CAS-004 Exam QuestionsBrowse all questions from this exam

CAS-004 Exam - Question 147


An analyst received a list of IOCs from a government agency. The attack has the following characteristics:

1. The attack starts with bulk phishing.

2. If a user clicks on the link, a dropper is downloaded to the computer.

3. Each of the malware samples has unique hashes tied to the user.

The analyst needs to identify whether existing endpoint controls are effective. Which of the following risk mitigation techniques should the analyst use?

Show Answer
Correct Answer: D

The analyst should detonate the malware in a sandbox. This involves executing the malicious files in an isolated environment where their actions can be safely observed. By doing so, the analyst can understand how the malware operates, assess whether existing endpoint security controls can detect and mitigate the malware during its execution, and gather intelligence that can be used to enhance detection and response strategies. This approach allows the analyst to evaluate the effectiveness of current defenses without risking further compromise of the production environment.

Discussion

9 comments
Sign in to comment
ThatGuyOverThereOption: D
Oct 20, 2023

Detonate in sandbox is the best answer. Many email protection solutions provide sandbox detonation as an automated process, the one I manage included. You cannot block the exe based on filename because that's too easy change, and it's already been demonstrated that the hash changes every time.

unBREAKable_Fs4Option: D
Mar 8, 2023

D. Detonate in a sandbox Sandbox Detonation is a preventative approach in which a security team intentionally sets of, or execution (that is detonated) the payload of a malicious file to determine what it will do and how to address it.

AlizadehOption: D
Aug 29, 2023

The answer is D. Detonate in a sandbox.

pawnpusherOption: B
Aug 26, 2023

Block the executable by the given IOC's, Just use the filename since hashes are unique.

NnatechOption: D
Aug 29, 2023

Detonating the malware samples in a sandboxed environment is a crucial step in analyzing their behavior and understanding their capabilities. Sandboxing involves executing the malicious files in an isolated environment where their actions can be observed without affecting the production systems. This helps the analyst determine how the malware behaves, what actions it takes, and what kind of impact it may have on the system.

pawnpusherOption: C
Aug 26, 2023

You dont have a payload to detonate?! You need a payload for that all you were given was a list of IOC's. Honeypot seems best.

Ariel235788Option: B
Sep 30, 2023

the question specifically asks: "ch of the following risk mitigation techniques should the analyst use?" First you want to isolate, by blocking the EXE via EDR tools. THEN you want to analyze. If you analyze first, the program may continue to execute. At least with isolating and blocking first, you have the chance to prevent malware spread. Also, detonating in a sandbox is NOT a risk mitigation technique, its a response technique.

Ariel235788
Sep 30, 2023

Ah with this part of the question "The analyst needs to identify whether existing endpoint controls are effective" then yes Sandbox. Apologies, I'll run with D actually.

AnarckiiOption: D
Dec 27, 2023

The analyst needs to identify whether existing endpoint controls are EFFECTIVE

23169fdOption: D
Jul 13, 2024

Detonating the malware in a sandbox environment allows the analyst to: Observe Behavior: Understand how the malware operates and what it tries to do once executed. Test Controls: Assess whether existing endpoint security controls (such as antivirus, EDR, and other defenses) can detect and mitigate the malware during its execution. Gather Intelligence: Collect information on how the malware behaves, which can be used to enhance detection and response strategies.