idaholab / cape2stix

This software allows for the conversion, extraction, and transformation of malware behavior data from "Malware Configuration And Payload Extraction" (CAPEv2) sandbox reports, to Structured Threat Information eXpression (STIX). This allows for further analysis to be performed, sharing of threat data, and transit to a graph database.
BSD 3-Clause "New" or "Revised" License
6 stars 2 forks source link

Something with file hashes #6

Open Fhree99 opened 1 year ago

Fhree99 commented 1 year ago

Might need to remove this as it's nothing more difficult than a single query match, but file hashes are a common observable that is used in threat intelligence. I do not believe there is a way to compare file hashes for similarity within Neo4J. In fact I believe similarity comparison for file hashes they would have to be of a certain type (not MD5). @Rcooley might be able to give insight.Summary - Answering this question would tell us if this binary is considered ransomware.

  Query -

  Picture of Graph -

  Picture of Table -

Might need to remove this as it's nothing more difficult than a single query match, but file hashes are a common observable that is used in threat intelligence. I do not believe there is a way to compare file hashes for similarity within Neo4J. In fact I believe similarity comparison for file hashes they would have to be of a certain type (not MD5). @Rcooley might be able to give insight.

Fhree99 commented 1 year ago

MATCH (f:file WHERE f.hashes =\~ '.[0-9,a-z,A-Z]{64}.' OR f.hashes =\~ '.[0-9,a-z,A-Z]{32}.') RETURN f

Fhree99 commented 1 year ago

We might need to verify that our file objects (or indicators) are actually getting hash values (sha, etc)

Fhree99 commented 1 year ago

While looking at cape2stix code

SHA256 MD5 IF TLSH, SSDeep Any Internal tags (implies) - perhaps throw it in a note object

Take Hashes in STIX bundles

Signatures Sys Calls Double Check Processes Take a look at the difference between the hashes of the main file and hashes of the dropped files.