IMPORTANT ANNOUNCEMENT: On May 6, 2024, Carbon Black User eXchange (UeX) and Case Management will move to a new platform!
The Community will be in read-only mode starting April 19th, 7:00 AM PDT. Check out the blog post!
You will still be able to use the case portal to create and interact with your support cases until the transition, view more information here!

CB PSC: How to Prevent DRIDEX?

CB PSC: How to Prevent DRIDEX?

Environment

  • CB Defense PSC Console: All Versions
  • CB Defense PSC Sensor: All Versions

Question

What policy rules should be in place to prevent DRIDEX?

Answer

  1. Login to the PSC Console
  2. Select Enforce > Policies 
  3. Select Prevention tab
  4. Ensure the following policy rules are in place
    • Known malware Runs or is running Terminate
    • Adware or PUP Runs or is running Terminate
    • Suspected malware Runs or is running Terminate
    • Applications at Path **\Microsoft Office\** Communicates over the network Terminate

Additional Notes

  • The above recommended policy rules are based on malware analysis performed by the Carbon Black Threat Team
  • Malware analysis by the Carbon Black Threat team, indicates that a network connection from winword.exe to the domain found within the embedded macro is made. Then following the netconn, winword.exe appears to write an executable file to the user’s temp directory. See Malware Analysis: Dridex for more information

Related Content


Was this article helpful? Yes No
100% helpful (1/1)
Article Information
Author:
Creation Date:
‎09-09-2020
Views:
550
Contributors