Aurora Agent Overview EN 2022 Mar
Aurora Agent Overview EN 2022 Mar
Sysmon Aurora
Event Source Sysmon Kernel Driver ETW (Event Tracing for Windows)
Sigma Rule Event Coverage 100% 95%
Relative Log Volume High Low
Sigma and IOC Matching No Yes
Response Actions No Yes
Resource Control (CPU Load, Output Throttling) No Yes
Output: Eventlog Yes Yes
Output: File No Yes
Output: TCP / UDP target No Yes
Risk: Blue Screen Yes No
Risk: High System Load Yes No
Risk: Incomplete Data due to Filters Yes No
Key Benefits 1/2
Key Benefits 2/2
Response Actions
Ransomware Example
§ Use Sigma to detect a threat
§ Add a response action
Sigma Rule with Response
§ Predefined
§ Kill a process or parent process
§ Suspend a process
§ Dump process memory
§ Custom
§ A custom command line that can
make use of environment
variables and the event’s values
e.g. copy %Image%
%%ProgramData%%\%ProcessId%.bin
Steps:
§ Start cmd.exe as
Administrator
§ Change to the extracted
program folder
§ Run:
aurora-agent-64.exe
Steps:
§ Run:
aurora-agent-64.exe --help
Steps:
§ Start cmd.exe as
Administrator
§ Change to the extracted
program folder
§ Run:
aurora-agent-64.exe --install
§ Check the agents status
with:
aurora-agent-64.exe --status
Function Tests and Event Review
Steps:
§ Start cmd.exe as Administrator
§ Run:
whoami /priv
§ Open the EventViewer and go to
“Application”
§ Look for the source “Aurora
Agent”
§ Select the “Details” Tab
§ Review the event information
Update Aurora and Signatures
Steps:
§ Start cmd.exe as Administrator
§ Change directory to
“C:\Program Files\Aurora-Agent”
(service) or the extracted program
folder, e.g. “C:\aurora” (standalone)
§ Run
aurora-agent-util.exe upgrade
More information:
https://aurora-agent-manual.nextron-systems.com/en/latest/usage/configuration.html#output-options
Configuration Presets
§ Intense -c agent-config-intense.yml
TLDR; every reasonable input activated, no limits
ETW
More information:
https://aurora-agent-manual.nextron-systems.com/en/latest/usage/configuration.html
Response Presets
Aurora comes with several presets that help you select the
recommended response for a given use case
Response Sigma Rules
--response-set ransomware.yml --activate-responses
Presets
This way you don’t have to review all 1000+ rules and select
the ones that you want to see blocked
responses
Process
More information:
https://aurora-agent-manual.nextron-systems.com/en/latest/usage/responses.html
The Cool Stuff
Features that make Aurora great
IOC Application
e.g.
*some event types & fields may not be available in the first release version, but the most
important ones
Reduced Log Volume
Sysmon
Sysmon Logs
Config
SIEM /
High Volume
Events Aurora Agent
Log Database
e.g.
§ Applies Sigma rules
§ Process Access § Only sends matches to backend
§ File Write Access Only Aurora Agent Matches
ETW § Handle Access e.g.
Channels § Network § Named pipe used by CobaltStrike
Connections § Suspicious access to LSASS
§ Suspicious network connection
from executable running in
%Public% folder
Recreation of Sysmon-like Events in Aurora
Kernel
Percentage of Percentage of
Event / Fields Event / Fields
Event ID 1: Process Creation used in Sigma Rules
ProcessID
Image
ParentImage
CommandLine
ETW Hash
~70% ~95%
…
Event ID 2: A process changed a file creation time
Event ID 3: Network connection
Event ID 4: Sysmon service state change
Event ID 5: Process Terminated
Event ID 6: Driver loaded
ImageLoaded
Hashes
Signature
SignatureStatus
ASGARD and Aurora Agent
Explorer.exe Outlook.exe
Sigma Rule
Match
Winword.exe cmd.exe
recursive: true
Powershell.exe Vssadmin.exe
Affected Processes
odh1kd.exe
Action: Kill, Recursive, LowPrivOnly, Ancestors: All
Explorer.exe Outlook.exe
Sigma Rule
lowprivonly: true Match
recursive: true
Winword.exe cmd.exe
ancestors: all
recursive: true
Powershell.exe Vssadmin.exe
recursive: true
odh1kd.exe
Affected Processes