Subject and predicate in the actions

 

To correctly understand the format used to present the information in the action list, a parallel needs to be drawn with the natural language:

The entity is complemented with a second field which adds information to the action, which is the Hash/Registry Value/Protocol-Direction/Description field.

The example below illustrates two actions carried out by the same hypothetical malware:

Date

Times

Action

Path/URL/Registry_Key/IP:Port

Hash/Registry Value/Protocol-Direction/Description

Trusted

3/30/2015 4:38:40 PM

1

Connects with

54.69.32.99:80

TCP-Bidrectional

NO

3/30/2015 4:38:45 PM

1

Loads

PROGRAM_FILES|\MOVIES TOOLBAR\SAFETYNUT\SAFETYCRT.DLL

9994BF035813FE8EB6BC98ECCBD5B0E1

NO

 

The first action indicates that the malware (subject) connects to (action) the IP address 54.69.32.99:80 (entity) through the TCP-bidirectional protocol.

The second action indicates that the malware (subject) loads (action) the library PROGRAM_FILES|\MOVIES TOOLBAR\SAFETYNUT\SAFETYCRT.DLL with hash 9994BF035813FE8EB6BC98ECCBD5B0E1

As with natural language, two types of sentences are implemented in Adaptive Defense 360:

Examples of active actions are:

Examples of passive actions are:

An example of a passive action is:

Date

Times

Action

Path/URL/Registry_Key/IP:Port

Hash/Registry Value/Protocol-Direction/Description

Trusted

3/30/2015 4:51:46 PM

1

Is executed by

WINDOWS|\ explorer.exe

7522F548A84ABAD8FA516DE5AB3931EF

NO

 

In this action, the malware (passive subject) is run by (passive action) the WINDOWS|\explorer.exe program (entity) with hash 7522F548A84ABAD8FA516DE5AB3931EF

Active actions let you inspect in detail the steps taken by the malware. By contrast, passive actions usually reflect the infection vector used by the malware (which process run it, which process copied it to the user's computer, etc.).

 


Related topics

Forensic analysis using the action tables