Hands-On Threat Hunting Guide for SOC Analysts and MSSPs
ANY.RUN’s Threat Intelligence Lookup (TI Lookup) has emerged as a game-changer, empowering analysts with rapid access to indicators of compromise (IOCs), behavioral indicators (IOBs), and attack indicators (IOAs) sourced from a global sandbox environment.
By leveraging flexible query syntax and comprehensive data correlation, SOC teams can now detect, triage, and contain threats with unprecedented speed and precision.
TI Lookup delivers access to a vast repository of real-world malware samples and IOC feeds, contributed by more than half a million security professionals.
Analysts can perform IOC lookups—searching IP addresses, file hashes, URLs, and domain names—and behavioral lookups that surface registry modifications, process activities, network communications, and mutex creations.
Integration of the MITRE ATT&CK framework enables searches by tactic and technique (TTP), from command and script execution (T1059) to registry-based persistence (T1547).
Wildcards and logical operators (AND, OR, NOT) facilitate complex queries, while YARA-based hunting refines searches by file patterns and characteristics.
File/event correlation further contextualizes alerts, helping teams link disparate artifacts into coherent attack narratives.
Analysts employ TI Lookup for targeted threat hunting through a series of specialized queries:
submissionCountry and threatLevel pinpoints regional phishing campaigns or PowerShell-driven malware outbreaks.MITRE:"T1059" with commandLine:"powershell" or imagePath:"mshta.exe" surfaces samples leveraging legitimate system tools for malicious execution. Correlating multiple techniques—such as process injection (T1055), system information discovery (T1082), and persistence (T1547)—uncovers sophisticated multi-stage attacks.NOT filePath:"Windows*") and targeting script extensions (fileExtension:"js" with commandLine:"powershell"), analysts isolate executables and scripts employing obfuscation..top, .xyz) over HTTP/HTTPS, or Cloudflare-hosted domains (domainName:".workers.dev"), reveal dynamic domains used in C2 communications.syncObjectName:"rmc" uncovers Remcos trojan samples using mutexes for single-instance control, while YARA rules spotlight persistence mechanisms in registry Run keys.By slashing mean time to respond (MTTR) and enriching alert triage with contextual insights, TI Lookup accelerates threat detection and containment.
Thematic query subscriptions keep analysts informed of emerging credential stealers—such as RedLine, Lumma, and Formbook targeting the SAM registry—and other high-risk campaigns.
This proactive posture enables security teams to prioritize high-impact threats, reduce false positives, and safeguard business operations.
As cyber adversaries continually evolve evasion tactics, the flexibility and depth of TI Lookup’s query engine ensure that SOC analysts and MSSPs remain on the front lines of defense, armed with the actionable intelligence needed to outpace modern threats.
Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates
The post Hands-On Threat Hunting Guide for SOC Analysts and MSSPs appeared first on Cyber Security News.
Publisher Sega and developer Creative Assembly have revealed what appears to be a teaser trailer…
US President Donald Trump used a lone gunman’s storming of the lobby outside the White House Correspondents’ Dinner on…
AMHERST — Performances by local and student bands, an art walk at campus galleries and…
GREENFIELD — Aided by grant funding, the nonprofit law organization providing free services to low-income…
Children’s Advocacy Center luminaria event NORTHAMPTON — The Children’s Advocacy Center (CAC) of Hampshire County…
CHESTERFIELD — For the fourth time in 16 months, Chesterfield has a new Council on…
This website uses cookies.