Bitdefender - Obfuscated PS VSS deletion response

Entities: IP, Process name Log type: Bitdefender

Playbook Description

This playbook counters the deletion of Volume Shadow Copies by decoding obfuscated commands and evaluating file, URL, and IP reputations to pinpoint threats, automatically blocking malicious connections. Once threats are validated, the response triggers process termination, file quarantine, and host isolation to halt encryption attempts. It concludes by initiating full antivirus scans, updating file blocklists, and alerting stakeholders.

MITRE ATT&CK mapping

Tactics Techniques Sub-techniques
Impact(TA0040) Data Manipulation (T1565) Stored Data Manipulation(T1565.001)

MITRE D3FEND mapping

Tactics Techniques Sub-techniques
Isolate(D3-Isolate) D3-NI  
Evict(D3-Evict) D3-PE  
Detect(D3-Detect) D3-PA D3-SEA

Playbook input type

Alert

Prerequisites

Need license with plan - Business Security Enterprise.

Playbook creation input

connectionName - Connection name of Bitdefender.

Dependencies

Extensions - Bitdefender

  • bitdefender_addFileToQuarantineTask
  • bitdefender_createScanTask
  • bitdefender_getTaskStatus
  • bitdefender_killProcess
  • bitdefender_createIsolateEndpoint
  • bitdefender_addToBlocklist

Extensions - VirusTotal

  • virustotal_ipReputation
  • virustotal_fileReputation
  • virustotal_calculateRiskScore

Utility functions

  • windows_commandLineAnalysis
  • bitdefender_buildBlockRule
  • utility_resolveDomainToIP
  • utility_extractMaliciousEntitiesByRiskScore
  • utility_getRequiredTime
  • utility_convertToString
  • windows_decodeCommand
  • utility_validateResponses

Scripts

Script Name Description Arguments
GetFileHash.ps1 This script retrieves the hash of a specified file using the given algorithm. FilePaths, Algorithm

Connections

  • VirusTotal connection: Need to connect with VirusTotal API and fetch access key to check the malware IP/URL/File details.
  • Bitdefender connection: Need to connect Bitdefender using API Key.

Sub playbooks

Bitdefender - Scan task execution
VirusTotal - URL reputation check

Execution workflow

Investigation:

  • Decodes the encoded command used in the attack.
  • Analyzes the command and fetch file path or URL present.
  • Checks the file hash or URL reputation.
  • Checks IP reputation in VirusTotal, if remote IP is involved.

Decision logic:

  • If IP and file path or URL risk score is high, it might be malicious and so proceeds with remediation.

Remediation:

  • Blocks the IP, if malicious.
  • Kills the process and quarantine the process.
  • Adds the malicious process to the blocklist.
  • Blocks the malicious file hashes & URLs fetched from the command line.
  • Runs full antivirus scan and check the risk score.
  • Isolates the host if risk score is high.
  • Notifies the users.
Execution Workflow
Figure: Execution workflow of the playbook

Post execution procedure

Steps to revert false positives:

  • Remove file from blocklist.
  • Remove the host from isolation.
  • Remove the file from quarantine.