Splunk® Enterprise Security

Use Splunk Enterprise Security

This documentation does not apply to the most recent version of Splunk® Enterprise Security. For documentation on the most recent version, go to the latest release.

Scenario: Find malware using Splunk Enterprise Security

Enterprise Security provides statistics and interesting events on security domain specific dashboards. Using the dashboards together, you can build a workflow for investigating threats by reviewing the results, isolating the events that require attention, and using the contextual information provided to drill down into the issue.

Prerequisites

  • Verify that a Splunk platform instance with Splunk Enterprise Security is installed and configured.
  • Verify that logs from an IDS/IPS tool, web proxy software or hardware, and/or an endpoint security product are indexed on a Splunk platform instance.

The Security Posture dashboard

Begin by reviewing the Security Posture dashboard. The dashboard represents a summary of all notable event activity over the last 24 hours. A notable event is the result of a security-oriented correlation search that scans the indexed logs until a match is found. When a notable event is created, it represents a potential issue or threat requiring a review and, depending upon the outcome of the review, an investigation.

This screen image shows the Security Posture dashboard, which summarizes notable events by urgency and time, and also the top notable events and top notable sources in various panels. Details about each panel are available in the surrounding text.

On any given day, there might be tens or hundreds of notable events represented on the Security Posture dashboard. Use the Notable Events By Urgency panel to determine which issue needs your immediate attention.

In the Notable Events Over Time panel, you see a spike in activity labeled "endpoint." The endpoint domain represents host based security, so you know there was a large spike in suspicious activity on the network hosts.

In the Top Notable Events panel, you see the count of notable events sorted by the correlation search name. The panel shows that the number of High Or Critical Priority Host With Malware Detected notable events had a sudden spike. To drill down into those numbers, select the peak count on the sparkline to open another browser window and drill down to the Incident Review dashboard.

Working in Incident Review

Use the Incident Review dashboard to find, assign, analyze, and update notable events.

Prioritize the task

This screen image shows the Incident Review dashboard. You can filter the notables based on several criteria such as Status, Owner, or Security Domain.

The search for High Or Critical Priority Host With Malware Detected ranges over several Urgency levels. The event urgency is calculated based on the priority assigned to a host or asset and the severity assigned to the correlation search.

All urgency levels are selected by default, and the Correlation Search Name is populated with the value "High Or Critical Priority Host With Malware Detected." The bottom portion of the image shows a table listing all the incidents. The table columns, from left to right, are Time, Security Domain, Title, Urgency, Status, Owner, and Actions.

  1. Start the investigation by looking at the notable event labeled Critical.
  2. Remove other notable events from the view by deselecting all other Urgency levels until only Critical remains.
    In a list of urgencies, only Critical remains selected. All other urgencies (High, Medium, Low, Info) are deselected The cursor is shown hovering over the Submit button, indicating that this should be clicked after the desired urgencies are selected.
  3. Click Submit.

The Incident Review dashboard displays only the Critical notable event that was created for a High Or Critical Priority Host With Malware Detected.

Task assignment

Assigning notable events begins a record of activity that you can use for notes and time tracking, and lets other analysts know that an issue is being investigated.

To assign the notable event to your user account:

  1. Use the check box to select the first notable event.
  2. Click the Edit all matching events link on the top left of the table view.
  3. Change the Status field to In Progress, and assign your user as the Owner.
  4. Update the Comment field as required by your company security policy.
  5. Click Save changes to return to the Incident Review dashboard.

Notable event review

The Description field is a summary of the conditions a correlation search must find for you to create a notable event.

  1. Click the arrow next to a notable event to expand the view and display the details of the notable event.
  2. Review the information provided with the notable event.
    This screen image shows a notable event on the Incident Review dashboard that is expanded to reveal additional information, like a description of the event and its raw data.
    Each notable event has a selection of fields that provide contextual information about the issue. The fields are populated with data correlated from the logs of one or more data sources and asset and identities collections.
  3. Review several fields for history about the host or hints of activity. The Urgency assigned to this notable event was partially calculated from the priority assigned to the host.
  4. Begin the investigation into the host by investigating the Destination IP Address. Click the arrow next to the Destination IP Address field to initiate a field action. A field action initiates a new search on another dashboard in Enterprise Security, using the selected field as a filter. This technique helps you to maintain context while opening multiple dashboards or using views during an investigation.
  5. In the field action menu, select Asset Investigator.
    This screen image shows the "Action" item in the "Destination IP Address" field of a notable event selected. A new window has appeared, with the "Asset Investigator" item selected.

A new browser window opens to the Asset Investigator dashboard and begins a search on the selected Destination IP Address.

Working in Asset Investigator

The Asset Investigator dashboard displays data about one asset or host collected and grouped by a common threat category. Each category is represented as a named row of data called a swim lane.

This screen image shows the Asset Investigator page. The destination IP address is shown at the top of the image, along with other details like where the IP address is located and its owner. The main portion of the image shows a table summarizing the events over a period of time. Additional information about the swim lanes and candlesticks are available in the surrounding text.

Each swim lane has a collection of data points called candlesticks. The event count within a candlestick is represented through a heat map. The higher the event count, the darker the color.

If you see too many events in one category, use the time sliders to focus the view down to the time frame where the notable event was triggered. In this example, the time sliders are moved to focus on a group of Malware Attacks.

This screen image shows the table on the Asset Investigator page, with the time selector sliders moved so that only events from a narrower scope of time are visible.

Find the event

At this point, you can follow any number of malware events related to this host. Use the Malware Attacks swim lane to select a candlestick and review the common fields using the Event Panel.

  1. In the Malware Attacks swim lane, select a candle stick.
  2. In the Event Panel find an event marked with a signature of unknown.
    This screen image shows a close up on the table on the Incident Review dashboard, with one of the events in "Malware Attacks" swim lane selected. There is another window on the right side of the image, labeled "Malware Attacks" with information about the attack, like the date and time, action, dest, signature, and user.
  3. Click the Go to Search icon to open another browser window to drill down and search on the selected Destination IP Address.
    This screen image shows the New Search screen, with a search string based on the selected IP address. Raw event data matching matching the search criteria appears in the table on this page.

Drill down to log events

Review the New Search dashboard. The search dashboard is still in Enterprise Security context, as marked by App: Enterprise Security in the top left corner. This mode ensures that the field values, aliases, and other field categories supplied with ES will apply when raw log events are searched from this dashboard.

Examine the drilldown search in the search bar. The process begins by identifying the datamodel | datamodel ("Malware","Malware_Attacks") before calling the normalized host value for the Malware data model | search (dest="x.x.x.x" OR "Malware_Attacks.dest="x.x.x.x"). A datamodel search command searches the indexed data over the time frame, filters the results through the malware data model constraints, and returns any matches.

Enterprise Security does not use accelerated data models for drilldown searches, so it is important to set a time range for faster results. The Malware_Attacks.dest represents the dest_ip field reference in the malware data model.

Identify relevant fields

You can see that the raw event has a lot of information to process. Let's begin by looking at common fields, such as dest_ip, source, and sourcetype. Reviewing these fields, you see that the dest_ip references an internal IP address range. Searching your network device inventory system might tell you what that host or dest_ip represents.

The source and sourcetype identify the events as sourcefire data. After confirming the dest_ip represents a proxy server device, you know that the src_ip field represents other hosts on the internal network accessing data through the proxy.

This screen image shows a closeup of the raw data for an event. The "src_ip," "dest_ip," and "client_app" fields are highlighted.

This event also contains client_app and uri fields. These fields represent traffic from a web browser to a site requesting a download. Let's review which fields in the source logs are relevant, and why.

Field Description
src_ip Represents internal network hosts.
dest_ip Another internal host that was discovered to be a proxy.
uri A record of what is being requested by the hosts.
client_app The browser used.

You know that the Critical notable event represents an unknown malware signature being passed through the proxy server into your network. As you progress through the investigation and followed data flows and requests, you created a list of the key fields relevant to the threat. Because a number of malware downloads are reported by the proxy, expand the search to find the internal hosts that are responsible.

Review a broader timespan of events

Broaden the search by widening the time range and search again.

  1. Select the Date time range button.
  2. Lower the Earliest time field to an earlier time (for example, 02:00:00.000).
  3. Raise the Latest field to a later time (for example, 10:00:00.000).
  4. Click Apply to keep the changes.
  5. Click Search.

The search page now shows multiple similar events that passed through the proxy.

700pxThis screen image shows the search results page. The "Date time range" button is highlighted, indicating that the value has been changed. There are multiple search results on the page, as a result of the expanded period of time configured in the "Date time range."

The search view displays many more events, but may be impractical for summarizing the data by important fields. Changing the search to a table view lets you retain the important fields and reduce the visual clutter. A table can also provide a reference because the results can be exported for reporting.

To view a table of the events sorted by relevant fields, use the search bar to add | table dest src url to the end of the existing search string and click search again.

table dest src url" added to the end of the search string. The resulting table contains only these three columns.

On the page of results, you see a number of common download requests. The .swfl file represents shockwave flash content. Because shockwave is a commonly exploited framework used to run malicious code or exploits, review the relevant fields that describe a shockwave download.


Find an exploited host

On the table of results, select a src field in an event referencing a downloaded shockwave file.

  1. Click the src field.
  2. Select New search.
    A new browser window opens to a search dashboard and begins to search on the selected src field over the time range.
    This screen image shows the search results page with the search string "* src="10.179.200.152". Only events matching this search string appear int the table.
    From the results, you can see additional alerts about this host from other log sources, implying that the specific src is being targeted with multiple forms of attacks. There is a chance that this host has downloaded an exploit from an Internet domain.
  3. Examine the url and file_name fields for the host.
    1. Review the data in a table format to give you a view of the important events.
    2. Use the search bar to add | table url file_name to the end of the existing search string and select search.
      table url file_name" appended to the end of the search string. The results appear in a table only two columns, labeled "url" and "file_name."
    3. Sort the table by selecting the url field.

As you review the results, you can see that a number of executable files were downloaded from the same domains.

At this point, quarantine the infected host based upon the data collected. More information is contained in the proxy logs, such as the domain being used to download the suspicious files. Digging deeper into those logs can provide information to use in active remediation.

Find additional affected hosts

On the table of results, select a url field in an event that references a suspicious domain.

  1. Click the url field.
  2. Click the icon next to New search.
    A new browser window opens to a search dashboard and begins searching on the selected url field over the time range.
    This screen image shows the search results screen, with the search string "* url="http://aa/bbb/ccc/ddd/eee *". Only events matching this search string appear in the table.

Widen the time range to broaden the search

  1. Click Date time range.
  2. Select the Last 24 hours option and click Search.
    You can see that the total count of events reaching out to this domain over the last 24 hours is high.
  3. Review the src field on the field picker to identify a count of the unique hosts attempting a connection to this domain. A number of hosts will require active scanning for malware. A report of all hosts receiving downloads from this domain is a useful resource.

Create reports of the results

Review the data in a table format.

  1. Use the search bar to add | table src url file_name to the end of the existing search string.
  2. Click Search.
    The results show a list of potentially infected hosts including suspicious file names that can be delivered to the endpoint administrator for immediate action.
    table src url file_name" appended to the end of the search string. The results table has only three columns, labeled "src," "url," and "file_name."
    You can export the results to place into a report or an email attachment.
  3. Click the Export button.
    This screen image shows a closeup of the top-right section of the search results page. The icon to export the results to a file is highlighted.
  4. Update the File Name field and save the results in a .csv format.
  5. Click Export to download the results.
  6. (Optional) Click Save As and select Report to save the report.
  7. Fill in the required fields, and write a summary of the report for the Description field.
  8. Click Save to write the report to the search head. The report is private, and available only to the creator by default.

Update the notable event

Before you perform any additional analysis, update the notable event on the Incident Review dashboard. Record any objects or reports that are created, and other actions required to process and close the notable event.

Use the report results for reference and investigation. You can deliver the .csv of hosts and file names to the team monitoring the endpoints.

Malware discovery summary

Using the data provided by the proxy server, Splunk Enterprise Security created notable events when hosts requested downloads from a suspicious domain. The notable events provided a starting point for investigation and included the most relevant fields to examine. By sorting the data and pivoting on those fields, an analyst generated a collection of reports that exposed the internal hosts involved, domains that might be blocked, and common file names that the malware runs as. As the remediation begins, the investigator has all of the critical information to act on the threat.

Last modified on 02 June, 2023
Scenarios using Splunk Enterprise Security   Scenario: Use DNS data to identify malware patient zero

This documentation applies to the following versions of Splunk® Enterprise Security: 7.0.1, 7.0.2, 7.1.0, 7.1.1, 7.1.2, 7.2.0, 7.3.0, 7.3.1, 7.3.2


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters