Have you been hit? CyberDefenses can help.

CHRIME and Execution

CyberDefenses - Chrime

by Monty St John

Execution comes last in CHRIME, but it’s far from the end at the same time.  Like I’ve mentioned more than once, it can be the beginning, where the steps of the operation performed are a better starting point.  I’ve highlighted many times that CHRIME is meant to be flipped or even used in portions to meet your needs.  That is part of its allure and agility, that it can function so flexibly.  Execution rounds out the rest of the technique and given we’ve been using phishing for our example, we’ll continue doing so.

 

Go big, but don’t forget the little things

Execution has a micro and macro aspect.  At a macro level, execution is concerned about big picture movements.  Specifically, the strategic operations involved in the execution.   It means evaluating the steps required at the strategic level to execute.  This is the big rock, behind-the-scenes actions.  For phishing, that means understanding and documenting the steps required to employ the phishing, such as the steps taken by your adversary to acquire the phishing kit, the resources they used, how they deployed it, and who they used it against.  Plenty more on that list, of course, but I’m sure you see where I’m going.  The micro execution pieces are the small things, the true step-by-step operations.  Usually, you focus on the tip of the spear operations for the purpose of speed, but given time, you would outline the smaller operations for each strategic step in the execution.

 

Here’s a short snippet talking about the execution of a phishing example we’ve been using and a slightly longer excerpt about the longer execution chain required.

 

View 1 – What we see

 

Phishing emails received

Responded

Victims followed phishing directions

Reported

Targeted employees reported the phish

Ignored or mitigated prior to opening

Phish was ignored or mitigated (recalled/removed)

Went to phishing website

Left the site

Reported the site as phishing

Didn’t report

Stayed on the site

Entered credentials

Didn’t enter credentials

Reported the site

Didn’t report the site

 

 

View 2 – What the adversary needed to do

 

Acquire Phishing Kit

Find (PHaaS)

Research capability to meet needs

Locate reputable seller

Purchase

Use resources to acquire

Deploy Phishing Kit

Tailor

Personalize kit

Setup

Acquire infrastructure if not part of kit

Deploy to infrastructure

Setup intermediate and end destination

Activate

Roll out

spin up redundancies or backups

Phish Targets

Load phishing “send” mechanism

Method might be via a service, script or via hijacked servers

Send phish as a burst, in waves, etc.

Victims Respond

Victims navigate to phishing website

Victims enter information

Gather Stolen Credentials

Accept

Entered data is collected and compiled

Store

Credentials entered are sent to intermediate or end destination

 

 

 

Breaking out operations and their tasks is part of the OODA Loop, specifically the Observe and Orient stages.  They help in understanding your adversary.  In our Defining TTPs course, we spend a significant amount of time instructing students on how to define operations from just about any action that your brain can conceive.  It’s an important technique to learn.  Decomposing big steps into smaller operations helps you understand patterns in data, but also opens the window to more.  Here’s a short list of the reasons to enumerate operations:

 

  • Breaking down steps or stages into smaller operations highlights commonalities.
  • Understanding the operations that help identify artifacts left behind by the action.
  • At a certain point, new operations become rare, as you find significant duplication exists. This means you can define a common set of operations.

 

Fact Patterns and Issues

Execution benefits from drafting a fact pattern, especially if you didn’t construct one during the “C” topic of CHRIME or follow on topics.  If you are unfamiliar with this technique, it’s where you write out the facts and information for each element of the event, especially where it relates to execution steps for our purposes at this topic (“E”).  Next, you iterate through the sequence of execution events one piece at a time, outlining each step and noting down any issues for each one.  A handy mnemonic for this is TLIAC, which helps to dissect and understand key issues.

 

When you develop a TLIAC analysis it is important to do more than simply list the elements within each category. You must also explain why each item is important. Identifying why something is important helps you develop or further refine the Intent for the course of action.

Threats involved:

The “threats” (menace or hazard) by vector or by execution path are significant elements in your investigation.  More than one hazard might be implied at each execution step or by the path taken.  For example, the execution path for malware to gain a foothold on an individual computer is one threat.  A second hazard is the vector for its initial infection, a third the now infectious “patient zero”, a fourth the menace to other members of your enterprise by the same initial infection point and many, many more issues just as easy to outline.

The thought process of outlining threats also includes intangible things, e.g., the time of day, or an action or omission such as failure to detect.

Location:

This involves both the place/location of the execution action involved and the sensitivity of where the execution action occurred.  The head of the finance department exposing their credentials in a company provided “secure” chat has multiple complexities in contrast to responding to a phishing email and providing the same credentials to a bogus website.

Information:

What was accessed, altered or removed.

We often think of this as files, but also consider execution that led to gaining access to records, to pulling files that contained passwords or hundreds of other possibilities.  Best considered as determining the outcome desired, e.g., the “why do this” answer for each execution step.

Artifacts:

What was left behind or whose absence is telling and points to removal.  Actions invariably leave behind trails of evidence.  Map each execution step to what artifacts are left behind.

Credentials:

The status of the credentials involved and their relationship to one another are important to your research. Persons or parties may be individuals, groups, corporations, or any entity or identity significant to the cause of action or the solution or outcome of the execution.  As individuals or credentials are indicated, a link model for link analysis can be employed as well.

 

Back to that phishing story…

At the big picture level, for the phishing example we want to understand whether-or-not we were singled out by the phishing.  The more tightly defined the phishing targets, the more targeted the phishing.  Any attack singly or tightly focused on us is a high cause of concern.  That points to a specific objective and a defined fisherman dropping a hook into our little pond.  A widespread, shotgun style campaign is like trawling the bottom of a river.  It’s big, wide and hits everything.  We don’t take it any less seriously, but the hazard or menace involved is much, much less than a dedicated adversary.  At the smaller, intimate level, we are looking to understand how many and who was phished, how many responded, what they responded with and when, where, etc.

 

Those are the immediate concerns.  Part of CHRIME is reflecting the intelligence crafted against your knowledge storehouse.  Execution thinks in operations and even if the faces changed, but the actions didn’t, you can imply a natural connection exists.  If you are phished a hundred times the same way, that intelligence is crucial to not only your threat intel and SOC teams, but also whoever is manning your security tools and handling your user security training.

 

To summarize, Execution is not only micro and macro depictions of operations, but also the resultant outcomes.  They are part of the CHRIME pattern and the operation outlines are sub-constellations that help depict the event.  Like we mentioned previously, these operational patterns should be stacked and contrasted to understand how they are alike, dissimilar, and to what degree of each.  A chain of execution that looks the same over and over again can point to a gap in your security, a defined procedure on the part of the adversary or help define a spectrum of courses of action available.  The opposite — equally telling.

 

We also use CHRIME in our daily work and you can find me talking about it at ISSA and conferences pretty year round.  In fact, CyberDefenses believes in this technique so much that we have a full-day dedicated training course to it.  You can find about our offerings on CHRIME and other via this link:  www.cyberdefenses.com/academy/.

 

This wraps up our series on CHRIME.   If you missed the previous discussions, you can find the introduction, as well as the 1st, 2nd, 3rd, 4th, 5th, and 6th discussions on the blog home page.

 

Don’t forget to check us out on Twitter or LinkedIn to find stay up-to-date on our offerings and become part of the conversation.

About the author

Carin Young

Contact CyberDefenses today to learn how we can help your company’s cybersecurity needs.