{"id":5109,"date":"2019-12-09T20:56:55","date_gmt":"2019-12-09T19:56:55","guid":{"rendered":"http:\/\/nextron.bsk-consulting.de\/?p=5109"},"modified":"2025-03-07T17:36:28","modified_gmt":"2025-03-07T16:36:28","slug":"not-all-ioc-scanning-is-the-same","status":"publish","type":"post","link":"https:\/\/www.nextron-systems.com\/2019\/12\/09\/not-all-ioc-scanning-is-the-same\/","title":{"rendered":"Not All IOC Scanning Is The Same"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221; da_disable_devices=&#8221;off|off|off&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-size: 18px;\">People often tell us that EDR product X already does IOC scanning and that they don\u2019t have to check for these indicators a second time using our scanners. Especially when it comes to network wide sweeps for traces of activity due to an ongoing incident I recommend scanning a second time with one of our scanners or a tool of similar quality.<\/span><\/p>\n<p>This blog post explains why.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;3_5,2_5&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-size: 18px;\">People usually spend a fair amount of time on selecting threat intel feeds and interesting indicators for their scans. However when it comes to the actual application of these indicators they seem to be satisfied with the simplest form of checks.<\/span><\/p>\n<p>Especially when we look at C2 or Filename IOCs I can easily explain the difference between the \u201ecompulsory\u201c and \u201efreestyle\u201c methods of IOC scanning.<\/p>\n<p>A plain \u201ecompulsory\u201c filename IOC check would walk the disk or query a database looking for a certain filename, right?<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2019\/12\/7S5g5.jpg&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;2_5,3_5&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;2_5&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>However if you think about it for a second and ask yourself \u201ewhere else could we check for that filename?\u201c you\u2019ll realize that the following elements could also contain the malicious filename:<\/p>\n<ul>\n<li>Eventlog entries (e.g. process starts, service installs with image path, access failures \u2026)<\/li>\n<li>Log files (local Antivirus log file, access to file in web root &gt; web server access log, backup errors, PowerShell history \u2026)<\/li>\n<li>Registry (recently opened files, shell bags, service image path, other caches \u2026)<\/li>\n<li>MFT (deleted entries)<\/li>\n<li>Archive content (packed in ZIP file)<\/li>\n<li>WMI (scripts \u2013 e.g. see<span>\u00a0<\/span><a href=\"https:\/\/github.com\/mattifestation\/WMI_Backdoor\" target=\"_blank\" rel=\"noopener noreferrer\">this PoC<\/a><span>\u00a0<\/span>by<span>\u00a0<\/span><a href=\"https:\/\/twitter.com\/mattifestation\" target=\"_blank\" rel=\"noopener noreferrer\">Matt Graeber)<\/a><\/li>\n<li>Crash dumps<\/li>\n<li>Windows Error Report (WER \u2013 file names and content)<\/li>\n<li>Free disk space (filename as content of batch files or other scripts, scheduled tasks \u2026)<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;3_5&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2019\/12\/IOC-Scanning.png&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>Actually we often see that during lateral movement attackers access systems, run their tools remotely, copy the output, delete the output files and leave no file system traces behind. Our scanners use the locations mentioned above and others to detect them although all the files have already been removed from disk. That\u2019s the \u201efreestyle\u201c method.<\/p>\n<p>The same counts for the C2 IOCs. The \u201ecompulsory\u201c plain method would check the system\u2019s network connections.<\/p>\n<p>The \u201efreestyle\u201c method also includes checking for these C2 IOCs in the following locations:<\/p>\n<ul>\n<li>Process memory (C2 strings loaded and decrypted in process memory)<\/li>\n<li>Log files (web server access logs, Windows firewall log file, AV module log file \u2026)<\/li>\n<li>Hosts file<\/li>\n<li>Files (in backdoor config files on disk)<\/li>\n<li>Registry (hard coded C2 server in registry key)<\/li>\n<\/ul>\n<p>It is sad to see great indicators from expensive feeds used into tools that do \u201eIOC scanning\u201c the \u201ecompulsory\u201c way missing so many interesting spots.<\/p>\n<blockquote>\n<p>If all you have is a hammer, everything looks like a nail.<\/p>\n<\/blockquote>\n<p>So \u2013 the next time when someone tells you that their tool checks for IOCs on the endpoint, your question should be \u201eHow and where do you check for these IOCs?\u201c.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>People often tell us that EDR product X already does IOC scanning and that they don\u2019t have to check for these indicators a second time using our scanners. Especially when it comes to network wide sweeps for traces of activity due to an ongoing incident I recommend scanning a second time with one of our scanners or a tool of similar quality. This blog post explains why.People usually spend a fair amount of time on selecting threat intel feeds and interesting indicators for their scans. However when it comes to the actual application of these indicators they seem to be satisfied with the simplest form of checks. Especially when we look at C2 or Filename IOCs I can easily explain the difference between the \u201ecompulsory\u201c and \u201efreestyle\u201c methods of IOC scanning. A plain \u201ecompulsory\u201c filename IOC check would walk the disk or query a database looking for a certain filename, right? &nbsp;However if you think about it for a second and ask yourself \u201ewhere else could we check for that filename?\u201c you\u2019ll realize that the following elements could also contain the malicious filename: Eventlog entries (e.g. process starts, service installs with image path, access failures \u2026) Log files (local Antivirus [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[32],"tags":[220,13,219,122,82,118,117,7,78,100],"class_list":["post-5109","post","type-post","status-publish","format-standard","hentry","category-thor","tag-c2","tag-detection","tag-filename","tag-hash","tag-ioc","tag-iocs","tag-scan","tag-scanner","tag-scanning","tag-windows"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Not All IOC Scanning Is The Same - Nextron Systems<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nextron-systems.com\/2019\/12\/09\/not-all-ioc-scanning-is-the-same\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nextron-systems.com\/2019\/12\/09\/not-all-ioc-scanning-is-the-same\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2019\/12\/09\/not-all-ioc-scanning-is-the-same\/\"},\"author\":{\"name\":\"Florian Roth\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\"},\"headline\":\"Not All IOC Scanning Is The Same\",\"datePublished\":\"2019-12-09T19:56:55+00:00\",\"dateModified\":\"2025-03-07T16:36:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2019\/12\/09\/not-all-ioc-scanning-is-the-same\/\"},\"wordCount\":738,\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"keywords\":[\"c2\",\"detection\",\"filename\",\"hash\",\"ioc\",\"IOCs\",\"scan\",\"scanner\",\"scanning\",\"windows\"],\"articleSection\":[\"THOR\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nextron-systems.com\/2019\/12\/09\/not-all-ioc-scanning-is-the-same\/\",\"url\":\"https:\/\/www.nextron-systems.com\/2019\/12\/09\/not-all-ioc-scanning-is-the-same\/\",\"name\":\"Not All IOC Scanning Is The Same - Nextron Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#website\"},\"datePublished\":\"2019-12-09T19:56:55+00:00\",\"dateModified\":\"2025-03-07T16:36:28+00:00\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nextron-systems.com\/2019\/12\/09\/not-all-ioc-scanning-is-the-same\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nextron-systems.com\/#website\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"name\":\"Nextron Systems\",\"description\":\"We Detect Hackers\",\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nextron-systems.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\",\"name\":\"Nextron Systems GmbH\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"width\":260,\"height\":260,\"caption\":\"Nextron Systems GmbH\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\",\"name\":\"Florian Roth\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"caption\":\"Florian Roth\"},\"description\":\"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.\",\"url\":\"https:\/\/www.nextron-systems.com\/author\/florian\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Not All IOC Scanning Is The Same - Nextron Systems","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nextron-systems.com\/2019\/12\/09\/not-all-ioc-scanning-is-the-same\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nextron-systems.com\/2019\/12\/09\/not-all-ioc-scanning-is-the-same\/#article","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/2019\/12\/09\/not-all-ioc-scanning-is-the-same\/"},"author":{"name":"Florian Roth","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919"},"headline":"Not All IOC Scanning Is The Same","datePublished":"2019-12-09T19:56:55+00:00","dateModified":"2025-03-07T16:36:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2019\/12\/09\/not-all-ioc-scanning-is-the-same\/"},"wordCount":738,"publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"keywords":["c2","detection","filename","hash","ioc","IOCs","scan","scanner","scanning","windows"],"articleSection":["THOR"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.nextron-systems.com\/2019\/12\/09\/not-all-ioc-scanning-is-the-same\/","url":"https:\/\/www.nextron-systems.com\/2019\/12\/09\/not-all-ioc-scanning-is-the-same\/","name":"Not All IOC Scanning Is The Same - Nextron Systems","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/#website"},"datePublished":"2019-12-09T19:56:55+00:00","dateModified":"2025-03-07T16:36:28+00:00","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nextron-systems.com\/2019\/12\/09\/not-all-ioc-scanning-is-the-same\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.nextron-systems.com\/#website","url":"https:\/\/www.nextron-systems.com\/","name":"Nextron Systems","description":"We Detect Hackers","publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nextron-systems.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nextron-systems.com\/#organization","name":"Nextron Systems GmbH","url":"https:\/\/www.nextron-systems.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","width":260,"height":260,"caption":"Nextron Systems GmbH"},"image":{"@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919","name":"Florian Roth","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","caption":"Florian Roth"},"description":"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.","url":"https:\/\/www.nextron-systems.com\/author\/florian\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/5109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/comments?post=5109"}],"version-history":[{"count":9,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/5109\/revisions"}],"predecessor-version":[{"id":25095,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/5109\/revisions\/25095"}],"wp:attachment":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media?parent=5109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/categories?post=5109"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/tags?post=5109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}