Cortex XDR Demo - Instructor Guide
Cortex XDR Demo - Instructor Guide
INSTRUCTOR GUIDE
1
©2023 Palo Alto Networks
Summary 34
2
©2023 Palo Alto Networks
Demo Environment
The XDR Demo environment can help you show use cases based on your customer’s needs. To help
streamline the demo experience, you will only need to access the XDR management console. The
infected client devices have already been attacked but the attacks were unsuccessful due to the XDR
agent being installed on the client devices, detecting and then preventing the attacks. The three attacks
that were launched on the client devices are:
1. Phishing and ransomware attack
2. A “watering hole” command & control attack
3. A Linux privilege escalation exploit attack
Although the three attacks listed above have already been executed on client devices, it’s important to
know how these attacks were launched. The following sections will provide insight into the attacks, so as
you review them with the XDR management console, you will have a better understanding of how XDR
detected and prevented the attacks.
Note: Due to the size and display resolution, many of the screenshots in this document may appear
distorted. Highlights and arrows have been provided to help you understand where to click and what to
review on your screen. Your XDR management console will provide clear visibility into the data you
should review as you progress through this demonstration.
Additional Resources:
To help with your pre-sales engagements, additional XDR resources are available on the NextWave
Partner Portal such as customer presentations, how-to videos, competitive information and much more.
If you have any questions or issues pertaining to this lab, feel free to email
[email protected]
3
©2023 Palo Alto Networks
2. When prompted to Sign In, please use one of the accounts listed below, then click Next and
enter the password. Note: Either of these accounts will allow you to login:
Remember, if you receive an Access Denied Error, then you are either not using an incognito / private
browser window and/or you have entered your SSO credentials, and not the ones listed above. Do not
proceed until you have successfully logged into the cloud managed XDR console.
4
©2023 Palo Alto Networks
You have now successfully logged into the XDR management console that will be used throughout the
lab exercises.
5
©2023 Palo Alto Networks
Hopefully your users are smart enough not to fall for such an obvious attempt. Unfortunately many
people are easily tricked and will open the attachment. However, with a properly configured XDR agent
installed, a phishing attempt like this will be detected and prevented as shown here:
6
©2023 Palo Alto Networks
2. Using the menu options presented at the left of the XDR console, navigate to > Incident
Response > Incidents as shown here:
3. Click the trash can icon to remove any existing filter as shown here:
7
©2023 Palo Alto Networks
5. Click Incident ID-3582 to select it. The right half of the screen, XDR will summarize the alerts
and insights of the attack, providing the number & severity of alerts, the hosts and users
involved in the incident and MITRE ATT&CK Tactics and Techniques seen in the incident.
6. Note: If you do not see the Alerts & Insights option as shown above, you might be in the legacy
view. Make sure you are in the Advanced layout, but clicking the drop-down next to legacy view,
and toggling the view to the Advanced layout
8
©2023 Palo Alto Networks
8. Click the Include Incident Insights checkbox as shown below. This will provide more detailed
information about tactics and techniques identified in the incident:
9
©2023 Palo Alto Networks
10. The analysis report shows you a detailed view of the processes and timeline of events that
occurred when the user double-clicked the infected invoice document. Shown below is the
analysis report of what WildFire captured. Explore this information, and then close the Wildfire
Analysis Report when you have finished reviewing the analysis.
10
©2023 Palo Alto Networks
12. Click the Expand link on the right, and the flowchart will enlarge the view and provide more
detailed information about each step of the attack.
11
©2023 Palo Alto Networks
14. Locate the WINWORD.EXE process. Notice a small graphical representation of the execution
steps is shown. XDR also identifies the “Causality Group Owner”, with the CGO tag (in this
example, winword.exe). This is what XDR believes to be the root cause of the incident.
12
©2023 Palo Alto Networks
13
©2023 Palo Alto Networks
4. Using the graphical flowchart, click the powershell.exe icon (there are multiple in the
flowchart; click the one that is to the left of reg.exe). Notice that PowerShell is being used
by the attacker to also disable the Windows firewall notifications in the registry:
14
©2023 Palo Alto Networks
6. You can also view the Alerts tab for more contextual information about what happened at
this moment in time:
15
©2023 Palo Alto Networks
8. Continue walking through the remaining nodes to view more information about the attack.
9. Several executables have been highlighted in red. Click any of the exe files in the chain that
are highlighted in red. Like the Incident page, these indicate that Wildfire identified these as
malicious files. This information, along with the fact that they are unsigned is also presented
in the lower portion of the screen.
16
©2023 Palo Alto Networks
11. Since XDR eventually prevented the ransomware from encrypting the drive, no immediate
action is necessary at this time, however analysts can use the data collected to better
understand the root cause and scope of an attack’s effect on the environment for
remediation.
12. Close the expanded chart view by clicking the X in the upper right of your screen (you will
not be able to access menu items until you close this window)
The XDR agent is actively monitoring various processes and looking for unusual events. Unlike traditional
antivirus that uses static rules and heuristics, XDR has the ability to detect suspicious activity inside
processes and successfully prevent attacks and exploits from occurring.
The amount of detailed data that the agent collects and forwards to the management console is critical
in helping an analyst fully understand all aspects of the attack.
Initially the XDR agent was set to an “Alert Only” mode which allowed the attack to execute, so that you
are able to gain deep insight into the data that is available. However, a properly configured XDR agent
will prevent these types of attacks and provide detailed visibility for the analyst.
17
©2023 Palo Alto Networks
18
©2023 Palo Alto Networks
19
©2023 Palo Alto Networks
2. Notice that Incident-3582 is the same incident used in the previous demonstration. As
mentioned earlier, this is because XDR can analyze multiple security alerts and combine them
into larger incidents. Click the Executions tab and then click the group owner: gcc64_win.exe
section:
20
©2023 Palo Alto Networks
4. Here you can see that gcc64_win.exe was identified as malicious by Wildfire by its node being
red in the causality chain. gcc64_win.exe acts as a dropper in this attack to gather and
exfiltrate system information and credentials, and install Command and Control software,
and establish persistence. Let's walk through how this is accomplished.
21
©2023 Palo Alto Networks
6. Click the certutil.exe node and then click the Network tab. Network connections are also
recorded by XDR so you can identify where this was downloaded from. You may need to
scroll through the various columns to find this information.
22
©2023 Palo Alto Networks
8. You can see a scheduled task is created to run “svchosts.exe” on startup under the name
“Google Cloud Agent”.
23
©2023 Palo Alto Networks
10. Click the dumpster.exe icon in the flowchart view. Upon establishing persistence via this
scheduled task, another executable downloaded by the dropper, “dumpster.exe” is used to
dump lsass in an attempt to harvest credentials, again triggering XDR alerts
24
©2023 Palo Alto Networks
12. Next, a dropped copy of nc.exe (netcat) is used to exfiltrate both the lsass memory dump and
the collected system information, which XDR notifies us about
25
©2023 Palo Alto Networks
Note: As this is a self-contained lab environment, the “lateral move” is actually just an upload to
localhost for purposes of demonstration.
This level of detail that XDR collects and presents to analysts is valuable if/when an attacker can bypass
an enterprise’s defenses, or when using “living off the land” techniques, enabling analysts to identify the
root cause and initial attack vector for future prevention, as well as ascertaining the scope of an attack’s
effect on the environment for remediation.
XDR not only will prevent these types of malicious files from being allowed to execute, but also provides
extensive analytics to the agent allowing deep forensic investigations to take place.
26
©2023 Palo Alto Networks
However, on a different Linux client, the XDR agent is installed and the attacker runs the same exploit
script hoping to gain root access. As shown below, XDR is configured to block such attacks and
successfully blocks the attempt.
27
©2023 Palo Alto Networks
2. Click the Alert & Insights tab. You will see that XDR prevented the attempt to gain escalated
privileges as shown below (Note, you may need to collapse the incidents section on the left
of your screen and/or scroll right using the scroll bar at the bottom of your screen to see the
Action and Description fields)
3. Unlike the two previous scenarios, you won’t need to spend much time reviewing the XDR
data, other than to demonstrate how a properly configured agent can successfully stop
various attacks when properly configured.
28
©2023 Palo Alto Networks
Using XQL
1. Using the left menu options, navigate to > Incident Response > Query Builder and then click
the XQL Search button. (Remember, if the menu options aren’t responding, make sure to
close the expanded flowchart view).
2. Click the Query Library tab and then type the word failed in the search box to narrow the list
of available queries and then click the Failed Windows Login Attempts.
29
©2023 Palo Alto Networks
4. Once loaded, you can view or modify the query as necessary as well as adjust the time frame.
The query also has comments to explain what each line does. Drag the separator bar down if
you need to see more of the query.
30
©2023 Palo Alto Networks
6. After the query finishes running, the results will be displayed in the lower pane. You can see
a suspicious user has many failed login attempts. These types of security anomalies can be
the jumping-off point for a threat hunting investigation.
31
©2023 Palo Alto Networks
2. These charts and queries can be saved as dashboard widgets so analysts can have quick
access to the information for future investigations. One such dashboard has been created
with several other example queries. Navigate to >Dashboards & Reports > Dashboard.
32
©2023 Palo Alto Networks
4. You will see the failed login query and several other XQL charts and graphs displayed.
33
©2023 Palo Alto Networks
34
©2023 Palo Alto Networks