Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Effective Threat Investigation for SOC Analysts

You're reading from  Effective Threat Investigation for SOC Analysts

Product type Book
Published in Aug 2023
Publisher Packt
ISBN-13 9781837634781
Pages 314 pages
Edition 1st Edition
Languages
Author (1):
Mostafa Yahia Mostafa Yahia
Profile icon Mostafa Yahia

Table of Contents (22) Chapters

Preface 1. Part 1: Email Investigation Techniques
2. Chapter 1: Investigating Email Threats 3. Chapter 2: Email Flow and Header Analysis 4. Part 2: Investigating Windows Threats by Using Event Logs
5. Chapter 3: Introduction to Windows Event Logs 6. Chapter 4: Tracking Accounts Login and Management 7. Chapter 5: Investigating Suspicious Process Execution Using Windows Event Logs 8. Chapter 6: Investigating PowerShell Event Logs 9. Chapter 7: Investigating Persistence and Lateral Movement Using Windows Event Logs 10. Part 3: Investigating Network Threats by Using Firewall and Proxy Logs
11. Chapter 8: Network Firewall Logs Analysis 12. Chapter 9: Investigating Cyber Threats by Using the Firewall Logs 13. Chapter 10: Web Proxy Logs Analysis 14. Chapter 11: Investigating Suspicious Outbound Communications (C&C Communications) by Using Proxy Logs 15. Part 4: Investigating Other Threats and Leveraging External Sources to Investigate Cyber Threats
16. Chapter 12: Investigating External Threats 17. Chapter 13: Investigating Network Flows and Security Solutions Alerts 18. Chapter 14: Threat Intelligence in a SOC Analyst’s Day 19. Chapter 15: Malware Sandboxing – Building a Malware Sandbox 20. Index 21. Other Books You May Enjoy

Investigating Suspicious Outbound Communications (C&C Communications) by Using Proxy Logs

Attackers usually configure their malware to communicate with their command and control servers, asking for new instructions to achieve their purpose. Most attackers adapt to the fact that most enterprises are implementing proxy devices for web browsing by configuring their malware to replicate the proxy server configuration of the victim’s system configuration. As a cyber defender, you should take advantage of the visibility provided by the web proxy through its logs of the C&C communications between the malware and its C&C server to investigate the attributes of such communications.

The objective of this chapter is to learn how to investigate C&C communications by using proxy logs with the questions, answers, and hypotheses technique. In this chapter, we will learn how to investigate most C&C communications attributes such as the web domain reputation and the suspicious...

Suspicious outbound communications alerts

After successfully gaining initial access to the victim’s machine and installing malware through one of the various ways, such as employing weaponized Microsoft Office documents or malware spread via removable media, the malware authors usually configure their malware to communicate with their command and control server to get new instructions and commands to be executed on the victim machine. Such malicious communications have a list of aspects that can be detected and investigated over the proxy logs as we will see later in this chapter.

During the SOC analyst’s working shift, they may get an alert from their security information and event management (SIEM) solution regarding communications from one of the organization’s machines to a suspicious/malicious domain or IP that seems to be related to a command and control server. Such alerts may be triggered according to different detection criteria, such as threat intel...

Investigating suspicious outbound communications (C&C communications)

In this chapter, our investigation of suspicious outbound communications through proxy logs follows a different investigative approach from the previous chapters. We will adopt the question-answer-hypothesis approach to effectively investigate these suspicious communications. Every investigation starts by raising a question, then providing all possible answers, which then leads to building a hypothesis. Acting upon this hypothesis involves either raising new questions or concluding the investigation process (see Figure 11.1):

Figure 11.1 – Investigation approach

Figure 11.1 – Investigation approach

To investigate such incidents, we will divide the rest of this chapter into the following subsections:

  • Investigating the web domain reputation
  • Investigating suspicious web target domain names
  • Investigating the requested web resources
  • Investigating the referrer URL
  • Investigating the communications...

Summary

During this chapter, we discussed how to investigate C&C communications by using the proxy logs with the questions, answers, and hypotheses method to investigate some C&C communications attributes, such as the web domain reputation and suspicious target domain names, the requested web resources, the referrer URL, the communications user agent, the communications destination port, the received and sent bytes, the HTTP method, and the Content-Type. Finally, we discussed some command and control techniques.

In the next chapter, we will discuss how to investigate external threats.

lock icon The rest of the chapter is locked
You have been reading a chapter from
Effective Threat Investigation for SOC Analysts
Published in: Aug 2023 Publisher: Packt ISBN-13: 9781837634781
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}