Kukuk
Versi integrasi: 10.0
Mengonfigurasi integrasi Cuckoo di Google Security Operations
Mengonfigurasi integrasi Cuckoo dengan sertifikat CA
Anda dapat memverifikasi koneksi dengan file sertifikat CA jika diperlukan.
Sebelum memulai, pastikan Anda memiliki hal berikut:
- File sertifikat CA
- Versi integrasi Cuckoo terbaru
Untuk mengonfigurasi integrasi dengan sertifikat CA, selesaikan langkah-langkah berikut:
- Parse file sertifikat CA Anda ke dalam String Base64.
- Buka halaman parameter konfigurasi integrasi.
- Masukkan string di kolom CA Certificate File.
- Untuk menguji bahwa integrasi berhasil dikonfigurasi, centang kotak Verifikasi SSL, lalu klik Uji.
Mengonfigurasi integrasi Cuckoo di Google SecOps
Untuk mendapatkan petunjuk mendetail terkait cara mengonfigurasi integrasi di Google SecOps, lihat Mengonfigurasi integrasi.
Parameter integrasi
Gunakan parameter berikut untuk mengonfigurasi integrasi:
Nama Tampilan Parameter | Jenis | Nilai Default | Wajib | Deskripsi |
---|---|---|---|---|
Nama Instance | String | T/A | Tidak | Nama Instance yang ingin Anda konfigurasi integrasinya. |
Deskripsi | String | T/A | Tidak | Deskripsi Instance. |
Root API | String | http://x.x.x.x:8090 | Ya | Alamat instance Cuckoo. |
Alamat Antarmuka Web | String | http://x.x.x.x:8000 | Ya | Alamat instance Cuckoo Web UI. |
Nilai Minimum Peringatan | Bilangan bulat | 5,0 | Ya | T/A |
File Sertifikat CA | String | T/A | Tidak | T/A |
Verifikasi SSL | Kotak centang | Tidak dicentang | Tidak | Gunakan kotak centang ini jika koneksi Cuckoo Anda memerlukan verifikasi SSL. |
Menjalankan dari Jarak Jauh | Kotak centang | Tidak dicentang | Tidak | Centang kolom untuk menjalankan integrasi yang dikonfigurasi dari jarak jauh. Setelah dicentang, opsi akan muncul untuk memilih pengguna jarak jauh (agen). |
Token API | Sandi | T/A | Tidak | Token API integrasi. |
Tindakan
Meledakkan File
Deskripsi
Mengirimkan file untuk dianalisis dan mendapatkan laporan, juga dikenal sebagai asinkron.
Parameter
Nama Tampilan Parameter | Jenis | Nilai Default | Wajib | Deskripsi |
---|---|---|---|---|
Jalur File | String | T/A | Ya | Jalur file yang akan dikirimkan. |
Run On
Tindakan ini dijalankan di semua entity.
Hasil Tindakan
Hasil Skrip
Nama Hasil Skrip | Opsi Nilai | Contoh |
---|---|---|
max_score | T/A | T/A |
Hasil JSON
{
"powershell8693919272434274241.ps1": {
"info": {
"category": "file",
"added": 1547640117.991152,
"monitor": "22c39cbb35f4d916477b47453673bc50bcd0df09",
"package": "ps1",
"started": 1547640190.471362,
"route": "internet",
"custom": null,
"machine": {
"status": "stopped",
"shutdown_on": "2019-01-16 12:28:55",
"started_on": "2019-01-16 12:03:16",
"manager": "VirtualBox",
"label": "win7x6427",
"name": "win7x6427"
},
"ended": 1547641736.394026,
"score": 6.6,
"platform": "windows",
"version": "2.0.6",
"owner": null,
"git": {
"head": "03731c4c136532389e93239ac6c3ad38441f81a7",
"fetch_head": "03731c4c136532389e93239ac6c3ad38441f81a7"
},
"options": "procmemdump=yes,route=internet",
"id": 889621,
"duration": 1545
},
"signatures":
[{
"families": [],
"description": "HTTP traffic contains suspicious features which may be indicative of malware related traffic",
"name": "network_cnc_http",
"markcount": 1,
"references": [],
"marks":
[{
"suspicious_features": "Connection to IP address",
"type": "generic",
"suspicious_request": "GET http://1.1.1.1:8080/"
}],
"severity": 2
}, {
"families": [],
"description": "Connects to smtp.live.com, possibly for spamming or data exfiltration",
"name": "smtp_live",
"markcount": 1,
"references": [],
"marks":
[{
"category": "domain",
"type": "ioc",
"ioc": "smtp.live.com",
"description": null
}],
"severity": 2
}, {
"families": [],
"description": "Connects to smtp.mail.yahoo.com, possibly for spamming or data exfiltration",
"name": "smtp_yahoo",
"markcount": 1,
"references": [],
"marks":
[{
"category": "domain",
"type": "ioc",
"ioc": "smtp.mail.yahoo.com",
"description": null
}],
"severity": 2
}]
}
}
URL Detonasi
Deskripsi
Mengirim URL untuk dianalisis dan mendapatkan laporan, juga dikenal sebagai asinkron.
Parameter
T/A
Run On
Tindakan ini dijalankan pada entity URL.
Hasil Tindakan
Hasil Skrip
Nama Hasil Skrip | Opsi Nilai | Contoh |
---|---|---|
is_success | Benar/Salah | is_success:False |
Hasil JSON
[
{
"EntityResult": {
"info": {
"category": "url",
"git": {
"head": "03731c4c136532389e93239ac6c3ad38441f81a7",
"fetch_head": "03731c4c136532389e93239ac6c3ad38441f81a7"
},
"monitor": "22c39cbb35f4d916477b47453673bc50bcd0df09",
"package": "ie",
"started": null,
"route": "internet",
"custom": null,
"machine": {
"status": "stopped",
"shutdown_on": "2019-01-16 13:14:26",
"label": "win7x6412",
"manager": "VirtualBox",
"started_on": "2019-01-16 12:48:54",
"name": "win7x6412"
},
"ended": 1547644467.207864,
"added": null,
"id": 889669,
"platform": null,
"version": "2.0.6",
"owner": null,
"score": 4.4,
"options": "procmemdump=yes,route=internet",
"duration": null
},
"signatures": [{
"families": [],
"description": "HTTP traffic contains suspicious features which may be indicative of malware related traffic",
"name": "network_cnc_http",
"markcount": 1,
"references": [],
"marks": [{
"suspicious_features": "Connection to IP address",
"type": "generic",
"suspicious_request": "GET http://1.1.1.1:8080/"
}],
"severity": 2
}, {
"families": [],
"description": "Performs some HTTP requests",
"name": "network_http",
"markcount": 9,
"references": [],
"marks": [{
"category": "request",
"ioc": "GET http://crl.microsoft.com/pki/crl/products/WinPCA.crl",
"type": "ioc",
"description": null
}, {
"category": "request",
"ioc": "GET http://www.microsoft.com/pki/crl/products/WinPCA.crl",
"type": "ioc",
"description": null
}, {
"category": "request",
"ioc": "GET http://crl.microsoft.com/pki/crl/products/MicrosoftTimeStampPCA.crl",
"type": "ioc",
"description": null
}],
"severity": 2
}, {
"families": [],
"description": "Communicates with host for which no DNS query was performed",
"name": "nolookup_communication",
"markcount": 11,
"references": [],
"marks": [{
"host": "1.1.1.1",
"type": "generic"
}, {
"host": "1.1.1.1",
"type": "generic"
}, {
"host": "1.1.1.1",
"type": "generic"
}],
"severity": 3
}]},
"Entity": "http://digi.ba/eng/#pgc-56-0-0"
}
]
Pengayaan Entity
Entitas ditandai sebagai mencurigakan (Benar) jika skor melebihi nilai minimum. Jika tidak: Salah.
Nama Kolom Pengayaan | Logika - Kapan harus menerapkan |
---|---|
Cuckoo_Score | T/A |
task_id | T/A |
Dapatkan Laporannya
Deskripsi
Mendapatkan laporan tugas tertentu berdasarkan ID, juga dikenal sebagai asinkron.
Parameter
Nama Tampilan Parameter | Jenis | Nilai Default | Wajib | Deskripsi |
---|---|---|---|---|
ID Tugas | String | T/A | Ya | ID tugas. Contoh: 10 |
Run On
Tindakan ini dijalankan di semua entity.
Hasil Tindakan
Hasil Skrip
Nama Hasil Skrip | Opsi Nilai | Contoh |
---|---|---|
skor | T/A | T/A |
Hasil JSON
{
"info": {
"category": "file",
"added": 1547640117.991152,
"monitor": "22c39cbb35f4d916477b47453673bc50bcd0df09",
"package": "ps1",
"started": 1547640190.471362,
"route": "internet",
"custom": null,
"machine": {
"status": "stopped",
"shutdown_on": "2019-01-16 12:28:55",
"started_on": "2019-01-16 12:03:16",
"manager": "VirtualBox",
"label": "win7x6427",
"name": "win7x6427"
},
"ended": 1547641736.394026,
"score": 6.6,
"platform": "windows",
"version": "2.0.6",
"owner": null,
"git": {
"head": "03731c4c136532389e93239ac6c3ad38441f81a7",
"fetch_head": "03731c4c136532389e93239ac6c3ad38441f81a7"
},
"options": "procmemdump=yes,route=internet",
"id": 889621,
"duration": 1545
},
"signatures": [{
"families": [],
"description": "HTTP traffic contains suspicious features which may be indicative of malware related traffic",
"name": "network_cnc_http",
"markcount": 1,
"references": [],
"marks": [{
"suspicious_features": "Connection to IP address",
"type": "generic",
"suspicious_request": "GET http://1.1.1.1:8080/"
}],
"severity": 2
}, {
"families": [],
"description": "Connects to smtp.live.com, possibly for spamming or data exfiltration",
"name": "smtp_live",
"markcount": 1,
"references": [],
"marks": [{
"category": "domain",
"type": "ioc",
"ioc": "smtp.live.com",
"description": null
}],
"severity": 2
}, {
"families": [],
"description": "Connects to smtp.mail.yahoo.com, possibly for spamming or data exfiltration",
"name": "smtp_yahoo",
"markcount": 1,
"references": [],
"marks": [{
"category": "domain",
"type": "ioc",
"ioc": "smtp.mail.yahoo.com",
"description": null
}],
"severity": 2
}]
}
Ping
Deskripsi
Uji Konektivitas.
Parameter
T/A
Run On
Tindakan ini dijalankan di semua entity.
Hasil Tindakan
Hasil Skrip
Nama Hasil Skrip | Opsi Nilai | Contoh |
---|---|---|
is_success | Benar/Salah | is_success:False |
Perlu bantuan lain? Dapatkan jawaban dari anggota Komunitas dan profesional Google SecOps.