HostThreatHunting
Disable Protections T1562.001
Look within GPO for changes to Defender/AV/Firewall within
Computer Configuration > Policies > Administrative Templates > Network > Network Connections > Windows Defender Firewall > Domain Profile.Look within GPO for changes to Defender/AV/Firewall within
Computer Configuration > Policies > Administrative Templates > Windows Components
Find LNK File Usage T1027.012
Use LECmd from Eric Zimmerman. Use a command like
.\LECmd.exe -d C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Recent --csvf Parsed-LNK.csv --csv C:\Users\Administrator\Desktop.
Find Policy Changes on System T1484.001
Use the command
Get-GPResultantSetOfPolicy -ReportType HTML -Path (Join-Path -Path (Get-Location).Path -ChildPath "RSOPReport.html")within Powershell.
Identify Environment Variables T1543
Use the
setcommand in the windows command line. Focus on the CompSpec, Path, PSModulePath, Public, and Temp folder locations.
Identify User Hotspots Usage [No TTP]
Look witin SOFTWARE hive for Network List Profiles.
Find Hidden Files in FAT32 T1564.001
Look at byte 12 of the SFN Entry. The file is hidden if the value is 0x02.
Use
Autopsyas a secondary tool.
View Docker Image Updates in Registry T1612
Search HTTP logs for the "PATCH" method.
Identify Docker Logs [No Specific TTP]
Run
docker logs [container name]in the command line.Execute
docker exec [container name] ls -la /var/login the command line.
Identify Audit Policy Changes T1562.002
Search Windows Security logs for Event ID 4719 and the specific subcategory.
Identify Firewall Tampering 1562.004
Look for wierd rule names that were added within the Windows FW event logs.
Focus on the "Microsoft-Windows-Windows Firewall With Advanced Security/Firewall" Channel with Event ID 2004.
Look within GPO for changes to Defender/AV/Firewall within
Computer Configuration > Policies > Administrative Templates > Network > Network Connections > Windows Defender Firewall > Domain Profile.
Identify Web Scanning T1595.003
Look through logs within
/var/logto find GET requests within log data.
Discover System Time Change T1124
On a linux system, view the syslog within /var/log/syslog and look for
systemd-timedatedfor changes in time.
AS-REP Roasting Detection T1558.004
Use
eventvwr.mscwith Windows Security Event logs event ID 4768 with ticket encryption type of 0x17 and ticket options of 0x40800010.
Identify Sysmon logs with Event ID 3.
Identify TimeStomping T1070.006
Identify Sysmon logs with Event ID 2.
Look for last access date before the modified date within SFN or LFN in FAT32.
Use the timeline feature within
Autopsyto find time anomalies.Use the
statcommand on to review modify, change, access, and birth dates and times.
Identify Kerberaost Attack T1558.003
View Windows Security Event logs with Event ID 4769 as well as encryption type 0x17 with uncommon usernames.
Look for files with names like "Rubeus" or "PowerView" within PowerShell logs event ID 4104.
Use
eventvwr.mscwith Windows Security Event logs event ID 4768 with ticket encryption type of 0x17 and ticket options of 0x40800010.
Malware Language [No TTPs]
Use Detect It Easy to find the language which the malware is written.
Malware Packing T1027.002
Use Detect It Easy to find the entropy of each section of the malware.
Malware Signing T1553.002
Use SigCheck to determine if the malware is signed.
Use Detect It Easy to help determine if malware is signed.
User Account Lockouts T1110
Use Live-Forensicator Tool with
.\Forensicator -EVTX EVTX, and search for UserLockOut Activites within the evtx.html, can be found here.Use
eventvwr.mscwith Windows Security Event logs event ID 4740.Use
eventvwr.mscwith Windows Security Event logs event ID 4767.
Examine PDFs T1024.002
Use
pdfid.pyto summarize risky aspects of the file.Use
pdf-parser.pyto search for objects within PDFs.Use
peepdf.pyto summarize aspects of file and search for objects.Use
swf_mastah.pyto extract Flash from PDF files.Use origami-pdf to analyze PDFs.
De-obfuscate Code T1027.010
Beautify the script using Notepad++ and JSTool plugins such as JSMin and JSFormat.
Use SpiderMonkey to analyze JavaScript and VBScript.
Use CScript to analyze JavaScript and VBScript.
Use box-js within the command line to analyze JavaScript.
Use
base64dump.pyto decode Base64 strings.
View Embedded Strings T1024
Run
pestron a linux operating system to view strings on an executable.Run
strings -aon a linux OS to view strings on an executable.Run
strings --encoding=lon a lnux OS to view strings of an executable.Place the file in PeStudio.
Identify WMI Activity T1047
Focus on ShimCache, AmCache.hve, and Prefetch with
wmic.exeon source machine.Focus on ShimCache, AmCache.hve, and Prefetch with
wmic.exe,scrons.exe,mofcomp.exe, orwmiprvse.exeon target machine.Use
eventvwr.mscwith Microsoft-Windows-WMI-Activity%4Operational for event ID 5857, 5860, and 5861 forwmiprvseexecution.Use
eventvwr.mscwith Windows Security Event logs event ID 4688.Use
eventvwr.mscwith Windows Security Event logs event ID 4648.Use
eventvwr.mscwith Sysmon Event logs and Event ID 20.Look for MOF files within
C:\Windows\System32\wbem\AutoRecoverorC:\Windows\System32\wbem\mofcomp.exe.Look for MOF files in registry
HKLM\SOFTWARE\Microsoft\Wbem\CIMON.
Use
eventvwr.mscwith Windows Security Event logs event ID 4648.Use
eventvwr.mscwith Microsoft-Windows-TerminalServices-RDPClient%4Operational for eventid 1024 and 1102 with destination hostname or IP address.View registry
NTUSER\Software\Microsoft\Terminal Server Client\Serversto find RDP connections per user.Focus on ShimCache and AmCache.hve with
mstsc.exefor RDP source machine.Focus on prefetch with
mstsc.exe,rdpclip.exeortstheme.exewithin the name of the file.View jumplists at
C:\Users\[username]\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\for RDP destinations and times.Use
eventvwr.mscwith Windows Security Event logs event ID 4624 for logon type 10.Use
eventvwr.mscwith Windows Security Event logs event ID 4778/4779 for logon source and username.Use
eventvwr.mscwith Microsoft-Windows-RemoteDesktopServices-RdpCoreTS%4Operational for eventid 131 and 98 for connection attempt IPs and successful connections.Use
eventvwr.mscwith Microsoft-Windows-TerminalServices-RDPClient%4Operational for eventid 1149 with source IP and Logon username.Use
eventvwr.mscwith Microsoft-Windows-TerminalServices-LocalSessionManager%4Operational for eventid 21, 22, 25, and 41 for source IP or logon username.Focus on ShimCache and AmCache.hve with
rdpclip.exeortstheme.exefor RDP destination machine.Use Live-Forensicator Tool with
.\Forensicator -EVTX EVTX, and search for RDP Logon Activities with an html file, can be found here.Use Chainsaw and an EVTX dump to search for failed logons with
./chainsaw hunt [evtx] -r ./rules/.Run the following command in PowerShell on the system:
Get-NetTCPConnection | select Local*, Remote*, State, OwningProcess,` @{n="ProcName";e={(Get-Process -Id $_.OwningProcess).ProcessName}},` @{n="ProcPath";e={(Get-Process -Id $_.OwningProcess).Path}} | sort State | ft -Auto.
View Change to Logging T1070.001
Use
eventvwr.mscwith Windows System Event logs 4719.Look for commands like
Remove-EventLog -LogName Security,Remove-EventLog -LogName Application, orRemove-EventLog -LogName System.Use TimelineExplorer to find suspicious powershell activity using input csv information.
Search Windows Security logs for Event ID 4719 and the specific subcategory.
Look within GPO for changes to Defender/AV/Firewall within
Computer Configuration > Policies > Administrative Templates > Network > Network Connections > Windows Defender Firewall > Domain Profile.Look within GPO for changes to Defender/AV/Firewall within
Computer Configuration > Policies > Administrative Templates > Windows Components
Use
eventvwr.mscwith Windows Security Event logs event id 4724 to view password reset.Use
eventvwr.mscwith Windows Security Event logs event id 4735 to view local group changes.Use
eventvwr.mscwith Windows Security Event logs event id 4738 to view local password change.Use
eventvwr.mscwith Windows Security Event logs event id 4688 to view process creation logs with the use ofnet.exeornet1.exeto change passwords.Use
wevutil.exeand search for appropriate Windows Security Eveents logs.Command to use is
wevutil.exe qe Security /q:"*[System[EventID=4725 or EventID=4722 or EventID=4723 or EventID=4724 or EventID=4726 or EventID=4767)]]
Use
eventvwr.mscwith Windows Security Event logs event id 4726 to remove a user account.Look for commands like
Remove-EventLog -LogName Security,Remove-EventLog -LogName Application, orRemove-EventLog -LogName System.Look for account creation on the command line with
net.exeornet1.exewith parent processcmd.exe.Use Live-Forensicator Tool with
.\Forensicator -EVTX EVTX, and search for User Creation Activity within the html file, can be found here.Use TimelineExplorer to find suspicious powershell activity using input csv information.
Look within GPO for changes to Defender/AV/Firewall within
Computer Configuration > Policies > Administrative Templates > Network > Network Connections > Windows Defender Firewall > Domain Profile.Look within GPO for changes to Defender/AV/Firewall within
Computer Configuration > Policies > Administrative Templates > Windows Components
Use wmd.pl to extract metadata.
Use
olevba.pyto examine metadata.Unzip the docx to deflate media and other sections of the document.
Use
oledump.pyto view the macros within a document.View macros within p-code called pcodedmp.py.
Examine RTF Documents T1024.002
Use
rtfdump.pyto examine the file.
Determine Persistence at Startup in Registry T1547.001
View registry at
HKLM\Software\Microsoft\Windows\CurrentVersion\Runonce.View registry at
HKLM\Software\Microsoft\Windows\CurrentVersion\policies\Explorer\Run.View registry at
HKLM\Software\Microsoft\Windows\CurrentVersion\Run.View registry at
HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Run.View registry at
HKCU\Software\Microsoft\Windows\CurrentVersion\Run.View registry at
HKCU\Software\Microsoft\Windows\CurrentVersion\Runonce.Use Systinternals autorunsc tool.
Use PowerShell with the following command:
Get-CimInstance Win32_StartupCommand | Select-Object Name, command, Location, User | fl.Use Powershell with the following command:
$winlogonPath = "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon"; "Userinit: $((Get-ItemProperty -Path $winlogonPath -Name 'Userinit').Userinit)"; "Shell: $((Get-ItemProperty -Path $winlogonPath -Name 'Shell').Shell)".
Detect External Devices T1025
Track USBs in machine at
SYSTEM\CurrentControlSet\Enum\USBSTORorSYSTEM\CurrentControlSet\Enum\USB.Create timeline for USB connections with
C:\Windows\inf\setupapi.dev.logorSYSTEM\CurrentControlSet\Enum\USBSTOR\Ven_Prod_Version\USB.Find the user with the USB device at
SYSTEM\MountedDeviceswith a GUID orNTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2.Find the USB volume serial number at
SOFTWARE\Microsoft\WindowsNT\CurrentVersion\ENDMgmt.Find the drive letter for the USB device
SOFTWARE\Microsoft\Windows Portable Devices\DevicesorSYSTEM\MountedDevices.Device mounting creates a link file at
C:\%USERPROFILE%\AppData\Roaming\Microsoft\Windows\RecentorC:\%USERPROFILE%\AppData\Roaming\Microsoft\Office\Recent.Use
eventvwr.mscwith Windows Security Event logs 20001.View USB connection time at
HKLM\Software\Microsoft\Windows NT\CurrentVersion\EMDMgmt.Determine UNIX timestamps for initial insertion, last insertion, etc for USB devices within the arguments secction of
SYSTEM\CurrentControlSet\Enum\USBSTOR.
Identify TimeZone [No TTP]
Look at
SYSTEM\CurrentControlSet\Control\TimeZoneInformationwithin the System Hive.
Focus on WordWheelQuery from the START menu located at
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\WordWheelQuery.View the Last Visited MRU at
NTUSER.dat\Software\Microsoft\Windows\CurrentVersion\Explorer\Comdlg32\LastVisited[PID]MRU.Focus on the thumbnails/thumbscache that are not deleted after file deletion at
C:\%USERPROFILE%\AppData\Local\Microsoft\Windows\Explorer.Examine the recycle bin at
C:\$Recycle.bin.View files access from IE at
%USERPROFILE%\AppData\Local\Microsoft\Windows\WebCache\WebCacheV*.dat.Use Rifiuti2 to exmaine the Recycle Bin.
Use
Autopsyas a secondary tool and look within the Recycle Bin of a disk image.For FAT32, look at SFN entries beginning with
0xE5of a disk image.Look at MFT using MFTECmd and see if the file is listed as "In Use".
Use
MFTECmdwith the USNJournal ($J) to find the specific file activity.Use
MFTECmdwith the $I30 file to find the specific file activity.
View the registry at
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{GUID}\Countwhere the GUID is specific for the OS.View the Windows Background Activity Monitor at
SYSTEM\CurrentControlSet\Services\bam\UserSettings\{SID}orSYSTEM\CurrentControlSet\Services\dam\UserSettings\{SID}View the Last Visited MRU at
NTUSER.dat\Software\Microsoft\Windows\CurrentVersion\Explorer\Comdlg32\LastVisited[PID]MRU.View the RunMRU at
NTUser.dat\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRUfor Start-> Run execution.View the RecentApps key for program execution at
NTUser.dat\Software\Microsoft\Windows\Current Version\Search\RecentAppswhere each GUID is a specific application.View the AppCompatCache to determine time of execution and name of executable at
SYSTEM\CurrentControlSet\Control\SessionManager\AppCompatCache.Utilize jump lists at
C:\%UserProfile%\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinationsto view user access of executables.Use
PECmd.exe(from Eric Zimmerman here with Command line.Command to use
PECmd.exe -f [prefetch_file]
View prefetch files at
C:\Windows\Prefetchfor program execution.View the Amcache or recentfile cache for data storage during process creation at
C:\Windows\AppCompat\Programs\Amcache.hve.Run
pestron a linux operating system to view strings on an executable.Run
strings -aon a linux OS to view strings on an executable.Run
strings --encoding=lon a lnux OS to view strings of an executable.Place the file in PeStudio.
Run
peframeon a linux machine to view imports and other file properties.Place the file in DetectItEasy.
Place the file in ExeInfoPE.
Analyze the file with signsrch.
Analyze the file with pescan.
Analyze the file with MASTIFF.
Analyze the file with Exiftool.
Analyze the file with TrID.
Analyze the file with Viper.
Analyze the file with PortEx.
Examine the execution within ProcDot.
Examine prefetch files with w10pf_parse.py.
Examine Sysmon Logs with Event ID 1.
Examine Windows Defender Logs with Event ID 1117 within the Channel Microsoft-Windows-Windows Defender/Operational.
Use
regripperto examine the NTUSER.dat file for a specific user looking at UserAssist.Run the following command in PowerShell on the system:
Get-NetTCPConnection | select Local*, Remote*, State, OwningProcess,` @{n="ProcName";e={(Get-Process -Id $_.OwningProcess).ProcessName}},` @{n="ProcPath";e={(Get-Process -Id $_.OwningProcess).Path}} | sort State | ft -Auto.Look at processes within Powershell with
Get-WmiObject -Class Win32_Process | ForEach-Object {$owner = $_.GetOwner(); [PSCustomObject]@{Name=$_.Name; PID=$_.ProcessId; P_PID=$_.ParentProcessId; User="$($owner.User)"; CommandLine=if ($_.CommandLine.Length -le 60) { $_.CommandLine } else { $_.CommandLine.Substring(0, 60) + "..." }; Path=$_.Path}} | ft -AutoSize.Use Eric Zimmermans Amcache parser in Powershell.
Look at Typed Paths within
NTUSER.dat\Software\Microsoft\Windows\CurrentVersion\Explorer\TypedPaths.
Examine the Shimcache/Amcache
View the AppCompatCache to determine time of execution and name of executable at
SYSTEM\CurrentControlSet\Control\SessionManager\AppCompatCache.View the Amcache or recentfile cache for data storage during process creation at
C:\Windows\AppCompat\Programs\Amcache.hve.Focus on ShimCache and AmCache.hve with
mstsc.exefor RDP source connections.Focus on ShimCache and AmCache.hve with
rdpclip.exeortstheme.exefor RDP destination machine.Use Eric Zimmermans Amcache parser in Powershell.
Examine Application Crashes T1499.004
Use
eventvwr.mscwith Windows Security Event logs 1001.
Examine SMB Shares/Sessions T1021
Use
Get-WmiObjectwithin Powershell.Command to use is
Get-WmiObject -Class win32_share
Use
Get-SMBSessionwithin Powershell.Command to use is
Get-SmbSession | Select-Object ClientComputerName,Dialect,SecondsExist,SecondsIdle
Use
Get-SMBMappingwithin Powershell.Examine remotely mapped shares at
NTUSER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2on source machine.Look for ShimCache, Amcache, BAM, DAM, or Prefetch with
net.exeornet1.exeon source machine.Use
eventvwr.mscwith Windows Security Event logs event ID 4648 on source machine.Use
eventvwr.mscwith Windows Security Event logs event ID 4624, 4672, 4776, 4768, 4769, 5140, and 5145 on destination machine.Use Powershell with the command:
Get-CimInstance -Class Win32_Share.
Use
Get-Servicewithin Powershell.Use
Get-CimInstance -ClassName Win32_Service | Format-List Name, Caption, Description,PathNamewithin Powershell.Use
Get-WinEventwithin Powershell looking for Event ID 7045 in the Security Log.Command to use is
Get-WinEvent -LogName System | Where-Object -Property ID -EQ 7045 | Format-List -Property TimeCreated,Message.
Use volatility with a forensic image.
Version 3 uses windows.svcscan.SvcScan
Use
DeepBlueCLI(from here) and Powershell.Use
eventvwr.mscwith Windows Security Event logs 4697.Use
eventvwr.mscwith Windows System Event logs 7034, 7035, 7036, 7040 in that order.Use
eventvwr.mscwith Windows System Event logs 6045 for service installation on a server.Use
sc.exeto query services.Command to use
sc.exe query state= all
Use
wevutil.exeand search for appropriate Windows Security Events logs.Command to use is
wevutil.exe qe Security /q:"*[System[(EventID=7045)]]
Use
eventvwr.mscwith Windows System Event logs 7045.View registry for new service creations at
SYSTEM\CurrentControlSet\Services\[servicename].Within Powershell run the command:
Get-CimInstance -ClassName Win32_Service | Where-Object { $_.State -eq "Running" } | Select-Object Name, DisplayName, State, StartMode, PathName, ProcessId | ft -AutoSize.Within Powershell, look for non-running services with
Get-CimInstance -ClassName Win32_Service | Where-Object { $_.State -ne "Running" } | Select-Object @{Name='Name'; Expression={if ($_.Name.Length -gt 22) { "$($_.Name.Substring(0,19))..." } else { $_.Name }}}, @{Name='DisplayName'; Expression={if ($_.DisplayName.Length -gt 45) { "$($_.DisplayName.Substring(0,42))..." } else { $_.DisplayName }}}, State, StartMode, PathName, ProcessId | Format-Table -AutoSize
Analyze OneNote Files T1137
Use
OneNoteAnalyzerfound here
Unsigned Files in C:\Windows\System32 T1587.002
Use
sigcheckwithin Sysinternals.sigcheck -u -e C:\Windows\System32 -accepteula
Alternate Data Streams T1564.004
Use
streamswithin Sysinternalsstreams C:\Users\Administrator\Desktop\maliciousfile.txt -accepteula
Use
moreto view the ADS files on the command line.more < C:\Users\Administrator\Desktop\maliciousfile.txt:ads.txt
Use
Get-WinEventwith Sysmon Event Logs.Command to use is
Get-WinEvent -Path <Path to Log> -FilterXPath '*/System/EventID=8'
Use
eventvwr.mscwith Sysmon Event logs and Event ID 8.With Sysmon logs, look for event ID 15.
Use
MFTECmdwith the USNJournal ($J) to find the specific file activity.Use
MFTECmdwith the $I30 file to find the specific file activity.
Autoruns T1547
Use
autorunswithin Sysinternalsautoruns
Use
osqueryon the Windows Command line.Command to use in interactive mode is
select path from autoexec;.
Dump Processes on Host T1059
Use
procdumpwithin Sysinternalsprocdump -accepteula
Use
procexpwithin Sysinternalsprocexp -accepteula
Use Process Hacker
Download as Desktop application
Use
procmonwithin SysInternalsprocmon -accepteula
Use
Get-WinEventwith Sysmon Event Logs.Command to use is
Get-WinEvent -Path <Path to Log> -FilterXPath '*/System/EventID=1'Command to use is
Get-WinEvent -Path <Path to Log> -FilterXPath '*/System/EventID=8'
Use
eventvwr.mscwith Sysmon Event logs and Event ID 1.Use
eventvwr.mscwith Sysmon Event logs and Event ID 8.Use
osqueryon the Windows Command line.Command to use in interactive mode is
select sid,path from userassist.
Use
DeepBlueCLI(from here) and Powershell.Use
eventvwr.mscwith Windows Security Event logs 4688.Use
Get-Processwithin Powershell.Use
Get-CimInstance -Class Win32_Process | Select-Object ProcessId, ProcessName,CommandLinewithin Powershell.Use volatility with a forensic image.
Version 3 uses windows.pslist.Pslist, windows.pstree.PsTree, windows.netscan.NetScan, windows.cmdline.Cmdline, windows.dlllist.DllList
Use SRUM Dump to examine system usages related to processes.
View the registry at
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{GUID}\Countwhere the GUID is specific for the OS.View the Windows Background Activity Monitor at
SYSTEM\CurrentControlSet\Services\bam\UserSettings\{SID}orSYSTEM\CurrentControlSet\Services\dam\UserSettings\{SID}View the Last Visited MRU at
NTUSER.dat\Software\Microsoft\Windows\CurrentVersion\Explorer\Comdlg32\LastVisited[PID]MRU.View the RunMRU at
NTUser.dat\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRUfor Start-> Run execution.Examine the execution within ProcDot.
Use
eventvwr.mscwith Windows Security Event logs 4663.Use
eventvwr.mscwith Sysmon Event logs and Event ID 10.Use
eventvwr.mscwith Sysmon Event logs and Event ID 25.Use
eventvwr.mscwith Sysmon Event logs and Event ID 8.Use Live Forensicator with
.\Forensicator -EVTX EVTXand identify processes within processes.html.Examine prefetch files with w10pf_parse.py.
Examine Windows Defender Logs with Event ID 1117 within the Channel Microsoft-Windows-Windows Defender/Operational.
Run the following command in PowerShell on the system:
Get-NetTCPConnection | select Local*, Remote*, State, OwningProcess,` @{n="ProcName";e={(Get-Process -Id $_.OwningProcess).ProcessName}},` @{n="ProcPath";e={(Get-Process -Id $_.OwningProcess).Path}} | sort State | ft -Auto.Look at processes within Powershell with
Get-WmiObject -Class Win32_Process | ForEach-Object {$owner = $_.GetOwner(); [PSCustomObject]@{Name=$_.Name; PID=$_.ProcessId; P_PID=$_.ParentProcessId; User="$($owner.User)"; CommandLine=if ($_.CommandLine.Length -le 60) { $_.CommandLine } else { $_.CommandLine.Substring(0, 60) + "..." }; Path=$_.Path}} | ft -AutoSize
Use
procmonwithin SysInternalsprocmon -accepteula
Use
Get-WinEventwith Sysmon Event Logs.Command to use is
Get-WinEvent -Path <Path to Log> -FilterXPath '*/System/EventID=13'Command to use is
Get-WinEvent -Path <Path to Log> -FilterXPath '*/System/EventID=12'
Use
eventvwr.mscwith Sysmon Event logs and Event ID 12.Use
eventvwr.mscwith Sysmon Event logs and Event ID 13.Use
eventvwr.mscwith Windows Security Event logs 4657.Use
Get-ChildItemwith the specific registry key in Powershell.Use
Get-ItemPropertywith the specific registry key in Powershell.Use Regshot to compare initial registry with final registry post execution.
Use RegRipper.
Command to use is
regripper -f [Hive] -a.
Look for registry modifications to
HKLM\SYSTEM\CurrentControlSet\Services\<NetworkProviderName>\NetworkProvider,HKLM\SYSTEM\CurrentControlSet\Control\Lsa\ Notification Packages, orHKLM\SYSTEM\CurrentControlSet\Control\NetworkProvider\Order.Use
regripperto examine the NTUSER.dat file for a specific user looking at UserAssist.
Use
Get-WinEventwith Sysmon Event Logs.Command to use is
Get-WinEvent -Path <Path to Log> -FilterXPath '*/System/EventID=1'
Use
eventvwr.mscwith Sysmon Event logs and Event ID 1.Use
Get-ScheduledTaskwithin Powershell. https://learn.microsoft.com/en-us/sysinternals/downloads/procmonCommand to use is
Get-ScheduledTask -TaskName [TaskName]
Use
Export-ScheduledTaskwithin Powershell.Command to use is
Get-ScheduledTask -TaskName [Name].
Use
eventvwr.mscwith Windows Security Event logs 4698.Use
eventvwr.mscwith Windows Security Event logs 4702.Use
eventvwr.mscwith Windows Security Event logs 4699.Use
eventvwr.mscwith Windows Security Event logs 4701.Identify processes of
at.exeorschtasks.exeon the source machine.View registry at
Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\TasksorMicrosoft\Windows NT\CurrentVersion\Schedule\TaskCache\Treeon target machine to find scheduled tasks.Look for hive key changes in the NetSh key with
Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Netsh".Look at Task Scheduler App.
Use
procmonwithin SysInternalsprocmon -accepteula
Use
Get-WinEventwith Sysmon Event Logs and look at the call trace.Command to use is
Get-WinEvent -Path <Path to Log> -FilterXPath '*/System/EventID=10'
Use
eventvwr.mscwith Sysmon Event logs and look at call trace in Event ID 10.Use
osqueryon the Windows Command line.Command to use in interactive mode is
select sid,path from userassist;.
Use
DeepBlueCLI(from here) and Powershell.Examine the execution within ProcDot.
Examine changes in DLLs residing in
C:\Windows\System32.Use
eventvwr.mscwith Windows Security Event logs 4663.Use
eventvwr.mscwith Sysmon Event logs and Event ID 10.Use
eventvwr.mscwith Sysmon Event logs and Event ID 25.Use
eventvwr.mscwith Sysmon Event logs and Event ID 8.Use Live Forensicator with
.\Forensicator -EVTX EVTXand identify processes within processes.html.Run the following command in PowerShell on the system:
Get-NetTCPConnection | select Local*, Remote*, State, OwningProcess,` @{n="ProcName";e={(Get-Process -Id $_.OwningProcess).ProcessName}},` @{n="ProcPath";e={(Get-Process -Id $_.OwningProcess).Path}} | sort State | ft -Auto.Look at processes within Powershell with
Get-WmiObject -Class Win32_Process | ForEach-Object {$owner = $_.GetOwner(); [PSCustomObject]@{Name=$_.Name; PID=$_.ProcessId; P_PID=$_.ParentProcessId; User="$($owner.User)"; CommandLine=if ($_.CommandLine.Length -le 60) { $_.CommandLine } else { $_.CommandLine.Substring(0, 60) + "..." }; Path=$_.Path}} | ft -AutoSize
Explore File Read Activity [No TTP]
Use
procmonwithin SysInternalsprocmon -accepteula
Use
LECmd.exe(from Eric Zimmerman here with Command line.Command to use
LECmd.exe -f [shortcut_file]Shortcut files:
C:\Users\<username>\AppData\Roaming\Microsoft\Windows\Recent\orC:\Users\<username>\AppData\Roaming\Microsoft\Office\Recent\
View the OpenSaveMRU to detect file opening at
NTUSER.dat\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSave[PID]MRU.View the Last Visited MRU at
NTUSER.dat\Software\Microsoft\Windows\CurrentVersion\Explorer\Comdlg32\LastVisited[PID]MRU.Examine the RecentFiles at
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs.Examine Office RecentFiles at
NTUSER.DAT\Sofware\Microsoft\Office\VERSION.Focus on Shellbags for find file access at
NTUSER.DAT\Software\Microsoft\Windows\Shell\BagMRUorNTUSER.DAT\Software\Microsoft\Windows\Shell\Bags.Each open of file creates a link file at
C:\%USERPROFILE%\AppData\Roaming\Microsoft\Windows\RecentorC:\%USERPROFILE%\AppData\Roaming\Microsoft\Office\Recent.Utilize jump lists at
C:\%UserProfile%\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinationsto view user access of files.Use
PECmd.exe(from Eric Zimmerman here with Command line.Command to use
PECmd.exe -f [prefetch_file]
View prefetch files at
C:\Windows\Prefetchfor program execution.View files access from IE at
%USERPROFILE%\AppData\Local\Microsoft\Windows\WebCache\WebCacheV*.dat.Examine prefetch files with w10pf_parse.py.
Use
MFTECmdwith the USNJournal ($J) to find the specific file activity.Use
MFTECmdwith the $I30 file to find the specific file activity.Look at Typed Paths within
NTUSER.dat\Software\Microsoft\Windows\CurrentVersion\Explorer\TypedPathsorNTUSER.dat\Software\Microsoft\Windows\CurrentVersion\Explorer\WordWheelQuery.
View the MRU at
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSave[PID]MRU.View email attachments at
%USERPROFILE%\AppData\Local\Microsoft\Outlook.View skype history at
C\%USERPROFILE%\AppData\Roaming\Skype\[skypename].View IE user account and download history at
%USERPROFILE%\AppData\Local\Microsoft\Windows\WebCache\WebCacheV*.dat.View Firefox user account at
%USERPROFILE%\AppData\Roaming\Mozilla\Firefox\Profiles\[randomtext].default\places.sqlite.View chrome user account at
%USERPROFILE%\AppData\Local\Google\Chrome\UserData\Default\History.View firefox download history at
%USERPROFILE%\AppData\Roaming\Mozilla\Firefox\Profiles\[randomtext].default\downloads.sqlite.View user downloads within
C:\User\*\Downloads.View Sysmon Event ID 22 for domain queries.
Use RegRipper to find file downloads via user hive.
Command to run is
regripper -f [Hive] -a
View edge user downloads looking at the History sqlite3 database table, specifically the downloads table.
View edge user downloads looking at the History sqlite3 database table, specifically the urls table.
View edge user downloads looking at the History sqlite3 database table, specifically the downloads_url_chains table.
View email attachments at
%USERPROFILE%\AppData\Local\Microsoft\Outlook.
View Skype History [No TTP]
View skype history at
C\%USERPROFILE%\AppData\Roaming\Skype\[skypename].
View Firefox user account and history at
%USERPROFILE%\AppData\Roaming\Mozilla\Firefox\Profiles\[randomtext].default\places.sqlite.View firefox download history at
%USERPROFILE%\AppData\Roaming\Mozilla\Firefox\Profiles\[randomtext].default\downloads.sqlite.Focus on cookiest at
%\USERPROFILE%\AppData\Roaming\Mozilla\Firefox\Profiles\[random].default\cookies.sqlite.Look at user cache at
\%USERPROFILE%\AppData\Local\Mozilla\Firefox\Profiles\[random].default\Cache.View the session restore within
%\USERPROFILE%\AppData\Roaming\Mozilla\Firefox\Profiles\[random].default\sessionstore.js.View flash cookies at
%APPDATA%\Roaming\Macromedia\FlashPlayer\#SharedObjects\[random].
View chrome user account and history at
%USERPROFILE%\AppData\Local\Google\Chrome\User Data\Default\History.Focus on cookies at
%\USERPROFILE%\AppData\Local\Google\Chrome\UserData\Default\Local Storage.Look at user cache at
%USERPROFILE%\AppData\Local\Google\Chrome\User Data\Default\Cache.Look at session restore data at
%USERPROFILE%\AppData\Local\Google\Chrome\User Data\Default.View flash cookies at
%APPDATA%\Roaming\Macromedia\FlashPlayer\#SharedObjects\[random].
Use
Autopsyas a secondary tool.View information located at:
C:\Users\<username>\AppData\Local\Microsoft\Windows\WebCache\WebCacheV*.dat
Focus on cookies at
%\USERPROFILE%\AppData\Roaming\Microsoft\Windows\Cookiesor%\USERPROFILE%\AppData\Local\Microsoft\Windows\INetCookies.Look at user cache or Edge at
\%USERPROFILE%\AppData\Local\Packages\microsoft.microsoftedge_[APPID]\AC\MicrosoftEdge\Cacheor for IE at%\USERPROFILE%\AppData\Local\Microsoft\Windows\INetCache\IE.Look at session restore data in IE at
%USERPROFILE%\AppData\Local\Microsoft\Internet Explorer\Recovery.View flash cookies at
%APPDATA%\Roaming\Macromedia\FlashPlayer\#SharedObjects\[random].Use Pasco to inspect
index.datfile.Use Live Forensicator with
./Forensicator -BROWSER BROWSERand search for histories within theBROWSWER_HISTORYfolder.Use Live Forensicator with
./Forensicator -BROWSER BROWSERand search for histories within the BrowserHistory.html file.If given a History SQLite3 table, use sql statements to examine the various tables and open the db with
sqlite3.View edge user downloads looking at the History sqlite3 database table, specifically the downloads table.
View edge user downloads looking at the History sqlite3 database table, specifically the urls table.
View edge user downloads looking at the History sqlite3 database table, specifically the downloads_url_chains table.
Focus on cookies at
%\USERPROFILE%\AppData\Roaming\Microsoft\Windows\Cookiesor%\USERPROFILE%\AppData\Local\Microsoft\Windows\INetCookies.Focus on cookies at
%\USERPROFILE%\AppData\Local\Google\Chrome\UserData\Default\Local Storage.Focus on cookiest at
%\USERPROFILE%\AppData\Roaming\Mozilla\Firefox\Profiles\[random].default\cookies.sqlite.View flash cookies at
%APPDATA%\Roaming\Macromedia\FlashPlayer\#SharedObjects\[random].
Use
Autopsyas a secondary tool.Use
LECmd.exe(from Eric Zimmerman here with Command line.Command to use
LECmd.exe -f [shortcut_file]Shortcut files:
C:\Users\<username>\AppData\Roaming\Microsoft\Windows\Recent\orC:\Users\<username>\AppData\Roaming\Microsoft\Office\Recent\
Use
MFTECmdwith the USNJournal to find the specific file activity.
Use
LECmd.exe(from Eric Zimmerman here with Command line.Command to use
LECmd.exe -f [shortcut_file]Shortcut files:
C:\Users\<username>\AppData\Roaming\Microsoft\Windows\Recent\orC:\Users\<username>\AppData\Roaming\Microsoft\Office\Recent\
Each open of file creates a link file at
C:\%USERPROFILE%\AppData\Roaming\Microsoft\Windows\RecentorC:\%USERPROFILE%\AppData\Roaming\Microsoft\Office\Recent.
Explore File Write Activity [No TTP]
Use
procmonwithin SysInternalsprocmon -accepteula
Use
LECmd.exe(from Eric Zimmerman here with Command line.Command to use
LECmd.exe -f [shortcut_file]Shortcut files:
C:\Users\<username>\AppData\Roaming\Microsoft\Windows\Recent\orC:\Users\<username>\AppData\Roaming\Microsoft\Office\Recent\
Use
MFTECmdwith the USNJournal to find the specific file activity.
Explore Prefetch Files T1204
Use
PECmd.exe(from Eric Zimmerman here with Command line.Command to use
PECmd.exe -f [prefetch_file]
View prefetch files at
C:\Windows\Prefetchfor program execution.Examine prefetch files with w10pf_parse.py.
Parse Windows 10 Timeline [No TTP]
Use
WxTCmd.exe(from Eric Zimmerman here on Windows Command line.Command to use
WxTCmd.exe -f [timeline_file]Timeline file:
C:\Users\<username>\AppData\Local\ConnectedDevicesPlatform\{randomfolder}\ActivitiesCache.db
Parse Windows Jump Lists [No TTP]
Use
JLECmd.exe(from Eric Zimmerman here on Windows Command line.Command to use
JLECmd.exe -f [jumplist_file]Jump List file:
C:\Users\<username>\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations
Explore File Creation Activity
Use
Get-WinEventwith Sysmon Event Logs.Command to use is
Get-WinEvent -Path <Path to Log> -FilterXPath '*/System/EventID=11'
Use
eventvwr.mscwith Sysmon Event logs and Event ID 11.Use
LECmd.exe(from Eric Zimmerman here with Command line.Command to use
LECmd.exe -f [shortcut_file]Shortcut files:
C:\Users\<username>\AppData\Roaming\Microsoft\Windows\Recent\orC:\Users\<username>\AppData\Roaming\Microsoft\Office\Recent\.
Look at Sysmon Event logs for event ID 11.
Use
MFTECmdwith the USNJournal ($J) to find the specific file activity.Use
MFTECmdwith the $I30 file to find the specific file activity.
Use
eventvwr.mscon a Windows system and navigate to Applications and Services Logs -> Microsoft -> Windows -> PowerShell -> Operational.Use
DeepBlueCLI(from here) and Powershell.Use
wevutil.exeto find Powershell execution.Command to use is
wevutil.exe qe “Windows PowerShell” /q:"*[System[(EventID=501 or EventID=500)]]"
Use
wevutil.exeto find Powershell execution to find Get calls.Command to use is
wevutil.exe qe "Microsoft-Windows-PowerShell/Operational" /q:"*[System[(EventID=4104)]]" /c:1000 /rd:true /f:text | findstr /i "Get-"
Use
wevutil.exeto find Powershell execution to find invoke execution calls.Command to use is
wevutil.exe qe "Microsoft-Windows-PowerShell/Operational" /q:"*[System[(EventID=4104)]]" /c:1000 /rd:true /f:text | findstr /i "iex"
Focus on ShimCache, AmCache.hve, Prefetch, DAM, and BAM with
powershell.exeon source machine.Use
eventvwr.mscto view Microsoft-Windows-WinRM%4Operational logs for event id 6, 8, 15, 16, or 33 on source machine for remote connection.Use
eventvwr.mscto view Microsoft-Windows-PowerShell%4Operational for event id 40961, 40962, 8193, 8194, and 8197 on source machine for remote connection.Use
eventvwr.mscto view Microsoft-Windows-PowerShell%4Operational for event id 4103, 4104, 53504 on target machine for remote connection.Use
eventvwr.mscto view Microsoft-Windows-WinRM%4Operational logs for event id 91 or 168 on target machine for remote connection.Use PSReadline to view full script blocks.
Use TimelineExplorer to find suspicious powershell activity using input csv information.
View PowerShell Script blocks within PowerShell-Operational.evtx logs with event ID 4104.
Use RegRipper to highlight powershell downloads with IEX Download String.
Command to use
regripper -f [Hive] -a.
Look for history file at
APPDATA\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt.Use Eric Zimmermans Amcache parser in Powershell.
Use
eventvwr.mscon a Windows system and navigate to Applications and Services Logs -> Microsoft -> Windows -> PowerShell -> Operational and look for EventID 4104.Use
eventvwr.mscon a Windows system and navigate to Applications and Services Logs -> Microsoft -> Windows -> PowerShell -> Operational and look for EventID 800.Use
eventvwr.mscon a Windows system and look for event ID 4104 within the Powershell (Microsoft-Windows-Powershell) log.Use
DeepBlueCLI(from here) and Powershell.Focus on ShimCache, AmCache.hve, Prefetch, DAM, and BAM with
powershell.exeon source machine.Use TimelineExplorer to find suspicious powershell activity using input csv information.
View PowerShell Script blocks within PowerShell-Operational.evtx logs with event ID 4104.
Examine prefetch files with w10pf_parse.py.
Use RegRipper to highlight powershell downloads with IEX Download String that can be found in LastRunMRU.
Command to use
regripper -f [Hive] -a.
Determine the Number Of Log Names [No TTP]
Use
wevutil.exewith PowershellCommand is
wevutil.exe el
Use
Get-WinEventwith PowershellCommand is
Get-WinEvent -ListLog *
Use
Get-WinEventwith XPath queries using PowerShell.Command would be
Get-WinEvent -LogName Security -FilterXPath '*/System/EventID=4720 and */EventData/Data[@Name="TargetUserName"]="[UserName]"'
Use
DeepBlueCLI(from here) and Powershell.Look for account creation on the command line with
net.exeornet1.exewith parent processcmd.exe.Use Live-Forensicator Tool with
.\Forensicator -EVTX EVTX, and search for User Creation Activity within the html file, can be found here.Using powershell look for users with
Get-CimInstance -Class Win32_UserAccount -Filter "LocalAccount=True" | Format-Table Name, PasswordRequired, PasswordExpires, PasswordChangeable.
Use
Get-WinEventusing PowerShell.Command would be
Get-WinEvent -LogName "Windows PowerShell" | Where-Object Id -eq 400 | Foreach-Object {$version = [Version] ( $_.Message -replace '(?s).*EngineVersion=([\d\.]+)*.*','$1') if($version -lt ([Version] "5.0")) { $_ }}
User
eventvwr.mscon a Windows system and filter for event ID 400 within the PowerShell logs.EngineVersionwill have a different number than other PowerShell logs.
Use
eventvwr.mscon a Windows system and filter for event ID 104 within the Microsoft-Windows-Eventlog source.Use
eventvwr.mscwith Windows Security Event logs 517.Use
eventvwr.mscwith Windows Security Event logs 1102 to view Audit log clearing.Look for commands like
Remove-EventLog -LogName Security,Remove-EventLog -LogName Application, orRemove-EventLog -LogName System.Use TimelineExplorer to find suspicious powershell activity using input csv information.
Explore Group Enumeration T1069
Use
eventvwr.mscon a Windows system and filter for event ID 4799 within Security event logs.Look for unusual groups using powershell with
Get-LocalGroup | ForEach-Object { $members = Get-LocalGroupMember -Group $_.Name; if ($members) { Write-Output "`nGroup: $($_.Name)"; $members | ForEach-Object { Write-Output "`tMember: $($_.Name)" } } }.
Determine Number of Network Connections T1021
Use
Get-WinEventwith Sysmon Event Logs.Command to use is
Get-WinEvent -Path <Path to Log> -FilterXPath '*/System/EventID=3 | Measure-Object
Use
Get-WinEventwith Sysmon Event Logs.Command to use is
Get-WinEvent -Path <Path to Log> -FilterXPath '*/System/EventID=3 and */EventData/Data[@Name="DestinationPort"] and */EventData/Data=4444'Command to use is
Get-WinEvent -Path <Path to Log> -FilterXPath '*/System/EventID=3 and */EventData/Data[@Name="DestinationPort"] and */EventData/Data=5555
Use
Get-WinEventwith Sysmon Event Logs.Command to use is
Get-WinEvent -Path <Path to Log> -FilterXPath '*/System/EventID=10 and */EventData/Data[@Name="TargetImage"] and */EventData/Data="C:\Windows\system32\lsass.exe"'
Use
DeepBlueCLI(from here) and Powershell.View the Last Visited MRU at
NTUSER.dat\Software\Microsoft\Windows\CurrentVersion\Explorer\Comdlg32\LastVisited[PID]MRU.Examine the execution within ProcDot.
Use
eventvwr.mscwith Windows Security Event logs Event ID 4688 with vssadmin.View ESENT logs with Event ID 325, 326, or 327 in Windows Application Logs.
Look for access to
C:\Windows\System32\config\directory.Identify interactions with
HKLM\SAM\Domains\Accounts\Users.Look for process access to common password locations with Sysmon Event ID 10 or 1.
Look for process creation Event ID 4688 to common password storage locations.
Find Common RAT Connections. T1021
Use
Get-WinEventwith Sysmon Event Logs.Command to use is
Get-WinEvent -Path <Path to Log> -FilterXPath '*/System/EventID=3 and */EventData/Data[@Name="DestinationPort"] and */EventData/Data=8080'
Use
DeepBlueCLI(from here) and Powershell.
Use
osqueryon the Windows Command line.Command to use
select * from programs;
Look at the Application Event log to find events for msiinstaller.
Use MFTECmd to look at downloaded files from the
$MFTon a system.Look at Application Event log for event ID 1033.
Use
osqueryon the Windows Command line.Command to use
select * from users;
Use
Get-LocalUserwithin Powershell.Command to use
Get-LocalUser | Where-Object 'Enabled' -eq $True
Use
Get-LocalGroupwithin Powershell.Use
Get-LocalGroupMemberwithin Powershell with a specific group in mind.
Determine Browser Extension T1176
Use
osqueryon the Windows Command line.Command to use
select * from ie_extensions;
View UserAssist Activity [No TTP]
Use
osqueryon the Windows Command line.Command to use in interactive mode is
select sid,path from userassist;.
View the registry at
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{GUID}\Countwhere the GUID is specific for the OS.Examine Word Wheel Query with
regripper.Use
regripperto examine the NTUSER.dat file for a specific user.
Parse $MFT for Windows NTFS T1564
Use
MFTECmd.exeon the Windows command line.Command to use
MCTECmd.exe -f [file] --csv [path_to_csv_output]
Use
Autopsyas a secondary tool.Pull out specific files and examine using
--deoption forMFTECmd.exe.Use
blessto examine the $MFT.
Parse $Boot for Windows NTFS T1564
Use
MFTECmd.exeon the Windows command line.Command to use
MCTECmd.exe -f [file] --csv [path_to_csv_output]
Use
Autopsyas a secondary tool.
Parse $J for Windows NTFS T1564
Use
MFTECmd.exe(from Eric Zimmerman here on the Windows command line.Command to use
MCTECmd.exe -f [file] --csv [path_to_csv_output]
Use
Autopsyas a secondary tool.
Parse $SDS for Windows NTFS T1564
Use
MFTECmd.exe(from Eric Zimmerman here on the Windows command line.Command to use
MCTECmd.exe -f [file] --csv [path_to_csv_output]
Use
Autopsyas a secondary tool.
Parse Volume Shadow Copies for Windows NTFS T1564
Use
MFTECmd.exe(from Eric Zimmerman here on the Windows command line.Command to use
MCTECmd.exe -f [file] --csv [path_to_csv_output]
Use
Autopsyas a secondary tool.
Parse $LogFile for Windows NTFS T1564
Use
MFTECmd.exe(from Eric Zimmerman here on the Windows command line.Command to use
MCTECmd.exe -f [file] --csv [path_to_csv_output]
Use
Autopsyas a secondary tool.
Use
DeepBlueCLI(from here) and Powershell.Use
eventvwr.mscwith Windows System Event logs 7045.Use
eventvwr.mscwith Windows Security Event logs 4697.
View User Authentications T1078
Use LogonTracer to map out logons by users.
Use
eventvwr.mscwith Windows Security Event logs 4624.View the SAM at
C:\Windows\system32\config\SAMorSAM\Domains\Account\Users.Use
eventvwr.mscwith Windows Security Event logs 4625 for failed logons.Use
eventvwr.mscwith Windows Security Event logs 4634 for logoff.Use
eventvwr.mscwith Windows Security Event logs 4647 for logoff.Use
eventvwr.mscwith Windows Security Event logs 4648 for run as login.Use
eventvwr.mscwith Windows Security Event logs 4672 for admin login.Use
eventvwr.mscwith Windows Security Event logs 4778 for RDP login.Use
eventvwr.mscwith Windows Security Event logs 4779 for RDP logoff.Use
eventvwr.mscwith Windows Security Event logs 4776 for NTLM authentication.Use
eventvwr.mscwith Windows Security Event logs 4768 for TGT successful logon.Use
eventvwr.mscwith Windows Security Event logs 4769 for TGS access to service.Use
eventvwr.mscwith Windows Security Event logs 4771/4772 failed ticket logon.Use
wevutil.exeand search for appropriate Windows Security Eveents logs.Command to use is
wevutil.exe qe Security /q:"*[System[(EventID=4624 or EventID=4625)]]
Look for
gpscript.exe /logonexecution for user logons.Use
eventvwr.mscwith Windows Security Event logs 4770 for kerberos ticket renewal.Use Live-Forensicator Tool with
.\Forensicator -EVTX EVTX, and search for RDP Logon Activities with an html file, can be found here.Use Chainsaw and an EVTX dump to search for failed logons with
./chainsaw hunt [evtx] -r ./rules/.Use powershell with
Get-LocalUser | Select-Object Name, LastLogon.
Examine Startup Actions T1547
View
desktop.inifor actions taken during startup.Use Systinternals autorunsc tool.
Use PowerShell with the following command:
Get-CimInstance Win32_StartupCommand | Select-Object Name, command, Location, User | fl.Use Powershell with the following command:
$winlogonPath = "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon"; "Userinit: $((Get-ItemProperty -Path $winlogonPath -Name 'Userinit').Userinit)"; "Shell: $((Get-ItemProperty -Path $winlogonPath -Name 'Shell').Shell)".
View Hosted Web Application Exploitation T1190
Use
eventvwr.mscwith Windows Security Event logs 4688 for process creation events on the host.View suspicious php or .jsp files within
/var/log/httpd/access.log.View suspicious php files within
/var/log/apache2/access.log.
Identify Phishing Attempts T1566
Look for registry modifications to
HKLM\SYSTEM\CurrentControlSet\Services\<NetworkProviderName>\NetworkProvider,HKLM\SYSTEM\CurrentControlSet\Control\Lsa\ Notification Packages, orHKLM\SYSTEM\CurrentControlSet\Control\NetworkProvider\Order.
Identity Suspicious DLLs T1574
Examine changes in DLLs residing in
C:\Windows\System32.Look for non-digitally signed DLLs.
Use
eventvwr.mscwith Sysmon Event logs and Event ID 25.Use
eventvwr.mscwith Sysmon Event logs and Event ID 10.
Identify Credential Dumping T1003
Use
eventvwr.mscwith Windows Security Event logs Event ID 4688 with vssadmin.View ESENT logs with Event ID 325, 326, or 327 in Windows Application Logs.
Identify Brute Force Attempts T1110
Use
eventvwr.mscwith Windows Security Event logs Event ID 4776.Use
eventvwr.mscwith Windows Security Event logs Event ID 4740.Use
eventvwr.mscwith Windows Security Event logs Event ID 4624.Use
eventvwr.mscwith Windows Security Event logs Event ID 4625.Use
eventvwr.mscwith Windows Security Event logs Event ID 4768.Use
eventvwr.mscwith Windows Security Event logs Event ID 4771.Use
eventvwr.mscwith Windows Security Event logs Event ID 4769.Use
eventvwr.mscwith Windows Security Event logs Event ID 4776.Use
eventvwr.mscwith Terminal-Services-RemoteConnectionManager Event ID 1149.Use
eventvwr.mscwith ListenerRDP-TCP Event ID 261.Use
eventvwr.mscwith Terminal-Services-LocalSessionManager Event ID 21.Use Live-Forensicator Tool with
.\Forensicator -EVTX EVTX, and search for RDP Logon Activities with an html file, can be found here.Use Chainsaw and an EVTX dump to search for failed logons with
./chainsaw hunt [evtx] -r ./rules/.Use TimelineExplorer to find suspicious powershell activity using input csv information.
Identify Credentials in Group Policy T1552.006
Look for powershell command executiono with
Get-GPPPassword.
Identify Credentials in Password Stores T1555
Look for access to
C:\Windows\System32\config\directory.Identify interactions with
HKLM\SAM\Domains\Accounts\Users.Look for process access to common password locations with Sysmon Event ID 10 or 1.
Look for process creation Event ID 4688 to common password storage locations.
Identify Proxy Usage T1090
Look for registry interactions with
HKLM\System\CurrentControlSet\Services\PortProxy\v4tov4\tcp.
Last updated