Mindmap - Analysis Scenarios
Mindmap - Analysis Scenarios
Audit
Destination
- Eula: Users need to execpt the user agreement before they can use the
Source sysinternals suite.
- EID 4648 will be on the source system if explicit creds are used (runas)
Audit
- FILE SYSTEM: PsExec will create a user profile on the destination by default
(als -e niet is mee gegeven). The creation time of this profile and its corresponding
Destination NTUSER.DAT registry data can be an indicator when PsExec was executed.
- look for the pipes: \\<ip>\pipe\PSEXECSVC-<sourcehostname>-<PID>-stdin
lookup all pipes in powershell: PS> get-childitem \\.\pipe\
PsExec
you can create a policy that prevents users from downloading software tools such as
PsExec and AppLocker. You can also configure the Windows Registry to require User
Account Control (UAC) approvals for any PsExec operations requiring administrator
privileges
if a new DLL is used to create a new service, creation of those files and subsequent
Destination
application execution artifacts can be identified.
if a new DLL is used to create a new service, creation of those files and subsequent
Destination
application execution artifacts can be identified.
Source
Code or Remote Commands
WMI commands are not encrypted -> Network forensics can be useful for tracking
Network WMI usage.
except if used over WinRM protocol (eg using powershell)
Source
command:"Invoke-Command"
command: "Enter-PSSession" Enter-PSSession creates an encrypted interactive shell like SSH
gives the adversaries similar capabilities to PsExec while leaving fewer artifacts.
Audit
If adversaries gain access to the patch distribution server, then can create a package/
Application Deployment Software
malware to spread that looks like a legit software update.
Crash reports
Audit
EID 4688: Mandatory Label: (new to Win10) In addition to each objects Discretionary Access
Event Logs A new process has been created Control List (permissions on a file) Windows also enforces Mandatory Integrity Control
Malware based (MIC) over object access attempts which compares the object's integrity label to the
the integrity level on the process trying to access the object.
HIPS/Antivirus/EMET logging
Crash Detection
Detection
Application control logs
Code-injection trackers