<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Stealing Tokens from Office products in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/stealing-tokens-from-office-products/m-p/515663#M2868</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/190671"&gt;@RFeyertag&lt;/a&gt;&amp;nbsp;there's a BIOC available in &lt;A href="https://github.com/Data-Equipment-AS/CortexXDR-BIOC/blob/main/Unsecured%20Access%20Tokens%20-%20MS%20Teams.bioc" target="_self"&gt;github&lt;/A&gt; that you can take a look at to see if it meets your needs.&lt;/P&gt;</description>
    <pubDate>Thu, 22 Sep 2022 02:02:43 GMT</pubDate>
    <dc:creator>bbarmanroy</dc:creator>
    <dc:date>2022-09-22T02:02:43Z</dc:date>
    <item>
      <title>Stealing Tokens from Office products</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/stealing-tokens-from-office-products/m-p/515220#M2849</link>
      <description>&lt;P&gt;Hello dear community,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;is there a capability in cortex xdr pro, which can detect or stop the dumping and stealing from tokens?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://mrd0x.com/stealing-tokens-from-office-applications/?no-cache=1" target="_blank"&gt;https://mrd0x.com/stealing-tokens-from-office-applications/?no-cache=1&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How would you go on this? XQL BIOC query with detection on dump creation? Or BIOC XQL for strings64.exe call?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rob&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 18 Sep 2022 19:17:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/stealing-tokens-from-office-products/m-p/515220#M2849</guid>
      <dc:creator>RFeyertag</dc:creator>
      <dc:date>2022-09-18T19:17:27Z</dc:date>
    </item>
    <item>
      <title>Re: Stealing Tokens from Office products</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/stealing-tokens-from-office-products/m-p/515228#M2850</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/190671"&gt;@RFeyertag&lt;/a&gt;&amp;nbsp;I would probably create BIOC rules with multiple logic:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Low Severity: Create a BIOC rule for srtings64.exe containing *.dmp in its command line. (Even though the article mentions that you could do an offline strings dump etc, Why? Obviously if done on the box it will create more telemetry and more telemetry creates more detection opportunities)&lt;/LI&gt;
&lt;LI&gt;Informational Severity: Create a BIOC rule where I would monitor for a process command line containing a *.dmp in its CLI. (Produces quite a bit noise)&lt;/LI&gt;
&lt;LI&gt;Medium Severity: Create a BIOC rule where an unsigned image created a *.dmp file (Please consider the noise in the environment before creation.)&lt;/LI&gt;
&lt;LI&gt;Medium Severity: Create a BIOC rule where tool name such as procdump*.exe or dumpit.exe i.e. common process dump utilities are used.&lt;/LI&gt;
&lt;LI&gt;Medium Severity: Create a BIOC rule where an image signer includes Microsoft* as a key word but the image name is not a known Microsoft Utility.&lt;/LI&gt;
&lt;LI&gt;Medium Severity: rundll32.exe executing comsvc.dll&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Before doing above baseline first:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;config case_sensitive = false 
| dataset = xdr_data 
| filter event_type = ENUM.FILE and event_sub_type in (ENUM.FILE_CREATE_NEW,ENUM.FILE_WRITE)
| filter actor_process_image_name != null
| filter actor_process_image_name not in ("werfault.exe","System") and action_file_name = "*.dmp"
| fields _time as Time_Stamp, agent_hostname as Host, agent_ip_addresses as IP_Addr, action_file_name as Dump_Filename, actor_process_image_name as Process&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;Kanwar&lt;/P&gt;</description>
      <pubDate>Mon, 19 Sep 2022 02:10:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/stealing-tokens-from-office-products/m-p/515228#M2850</guid>
      <dc:creator>KanwarSingh01</dc:creator>
      <dc:date>2022-09-19T02:10:37Z</dc:date>
    </item>
    <item>
      <title>Re: Stealing Tokens from Office products</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/stealing-tokens-from-office-products/m-p/515663#M2868</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/190671"&gt;@RFeyertag&lt;/a&gt;&amp;nbsp;there's a BIOC available in &lt;A href="https://github.com/Data-Equipment-AS/CortexXDR-BIOC/blob/main/Unsecured%20Access%20Tokens%20-%20MS%20Teams.bioc" target="_self"&gt;github&lt;/A&gt; that you can take a look at to see if it meets your needs.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Sep 2022 02:02:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/stealing-tokens-from-office-products/m-p/515663#M2868</guid>
      <dc:creator>bbarmanroy</dc:creator>
      <dc:date>2022-09-22T02:02:43Z</dc:date>
    </item>
    <item>
      <title>Re: Stealing Tokens from Office products</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/stealing-tokens-from-office-products/m-p/515886#M2893</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192661"&gt;@bbarmanroy&lt;/a&gt;,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thank you very much! It worked like very good! Here is my final query:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;dataset = xdr_data |&lt;BR /&gt;filter event_type = FILE and (&lt;BR /&gt;actor_process_image_name not contains "Teams" and &lt;BR /&gt;actor_process_image_name not contains "teams" and actor_process_image_path not contains "C:\Windows\System32\svchost.exe"&lt;BR /&gt;)&lt;BR /&gt;and (&lt;BR /&gt;action_file_path contains "\Microsoft\Teams\Cookies" or&lt;BR /&gt;action_file_path contains "Microsoft\Teams\Local Storage\leveldb" or &lt;BR /&gt;action_file_path contains "/Library/Application Support/Microsoft/Teams/Cookies" or &lt;BR /&gt;action_file_path contains "/Library/Application Support/Microsoft/Teams/Local Storage/leveldb" or &lt;BR /&gt;action_file_path contains "/.config/Microsoft/Microsoft Teams/Cookies" or &lt;BR /&gt;action_file_path contains "/.config/Microsoft/Microsoft Teams/Local Storage/leveldb"&lt;BR /&gt;)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you think excluding svchost.exe is a good idea?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Rob&lt;/P&gt;</description>
      <pubDate>Sat, 24 Sep 2022 20:59:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/stealing-tokens-from-office-products/m-p/515886#M2893</guid>
      <dc:creator>RFeyertag</dc:creator>
      <dc:date>2022-09-24T20:59:39Z</dc:date>
    </item>
    <item>
      <title>Re: Stealing Tokens from Office products</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/stealing-tokens-from-office-products/m-p/515907#M2896</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/190671"&gt;@RFeyertag&lt;/a&gt;&amp;nbsp;the query looks good.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'd probably want to clean up a bit if that makes for a quicker read as BIOC rules are case-insensitive by default (takes care of the process name) as well as put the paths in an array:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;dataset = xdr_data 
| filter event_type = ENUM.FILE 
| filter action_file_path in ("%AppData%\Microsoft\Teams\Cookies", "%AppData%\Microsoft\Teams\Local Storage\leveldb", "~/Library/Application Support/Microsoft/Teams/Cookies", "~/Library/Application Support/Microsoft/Teams/Local Storage/leveldb","~/.config/Microsoft/Microsoft Teams/Cookies", "~/.config/Microsoft/Microsoft Teams/Local Storage/leveldb") and action_process_image_name !~= "teams"&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am not full up-to-date with the threat, but I understand that this requires local privileges on the endpoint (so an attacker would already have access to Teams at that point post-authentication?). As such, putting in svchost in the query is probably not necessary. Do discuss this with your wider information security teams (including threat intel) to discover variants and use that to modify the BIOC as needed.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Sep 2022 03:00:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/stealing-tokens-from-office-products/m-p/515907#M2896</guid>
      <dc:creator>bbarmanroy</dc:creator>
      <dc:date>2022-09-26T03:00:16Z</dc:date>
    </item>
  </channel>
</rss>

