Malware Analysis & Threat Intel: UAC Bypasses

Поделиться
HTML-код
  • Опубликовано: 26 мар 2024
  • jh.live/anyrun-ti || ANYRUN has just released their latest Threat Intelligence feature set, and it is super cool to track and hunt for malware families or observed tradecraft -- try it out! jh.live/anyrun-ti
    Learn Cybersecurity - Name Your Price Training with John Hammond: nameyourpricetraining.com
    📧JOIN MY NEWSLETTER ➡ jh.live/email
    🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
    🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
    🌎FOLLOW ME EVERYWHERE ➡ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/discord ↔ jh.live/instagram ↔ jh.live/tiktok
    💥 SEND ME MALWARE ➡ jh.live/malware
    🔥RUclips ALGORITHM ➡ Like, Comment, & Subscribe!

Комментарии • 67

  • @IAmmlskOG
    @IAmmlskOG 2 месяца назад +72

    dude you move through this file like butter

    • @nickadams2361
      @nickadams2361 2 месяца назад +5

      he did it before, this is a planned demo. Normal stuff you should be able to do at work

    • @user-sx4zy5hn2f
      @user-sx4zy5hn2f 2 месяца назад

      ​@@nickadams2361😊😊😊😊😊😊😊😊😊

    • @IOwnThisHandle
      @IOwnThisHandle 18 дней назад

      It is rehearsed

  • @hedgehogform
    @hedgehogform 2 месяца назад +24

    VSCode has a powershell formatter

    • @HachikoTanuki
      @HachikoTanuki 2 месяца назад +5

      I feel like such a casual that I know none of the tools John is using, while VSCode is too casual for John to know it has a Powershell formatter 😭

  • @markcentral
    @markcentral 2 месяца назад +16

    Thanks for the video. Is the anyrun segment part of a sponsored deal? If not, I would have preferred you continued to demonstrate how to deconstruct the malware locally. There's a lot of educational value and wisdom potential being lost by moving things to an online platform that requires a subscription vs local

  • @gabriell4815162342
    @gabriell4815162342 2 месяца назад +24

    I love your videos, as a foreigner and because I don't speak native English, I feel very comfortable and can understand everything because of the calm and concise way you speak. In addition to practicing my English, I learn a lot about cyber security

    • @Alfred-Neuman
      @Alfred-Neuman 2 месяца назад +1

      I learned English by watching lot of RUclips videos like this.
      If you are curious enough and/or determined, you'll be able to write some English poetry pretty soon. ;D

    • @severinghams
      @severinghams Месяц назад

      @@Alfred-Neuman I don't understand foreigners' fascination with English poetry. Why is poetry something that so many non-English speakers flock to when they learn English? Why not debate, or music, or popular speeches, or literature- why _specifically_ poetry? What is so special about poetry?

    • @Alfred-Neuman
      @Alfred-Neuman Месяц назад

      @@severinghams
      How many languages do you speak outside of English?

  • @Supstone8519
    @Supstone8519 2 месяца назад

    Very insightful. Thank you for doing this video.

  • @Adkali
    @Adkali 2 месяца назад

    Love the threat analysis using the dynamic analysis. Again, thanks john for another fun schooling video

  • @PMM619
    @PMM619 2 месяца назад +2

    hey fan from Morocco, all the love !!

  • @valk9789
    @valk9789 2 месяца назад +5

    Treat at the end~ love John's laugh😅❤

  • @cypher2226
    @cypher2226 2 месяца назад +2

    I didn't know about that UAC bypass

  • @antifreeze44
    @antifreeze44 2 месяца назад +6

    You're take on the Apex stuff was AWESOME, thanks John!

  • @Streetrack
    @Streetrack 2 месяца назад

    I really like this one!!

  • @k.g.c.karunathilaka9781
    @k.g.c.karunathilaka9781 2 месяца назад

    Thanks

  • @Duy1P3
    @Duy1P3 2 месяца назад

    I'd really like to see your homelab setup and see how you run things and do your investigations and with what tools and stuff.

  • @YuKonSama
    @YuKonSama 2 месяца назад

    I kind of like the sublime approach to clean the sample up but I also would be interested into automating stuff like this (guess R.E.M has tools for this). For example, deleting variables that are assigned but never used should be a pretty easy task.

  • @memeconnect4489
    @memeconnect4489 2 месяца назад +8

    a lot of danish words in that code

    • @7YBzzz4nbyte
      @7YBzzz4nbyte 2 месяца назад

      Seems to be fluff to obfuscate the code itself. Seems like Danish-inspired gobbledegook, words stacked without meaning, though a scanner would not know (at least not before AI). 😮

  • @ShayBlez
    @ShayBlez 2 месяца назад

    Never thought Id see Bonzi Buddy again.. XD

  • @capability-snob
    @capability-snob 2 месяца назад

    What was the intended use of this .ini file and the class named by the guid?

  • @carsonjamesiv2512
    @carsonjamesiv2512 2 месяца назад

    NICE!😃

  • @Carambolero
    @Carambolero 2 месяца назад +2

    Nice start, but next time if you want to promote a tool, just go to the point and state it in the Title. Tx.

  • @allofabout7064
    @allofabout7064 2 месяца назад

    I hope you discuss Qlin Ransomware, and how to overcome it (recovery)

  • @dipongkorroy6424
    @dipongkorroy6424 2 месяца назад +2

    Love from Bangladesh ❤

    • @user-lq3tv4nd8w
      @user-lq3tv4nd8w 2 месяца назад +1

      Why did you bang ladesh tho, poor fella

  • @eikichi9050
    @eikichi9050 2 месяца назад +1

    Hello Mr Hammond it is possible to defend against these type of attacks? Sorry for my english

    • @UnfiItered
      @UnfiItered 2 месяца назад +4

      If your end users don't use/run vbs/batch/PS1 scripts. You can make a group policy to require UAC to run them or disable them completely.

  • @user-yi4ef2gk1o
    @user-yi4ef2gk1o 2 месяца назад

    NICE this is really menace :)

  • @learnsomething564
    @learnsomething564 2 месяца назад +3

    First one ooooo now i have millions in my account

  • @johnvardy9559
    @johnvardy9559 2 месяца назад

    I love y john

  • @JohnSmith-jc7dk
    @JohnSmith-jc7dk 2 месяца назад

    why vbs is required to deploy remcos and not deploying remcos directly?

    • @UnfiItered
      @UnfiItered 2 месяца назад +1

      Vbs was just a stager to build the powershell to run. Basically the hacker was trying to hide what they were doing behind a bunch of dead end code.

    • @U20E0
      @U20E0 2 месяца назад +1

      The point is that anyone who finds the malware but doesn't know how to handle this (including antiviruses) will likely not try to, which hopefully buys some more time before it gets logged into a malware registry.
      Inflated file sizes also stop VirusTotal and some antiviruses from analysing the file

  • @codytrout3257
    @codytrout3257 2 месяца назад

    Pro tip- change the speed to slower if you cant keep up with the commands fully, yet, like me.

  • @mdfourhadkhan1842
    @mdfourhadkhan1842 2 месяца назад +1

    ❤❤❤❤❤❤

  • @carteldebellamy677
    @carteldebellamy677 2 месяца назад

    Awesome video

  • @Hacker_Solo
    @Hacker_Solo 2 месяца назад

    Where can we obtain this sample for free

  • @RandomytchannelGD
    @RandomytchannelGD 2 месяца назад

    Hi

  • @psbharathkumarachari4005
    @psbharathkumarachari4005 2 месяца назад +2

    hi man
    fan from india

  • @liljeep3631
    @liljeep3631 2 месяца назад

    You guys use uac?

    • @UnfiItered
      @UnfiItered 2 месяца назад +1

      ? Everyone in the AD world uses UAC. You don't want your end users in a lower privilege group policy to just download and run anything without UAC. You're opening yourself up to so many threat vector by doing that.

    • @liljeep3631
      @liljeep3631 2 месяца назад

      @@UnfiItered vector these nuts

    • @UnfiItered
      @UnfiItered 2 месяца назад

      @@liljeep3631 okay, obviously you're a troll.

    • @liljeep3631
      @liljeep3631 2 месяца назад

      @@UnfiItered don’t need uac

    • @UnfiItered
      @UnfiItered 2 месяца назад

      @@nezu_cc other than stealing files via emails and accessing network, everything else should require UAC via group policy (cmd, pwsh, windows native file encryption tools, vbs, portable exe etc..). Even then, group policy should dictate which user have access to which network drive. Outlook is the only email client used. Attachment is disallowed unless sending to internal email.

  • @runandwin5396
    @runandwin5396 2 месяца назад +1

    Chapters please?

  • @frinkifail7063
    @frinkifail7063 2 месяца назад +1

    sure love assimilationist one hundred thirty nine

  • @SlipperyCarrot
    @SlipperyCarrot 2 месяца назад +1

    Whole lot of Danish word in that sample..

  • @bamboozledbamboozler
    @bamboozledbamboozler 7 дней назад

    I... i got so fucking lost. To be fair idk shit but i still find coding nonsense interesting

  • @user-cz1lz5ye4i
    @user-cz1lz5ye4i 2 месяца назад +1

    mom

  • @user-cz1lz5ye4i
    @user-cz1lz5ye4i 2 месяца назад +1

    voice

  • @user-cz1lz5ye4i
    @user-cz1lz5ye4i 2 месяца назад +1

    @#

  • @Monothefox
    @Monothefox 2 месяца назад

    It's in Danish.

  • @iamwitchergeraltofrivia9670
    @iamwitchergeraltofrivia9670 2 месяца назад

    Fucking intel

  • @user-cz1lz5ye4i
    @user-cz1lz5ye4i 2 месяца назад +1

    mobile no.

  • @radityaharya
    @radityaharya 2 месяца назад

    ur audio sounds weird

  • @user-cz1lz5ye4i
    @user-cz1lz5ye4i 2 месяца назад

    bhabhi