PowerShell Goodies
PDF
Ransomware is Coming to a Desktop Near You
Antifragile Cyber Defense
An Introduction to the Agile SoC
Protecting the financial services industry
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Avoiding Sophisticated Targeted Breach Critical Guidance Healthcare
Some PowerShell Goodies
Ransomware is Coming to a Desktop Near You

Recently uploaded (20)

PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
Modernising the Digital Integration Hub
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Five Habits of High-Impact Board Members
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
The various Industrial Revolutions .pptx
DOCX
search engine optimization ppt fir known well about this
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
STKI Israel Market Study 2025 version august
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Chapter 5: Probability Theory and Statistics
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
1 - Historical Antecedents, Social Consideration.pdf
Modernising the Digital Integration Hub
O2C Customer Invoices to Receipt V15A.pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
Enhancing emotion recognition model for a student engagement use case through...
Five Habits of High-Impact Board Members
A comparative study of natural language inference in Swahili using monolingua...
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
DP Operators-handbook-extract for the Mautical Institute
The various Industrial Revolutions .pptx
search engine optimization ppt fir known well about this
Taming the Chaos: How to Turn Unstructured Data into Decisions
STKI Israel Market Study 2025 version august
A novel scalable deep ensemble learning framework for big data classification...
Zenith AI: Advanced Artificial Intelligence
Chapter 5: Probability Theory and Statistics
NewMind AI Weekly Chronicles – August ’25 Week III
Group 1 Presentation -Planning and Decision Making .pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf

Maturing your threat hunting program

  • 1. Total Endpoint Protection: #1 in EDR & Next-Gen AV Threat Hunting 102: Beyond The Basics, Maturing Your Threat Hunting Program
  • 2. Total Endpoint Protection: #1 in EDR & Next-Gen AV Who Am I? Jayson Wehrend Senior Sales Engineer, Cybereason Former Tech Consultant, RSA
  • 3. Total Endpoint Protection: #1 in EDR & Next-Gen AV Why We’re Here Today o Quick hunting refresher o I’m hunting! Now what? o Giving back & process integration o Expanded PowerShell use case
  • 4. Total Endpoint Protection: #1 in EDR & Next-Gen AV REFRESHER: HUNTING DEFINED. The process of proactively discovering undesirable activity to illicit a positive outcome.
  • 5. Total Endpoint Protection: #1 in EDR & Next-Gen AV REFRESHER: WHY? Prepare? It’s very hard to defend what you can’t see and don’t understand. Be proactive? Don’t wait for the bad to happen, then have to react to fix. Fix stuff? Especially before it breaks!
  • 6. Total Endpoint Protection: #1 in EDR & Next-Gen AV Time to Change. Intelligence is the ability to adapt to change. -- Stephen Hawking
  • 7. Total Endpoint Protection: #1 in EDR & Next-Gen AV The Hunting Process Motivation + Hypothesis Data Collection Tooling / Analysis Outcomes Automation
  • 8. Total Endpoint Protection: #1 in EDR & Next-Gen AV I’m Hunting! Now What? o We’re Giving Back! – Incidents – Detection improvements / new collection techniques – Prevention with confidence – Improve response / triage – Configuration management / compliance / audit
  • 9. Total Endpoint Protection: #1 in EDR & Next-Gen AV Incident Response Process Prepare Detect Respond Contain / Eradicate Post- Mortem / Prevent
  • 10. Total Endpoint Protection: #1 in EDR & Next-Gen AV Prepare Detect Respond Contain / Eradicate Post- Mortem / Prevent Motivation + Hypothesis Data Collection Tooling / Analysis Outcomes Automation* Incident Response Process Hunting Process Use blind spots/gaps as sources of motivation + hypothesis High fidelity detections Escalated incident New data collection & analysis techniques improve triage & response SOPs
  • 11. Total Endpoint Protection: #1 in EDR & Next-Gen AV Hunting: A Deeper Dive o Previous outcomes create new motivation + hypothesis’ o Introducing new datasets to expand previous outcomes o Data stacking becomes more crucial to the journey to analysis/data science
  • 12. Total Endpoint Protection: #1 in EDR & Next-Gen AV EXPANDED HUNTING: POWERSHELL
  • 13. Total Endpoint Protection: #1 in EDR & Next-Gen AV File-less Techniques PowerShell Process Execution Persistence Network Comms Service Registry Hidden Obfuscated Encoded Download Commands Shellcode DLL Execution Parent/child Profiling Int2Ext Profiling DNS Queries Service = commandline:powershell or .ps* Registry = commandline:powershell or .ps* commandLine:hidden|1|-nop|iex|- invoke|ICM|scriptblock, commandLine:`|1|^|+|$|*|&|. commandLine:nop|nonl|nol|bypass|e|enc|ec commandLine:DownloadFile|IWE|Invoke-WebRequest|IRM|Invoke- RestMethod|DownloadString|BITS commandLine:dllimport| virtualalloc Parent:wscript|mshta|M SOffice|Browser|WMI* Connections à Filter:isExternalConnection:True URL: .ps* DNS Query: TXT C2 DNS Query: Received vs. Transmitted Ratios
  • 14. Total Endpoint Protection: #1 in EDR & Next-Gen AV Giving Back…Incident Escalation o Incident 1: PowerShell Web Client – Downloading Stage 2 Payload o Incident 2: Remote .ps file execution / invoking shellcode o Incident 3: Mismatched Services – Adversarial use of .ps o Incident 4: Data Exfil – Powershell BITSTransfer
  • 15. Total Endpoint Protection: #1 in EDR & Next-Gen AV Giving Back…Prevention o Block execution of PowerShell.exe on all systems where it’s not in use for administrative purposes o Force specific Parent/Child Process Relationships – MSOffice|Wscript|Mshta|Browsers|WMI spawning Powershell.exe o Anchor PowerShell scripts to a specific server directories, block .ps* from running directly on a system o Use endpoint firewall to prevent PowerShell.exe from connecting to non- approved Ips o Block “Bypass” “Hidden” “Download String” “WebClient” “DLLImport” “VirtualAlloc” as a command line argument for execution by an unauthorized user o See #2 for allowing valid applications
  • 16. Total Endpoint Protection: #1 in EDR & Next-Gen AV Thank you! Questions? jayson.wehrend@cybereason.com @cybereason