This Is The Fastest Way To Hunt Windows Endpoints PDF
This Is The Fastest Way To Hunt Windows Endpoints PDF
Windows Endpoints
Michael Gough
MalwareArchaeology.com
MalwareArchaeology.com
Who am I
• Blue Team Defender Ninja, Malware Archaeologist, Logoholic
• I love “properly” configured logs – they tell us Who, What, Where,
When and hopefully How
Creator of
“Windows Logging Cheat Sheet”, “Windows File Auditing Cheat Sheet”
“Windows Registry Auditing Cheat Sheet”, “Windows Splunk Logging Cheat Sheet”
“Windows PowerShell Logging Cheat Sheet”, “Malware Management Framework”
NEW - “Windows HUMIO Logging Cheat Sheet”
MalwareArchaeology.com
Hunting requires some
‘Back to Basics’ to
achieve “Totality”
MalwareArchaeology.com
Achieve Totality
Coverage - Asset Management
• Can you see every host?
• Do you have ghost assets?
• Remote systems (Road Warriors)
• Powered down VM’s/Systems
• IP Scan all devices and identify the OS
MalwareArchaeology.com
We need a
Hunting method
MalwareArchaeology.com
What to base a Hunt on?
• So what do we look for ?
• What do we base our hunts on?
• Where do we start?
MalwareArchaeology.com
IR Reports
• IR Firms publish their findings
– Many published on MalwareArchaeology.com
– I call this Malware Management
• MalwareManagementFramework.org
• Presentations by those of us that have fought and
won/lost against advanced adversaries
MalwareArchaeology.com
Mitre Att@ck
Adversarial Tactics, Techniques & Common Knowledge
• This is a good place to start and map all your detection, prevention,
and hunt activities to
• Not enough details as to how
– You will need to map them
– Or find someone that has, maybe a product(s)
• But most can be mapped to logging for example
• Add Log Management
• Add some Sysmon or WLS to the logs for more details
• Add LOG-MD-Pro, and other tool or script(s)
• Add a solution to query the OS ( I love BigFix)
• Add Network tools
• Fill other gaps
MalwareArchaeology.com
Map them to ATT&CK
• Map the tools you have to the ATT&CK Matrix
• This will give you a place to start and a way to
track and rate your activities
MalwareArchaeology.com
Introducing
• The Windows ATT&CK Logging Cheat Sheet
• 11 Tactics and 187 Techniques mapped to
Windows Event IDs
MalwareArchaeology.com
Introducing
• The Windows LOG-MD ATT&CK Cheat Sheet
• 11 Tactics and 187 Techniques mapped to
Windows Event IDs, LOG-MD, and Sysmon
MalwareArchaeology.com
80/20 rule
• Another VERY important point is we need to
ignore or not worry about the 20% that you
don’t, or can’t cover.
• Don’t get hung up on the 20% or you will
continue to flounder
• Worry about the 80% you CAN or COULD do
• You have to learn to walk before you worry about
trying to be, or cover 100% (run)
• Being good at 80% should be a goal
• You will improve over time as you get better
MalwareArchaeology.com
What to Hunt for
MalwareArchaeology.com
So what to hunt for… quickly
• You basically have two options
• Three, if you include network traffic, but that
is not as fast IMHO and you can add this
method as you get better and faster and can
integrate it into your hunting methodology
– Part of that 20% I just mentioned
MalwareArchaeology.com
Quick Methods of Hunting
These are two faster methods you can hunt on
Windows
1. What is in the logs
2. What is not in the logs
MalwareArchaeology.com
What is in the Logs
• Event ID’s
– Map them to YOUR ATT&CK Matrix
MalwareArchaeology.com
What is in the Logs
• You can hunt them locally if you follow the
Cheat Sheet(s)
– Enabling Process command Line is key
– Write a script or use a tool like LOG-MD to collect
log data
MalwareArchaeology.com
What is in the Logs
• Push and run LOG-MD-Pro, PowerShell, or any
script or tool can think of to query the logs
• Process Command Line (4688) is a key
indicator, New Service (7045), etc.
• There are a lot of Event ID’s you can hunt for
to indicate things that have happened
• Data in IR Reports and the Cheat Sheets are a
place to start for Event IDs and commands
MalwareArchaeology.com
What is in the Logs
• Obvious Log Events such as
– Suspicious PowerShell events (200-500, 4100-4104)
• obfuscation, web calls, size of block, Base64, etc.
– Logins (one account to multiple systems) (4624)
– Process CMD Line – e.g. Rundll32 malware.dll (4688)
– Quantity of Admin commands run in a short period
– New Task (106)
– New Service (7045)
– What process called SeTcbPrivilege (Mimikatz) 4703
MalwareArchaeology.com
Not in the Logs
MalwareArchaeology.com
Non-Logs
• Map them to YOUR ATT&CK Matrix
MalwareArchaeology.com
Non-Logs
• Use a tool that can query the OS to look for
– Registry Keys, Values, Data
– Files and Directories
– Yes, hashes if you must
MalwareArchaeology.com
Tools
MalwareArchaeology.com
My Top 10 Hunting Tools
1. Log Management (Splunk, Humio, ELK, Graylog)
2. Query the OS type tool (BigFix ROCKS!)
3. LOG-MD-Pro (details)
4. n/a
5. n/a
6. n/a
7. n/a
8. n/a
9. n/a
10. n/a
MalwareArchaeology.com
Tools to Query the OS
• BigFix
• Tanium
• SCCM
• OS Query
• InvestiGator
• Grr
• PowerShell
• Kansa
• Old Fashioned scripts
• EDR-IR tools (Cb, CrowdStrike, Endgame, Red Cloak, etc.)
• LOG-MD-Pro (My personal favorite)
MalwareArchaeology.com
How do I hunt for PS?
• Without Log Management?
• Or with it, we consume LOG-MD-Pro logs into
Log Management too
MalwareArchaeology.com
Resources
• Mitre - ATT&CK Framework
– attack.mitre.org/wiki/Main_Page
• Endgame – The Endgame Guide to Threat Hunting
– https://pages.endgame.com/rs/627-YBU-
612/images/The%20Endgame%20Guide%20to%20Threat%20Hunting%20-
%20ebook.pdf
• Sqrrl - Hunt Evil Your Practical Guide to Threat Hunting
– https://sqrrl.com/media/Your-Practical-Guide-to-Threat-Hunting.pdf
• SANS Poster – Find Evil
– Digital-
forensics.sans.org/media/poster_2014_find_evil.pdf
MalwareArchaeology.com
Resources
• Cyb3rWard0g/ThreatHunter-Playbook
– https://github.com/Cyb3rWard0g/ThreatHunter-
Playbook
• beahunt3r/Windows-Hunting
– https://github.com/beahunt3r/Windows-Hunting
• ThreatHunting.net
• ThreatHunting.org
• Findingbad.blogspot.com
LOG-MD.COM
Questions?
You can find us at:
• Log-MD.com
• @HackerHurricane
• HackerHurricane.com (blog)
• MalwareArchaeology.com – Cheat Sheets
• Listen to the “Brakeing Down Incident Response”
Podcast
– BDIRPodcast.com
LOG-MD.COM