Quantcast
Channel: Symantec Connect: Symantec Protection Center Product Group
Viewing all articles
Browse latest Browse all 60

SEP Deception - Process Deceptor implementation

$
0
0

Symantec's deception is a way to create bait on the endpoint and wait for the intruder to trip it and log the event. 

Since this is an endpoint protection, it is assumed that the intruder has come past the perimeter level protection and is trying lateral movement using the endpoints, steal admin credentials etc. There are multiple deceptors available with Symantec and more on it in the below documents. 

Endpoint Protection Deception

A look at Deception

Below is a guide to test the Process termination deceptor. 

The Process termination deceptor policy comes with the SEP 14 package, under the tools folder. Indise tools/deception folder the required HI & ADC policies are available along with a guide to implement the same. 

Copy the policies to the SEPM server. Open SEPM > goto policies > Host Integrity > Import a Host Integrity policy > choose the "Deception Process Termination Deployment" HI policy.

Once the policy is imported, enable the checkbox that says Deliver the process termination deceptor. This is how the bait process is delivered on the endpoint. 

Now import the Add the ADC policy "Deception ADC Monitoring - Process Termination" using the same steps and check the box "Monitor Process Termination Deceptor"

Add the HI & ADC policies to a test group. 

Clients > <Deception Test group> Policies > Add a policy > Choose Host Integrity Policy. Click on Next

Choose "Use an Existing Policy"> Next 

Choose the imported Process Termination Policy and click OK.

If a Host Integrity policy already exists, you can copy the HI requirements from the Imported policy and paste it in the existing HI policy. 

Follow the same steps to import the given ADC policy. Now the Policies are applied to the test group where the test client is moved. 

Once the policies are applied to the client based on its heartbeat interval, the deceptors will be deployed.

The process termination deceptor creates a fake process in the name of a AV product. An intruder trying to get rid of the AV on the endpoint to avoid detection is expected to kill this process. 

Below are the list of AV processes that the HI policy would create. 

 avgserv.exe  
 Ad-Aware.exe  
 f-prot.exe  
 kavlite40eng.exe  
 mcshield.exe  
 ccapp.exe  
 ccevtmgr.exe  
 ccpxysvc.exe  
 nmain.exe  
 navw32.exe

The process deceptor can be identified by using a Process Explorer.

Here, kavlite40eng.exe is the bait process. 

You can select the bait process and kill it.

This will trigger the monitoring ADC policy to send a log to SEPM. We can see the logs on SEPM once it is enabled. 

Open SEPM installation directory > goto \tomcat\etc > open conf.properties using notepad. 

Scroll all the way down and add the below line. 

scm.deception.enabled=true

Save the notepad and exit. 

Start > Run > Services.msc > choose the SEPM services and restart them.  

Now that the logging is enabled, you should see the Deception logs on the SEPM. 

Open SEPM > Monitors > Log Type: Deception > View Logs

Note that the column "Caller Process" gives information about how the bait process was terminated. Here it says procexp64.exe which is the process explorer application. 

Various methods of killing the process were tried. Remote killing of the process was also logged. But killing it from the same machine did not log. Possibly a feature to avoid false positive. 

The killed process will be replaced with a new bait process within few minutes. You can see the new bait process navw32.exe below

The deceptor can be removed by applying the HI policy

And the ADC policy should also be removed.

Hope it helps. 


Viewing all articles
Browse latest Browse all 60

Latest Images

Trending Articles



Latest Images