Part 2 - Endpoint Detection and Response in Threat Hunting
Part 2 - Endpoint Detection and Response in Threat Hunting
By,
Asif khan,
Sr. Cyber/Digital Forensics Expert,
HTTPS://WWW.LINKEDIN.COM/
IN/ASIF-KHAN-B5379A126/
Index
1. Introduction
2. Core Capabilities of EDR
3. Technical Workflow for Threat Hunting with EDR
4. Deep Dive into EDR Features
5. EDR in Action: Threat Hunting Scenarios
6. Technical Examples of EDR in Threat Hunting
• Fileless Malware Detection
o Detecting Encoded PowerShell Scripts
o Process Termination and Endpoint Isolation
• Suspicious Network Connections
o Identifying Non-Standard Ports
o Blocking Malicious Traffic
• Ransomware Detection
o Monitoring File Modifications
o Termination of Encryption Processes
• Lateral Movement Detection
o Identifying PsExec and WMI Usage
o Blocking Unauthorized Remote Execution
• Credential Dumping Detection
o Monitoring Access to lsass.exe
o Blocking Memory Dump Attempts
• Persistence Mechanisms
o Detecting New Scheduled Tasks or Autorun Entries
o Disabling Unauthorized Persistence Mechanisms
• Abnormal User Behavior
o Monitoring Odd Hour Logins
o Locking Suspicious User Accounts
• DLL Injection Detection
o Monitoring Unusual DLLs in System Processes
o Unloading Malicious DLLs
• Detecting Data Exfiltration
o Monitoring High-Volume Uploads
o Blocking Non-Corporate Domains
• Insider Threat Monitoring
o Tracking Unauthorized File Access
o Investigating Suspicious User Behavior
7. Challenges in EDR for Threat Hunting
8. Conclusion
Endpoint Detection and Response (EDR) in SOC for Threat
Hunting: Technical Insights
Introduction
Endpoint Detection and Response (EDR) is a cornerstone of modern Security Operations Centers
(SOC), enabling active threat hunting and incident response. By providing detailed endpoint
telemetry and advanced analytics, EDR empowers threat hunters and SOC analysts to detect,
investigate, and respond to advanced persistent threats (APTs) and other sophisticated attacks.
6. Persistence Mechanisms
Scenario: Detect creation of new scheduled tasks or autorun entries.
Technical Example:
• Indicator: New scheduled tasks added by unauthorized users.
• Hunting Query:
sql
>>SELECT * FROM scheduled_tasks
WHERE task_author NOT IN ('SYSTEM', 'Administrator')
AND task_name NOT LIKE 'Microsoft%'
• Detection Outcome:
o Flags unauthorized tasks (e.g., task_name = 'malicious_update').
o Example: Command to persist malware: schtasks /create /tn MaliciousTask /tr
backdoor.exe /sc onlogon
EDR Response:
• Disable the suspicious task.
• Audit user activity to identify potential insider threats.
Conclusion
These technical examples demonstrate how EDR facilitates proactive threat hunting by providing
granular endpoint telemetry, flexible querying capabilities, and automated responses. Threat
hunters and SOC analysts must regularly update detection logic to counter evolving threats
effectively.