Exam CAS-004 All QuestionsBrowse all questions from this exam
Question 147

An analyst received a list of IOCs from a government agency. The attack has the following characteristics:

1. The attack starts with bulk phishing.

2. If a user clicks on the link, a dropper is downloaded to the computer.

3. Each of the malware samples has unique hashes tied to the user.

The analyst needs to identify whether existing endpoint controls are effective. Which of the following risk mitigation techniques should the analyst use?

    Correct Answer: D

    The analyst should detonate the malware in a sandbox. This involves executing the malicious files in an isolated environment where their actions can be safely observed. By doing so, the analyst can understand how the malware operates, assess whether existing endpoint security controls can detect and mitigate the malware during its execution, and gather intelligence that can be used to enhance detection and response strategies. This approach allows the analyst to evaluate the effectiveness of current defenses without risking further compromise of the production environment.

Discussion
ThatGuyOverThereOption: D

Detonate in sandbox is the best answer. Many email protection solutions provide sandbox detonation as an automated process, the one I manage included. You cannot block the exe based on filename because that's too easy change, and it's already been demonstrated that the hash changes every time.

AlizadehOption: D

The answer is D. Detonate in a sandbox.

unBREAKable_Fs4Option: D

D. Detonate in a sandbox Sandbox Detonation is a preventative approach in which a security team intentionally sets of, or execution (that is detonated) the payload of a malicious file to determine what it will do and how to address it.

NnatechOption: D

Detonating the malware samples in a sandboxed environment is a crucial step in analyzing their behavior and understanding their capabilities. Sandboxing involves executing the malicious files in an isolated environment where their actions can be observed without affecting the production systems. This helps the analyst determine how the malware behaves, what actions it takes, and what kind of impact it may have on the system.

pawnpusherOption: B

Block the executable by the given IOC's, Just use the filename since hashes are unique.

23169fdOption: D

Detonating the malware in a sandbox environment allows the analyst to: Observe Behavior: Understand how the malware operates and what it tries to do once executed. Test Controls: Assess whether existing endpoint security controls (such as antivirus, EDR, and other defenses) can detect and mitigate the malware during its execution. Gather Intelligence: Collect information on how the malware behaves, which can be used to enhance detection and response strategies.

AnarckiiOption: D

The analyst needs to identify whether existing endpoint controls are EFFECTIVE

Ariel235788Option: B

the question specifically asks: "ch of the following risk mitigation techniques should the analyst use?" First you want to isolate, by blocking the EXE via EDR tools. THEN you want to analyze. If you analyze first, the program may continue to execute. At least with isolating and blocking first, you have the chance to prevent malware spread. Also, detonating in a sandbox is NOT a risk mitigation technique, its a response technique.

Ariel235788

Ah with this part of the question "The analyst needs to identify whether existing endpoint controls are effective" then yes Sandbox. Apologies, I'll run with D actually.

pawnpusherOption: C

You dont have a payload to detonate?! You need a payload for that all you were given was a list of IOC's. Honeypot seems best.