Path: blob/master/Guided Hunting - Covid-19 Themed Threats.ipynb
3250 views
Guided Hunting - Covid-19 Themed Threats
Notebook Version: 1.0
Python Version: Python 3.6 (including Python 3.6 - AzureML)
Data Sources Required: CommonSecurityLog, OfficeActivity, SecurityEvent
This Notebook assists defenders in hunting for Covid-19 themed attacks by identifying anomalous Covid-19 related events within your Microsoft Sentinel Workspace. This is designed to be a hunting notebook and has a high probability of returning false positives and returned data points should not be seen as detections without further investigation.
How to use:
Run the cells in this Notebook in order, at various points in the Notebook flow you will be prompted to enter or select options relevant to the scope of your triage.
This Notebook presumes you have Microsoft Sentinel Workspace settings and Threat Intelligence providers configured in a config file. If you do not have this in place please refer https://msticpy.readthedocs.io/en/latest/getting_started/msticpyconfig.html# to https://github.com/Azure/Azure-Sentinel-Notebooks/blob/master/ConfiguringNotebookEnvironment.ipynb and to set this up.
Setup
Network event investigation
Select the time window in which to review network logs in (default is last 24 hours). In large environments you may need to make this time windows smaller in order to avoid query timeout.
Pick a date to filter out domains registered before:
Select a domain to get more details on:
Office Activity Investigation
Review Covid-19 related files that have been accessed by large part of your organization. There is a good chance many of these are legitimate organizational documents but some may be widely shared malicious or mis-leading documents. Enter the approximate number of users in your organization and the query will identify documents accessed by more than 10% of your user base.
Look for Covid-19 related documents that have been uploaded by User Agents that have not been widely seen in the environment over the last 30 days. This may indicate malicious users uploading documents.
Host Activity Investigation
Look for new processes spawned from a command line containing COVID-19 related names that may be phishing lures. We start by looking at the number of hosts observed with the command line spawning the particular process and from there can drill down into a specific command line.
Select command line to look at in more detail:
Use Sysmon data to identify files that are included in the Microsoft Covid-19 threat intelligence data.