Threat Hunting Hypothesis Examples: Prepare For a Good Hunt!

cybersecurity visualization

A good threat hunting hypothesis is key to identifying weak spots in an organizationā€™s digital infrastructure. Just learn to ask the right questions, and you will get the answers that youā€™re looking for. In this blog post, we review a proactive threat hunting methodology: Hypothesis-Driven Threat Hunting. Letā€™s dive right in!

Detect & Hunt Explore Threat Context

What is a Threat Hunting Hypothesis?

A threat hunting hypothesis is an informed assumption about a cyber-attack or any of its components. Just like in scientific research, in hypothesis-driven threat hunting, Threat Hunters make hypotheses the foundation of their investigations.

Once a hypothesis is made, a Threat Hunter must take steps to test it. It is in the strategy for testing the hypothesis that most of the threat hunting work is completed (e.g., forming a useful query often takes longer than its execution). This often includes identifying related data sources (security events, system logs, etc.), relevant analysis techniques (querying, stack counting, etc.), and then taking action on this strategy.Ā 

Threat hunting hypothesis facilitates a proactive cyber defense routine. One of the many variants of the latter consists of:

  • Predicting adversary behavior
  • Suggesting ways to find a threat
  • Detecting anomalies, intrusions, baseline/threshold hits
  • Studying event correlation
  • Testing samples in sandboxes, honey pots, and emulated environments
  • Documenting results
  • Improving the protection of assets and infrastructure
  • Performing mitigationĀ 
  • Informing authorities (if applicable)

Overall, the success of threat hunting greatly depends on an insightful hypothesis, so letā€™s see how to make one.

How to Generate a Hypothesis for a Threat Hunt?

To make it easier at the beginning, you can think of threat hunting hypotheses as kind of user stories but from malwareā€™s perspective.Ā 

Threat Hunting Hypothesis #1

  • As a [malicious script], I want to [send a request via TCP port 50050] so I can [establish connection].
  • As an [infected zip], I want to [use WMI] so I can [maintain persistence].
  • As a [Javascript code], I want to [exploit BITSAdmin] so I can [download modules].

Alternatively, letā€™s make a hypothesis from an attackerā€™s perspective.

Threat Hunting Hypothesis #2

As an APT37 (North Korea), I want to attack the US government for political reasons, so I’ll use Cobalt Strike in T1218.011, planting rundll32 for proxy execution of malicious code.

However, there is no single template of a ā€œrightā€ format for a threat hunting hypothesis. For example, they can also be more complex than just one sentence. For malware that executes a multi-stage kill chain, a threat hunting hypothesis might also include a few points.Ā 

Threat Hunting Hypothesis #3

Malware X:
Executes a command via EXE file
Imports and executes PowerShell cmdlets from an external source
Runs a local .NET binary
Uses setenv() function to add the variable to the environment

Now letā€™s move on to more complex examples.

Advanced Threat Hunting Hypotheses

Threat hunting hypotheses can be operational, like the examples above, or tactical and strategic. Seasoned Threat Hunters can formulate broader hypotheses that can nevertheless result in finely targeted tests. To do that, they need to include:

  • Domain expertise – having experience, sharing knowledge
  • Situational awareness – knowing internal infrastructure, vulnerabilities, core assets
  • Intelligence – pulling threat intelligence data like IOCs and TTPs

Apply all of the above to formulate a deeply analytical hypothesis about what systems attackers will target and what they will try to achieve.Ā 

For example, a Threat Hunter Bob has been researching some IOCs obtained through a threat intel feed. Having done a Crown Jewels Analysis (CJA), he knows that their companyā€™s jewel in the crown is the place where they store proprietary algorithms. His experience with previous hunts and a talk with a fellow researcher Alice allow suggesting the most likely adversary behavior in a given situation. So he formulates a hypothesis.

Threat Hunting Hypothesis #4

Attackers that tried to gain initial access through a phishing email will do lateral movement and privilege escalation to get to the heart of the system and exfiltrate data.

Hypotheses can also be targeted not at predicting the future steps of the attackers but at understanding patterns, dependencies, and so on. In other words, seeing the whole picture.

Where do they have their C2 servers? How do they obfuscate them? How do they maintain persistence? Whatā€™s the relationship between specific servers and various attack campaigns?

In this case, cybersecurity is not just about seeing issues and quickly remediating them. Itā€™s also necessary to ask questions. A bit like investigative journalism with its 5W rule:

  • Who
  • What
  • When
  • Where
  • Why

Because often the situation is like this. There are multiple events in multiple places. Millions of scripts, scheduled tasks, files, and user actions. They all do something. Those various events might be stages of a kill chain. But you donā€™t know that because a malware piece encrypted itself and hid somewhere in a legitimate file. It also stole certificates, so it executes as part of the reputable software that the company bought. You mightā€™ve taken care of IOCs, but it was not enough. The company might be spied on, but thereā€™s no hard evidence of that. So on the surface, nothing catastrophic happened. A hypothesis will help to identify such a sophisticated attack or prove an absence of it.

Threat Hunting Hypothesis #5

A state-sponsored threat actor A uses the same C2 servers as threat actor B, so they might be part of the same botnet. They use a software pipeline infection and plant malware with a 1-2 weeks dormant period before triggering reconnaissance which lasts 2-6 months. If our scan shows obfuscated data inside legitimate binaries, we should look for signs of establishing a connection with a C2 server so we can conclude that those files are malware.Ā 

Conclusion

Practice makes perfect, so donā€™t worry if things like threat reports and raw data look a little gibberish to you at the start. Learn computer science subjects like networks, low-level languages, and application architecture to feel more comfortable with specific terms and numeric values (like port numbers, etc.) Anyway, thereā€™s always lots of information to deal with – donā€™t feel discouraged if you donā€™t understand everything you come across. Itā€™s barely possible to know it all, so using Google sometimes helps a lot, too.Ā 

A good threat hunting hypothesis allows one to arrive at valuable conclusions and prevent possible attacks. Moreover, it helps Threat Hunters to examine the right data at the right time instead of having to search through millions of logs for millions of likely reasons. Join our Detection as Code platform to gain access to near real-time detection algorithms compatible with 25+ SIEM, EDR, and XDR solutions and instantly search for the latest threats in your environment.

Was this article helpful?

Like and share it with your peers.
Join SOC Prime's Detection as Code platform to improve visibility into threats most relevant to your business. To help you get started and drive immediate value, book a meeting now with SOC Prime experts.

Related Posts