HostThreatHunting
Find Policy Changes on System T1484.001
- Use the command - Get-GPResultantSetOfPolicy -ReportType HTML -Path (Join-Path -Path (Get-Location).Path -ChildPath "RSOPReport.html")within Powershell.
Identify Environemnt Variables T1543
- Use the - setcommand in the windows command line. Focus on the CompSpec, Path, PSModulePath, Public, and Temp folder locations.
Identify User Hotspots Usage [No TTP]
- Look witin SOFTWARE hive for Network List Profiles. 
Find Hidden Files in FAT32 T1564.001
- Look at byte 12 of the SFN Entry. The file is hidden if the value is 0x02. 
- Use - Autopsyas a secondary tool.
View Docker Image Updates in Registry T1612
- Search HTTP logs for the "PATCH" method. 
Identify Docker Logs [No Specific TTP]
- Run - docker logs [container name]in the command line.
- Execute - docker exec [container name] ls -la /var/login the command line.
Identify Audit Policy Changes T1562.002
- Search Windows Security logs for Event ID 4719 and the specific subcategory. 
Identify Firewall Tampering 1562.004
- Look for wierd rule names that were added within the Windows FW event logs. 
- Focus on the "Microsoft-Windows-Windows Firewall With Advanced Security/Firewall" Channel with Event ID 2004. 
Identify Web Scanning T1595.003
- Look through logs within - /var/logto find GET requests within log data.
Discover System Time Change T1124
- On a linux system, view the syslog within /var/log/syslog and look for - systemd-timedatedfor changes in time.
AS-REP Roasting Detection T1558.004
- Use - eventvwr.mscwith Windows Security Event logs event ID 4768 with ticket encryption type of 0x17 and ticket options of 0x40800010.
- Identify Sysmon logs with Event ID 3. 
Identify TimeStomping T1070.006
- Identify Sysmon logs with Event ID 2. 
- Look for last access date before the modified date within SFN or LFN in FAT32. 
- Use the timeline feature within - Autopsyto find time anomalies.
- Use the - statcommand on to review modify, change, access, and birth dates and times.
Identify Kerberaost Attack T1558.003
- View Windows Security Event logs with Event ID 4769 as well as encryption type 0x17 with uncommon usernames. 
- Look for files with names like "Rubeus" or "PowerView" within PowerShell logs event ID 4104. 
- Use - eventvwr.mscwith Windows Security Event logs event ID 4768 with ticket encryption type of 0x17 and ticket options of 0x40800010.
Malware Language [No TTPs]
- Use Detect It Easy to find the language which the malware is written. 
Malware Packing T1027.002
- Use Detect It Easy to find the entropy of each section of the malware. 
Malware Signing T1553.002
- Use SigCheck to determine if the malware is signed. 
- Use Detect It Easy to help determine if malware is signed. 
User Account Lockouts T1110
- Use Live-Forensicator Tool with - .\Forensicator -EVTX EVTX, and search for UserLockOut Activites within the evtx.html, can be found here.
- Use - eventvwr.mscwith Windows Security Event logs event ID 4740.
- Use - eventvwr.mscwith Windows Security Event logs event ID 4767.
Examine PDFs T1024.002
- Use - pdfid.pyto summarize risky aspects of the file.
- Use - pdf-parser.pyto search for objects within PDFs.
- Use - peepdf.pyto summarize aspects of file and search for objects.
- Use - swf_mastah.pyto extract Flash from PDF files.
- Use origami-pdf to analyze PDFs. 
De-obfuscate Code T1027.010
- Beautify the script using Notepad++ and JSTool plugins such as JSMin and JSFormat. 
- Use SpiderMonkey to analyze JavaScript and VBScript. 
- Use CScript to analyze JavaScript and VBScript. 
- Use box-js within the command line to analyze JavaScript. 
- Use - base64dump.pyto decode Base64 strings.
View Embedded Strings T1024
- Run - pestron a linux operating system to view strings on an executable.
- Run - strings -aon a linux OS to view strings on an executable.
- Run - strings --encoding=lon a lnux OS to view strings of an executable.
- Place the file in PeStudio. 
Identify WMI Activity T1047
- Focus on ShimCache, AmCache.hve, and Prefetch with - wmic.exeon source machine.
- Focus on ShimCache, AmCache.hve, and Prefetch with - wmic.exe,- scrons.exe,- mofcomp.exe, or- wmiprvse.exeon target machine.
- Use - eventvwr.mscwith Microsoft-Windows-WMI-Activity%4Operational for event ID 5857, 5860, and 5861 for- wmiprvseexecution.
- Use - eventvwr.mscwith Windows Security Event logs event ID 4688.
- Use - eventvwr.mscwith Windows Security Event logs event ID 4648.
- Use - eventvwr.mscwith Sysmon Event logs and Event ID 20.
- Look for MOF files within - C:\Windows\System32\wbem\AutoRecoveror- C:\Windows\System32\wbem\mofcomp.exe.
- Look for MOF files in registry - HKLM\SOFTWARE\Microsoft\Wbem\CIMON.
- Use - eventvwr.mscwith Windows Security Event logs event ID 4648.
- Use - eventvwr.mscwith Microsoft-Windows-TerminalServices-RDPClient%4Operational for eventid 1024 and 1102 with destination hostname or IP address.
- View registry - NTUSER\Software\Microsoft\Terminal Server Client\Serversto find RDP connections per user.
- Focus on ShimCache and AmCache.hve with - mstsc.exefor RDP source machine.
- Focus on prefetch with - mstsc.exe,- rdpclip.exeor- tstheme.exewithin the name of the file.
- View jumplists at - C:\Users\[username]\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\for RDP destinations and times.
- Use - eventvwr.mscwith Windows Security Event logs event ID 4624 for logon type 10.
- Use - eventvwr.mscwith Windows Security Event logs event ID 4778/4779 for logon source and username.
- Use - eventvwr.mscwith Microsoft-Windows-RemoteDesktopServices-RdpCoreTS%4Operational for eventid 131 and 98 for connection attempt IPs and successful connections.
- Use - eventvwr.mscwith Microsoft-Windows-TerminalServices-RDPClient%4Operational for eventid 1149 with source IP and Logon username.
- Use - eventvwr.mscwith Microsoft-Windows-TerminalServices-LocalSessionManager%4Operational for eventid 21, 22, 25, and 41 for source IP or logon username.
- Focus on ShimCache and AmCache.hve with - rdpclip.exeor- tstheme.exefor RDP destination machine.
- Use Live-Forensicator Tool with - .\Forensicator -EVTX EVTX, and search for RDP Logon Activities with an html file, can be found here.
- Use Chainsaw and an EVTX dump to search for failed logons with - ./chainsaw hunt [evtx] -r ./rules/.
- Run the following command in PowerShell on the system: - Get-NetTCPConnection | select Local*, Remote*, State, OwningProcess,` @{n="ProcName";e={(Get-Process -Id $_.OwningProcess).ProcessName}},` @{n="ProcPath";e={(Get-Process -Id $_.OwningProcess).Path}} | sort State | ft -Auto.
View Change to Logging T1070.001
- Use - eventvwr.mscwith Windows System Event logs 4719.
- Look for commands like - Remove-EventLog -LogName Security,- Remove-EventLog -LogName Application, or- Remove-EventLog -LogName System.
- Use TimelineExplorer to find suspicious powershell activity using input csv information. 
- Search Windows Security logs for Event ID 4719 and the specific subcategory. 
- Use - eventvwr.mscwith Windows Security Event logs event id 4724 to view password reset.
- Use - eventvwr.mscwith Windows Security Event logs event id 4735 to view local group changes.
- Use - eventvwr.mscwith Windows Security Event logs event id 4738 to view local password change.
- Use - eventvwr.mscwith Windows Security Event logs event id 4688 to view process creation logs with the use of- net.exeor- net1.exeto change passwords.
- Use - wevutil.exeand search for appropriate Windows Security Eveents logs.- Command to use is - wevutil.exe qe Security /q:"*[System[EventID=4725 or EventID=4722 or EventID=4723 or EventID=4724 or EventID=4726 or EventID=4767)]]
 
- Use - eventvwr.mscwith Windows Security Event logs event id 4726 to remove a user account.
- Look for commands like - Remove-EventLog -LogName Security,- Remove-EventLog -LogName Application, or- Remove-EventLog -LogName System.
- Look for account creation on the command line with - net.exeor- net1.exewith parent process- cmd.exe.
- Use Live-Forensicator Tool with - .\Forensicator -EVTX EVTX, and search for User Creation Activity within the html file, can be found here.
- Use TimelineExplorer to find suspicious powershell activity using input csv information. 
- Use wmd.pl to extract metadata. 
- Use - olevba.pyto examine metadata.
- Unzip the docx to deflate media and other sections of the document. 
- Use - oledump.pyto view the macros within a document.
- View macros within p-code called pcodedmp.py. 
Examine RTF Documents T1024.002
- Use - rtfdump.pyto examine the file.
Determine Persistence at Startup in Registry T1547.001
- View registry at - HKLM\Software\Microsoft\Windows\CurrentVersion\Runonce.
- View registry at - HKLM\Software\Microsoft\Windows\CurrentVersion\policies\Explorer\Run.
- View registry at - HKLM\Software\Microsoft\Windows\CurrentVersion\Run.
- View registry at - HKCU\Software\Microsoft\Windows NT\CurrentVersion\Windows\Run.
- View registry at - HKCU\Software\Microsoft\Windows\CurrentVersion\Run.
- View registry at - HKCU\Software\Microsoft\Windows\CurrentVersion\Runonce.
- Use Systinternals autorunsc tool. 
- Use PowerShell with the following command: - Get-CimInstance Win32_StartupCommand | Select-Object Name, command, Location, User | fl.
- Use Powershell with the following command: - $winlogonPath = "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon"; "Userinit: $((Get-ItemProperty -Path $winlogonPath -Name 'Userinit').Userinit)"; "Shell: $((Get-ItemProperty -Path $winlogonPath -Name 'Shell').Shell)".
Detect External Devices T1025
- Track USBs in machine at - SYSTEM\CurrentControlSet\Enum\USBSTORor- SYSTEM\CurrentControlSet\Enum\USB.
- Create timeline for USB connections with - C:\Windows\inf\setupapi.dev.logor- SYSTEM\CurrentControlSet\Enum\USBSTOR\Ven_Prod_Version\USB.
- Find the user with the USB device at - SYSTEM\MountedDeviceswith a GUID or- NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2.
- Find the USB volume serial number at - SOFTWARE\Microsoft\WindowsNT\CurrentVersion\ENDMgmt.
- Find the drive letter for the USB device - SOFTWARE\Microsoft\Windows Portable Devices\Devicesor- SYSTEM\MountedDevices.
- Device mounting creates a link file at - C:\%USERPROFILE%\AppData\Roaming\Microsoft\Windows\Recentor- C:\%USERPROFILE%\AppData\Roaming\Microsoft\Office\Recent.
- Use - eventvwr.mscwith Windows Security Event logs 20001.
- View USB connection time at - HKLM\Software\Microsoft\Windows NT\CurrentVersion\EMDMgmt.
- Determine UNIX timestamps for initial insertion, last insertion, etc for USB devices within the arguments secction of - SYSTEM\CurrentControlSet\Enum\USBSTOR.
Identify TimeZone [No TTP]
- Look at - SYSTEM\CurrentControlSet\Control\TimeZoneInformationwithin the System Hive.
- Focus on WordWheelQuery from the START menu located at - NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\WordWheelQuery.
- View the Last Visited MRU at - NTUSER.dat\Software\Microsoft\Windows\CurrentVersion\Explorer\Comdlg32\LastVisited[PID]MRU.
- Focus on the thumbnails/thumbscache that are not deleted after file deletion at - C:\%USERPROFILE%\AppData\Local\Microsoft\Windows\Explorer.
- Examine the recycle bin at - C:\$Recycle.bin.
- View files access from IE at - %USERPROFILE%\AppData\Local\Microsoft\Windows\WebCache\WebCacheV*.dat.
- Use Rifiuti2 to exmaine the Recycle Bin. 
- Use - Autopsyas a secondary tool and look within the Recycle Bin of a disk image.
- For FAT32, look at SFN entries beginning with - 0xE5of a disk image.
- Look at MFT using MFTECmd and see if the file is listed as "In Use". 
- Use - MFTECmdwith the USNJournal ($J) to find the specific file activity.
- Use - MFTECmdwith the $I30 file to find the specific file activity.
- View the registry at - NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{GUID}\Countwhere the GUID is specific for the OS.
- View the Windows Background Activity Monitor at - SYSTEM\CurrentControlSet\Services\bam\UserSettings\{SID}or- SYSTEM\CurrentControlSet\Services\dam\UserSettings\{SID}
- View the Last Visited MRU at - NTUSER.dat\Software\Microsoft\Windows\CurrentVersion\Explorer\Comdlg32\LastVisited[PID]MRU.
- View the RunMRU at - NTUser.dat\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRUfor Start-> Run execution.
- View the RecentApps key for program execution at - NTUser.dat\Software\Microsoft\Windows\Current Version\Search\RecentAppswhere each GUID is a specific application.
- View the AppCompatCache to determine time of execution and name of executable at - SYSTEM\CurrentControlSet\Control\SessionManager\AppCompatCache.
- Utilize jump lists at - C:\%UserProfile%\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinationsto view user access of executables.
- Use - PECmd.exe(from Eric Zimmerman here with Command line.- Command to use - PECmd.exe -f [prefetch_file]
 
- View prefetch files at - C:\Windows\Prefetchfor program execution.
- View the Amcache or recentfile cache for data storage during process creation at - C:\Windows\AppCompat\Programs\Amcache.hve.
- Run - pestron a linux operating system to view strings on an executable.
- Run - strings -aon a linux OS to view strings on an executable.
- Run - strings --encoding=lon a lnux OS to view strings of an executable.
- Place the file in PeStudio. 
- Run - peframeon a linux machine to view imports and other file properties.
- Place the file in DetectItEasy. 
- Place the file in ExeInfoPE. 
- Analyze the file with signsrch. 
- Analyze the file with pescan. 
- Analyze the file with MASTIFF. 
- Analyze the file with Exiftool. 
- Analyze the file with TrID. 
- Analyze the file with Viper. 
- Analyze the file with PortEx. 
- Examine the execution within ProcDot. 
- Examine prefetch files with w10pf_parse.py. 
- Examine Sysmon Logs with Event ID 1. 
- Examine Windows Defender Logs with Event ID 1117 within the Channel Microsoft-Windows-Windows Defender/Operational. 
- Use - regripperto examine the NTUSER.dat file for a specific user looking at UserAssist.
- Run the following command in PowerShell on the system: - Get-NetTCPConnection | select Local*, Remote*, State, OwningProcess,` @{n="ProcName";e={(Get-Process -Id $_.OwningProcess).ProcessName}},` @{n="ProcPath";e={(Get-Process -Id $_.OwningProcess).Path}} | sort State | ft -Auto.
- Look at processes within Powershell with - Get-WmiObject -Class Win32_Process | ForEach-Object {$owner = $_.GetOwner(); [PSCustomObject]@{Name=$_.Name; PID=$_.ProcessId; P_PID=$_.ParentProcessId; User="$($owner.User)"; CommandLine=if ($_.CommandLine.Length -le 60) { $_.CommandLine } else { $_.CommandLine.Substring(0, 60) + "..." }; Path=$_.Path}} | ft -AutoSize
Examine the Shimcache/Amcache
- View the AppCompatCache to determine time of execution and name of executable at - SYSTEM\CurrentControlSet\Control\SessionManager\AppCompatCache.
- View the Amcache or recentfile cache for data storage during process creation at - C:\Windows\AppCompat\Programs\Amcache.hve.
- Focus on ShimCache and AmCache.hve with - mstsc.exefor RDP source connections.
- Focus on ShimCache and AmCache.hve with - rdpclip.exeor- tstheme.exefor RDP destination machine.
Examine Application Crashes T1499.004
- Use - eventvwr.mscwith Windows Security Event logs 1001.
Examine SMB Shares/Sessions T1021
- Use - Get-WmiObjectwithin Powershell.- Command to use is - Get-WmiObject -Class win32_share
 
- Use - Get-SMBSessionwithin Powershell.- Command to use is - Get-SmbSession | Select-Object ClientComputerName,Dialect,SecondsExist,SecondsIdle
 
- Use - Get-SMBMappingwithin Powershell.
- Examine remotely mapped shares at - NTUSER\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2on source machine.
- Look for ShimCache, Amcache, BAM, DAM, or Prefetch with - net.exeor- net1.exeon source machine.
- Use - eventvwr.mscwith Windows Security Event logs event ID 4648 on source machine.
- Use - eventvwr.mscwith Windows Security Event logs event ID 4624, 4672, 4776, 4768, 4769, 5140, and 5145 on destination machine.
- Use Powershell with the command: - Get-CimInstance -Class Win32_Share.
- Use - Get-Servicewithin Powershell.
- Use - Get-CimInstance -ClassName Win32_Service | Format-List Name, Caption, Description,PathNamewithin Powershell.
- Use - Get-WinEventwithin Powershell looking for Event ID 7045 in the Security Log.- Command to use is - Get-WinEvent -LogName System | Where-Object -Property ID -EQ 7045 | Format-List -Property TimeCreated,Message.
 
- Use volatility with a forensic image. - Version 3 uses windows.svcscan.SvcScan 
 
- Use - DeepBlueCLI(from here) and Powershell.
- Use - eventvwr.mscwith Windows Security Event logs 4697.
- Use - eventvwr.mscwith Windows System Event logs 7034, 7035, 7036, 7040 in that order.
- Use - eventvwr.mscwith Windows System Event logs 6045 for service installation on a server.
- Use - sc.exeto query services.- Command to use - sc.exe query state= all
 
- Use - wevutil.exeand search for appropriate Windows Security Events logs.- Command to use is - wevutil.exe qe Security /q:"*[System[(EventID=7045)]]
 
- Use - eventvwr.mscwith Windows System Event logs 7045.
- View registry for new service creations at - SYSTEM\CurrentControlSet\Services\[servicename].
- Within Powershell run the command: - Get-CimInstance -ClassName Win32_Service | Where-Object { $_.State -eq "Running" } | Select-Object Name, DisplayName, State, StartMode, PathName, ProcessId | ft -AutoSize.
- Within Powershell, look for non-running services with - Get-CimInstance -ClassName Win32_Service | Where-Object { $_.State -ne "Running" } | Select-Object @{Name='Name'; Expression={if ($_.Name.Length -gt 22) { "$($_.Name.Substring(0,19))..." } else { $_.Name }}}, @{Name='DisplayName'; Expression={if ($_.DisplayName.Length -gt 45) { "$($_.DisplayName.Substring(0,42))..." } else { $_.DisplayName }}}, State, StartMode, PathName, ProcessId | Format-Table -AutoSize
Analyze OneNote Files T1137
- Use - OneNoteAnalyzerfound here
Unsigned Files in C:\Windows\System32 T1587.002
- Use - sigcheckwithin Sysinternals.- sigcheck -u -e C:\Windows\System32 -accepteula
 
Alternate Data Streams T1564.004
- Use - streamswithin Sysinternals- streams C:\Users\Administrator\Desktop\maliciousfile.txt -accepteula
 
- Use - moreto view the ADS files on the command line.- more < C:\Users\Administrator\Desktop\maliciousfile.txt:ads.txt
 
- Use - Get-WinEventwith Sysmon Event Logs.- Command to use is - Get-WinEvent -Path <Path to Log> -FilterXPath '*/System/EventID=8'
 
- Use - eventvwr.mscwith Sysmon Event logs and Event ID 8.
- With Sysmon logs, look for event ID 15. 
- Use - MFTECmdwith the USNJournal ($J) to find the specific file activity.
- Use - MFTECmdwith the $I30 file to find the specific file activity.
Autoruns T1547
- Use - autorunswithin Sysinternals- autoruns
 
- Use - osqueryon the Windows Command line.- Command to use in interactive mode is - select path from autoexec;.
 
Dump Processes on Host T1059
- Use - procdumpwithin Sysinternals- procdump -accepteula
 
- Use - procexpwithin Sysinternals- procexp -accepteula
 
- Use Process Hacker - Download as Desktop application 
 
- Use - procmonwithin SysInternals- procmon -accepteula
 
- Use - Get-WinEventwith Sysmon Event Logs.- Command to use is - Get-WinEvent -Path <Path to Log> -FilterXPath '*/System/EventID=1'
- Command to use is - Get-WinEvent -Path <Path to Log> -FilterXPath '*/System/EventID=8'
 
- Use - eventvwr.mscwith Sysmon Event logs and Event ID 1.
- Use - eventvwr.mscwith Sysmon Event logs and Event ID 8.
- Use - osqueryon the Windows Command line.- Command to use in interactive mode is - select sid,path from userassist.
 
- Use - DeepBlueCLI(from here) and Powershell.
- Use - eventvwr.mscwith Windows Security Event logs 4688.
- Use - Get-Processwithin Powershell.
- Use - Get-CimInstance -Class Win32_Process | Select-Object ProcessId, ProcessName,CommandLinewithin Powershell.
- Use volatility with a forensic image. - Version 3 uses windows.pslist.Pslist, windows.pstree.PsTree, windows.netscan.NetScan, windows.cmdline.Cmdline, windows.dlllist.DllList 
 
- Use SRUM Dump to examine system usages related to processes. 
- View the registry at - NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{GUID}\Countwhere the GUID is specific for the OS.
- View the Windows Background Activity Monitor at - SYSTEM\CurrentControlSet\Services\bam\UserSettings\{SID}or- SYSTEM\CurrentControlSet\Services\dam\UserSettings\{SID}
- View the Last Visited MRU at - NTUSER.dat\Software\Microsoft\Windows\CurrentVersion\Explorer\Comdlg32\LastVisited[PID]MRU.
- View the RunMRU at - NTUser.dat\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRUfor Start-> Run execution.
- Examine the execution within ProcDot. 
- Use - eventvwr.mscwith Windows Security Event logs 4663.
- Use - eventvwr.mscwith Sysmon Event logs and Event ID 10.
- Use - eventvwr.mscwith Sysmon Event logs and Event ID 25.
- Use - eventvwr.mscwith Sysmon Event logs and Event ID 8.
- Use Live Forensicator with - .\Forensicator -EVTX EVTXand identify processes within processes.html.
- Examine prefetch files with w10pf_parse.py. 
- Examine Windows Defender Logs with Event ID 1117 within the Channel Microsoft-Windows-Windows Defender/Operational. 
- Run the following command in PowerShell on the system: - Get-NetTCPConnection | select Local*, Remote*, State, OwningProcess,` @{n="ProcName";e={(Get-Process -Id $_.OwningProcess).ProcessName}},` @{n="ProcPath";e={(Get-Process -Id $_.OwningProcess).Path}} | sort State | ft -Auto.
- Look at processes within Powershell with - Get-WmiObject -Class Win32_Process | ForEach-Object {$owner = $_.GetOwner(); [PSCustomObject]@{Name=$_.Name; PID=$_.ProcessId; P_PID=$_.ParentProcessId; User="$($owner.User)"; CommandLine=if ($_.CommandLine.Length -le 60) { $_.CommandLine } else { $_.CommandLine.Substring(0, 60) + "..." }; Path=$_.Path}} | ft -AutoSize
- Use - procmonwithin SysInternals- procmon -accepteula
 
- Use - Get-WinEventwith Sysmon Event Logs.- Command to use is - Get-WinEvent -Path <Path to Log> -FilterXPath '*/System/EventID=13'
- Command to use is - Get-WinEvent -Path <Path to Log> -FilterXPath '*/System/EventID=12'
 
- Use - eventvwr.mscwith Sysmon Event logs and Event ID 12.
- Use - eventvwr.mscwith Sysmon Event logs and Event ID 13.
- Use - eventvwr.mscwith Windows Security Event logs 4657.
- Use - Get-ChildItemwith the specific registry key in Powershell.
- Use - Get-ItemPropertywith the specific registry key in Powershell.
- Use Regshot to compare initial registry with final registry post execution. 
- Use RegRipper. - Command to use is - regripper -f [Hive] -a.
 
- Look for registry modifications to - HKLM\SYSTEM\CurrentControlSet\Services\<NetworkProviderName>\NetworkProvider,- HKLM\SYSTEM\CurrentControlSet\Control\Lsa\ Notification Packages, or- HKLM\SYSTEM\CurrentControlSet\Control\NetworkProvider\Order.
- Use - regripperto examine the NTUSER.dat file for a specific user looking at UserAssist.
- Use - Get-WinEventwith Sysmon Event Logs.- Command to use is - Get-WinEvent -Path <Path to Log> -FilterXPath '*/System/EventID=1'
 
- Use - eventvwr.mscwith Sysmon Event logs and Event ID 1.
- Use - Get-ScheduledTaskwithin Powershell. https://learn.microsoft.com/en-us/sysinternals/downloads/procmon- Command to use is - Get-ScheduledTask -TaskName [TaskName]
 
- Use - Export-ScheduledTaskwithin Powershell.- Command to use is - Get-ScheduledTask -TaskName [Name].
 
- Use - eventvwr.mscwith Windows Security Event logs 4698.
- Use - eventvwr.mscwith Windows Security Event logs 4702.
- Use - eventvwr.mscwith Windows Security Event logs 4699.
- Use - eventvwr.mscwith Windows Security Event logs 4701.
- Identify processes of - at.exeor- schtasks.exeon the source machine.
- View registry at - Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasksor- Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Treeon target machine to find scheduled tasks.
- Look for hive key changes in the NetSh key with - Get-ItemProperty -Path "HKLM:\SOFTWARE\Microsoft\Netsh".
- Use - procmonwithin SysInternals- procmon -accepteula
 
- Use - Get-WinEventwith Sysmon Event Logs and look at the call trace.- Command to use is - Get-WinEvent -Path <Path to Log> -FilterXPath '*/System/EventID=10'
 
- Use - eventvwr.mscwith Sysmon Event logs and look at call trace in Event ID 10.
- Use - osqueryon the Windows Command line.- Command to use in interactive mode is - select sid,path from userassist;.
 
- Use - DeepBlueCLI(from here) and Powershell.
- Examine the execution within ProcDot. 
- Examine changes in DLLs residing in - C:\Windows\System32.
- Use - eventvwr.mscwith Windows Security Event logs 4663.
- Use - eventvwr.mscwith Sysmon Event logs and Event ID 10.
- Use - eventvwr.mscwith Sysmon Event logs and Event ID 25.
- Use - eventvwr.mscwith Sysmon Event logs and Event ID 8.
- Use Live Forensicator with - .\Forensicator -EVTX EVTXand identify processes within processes.html.
- Run the following command in PowerShell on the system: - Get-NetTCPConnection | select Local*, Remote*, State, OwningProcess,` @{n="ProcName";e={(Get-Process -Id $_.OwningProcess).ProcessName}},` @{n="ProcPath";e={(Get-Process -Id $_.OwningProcess).Path}} | sort State | ft -Auto.
- Look at processes within Powershell with - Get-WmiObject -Class Win32_Process | ForEach-Object {$owner = $_.GetOwner(); [PSCustomObject]@{Name=$_.Name; PID=$_.ProcessId; P_PID=$_.ParentProcessId; User="$($owner.User)"; CommandLine=if ($_.CommandLine.Length -le 60) { $_.CommandLine } else { $_.CommandLine.Substring(0, 60) + "..." }; Path=$_.Path}} | ft -AutoSize
Explore File Read Activity [No TTP]
- Use - procmonwithin SysInternals- procmon -accepteula
 
- Use - LECmd.exe(from Eric Zimmerman here with Command line.- Command to use - LECmd.exe -f [shortcut_file]
- Shortcut files: - C:\Users\<username>\AppData\Roaming\Microsoft\Windows\Recent\or- C:\Users\<username>\AppData\Roaming\Microsoft\Office\Recent\
 
- View the OpenSaveMRU to detect file opening at - NTUSER.dat\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSave[PID]MRU.
- View the Last Visited MRU at - NTUSER.dat\Software\Microsoft\Windows\CurrentVersion\Explorer\Comdlg32\LastVisited[PID]MRU.
- Examine the RecentFiles at - NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs.
- Examine Office RecentFiles at - NTUSER.DAT\Sofware\Microsoft\Office\VERSION.
- Focus on Shellbags for find file access at - NTUSER.DAT\Software\Microsoft\Windows\Shell\BagMRUor- NTUSER.DAT\Software\Microsoft\Windows\Shell\Bags.
- Each open of file creates a link file at - C:\%USERPROFILE%\AppData\Roaming\Microsoft\Windows\Recentor- C:\%USERPROFILE%\AppData\Roaming\Microsoft\Office\Recent.
- Utilize jump lists at - C:\%UserProfile%\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinationsto view user access of files.
- Use - PECmd.exe(from Eric Zimmerman here with Command line.- Command to use - PECmd.exe -f [prefetch_file]
 
- View prefetch files at - C:\Windows\Prefetchfor program execution.
- View files access from IE at - %USERPROFILE%\AppData\Local\Microsoft\Windows\WebCache\WebCacheV*.dat.
- Examine prefetch files with w10pf_parse.py. 
- Use - MFTECmdwith the USNJournal ($J) to find the specific file activity.
- Use - MFTECmdwith the $I30 file to find the specific file activity.
- Looked at Typed Paths within - NTUSER.dat\Software\Microsoft\Windows\CurrentVersion\Explorer\TypedPathsor- NTUSER.dat\Software\Microsoft\Windows\CurrentVersion\Explorer\WordWheelQuery.
- View the MRU at - NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSave[PID]MRU.
- View email attachments at - %USERPROFILE%\AppData\Local\Microsoft\Outlook.
- View skype history at - C\%USERPROFILE%\AppData\Roaming\Skype\[skypename].
- View IE user account and download history at - %USERPROFILE%\AppData\Local\Microsoft\Windows\WebCache\WebCacheV*.dat.
- View Firefox user account at - %USERPROFILE%\AppData\Roaming\Mozilla\Firefox\Profiles\[randomtext].default\places.sqlite.
- View chrome user account at - %USERPROFILE%\AppData\Local\Google\Chrome\UserData\Default\History.
- View firefox download history at - %USERPROFILE%\AppData\Roaming\Mozilla\Firefox\Profiles\[randomtext].default\downloads.sqlite.
- View user downloads within - C:\User\*\Downloads.
- View Sysmon Event ID 22 for domain queries. 
- Use RegRipper to find file downloads via user hive. - Command to run is - regripper -f [Hive] -a
 
- View edge user downloads looking at the History sqlite3 database table, specifically the downloads table. 
- View edge user downloads looking at the History sqlite3 database table, specifically the urls table. 
- View edge user downloads looking at the History sqlite3 database table, specifically the downloads_url_chains table. 
- View email attachments at - %USERPROFILE%\AppData\Local\Microsoft\Outlook.
View Skype History [No TTP]
- View skype history at - C\%USERPROFILE%\AppData\Roaming\Skype\[skypename].
- View Firefox user account and history at - %USERPROFILE%\AppData\Roaming\Mozilla\Firefox\Profiles\[randomtext].default\places.sqlite.
- View firefox download history at - %USERPROFILE%\AppData\Roaming\Mozilla\Firefox\Profiles\[randomtext].default\downloads.sqlite.
- Focus on cookiest at - %\USERPROFILE%\AppData\Roaming\Mozilla\Firefox\Profiles\[random].default\cookies.sqlite.
- Look at user cache at - \%USERPROFILE%\AppData\Local\Mozilla\Firefox\Profiles\[random].default\Cache.
- View the session restore within - %\USERPROFILE%\AppData\Roaming\Mozilla\Firefox\Profiles\[random].default\sessionstore.js.
- View flash cookies at - %APPDATA%\Roaming\Macromedia\FlashPlayer\#SharedObjects\[random].
- View chrome user account and history at - %USERPROFILE%\AppData\Local\Google\Chrome\User Data\Default\History.
- Focus on cookies at - %\USERPROFILE%\AppData\Local\Google\Chrome\UserData\Default\Local Storage.
- Look at user cache at - %USERPROFILE%\AppData\Local\Google\Chrome\User Data\Default\Cache.
- Look at session restore data at - %USERPROFILE%\AppData\Local\Google\Chrome\User Data\Default.
- View flash cookies at - %APPDATA%\Roaming\Macromedia\FlashPlayer\#SharedObjects\[random].
- Use - Autopsyas a secondary tool.- View information located at: - C:\Users\<username>\AppData\Local\Microsoft\Windows\WebCache\WebCacheV*.dat
 
- Focus on cookies at - %\USERPROFILE%\AppData\Roaming\Microsoft\Windows\Cookiesor- %\USERPROFILE%\AppData\Local\Microsoft\Windows\INetCookies.
- Look at user cache or Edge at - \%USERPROFILE%\AppData\Local\Packages\microsoft.microsoftedge_[APPID]\AC\MicrosoftEdge\Cacheor for IE at- %\USERPROFILE%\AppData\Local\Microsoft\Windows\INetCache\IE.
- Look at session restore data in IE at - %USERPROFILE%\AppData\Local\Microsoft\Internet Explorer\Recovery.
- View flash cookies at - %APPDATA%\Roaming\Macromedia\FlashPlayer\#SharedObjects\[random].
- Use Pasco to inspect - index.datfile.
- Use Live Forensicator with - ./Forensicator -BROWSER BROWSERand search for histories within the- BROWSWER_HISTORYfolder.
- Use Live Forensicator with - ./Forensicator -BROWSER BROWSERand search for histories within the BrowserHistory.html file.
- If given a History SQLite3 table, use sql statements to examine the various tables and open the db with - sqlite3.
- View edge user downloads looking at the History sqlite3 database table, specifically the downloads table. 
- View edge user downloads looking at the History sqlite3 database table, specifically the urls table. 
- View edge user downloads looking at the History sqlite3 database table, specifically the downloads_url_chains table. 
- Focus on cookies at - %\USERPROFILE%\AppData\Roaming\Microsoft\Windows\Cookiesor- %\USERPROFILE%\AppData\Local\Microsoft\Windows\INetCookies.
- Focus on cookies at - %\USERPROFILE%\AppData\Local\Google\Chrome\UserData\Default\Local Storage.
- Focus on cookiest at - %\USERPROFILE%\AppData\Roaming\Mozilla\Firefox\Profiles\[random].default\cookies.sqlite.
- View flash cookies at - %APPDATA%\Roaming\Macromedia\FlashPlayer\#SharedObjects\[random].
- Use - Autopsyas a secondary tool.
- Use - LECmd.exe(from Eric Zimmerman here with Command line.- Command to use - LECmd.exe -f [shortcut_file]
- Shortcut files: - C:\Users\<username>\AppData\Roaming\Microsoft\Windows\Recent\or- C:\Users\<username>\AppData\Roaming\Microsoft\Office\Recent\
 
- Use - MFTECmdwith the USNJournal to find the specific file activity.
- Use - LECmd.exe(from Eric Zimmerman here with Command line.- Command to use - LECmd.exe -f [shortcut_file]
- Shortcut files: - C:\Users\<username>\AppData\Roaming\Microsoft\Windows\Recent\or- C:\Users\<username>\AppData\Roaming\Microsoft\Office\Recent\
 
- Each open of file creates a link file at - C:\%USERPROFILE%\AppData\Roaming\Microsoft\Windows\Recentor- C:\%USERPROFILE%\AppData\Roaming\Microsoft\Office\Recent.
Explore File Write Activity [No TTP]
- Use - procmonwithin SysInternals- procmon -accepteula
 
- Use - LECmd.exe(from Eric Zimmerman here with Command line.- Command to use - LECmd.exe -f [shortcut_file]
- Shortcut files: - C:\Users\<username>\AppData\Roaming\Microsoft\Windows\Recent\or- C:\Users\<username>\AppData\Roaming\Microsoft\Office\Recent\
 
- Use - MFTECmdwith the USNJournal to find the specific file activity.
Explore Prefetch Files T1204
- Use - PECmd.exe(from Eric Zimmerman here with Command line.- Command to use - PECmd.exe -f [prefetch_file]
 
- View prefetch files at - C:\Windows\Prefetchfor program execution.
- Examine prefetch files with w10pf_parse.py. 
Parse Windows 10 Timeline [No TTP]
- Use - WxTCmd.exe(from Eric Zimmerman here on Windows Command line.- Command to use - WxTCmd.exe -f [timeline_file]
- Timeline file: - C:\Users\<username>\AppData\Local\ConnectedDevicesPlatform\{randomfolder}\ActivitiesCache.db
 
Parse Windows Jump Lists [No TTP]
- Use - JLECmd.exe(from Eric Zimmerman here on Windows Command line.- Command to use - JLECmd.exe -f [jumplist_file]
- Jump List file: - C:\Users\<username>\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations
 
Explore File Creation Activity
- Use - Get-WinEventwith Sysmon Event Logs.- Command to use is - Get-WinEvent -Path <Path to Log> -FilterXPath '*/System/EventID=11'
 
- Use - eventvwr.mscwith Sysmon Event logs and Event ID 11.
- Use - LECmd.exe(from Eric Zimmerman here with Command line.- Command to use - LECmd.exe -f [shortcut_file]
- Shortcut files: - C:\Users\<username>\AppData\Roaming\Microsoft\Windows\Recent\or- C:\Users\<username>\AppData\Roaming\Microsoft\Office\Recent\.
 
- Look at Sysmon Event logs for event ID 11. 
- Use - MFTECmdwith the USNJournal ($J) to find the specific file activity.
- Use - MFTECmdwith the $I30 file to find the specific file activity.
- Use - eventvwr.mscon a Windows system and navigate to Applications and Services Logs -> Microsoft -> Windows -> PowerShell -> Operational.
- Use - DeepBlueCLI(from here) and Powershell.
- Use - wevutil.exeto find Powershell execution.- Command to use is - wevutil.exe qe “Windows PowerShell” /q:"*[System[(EventID=501 or EventID=500)]]"
 
- Use - wevutil.exeto find Powershell execution to find Get calls.- Command to use is - wevutil.exe qe "Microsoft-Windows-PowerShell/Operational" /q:"*[System[(EventID=4104)]]" /c:1000 /rd:true /f:text | findstr /i "Get-"
 
- Use - wevutil.exeto find Powershell execution to find invoke execution calls.- Command to use is - wevutil.exe qe "Microsoft-Windows-PowerShell/Operational" /q:"*[System[(EventID=4104)]]" /c:1000 /rd:true /f:text | findstr /i "iex"
 
- Focus on ShimCache, AmCache.hve, Prefetch, DAM, and BAM with - powershell.exeon source machine.
- Use - eventvwr.mscto view Microsoft-Windows-WinRM%4Operational logs for event id 6, 8, 15, 16, or 33 on source machine for remote connection.
- Use - eventvwr.mscto view Microsoft-Windows-PowerShell%4Operational for event id 40961, 40962, 8193, 8194, and 8197 on source machine for remote connection.
- Use - eventvwr.mscto view Microsoft-Windows-PowerShell%4Operational for event id 4103, 4104, 53504 on target machine for remote connection.
- Use - eventvwr.mscto view Microsoft-Windows-WinRM%4Operational logs for event id 91 or 168 on target machine for remote connection.
- Use PSReadline to view full script blocks. 
- Use TimelineExplorer to find suspicious powershell activity using input csv information. 
- View PowerShell Script blocks within PowerShell-Operational.evtx logs with event ID 4104. 
- Use RegRipper to highlight powershell downloads with IEX Download String. - Command to use - regripper -f [Hive] -a.
 
- Look for history file at - APPDATA\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt.
- Use - eventvwr.mscon a Windows system and navigate to Applications and Services Logs -> Microsoft -> Windows -> PowerShell -> Operational and look for EventID 4104.
- Use - eventvwr.mscon a Windows system and navigate to Applications and Services Logs -> Microsoft -> Windows -> PowerShell -> Operational and look for EventID 800.
- Use - eventvwr.mscon a Windows system and look for event ID 4104 within the Powershell (Microsoft-Windows-Powershell) log.
- Use - DeepBlueCLI(from here) and Powershell.
- Focus on ShimCache, AmCache.hve, Prefetch, DAM, and BAM with - powershell.exeon source machine.
- Use TimelineExplorer to find suspicious powershell activity using input csv information. 
- View PowerShell Script blocks within PowerShell-Operational.evtx logs with event ID 4104. 
- Examine prefetch files with w10pf_parse.py. 
- Use RegRipper to highlight powershell downloads with IEX Download String that can be found in LastRunMRU. - Command to use - regripper -f [Hive] -a.
 
Determine the Number Of Log Names [No TTP]
- Use - wevutil.exewith Powershell- Command is - wevutil.exe el
 
- Use - Get-WinEventwith Powershell- Command is - Get-WinEvent -ListLog *
 
- Use - Get-WinEventwith XPath queries using PowerShell.- Command would be - Get-WinEvent -LogName Security -FilterXPath '*/System/EventID=4720 and */EventData/Data[@Name="TargetUserName"]="[UserName]"'
 
- Use - DeepBlueCLI(from here) and Powershell.
- Look for account creation on the command line with - net.exeor- net1.exewith parent process- cmd.exe.
- Use Live-Forensicator Tool with - .\Forensicator -EVTX EVTX, and search for User Creation Activity within the html file, can be found here.
- Using powershell look for users with - Get-CimInstance -Class Win32_UserAccount -Filter "LocalAccount=True" | Format-Table Name, PasswordRequired, PasswordExpires, PasswordChangeable.
- Use - Get-WinEventusing PowerShell.- Command would be - Get-WinEvent -LogName "Windows PowerShell" | Where-Object Id -eq 400 | Foreach-Object {$version = [Version] ( $_.Message -replace '(?s).*EngineVersion=([\d\.]+)*.*','$1') if($version -lt ([Version] "5.0")) { $_ }}
 
- User - eventvwr.mscon a Windows system and filter for event ID 400 within the PowerShell logs.- EngineVersionwill have a different number than other PowerShell logs.
 
- Use - eventvwr.mscon a Windows system and filter for event ID 104 within the Microsoft-Windows-Eventlog source.
- Use - eventvwr.mscwith Windows Security Event logs 517.
- Use - eventvwr.mscwith Windows Security Event logs 1102 to view Audit log clearing.
- Look for commands like - Remove-EventLog -LogName Security,- Remove-EventLog -LogName Application, or- Remove-EventLog -LogName System.
- Use TimelineExplorer to find suspicious powershell activity using input csv information. 
Explore Group Enumeration T1069
- Use - eventvwr.mscon a Windows system and filter for event ID 4799 within Security event logs.
- Look for unusual groups using powershell with - Get-LocalGroup | ForEach-Object { $members = Get-LocalGroupMember -Group $_.Name; if ($members) { Write-Output "`nGroup: $($_.Name)"; $members | ForEach-Object { Write-Output "`tMember: $($_.Name)" } } }.
Determine Number of Network Connections T1021
- Use - Get-WinEventwith Sysmon Event Logs.- Command to use is - Get-WinEvent -Path <Path to Log> -FilterXPath '*/System/EventID=3 | Measure-Object
 
- Use - Get-WinEventwith Sysmon Event Logs.- Command to use is - Get-WinEvent -Path <Path to Log> -FilterXPath '*/System/EventID=3 and */EventData/Data[@Name="DestinationPort"] and */EventData/Data=4444'
- Command to use is - Get-WinEvent -Path <Path to Log> -FilterXPath '*/System/EventID=3 and */EventData/Data[@Name="DestinationPort"] and */EventData/Data=5555
 
- Use - Get-WinEventwith Sysmon Event Logs.- Command to use is - Get-WinEvent -Path <Path to Log> -FilterXPath '*/System/EventID=10 and */EventData/Data[@Name="TargetImage"] and */EventData/Data="C:\Windows\system32\lsass.exe"'
 
- Use - DeepBlueCLI(from here) and Powershell.
- View the Last Visited MRU at - NTUSER.dat\Software\Microsoft\Windows\CurrentVersion\Explorer\Comdlg32\LastVisited[PID]MRU.
- Examine the execution within ProcDot. 
- Use - eventvwr.mscwith Windows Security Event logs Event ID 4688 with vssadmin.
- View ESENT logs with Event ID 325, 326, or 327 in Windows Application Logs. 
- Look for access to - C:\Windows\System32\config\directory.
- Identify interactions with - HKLM\SAM\Domains\Accounts\Users.
- Look for process access to common password locations with Sysmon Event ID 10 or 1. 
- Look for process creation Event ID 4688 to common password storage locations. 
Find Common RAT Connections. T1021
- Use - Get-WinEventwith Sysmon Event Logs.- Command to use is - Get-WinEvent -Path <Path to Log> -FilterXPath '*/System/EventID=3 and */EventData/Data[@Name="DestinationPort"] and */EventData/Data=8080'
 
- Use - DeepBlueCLI(from here) and Powershell.
- Use - osqueryon the Windows Command line.- Command to use - select * from programs;
 
- Look at the Application Event log to find events for msiinstaller. 
- Use MFTECmd to look at downloaded files from the - $MFTon a system.
- Look at Application Event log for event ID 1033. 
- Use - osqueryon the Windows Command line.- Command to use - select * from users;
 
- Use - Get-LocalUserwithin Powershell.- Command to use - Get-LocalUser | Where-Object 'Enabled' -eq $True
 
- Use - Get-LocalGroupwithin Powershell.
- Use - Get-LocalGroupMemberwithin Powershell with a specific group in mind.
Determine Browser Extension T1176
- Use - osqueryon the Windows Command line.- Command to use - select * from ie_extensions;
 
View UserAssist Activity [No TTP]
- Use - osqueryon the Windows Command line.- Command to use in interactive mode is - select sid,path from userassist;.
 
- View the registry at - NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{GUID}\Countwhere the GUID is specific for the OS.
- Examine Word Wheel Query with - regripper.
- Use - regripperto examine the NTUSER.dat file for a specific user.
Parse $MFT for Windows NTFS T1564
- Use - MFTECmd.exeon the Windows command line.- Command to use - MCTECmd.exe -f [file] --csv [path_to_csv_output]
 
- Use - Autopsyas a secondary tool.
- Pull out specific files and examine using - --deoption for- MFTECmd.exe.
- Use - blessto examine the $MFT.
Parse $Boot for Windows NTFS T1564
- Use - MFTECmd.exeon the Windows command line.- Command to use - MCTECmd.exe -f [file] --csv [path_to_csv_output]
 
- Use - Autopsyas a secondary tool.
Parse $J for Windows NTFS T1564
- Use - MFTECmd.exe(from Eric Zimmerman here on the Windows command line.- Command to use - MCTECmd.exe -f [file] --csv [path_to_csv_output]
 
- Use - Autopsyas a secondary tool.
Parse $SDS for Windows NTFS T1564
- Use - MFTECmd.exe(from Eric Zimmerman here on the Windows command line.- Command to use - MCTECmd.exe -f [file] --csv [path_to_csv_output]
 
- Use - Autopsyas a secondary tool.
Parse Volume Shadow Copies for Windows NTFS T1564
- Use - MFTECmd.exe(from Eric Zimmerman here on the Windows command line.- Command to use - MCTECmd.exe -f [file] --csv [path_to_csv_output]
 
- Use - Autopsyas a secondary tool.
Parse $LogFile for Windows NTFS T1564
- Use - MFTECmd.exe(from Eric Zimmerman here on the Windows command line.- Command to use - MCTECmd.exe -f [file] --csv [path_to_csv_output]
 
- Use - Autopsyas a secondary tool.
- Use - DeepBlueCLI(from here) and Powershell.
- Use - eventvwr.mscwith Windows System Event logs 7045.
- Use - eventvwr.mscwith Windows Security Event logs 4697.
View User Authentications T1078
- Use LogonTracer to map out logons by users. 
- Use - eventvwr.mscwith Windows Security Event logs 4624.
- View the SAM at - C:\Windows\system32\config\SAMor- SAM\Domains\Account\Users.
- Use - eventvwr.mscwith Windows Security Event logs 4625 for failed logons.
- Use - eventvwr.mscwith Windows Security Event logs 4634 for logoff.
- Use - eventvwr.mscwith Windows Security Event logs 4647 for logoff.
- Use - eventvwr.mscwith Windows Security Event logs 4648 for run as login.
- Use - eventvwr.mscwith Windows Security Event logs 4672 for admin login.
- Use - eventvwr.mscwith Windows Security Event logs 4778 for RDP login.
- Use - eventvwr.mscwith Windows Security Event logs 4779 for RDP logoff.
- Use - eventvwr.mscwith Windows Security Event logs 4776 for NTLM authentication.
- Use - eventvwr.mscwith Windows Security Event logs 4768 for TGT successful logon.
- Use - eventvwr.mscwith Windows Security Event logs 4769 for TGS access to service.
- Use - eventvwr.mscwith Windows Security Event logs 4771/4772 failed ticket logon.
- Use - wevutil.exeand search for appropriate Windows Security Eveents logs.- Command to use is - wevutil.exe qe Security /q:"*[System[(EventID=4624 or EventID=4625)]]
 
- Look for - gpscript.exe /logonexecution for user logons.
- Use - eventvwr.mscwith Windows Security Event logs 4770 for kerberos ticket renewal.
- Use Live-Forensicator Tool with - .\Forensicator -EVTX EVTX, and search for RDP Logon Activities with an html file, can be found here.
- Use Chainsaw and an EVTX dump to search for failed logons with - ./chainsaw hunt [evtx] -r ./rules/.
- Use powershell with - Get-LocalUser | Select-Object Name, LastLogon.
Examine Startup Actions T1547
- View - desktop.inifor actions taken during startup.
- Use Systinternals autorunsc tool. 
- Use PowerShell with the following command: - Get-CimInstance Win32_StartupCommand | Select-Object Name, command, Location, User | fl.
- Use Powershell with the following command: - $winlogonPath = "HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon"; "Userinit: $((Get-ItemProperty -Path $winlogonPath -Name 'Userinit').Userinit)"; "Shell: $((Get-ItemProperty -Path $winlogonPath -Name 'Shell').Shell)".
View Hosted Web Application Exploitation T1190
- Use - eventvwr.mscwith Windows Security Event logs 4688 for process creation events on the host.
- View suspicious php or .jsp files within - /var/log/httpd/access.log.
- View suspicious php files within - /var/log/apache2/access.log.
Identify Phishing Attempts T1566
- Look for registry modifications to - HKLM\SYSTEM\CurrentControlSet\Services\<NetworkProviderName>\NetworkProvider,- HKLM\SYSTEM\CurrentControlSet\Control\Lsa\ Notification Packages, or- HKLM\SYSTEM\CurrentControlSet\Control\NetworkProvider\Order.
Identity Suspicious DLLs T1574
- Examine changes in DLLs residing in - C:\Windows\System32.
- Look for non-digitally signed DLLs. 
- Use - eventvwr.mscwith Sysmon Event logs and Event ID 25.
- Use - eventvwr.mscwith Sysmon Event logs and Event ID 10.
Identify Credential Dumping T1003
- Use - eventvwr.mscwith Windows Security Event logs Event ID 4688 with vssadmin.
- View ESENT logs with Event ID 325, 326, or 327 in Windows Application Logs. 
Identify Brute Force Attempts T1110
- Use - eventvwr.mscwith Windows Security Event logs Event ID 4776.
- Use - eventvwr.mscwith Windows Security Event logs Event ID 4740.
- Use - eventvwr.mscwith Windows Security Event logs Event ID 4624.
- Use - eventvwr.mscwith Windows Security Event logs Event ID 4625.
- Use - eventvwr.mscwith Windows Security Event logs Event ID 4768.
- Use - eventvwr.mscwith Windows Security Event logs Event ID 4771.
- Use - eventvwr.mscwith Windows Security Event logs Event ID 4769.
- Use - eventvwr.mscwith Windows Security Event logs Event ID 4776.
- Use - eventvwr.mscwith Terminal-Services-RemoteConnectionManager Event ID 1149.
- Use - eventvwr.mscwith ListenerRDP-TCP Event ID 261.
- Use - eventvwr.mscwith Terminal-Services-LocalSessionManager Event ID 21.
- Use Live-Forensicator Tool with - .\Forensicator -EVTX EVTX, and search for RDP Logon Activities with an html file, can be found here.
- Use Chainsaw and an EVTX dump to search for failed logons with - ./chainsaw hunt [evtx] -r ./rules/.
- Use TimelineExplorer to find suspicious powershell activity using input csv information. 
Identify Credentials in Group Policy T1552.006
- Look for powershell command executiono with - Get-GPPPassword.
Identify Credentials in Password Stores T1555
- Look for access to - C:\Windows\System32\config\directory.
- Identify interactions with - HKLM\SAM\Domains\Accounts\Users.
- Look for process access to common password locations with Sysmon Event ID 10 or 1. 
- Look for process creation Event ID 4688 to common password storage locations. 
Identify Proxy Usage T1090
- Look for registry interactions with - HKLM\System\CurrentControlSet\Services\PortProxy\v4tov4\tcp.
Last updated