7. LogScan

The LogScan module processes *.log files found on disk line by line (It performs some checks to avoid scanning files that are not ASCII log files, but something else that uses the *.log extension). Each log line is checked with all file name and keyword IOCs and scanned with the "keyword" and "log" type YARA rules.

7.1. Samples

Aug 26 18:58:32 System23.local.net/10.2.2.14
THOR: Warning: MODULE: LogScan
MESSAGE: Suspicious file name in Log Entry detected
ELEMENT: Deleted file - E:\TEAM-TRANSFER\4Helmut\Tools\PortScan.exe
PATTERN: \PortScan.exe
SCORE: 65
DESC: PortScanner Names
FILE: D:\ scripts\log\TEAM-TRANSFER.CLEANUP.cmd.2015-09-27.log
LINE: 320
Aug 27 10:40:30 System23.local.net/10.2.2.14
THOR: Warning: MODULE: LogScan
MESSAGE: Suspicious file name in Log Entry detected
ELEMENT: /EN/cmd.exe /c+dir "C:\data\inetpub\wwwroot\EN\cmd.exe" 404 "SW0123" - -2147024864 - - 0 10.10.9.24 443 - "gi.webshop.com" - 09:48:18.024 "HTTP/1.1" "https" 1405 102
PATTERN: ([C-Zc-z]:|\\).{1,40}\

7.2. Typical False Positives

  • Web vulnerability scans trying to access files that do not exist (HTTP Error 404)

  • RoboCopy logs that list hack tools like nmap.exe or ncat.exe

7.3. Attribute Evaluation

Attribute

Question

Answer

Indication

Weight

FILE

Does the path include a timestamp that indicates very old data? (e.g. C:\wwwroot\logs\2003-04-17-access.log)

Yes

Good

Medium

ELEMENT

Does an investigation for the remote IP address return negative or suspicious results?

Yes

Bad

High

ELEMENT

Does the web server access log line include a response code 404? (404: file not found, see the example above)

Yes

Good

Medium

ELEMENT

Does the element show an Antivirus alert? Antivirus alerts often go unnoticed / it is recommended to include them in the reports

Yes

Bad

Medium

ELEMENT

See chapter File Path Checks