Cylabs
  • 😊Welcome to CyLabs
  • 101 Series
    • Cyber Security 101
      • Introduction to Cyber Security and core concepts
      • Getting Started into Cyber Security Career
      • Online Cybersecurity Practice Labs to Sharpen Your Skills
      • Cyber Security Interview Q&A
        • Careers in Cybersecurity
      • Stay Tuned : Cyber Resources
        • Blogs for Cyber Security
          • Blogs
            • Penetration Testing Automation
            • Security
              • Metasploit Framework
              • Jenkins Servers: Identifying Vulnerabilities and Exploiting Unauthenticated Access with Groovy Scrip
              • Securing Your Network: Printer Vulnerabilities, LDAP Exploits, and Defense Strategies
              • SSH for Red Teaming and Security Analysis
              • Operating Systems for Penetration Testing: Enhancing Your Cybersecurity Arsenal
              • Hacking Notes
                • Phineas Fisher
        • Cyber News
        • Leading Cybersecurity Companies to follow
        • Cybersecurity Courses and Certifications: Trends in 2024
        • ISACs: Enhancing Cybersecurity through Collaboration and Information Sharing
        • Global and National Cybersecurity Agencies: Guardians of the Digital Realm
        • Cyber Security News Feed Resources
    • Kubernetes 101
    • Web 101
    • Operating Systems
      • Linux 101
        • Linux Kernel
        • Basic Commands and Usage
          • Shell Commands
        • Linux File System
        • apt
        • su and sudo
        • File Search
        • Linux Services
        • Networking
          • Netcat
        • Corn Jobs
        • Shell Scripting
        • Linux OS API's
      • Windows 101
        • Windows system calls
        • Windows Event Logs and IDs
        • Windows UAC
        • Windows Registry
        • Windows Bit Locker
        • Volume Shadow Copy Service
        • Windows OS API's
    • Building the Security Lab
      • Virtualization with Virtual Box
        • Installing and setting Virtual Box
        • Vritual Box Networking
      • Home Lab Setup
        • PF Sense Installation
        • Ubuntu Installation
        • Metasploit Installation
        • Kali Linux Installation
    • Fundamentals of Programming
      • Python 101
      • Powershell 101
      • SQL 101
    • AI/ML and Data Science for Cyber Security and Analytics
    • IT Infrastructure and Hardware
    • Governance, Risk and Compliance
    • Networking 101
      • Network Packets and Frames
      • Network Switches and Routers: The Backbone of Connectivity
      • Network Security Devices and Strategies
      • Network Design and Architecture: A Foundation for Robust Connectivity
      • Specialized Network Equipment and Functions
      • Network Traffic Management and Analysis
      • Advanced Networking Concepts
      • ARP and RARP
      • How DNS, HTTP and HTTPS works
      • Understanding the Basics of Networking
  • Introduction to Cyber Security Operations
    • Security Architecture and Engineering
      • Security Controls
        • Preventive
        • Deterrent
        • Detective
        • Corrective
        • Compensating
        • Directive
    • GRC
      • Information Security and Risk Management
        • Risk Management
        • Supply Chain Risk Management
        • Governance
        • Asset Management
        • Cyber Security Road Map
        • Cyber Security Controls
        • Cyber Security Strategy and Architecture
        • Cyber Security Architecture
        • Risk Assessment and Security Questionnaire
        • Ransomware Prevention
        • Gap Assessment
        • Principle of Least Privilege
      • Governance
      • Asset Security
      • Communication and Network Security
      • Identity and Access Management
      • Security Assessment and Testing
      • Security Operations
      • Software Development Security
      • Security Baselines
      • Security Reporting
      • Data Loss Prevention
      • Zero Trust
      • MFA
      • Compliance
    • Security Policies and Procedures
    • Offensive Security
      • Stages of Penetration Testing
    • Cyber Defense
      • Security Operations Center (SOC)
        • SOC Architecture Development with ELK Stack:
      • Different Classes of Threat Actor
    • Security Principles, Controls and Strategies
      • Defense in Depth
      • Least Privilege
      • Zero Trust
  • Cyber Security Assessment
    • Planning and Scoping
      • Security Engagement
      • Security Assessment Questionaire
      • Who Targeting you
    • Reconnaissance
      • Active Recon
        • Tools
          • NMAP
          • Maascan
          • Recon-NG
          • Maltego
          • Spider Foot
          • Whois
          • TraceRoute
          • Amass
          • The Harvester
          • Nslookup
          • DNS Dumpster
          • BloodHound
          • Relay Attacks
          • Packet Crafting
          • NMAP+Proxychains+TOR
      • Passive Reconnaissance
        • Network Sniffing
          • Wireshark
          • TCPDump
        • Whois (online services)
        • EMail Account Enumeration
          • Hunter.io
        • Search Engine Analysis
          • Google Hacking Database
          • Shodan
          • Censys.io
        • Information Disclousre
        • Banner Grabbing
        • HTML Scrapping
        • Certificate Transparency Logs
        • Open Source Intelligence (OSINT)
          • Ship OSINT
          • Social Media
          • Code Repositories
          • Darkweb Analysis
          • DNS
          • Cached Pages
          • Password Dumps
          • Anonymity
    • Enumeration
      • OS Finger Printing
      • Service Discovery
      • Protocol Enumeration
      • DNS Enumeration
      • FTP Service
      • HTTP/HTTPS
      • WMI
      • DCOM
      • RPC Remote Procedure Call
      • Directory Enumeration
      • Host Discovery
      • Share Enumeration
        • SMB
      • Local User Enumeration
      • Email Account Enumeration
      • SSH Service
      • Wireless Enumeration
        • Wigle.net
        • InSSIDer
        • Aircrack-ng
      • Permission Enumeration
      • Secrets Enumeration
        • Passwords
        • Session Tokens
        • Cloud Access Keys
      • Attack Path Mapping
      • VNC
      • Web Application Firewall
      • Wordpress Scan
      • Remote Desktop Protocol
      • SNMP
      • SMTP
      • Web Crawling
        • Platform Plugins
        • Sitemap
        • Robots.txt
      • Active Directory Enumeration
    • Vulnerability Assessment and Management
      • Terminology
      • Vulnerability Database
      • Vulnerability Scoring
        • CWE
        • CVSS
        • CVE
        • EPSS
      • Vulnerability Scan
        • Authenticated vs Unauthenticated Scans
        • OS Security Assessment
        • Tenable
        • Nikto
        • Open VAS
      • Exploit Databases
      • Tools
        • Tenable.IO
        • Open VAS
    • Exploitation
      • Attack Surface and Target Prioritization
        • High Valued Assets and Identification
        • Vulnerability Metrics
        • End of Life Softwares
        • Default Configuration
        • Running Services
        • Vulnerable Encryption Methods
        • Defensive Capabilities
        • Attack Path
      • Attack Types
        • Network Attacks
          • Virtual LAN Hopping
          • Packet Crafting
            • Attacks Scenario
          • Default Credentials
          • On-Path / Man in the Middle Attacks
          • Certificate Services Attacks
      • Host Based Attacks
        • Privilege Escalation
        • Credential Dumping
        • Shell Escape
        • UAC Bypass
        • Payload Obfuscation
        • Endpoint Security Bypass
        • Process Hallowing
        • Log Tampering
        • DLL Injection
        • Service Path Injection
      • Authentication Attacks
        • LDAP Injection
        • SAML Attacks
        • Open ID Connect Attacks
        • Dictionary Attacks
        • Credential Stuffing
        • MFA Fatigue
        • Pass the Hash attacks
        • Kerberos Attacks
        • Pass the Ticket Attacks
      • Vulnerable Encryption Methods
      • Tools
        • Metsploit
        • Netcat
        • LOLbins
        • Mimikatz
        • Rubeus
        • Certify
        • AD Search
        • Powerview
        • SeaBelt
        • Evil winRM
        • PSEXEC
        • Powersploit
        • Metasploit
        • Impacket
        • Responder
        • CrackMapExec
        • Msfvenom
        • Responder
        • Searhsploit
        • Powersploit
      • Password Attacks
        • Password Cracking
        • Password Spraying
        • Tools
          • Medusa
          • Burpsuite
          • John the Ripper
          • Hydra
          • Hashcat
        • Password Attacks
    • Lateral Movement
      • Relay Creation
      • String Searches
      • Service Discovery
      • Tunneling
        • SSH Tunneling
      • Pivoting
      • Exfiltration
        • DNS
        • HTTPS
        • EMail
        • Cloud Storage
      • Tools
        • sshuttle
        • Page 1
    • Post Exploitation
      • Persistance
        • Scheduled Taks
        • Bind Shell
        • Registry Keys
        • C2 Frameworks
        • Tampering Security Controls
        • Back Door
          • Trojan
          • Root Kit
          • Web Shell
        • Searching Valid Account Credetials
        • New Account Creation
        • Reverse Shell
        • Service Creation
        • Cron Jobs
      • Command and Control
    • Reporting
  • Cybersecurity Frameworks and Standards
    • CREST
    • CIS
    • NIST Publications
      • NIST SP 800-171
      • NIST CSF
      • NIST SP 800-115
    • MITRE
      • MITRE D3FEND
      • MITRE ATT&CK
    • Penetration Testing Execution Standard (PTES)
    • OWASP Top 10
    • Purdue Model
    • Open Source Security Testing Methodology Manual (OSSTMM)
    • Council of Registered Ethical Security Testers (CREST)
    • Zero Trust
    • CMMC
    • Threat Modeling Frameworks
      • STRIDE
      • OCTAVE
      • DREAD
    • Mitigation Strategies
      • Network Segmentaion
      • Access Control
      • Application Control
      • Isolation Techniques
      • Default Password Changes
      • Host based firewall
      • Protocol blocking
      • Port blocking
      • Host based intrusion prevention
      • Endpoint Management
      • Decommissioning
      • Configuration Management
      • Least Privilege
      • Logging
      • Monitoring
      • Encryption
      • Patching
    • Security Governance
      • Data and System: Roles and Responsiblities
      • Security Policies
        • Access Use Policy
      • Security Standards
        • Access Control
        • Encryption
        • Password
      • Security Procedures
        • Change Management
  • Security Domains
    • Security Designing
    • Application Security
      • Cryptographic Attacks
      • Password Attacks
      • Web Application Security
        • Enumeration
          • Cookie and Header Security Review
        • Bruteforce Attack
        • Directory Traversal
        • Insecure Direct Object Reference (IDOR)
        • Session Hijacking
        • File Inclusion Attacks
          • LFI
          • Webshell
          • RFI
        • Server-Side Request Forgery (SSRF)
        • Deserialization Attacks
        • Command Injection
        • Server Side Template Injection
        • Cross Site Scripting (XSS)
        • SQL Injection
          • Union Based SQL Injection
          • Blind SQL Injection
        • Cross-Site Request Forgery (CSRF)
        • XML External Entity (XXE)
        • File Upload Vulnerabilites
        • Remote Code Execution (RCE)
        • Tools
          • Hetty
      • OWASP TOP 10 API
        • API Abuse
        • JWT Token manipulation
        • Graph QL security
        • API security
      • OWASP Top 10 Mobile
      • OWASP Top 10 IOT
      • Web Application Security
        • Getting Started in BugBounty Hutning
        • Subdomain Enumeration
        • Subdomain Takeover: Understanding the Risks and Prevention
        • Tools and Technologies
      • Microservices
      • WPscan
        • Burpsuite
        • Ffuf
        • Gobuster
        • Postman
        • Dirbuster
        • Wfuzz
        • ZAP
      • Tools
        • BurpSuite
        • SQLmap
    • Cloud Security
      • Metadata Service Attacks
      • IAM misconfigurations
      • Tools
        • Pacu
        • Prowler
        • Scoutsuite
        • Docker Bench
      • Container Escape
      • Workload Runtime Attacks
      • Supply Chain Attacks
      • Misconfigurations
        • Network Segmentation
        • Network Controls
        • IAM Credentials
        • Public Access to Services
        • Exposed Storage Buckets
        • Logging Information Exposure
      • Azure Security : Components and Assessment Guide
        • Azure Security Assessment Tools : Installation and usuage
    • Identity and Access Management
    • Cloud Security
      • Cloud Engineering and Architecture concepts
      • Cloud Data Security
      • Cloud Platform and Infrastructure Security
      • Cloud Application Security
      • Cloud Security Operations
      • Cloud Legal, Risk and Compliance
      • Azure Security
      • Azure Pentest
    • DevSecOps
      • Static Application Security Testing (SAST)
        • Code Quality
        • CheckMarx
        • Sonarqube
          • Sonarqube Installation using Helm Chart on AKS
      • Interactive Application Security Testing (IAST)
      • Dynamic Application Security Testing (DAST)
      • SCA
      • Wazuh SIEM and XDR
        • Wazuh on Azure AKS
        • Azure + Argo
      • DevSecOps
    • Social Engineering
      • Vishing
      • Spearphishing
      • Smishing
      • Eavesdropping
      • Impersonation
      • Watering Hole
      • Shoulder Surfing
      • Whaling
      • Phishing
      • Tools
        • GoPhish
        • Beef
        • Evilginx
        • SET social engineering toolkit
    • DevOps
      • Kubernetes
        • Kubernetes Architecture and Components
        • Mastering kubectl: The Command Line Interface for Kubernetes
        • Overview of Kubernetes Tools and Utilities
        • Container vs Pod vs Deployment
        • Kubernetes and Docker Swarm
        • Deploying a Kubernetes Cluster Using Minikube
        • Deploying a Kubernetes Cluster Using Kind
        • Integrating Kubernetes with Azure Key Vault
        • Containers vs Virtual Machines
        • Comprehensive Guide to Kubernetes Security and Analysis Tools
        • Monitoring Kubernetes with Prometheus and Grafana
        • Introduction to Azure Kubernetes Service (AKS) and Deploying Your First Cluster
        • Kubernetes Persistence with Backend Databases
        • Kubernetes StatefulSet vs. Deployment
        • DevSecOps Architecture for Kubernetes
      • Docker
      • Helm
        • Scenario : Configuring Azure Key Vault and Using Secrets in Helm Deployments
      • Git Ops
        • Argo CD
      • Git and Versioning
      • Terraform
      • Virtualization
    • Mobile Security
      • Android Mobile App Security Assessment
      • Suspicious Malware App Analysis
      • Android App Penetration Testing
      • Permission Abuse
      • Jailbreak/Rooting
      • Tools
        • MobSF
        • Drozer
        • Frida
    • IOT/OT/SCADA
      • Power Supply
        • Juice Jacking
      • RFID
      • Bluetooth
        • BlueJacking
        • Bluetooth Spamming
      • Ports and Services
      • Port Mirroring
      • Modbus Attack
      • CAN Bus Attack
      • Replay Attack
      • Memory Registry Attacks
      • Tools
        • BlueCrack
        • Scapy
        • TCP Replay
    • Network Security
      • Network Attacks
        • DNS Attacks
        • DDOS
      • Network Assessment
      • Wireshark
      • Zeek
      • Snort
      • TCPDump
      • Defensive Network
        • Firewalls
        • Intrusion Detection System
    • Wireless Attacks
      • Service Set Identifier (SSID)
      • Wardriving
      • Evil Twin Attack
      • Deauthentication Attacks
      • Signal Jamming
      • Channel Scanning
      • Signal Strength Scanning
      • Tools
        • WiFi Pumpkin
        • AirCrack Ng
        • Kismet
    • Purple Teaming
      • Tools
        • Infection Monkey
        • Atomic RedTeam
        • Caldera
    • Kubernetes Security
      • AKS Security
      • Kube-Hunter
      • KubeEscape
    • Hardware Security
    • Container Security
      • Grype
      • Trivy
      • Clair
    • AI
      • LLM (Large Language Models)
      • Prompt Engineering
      • AI Cyber Security Risk Management
        • AI Policies
      • AI Security
      • AI Attacks
        • Prompt Injection
        • Model Manipulation
      • Security Frameworks
        • MITRE ATLAS
        • OWASP Top 10 LLMs
        • NIST AI Risk Management Framework
    • Reverse Engineering
      • Scenarios
        • Browser Plugin
        • PDF document
        • Word Doc
        • Windows Binary File
        • Mobile App
      • Buffer Overflow
  • Operational Security
    • Identity and Access Management
      • Identity
      • Authentication
      • Accountability
      • Access Management
      • Authorization
      • Access Controls
    • Deception Technology
      • Honeypot
      • Honeynet
      • Honeyfile
      • Honey Token
    • Cryptography
      • Data at Rest
      • Data at Transit
      • Hashing
      • BlockChain
      • Digital Signatures
      • Certificates
      • Encryption
        • Public Key Infrastructure (PKI)
          • Public Key
          • Private Key
        • Tools
      • Certification Preparation
        • Penetration Testing
        • GRC and Audit
    • File Integrity Monitoring
    • Data Security
      • DLP
    • Change Management
      • Impact Analysis
    • Malware Analysis
      • Malware Analysis Tool
      • Malware Analysis Books
      • university courses and resources related to malware analysis
      • Binary Analysis
    • Data Loss Prevention
    • Threat Modeling
      • Attack Surface Management
        • Introduction
      • Threats, Technologies, Procedures
        • Threat Actors
      • Threat Hunting
        • Indicators of Compromise
      • Threat Assessment
        • Threat Modeling
          • OCTAVE
          • DREAD
          • STRIDE
        • Threat Hunting
          • Threat Hunting Blogs
          • Ransomware: An Overview
          • Threat Hunting and Incident Response Q&A
          • Network Traffic Analysis: Wireshark
          • Threat Hunting Questionnaire
          • KQL
          • Email Header Analysis
          • TH
          • Windows Process Exploration
        • Threat Intelligence
          • Threat Intelligence Tools and Techniques
            • Yara
      • Malware Attacks
    • Digital Forensics
      • Network Forensics
      • Forensic Tool Analysis
      • Data Recovery
    • Endpoint Management
    • SOC/SOAR
      • Threat hunting scenarios
      • Log Management
        • AWS VPC flow log analysis
        • Linux Logs
        • Windows Logs
    • Ransomware Prevention
      • APT Groups
    • Security Automation
      • C
      • Powershell
      • Python
      • C++
      • GO
      • Rust
    • Incident Response
      • Scenarios
        • Windows : No Event Logs
      • Tools
        • Chainsaw
    • Defensive Security Controls
    • Physical Security
      • Physical Attacks
        • USB (Universal Serial Bus)
        • Tailgating
        • Lock Picking
        • RFID Cloning
          • Badge Cloning
    • Personal Security
    • Security Awareness and Training
    • Firewall
    • Network Access Control
    • Intrusion Detection System
    • Intrusion Prevention System
    • Operating System Security
    • Secure Protocol Usuage
    • Business Continuity
    • Email Security
    • DNS Filtering
    • user behaviour analytics
    • Host Security
    • Mobile Device Security
    • Change Management
    • Vulnerability Management
      • Vulnerability Assessment
        • Vulnerability Analysis
      • Types of Vulnerabilites
    • Penetration Testing/Red Teaming
    • Disaster Recovery
    • Logging and Monitoring
      • Monitoring
        • Systems
        • Infrastructure
        • Applications
      • Logging
        • Log Data
          • Application Logs
          • Network Logs
          • WAF Logs
          • IDS/IPS logs
          • OS logs
          • Endpoint Logs
          • Firewall Logs
        • Alerting
        • Log Aggregation
      • Tools
    • Endpoint
    • Security Metrics
  • Industry Specific Security:Case Studies
    • Aviation Security
      • The Integral Role of Airports in National Security : Operations Perspective
      • Cyber Attacks on Airports
      • Navigating the Complex Web of Airport Operations: Key Components and Leading Industry Providers
    • Aviation Security
  • Computational Science
    • Quantum Computing
      • Quantum Computing: Unleashing the Power of Qubits
    • Probability
  • Data Engineering
  • AI/ML and Data Science
    • Installation
      • Ollama
    • Machine Learning
    • Large Language Models (LLM)
    • Security Analytics
    • Untitled
      • Roles and Responsibilites
      • Azure AI Services
        • AI Services Security
        • Monitoring Azure AI Services
        • AI services on containers
  • Application Development
    • Django
  • Radom Topics :)
    • CSA WAI
  • CISSP
Powered by GitBook
On this page

Was this helpful?

  1. Operational Security
  2. SOC/SOAR

Threat hunting scenarios

PreviousSOC/SOARNextLog Management

Last updated 1 year ago

Was this helpful?

    • Most common protocol usage

      • VNC protocol usage

      • RDP protocol usage connections to and from public IP range

      • FTP protocol usage

    • suspicious IP/Domains lookup with Alexa/Cisco million domains list

    • Investigate suspicious domain certificates to find similar malicious or impersonating domains

    • Disabling the endpoint security events, script execution activity (ex: PS, JS, DLL followed by download activity)

    • .rdp files in environment

    • .hta files in environment

    • .iso files in environment

    • .ink files in environment

    • Passwords.txt in environment

    • Network Recon Activity

      • Using windows utilities

    • Password Dumping activity tools

      • Mimikatz fetching domain admin kerberos

      • Lass.exe dumping

    • Additional tools

      • Lazangne

      • RDPV

      • NirSoft Tools

      • psexec

    • Network port scan activity

    • windows utilities such as WMI, wmic, task kill, WEVTUTIL, sc, net.exe to kill processes and remove logs from the system

    • Utilman.exe to manipulate/disable cmd.exe

    • rule to detect findstr.exe

    • WScript to downloading files

    • DLL dropping in %appdata% with different file format

    • Regsrv32 loads DLL

    • Ping beaconing/ICMP

    • .js files downloading dll's

    • Detecting Cobalt Strike activity

    • PowerShell download (invoke-webrequest)

    • Persistence using schedule task

    • wermgr.exe process injection

    • Svchost.exe process injection

    • ARP for enumeration

    • Word document with macro

    • .onion traffic

    • TOR traffic

    • Chisel, a tunneling tool transported over HTTP and secured via SSH

    • AnyDesk, LogMeIn, and Atera

    • Group policy changes monitoring

    • Anti virus change policies

    • Windows Restart Manager to determine whether targeted files are currently in use or

    • blocked by other applications

    • AV tamper tool

    • Check LastPass Use

    • Check robots.txt

    • Check Cookies storage

    • Excel.exe -< regsvr32.exe -s : to download malicious files

    • Powershell activity with base64

    • DNS over HTTP

    • DNS over TLS

    • Outbound activity to suspicious

    • Power shell to DNS request (potential download

    • Canary tokens

    • Cobalt Strike traffic

    • Visiting cloud hosting ( box)

    • Pasting sites

    • NMAP installed devices

    • Wireshark installed

    • System, Security and Application Windows event logs wiped

    • Microsoft Windows Defender AntiSpyware Protection disabled

    • Microsoft Windows Defender AntiVirus Protection disabled

    • Volume shadow copies deleted

    • Normal boot process prevented

    • Known IOCs – Logged Processes

    • wevtutil.exe cl system

    • wevtutil.exe cl security

    • wevtutil.exe cl application

    • vssadmin.exe delete shadows /all /quiet

    • wmic.exe SHADOWCOPY /nointeractive

    • wmic.exe shadowcopy delete

    • Get-WMIObject : wmi activity

    • bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures

    • bcdedit.ex

    • Identify processes related to backups, antivirus/anti-spyware, and file copying and then terminating those processes to facilitate file encryption.

    • Stop the volume shadow copy services and remove all existing shadow copies via vssadmin on command line or via PowerShell.

    • Delete Windows event logs, specifically the System, Security and Application logs

    • removes virus definitions and disables all portions of Windows Defender and other common antivirus programs in the system registry

    • set {default} recoveryenabled no devices

    • Most, Least and outliner

    • Installed applications

    • Installed servers (Tomcat, HTTP servers)

    • Detecting different browsers in use

    • Detecting browser plugins

    • Cobalt strike Activity

    • PsExec

    • BITSadmin

    • Wmi

    • Pchunter

    • Programs which are not signed

    • Hunting torrents traffic

    • SSDP

    • Microsoft sharing the installation packages

    • Peer to Peer antivirus scans

    • Microsoft computer browser service annnouncements

    • ARP Traffic

    • Dropbox discovery broadcasts

    • kerborosting detection

    • password spraying

    • Transfer of Darkside malware over HTTP/S

    • Email Darkside malware as a ZIP attachment

    • Transfer of Darkside malware over HTTP/S

    • Email Darkside malware as a ZIP attachment

    • Pre-execution phase of Darkside malware

    • Write Darkside malware to disk

    • Create and Start a Service

    • Masquerading

    • Discover Remote Systems using PowerShell

    • Collect Files using ZIP

    • #6127 - Extract LSASS memory dump using PowerShell and Rundll32

    • #5307 - Event Triggered Execution using PowerShell Profile

    • #5107 - Stop a service using net stop command

    • #3820 - Extract credentials stored in a browser using WebBrowserPassView

    • #312 - Obfuscation of EXE inside Encrypted ZIP over HTTP protocol

    • #2611 - Extract system date using PowerShell

    • #214 - Scheduled task creation over SMB

    • #1693 - Collect Windows system data using CMD

    • #1269 - Creating Windows schedule task (schtasks)

    • #110 - Covert data asset exfiltration using HTTP/s POST

    • #109 - Covert data asset exfiltration using HTTP/s GET

    • #106 - Covert data exfiltration using HTTP (GET)

    • #105 - Covert data asset exfiltration using HTTP (URI)

    • #2174 - Extract users and groups using net.exe (Windows)

    • #2164 - Scheduled Task

    • #6369 - Communication with Darkside using HTTP (Infiltration)

    • #6370 - Communication with a real malicious Darkside server using HTTP/S (Infiltration)

    • rubess program to dump

    • Non signed applications

    • VPN's

      • Compromising VPN services

      • Brute forcing VPN services

      • User Sign In activity Bruteforce/impersonation attacks

      • Zero-Day and vulnerability attacks on VPN services

    • using single factor logins via Remote Desktop Protocol (RDP)

    • virtual private networks (VPNs)

    • Any DGA domains

      • What is the age

      • Who created it

      • Who is the registrant

    • Browser plugins

    • exfiltrate data likely using a combination of Clone

    • cloud storage service Mega.nz

    • Tools usage :

      • Windows native tools

      • Windows event viewer

      • WMI activity

      • DCOM WinRM

      • Event Tracing for Windows (ETW)

    • Most common protocols

      • FTP services

      • IRC service

      • Unix RPC services

      • SMB services 135-139

      • RDP

      • Wmic

      • DNS

      • ICMP

      • DHCP

      • PXE

      • LLMNR 5355, NBT_NS, mDNS 5353

      • WPAD

      • OSPF

      • EIGRP

      • VRRP

      • HSRP

      • Network discovery protocols (IPV4 and IPV6)

      • Plaintext username and passwords

      • Weak Cipher

      • No SSL/TLS

      • Adminpages

    • Most common protocol usage

    • suspicious IP/Domains lookup with Alexa/Cisco million domains list (need to use automation script)

    • Investigate suspicious domain certificates to find similar malicious or impersonating domains

    • Disabling the endpoint security events, script execution activity (ex: PS, JS, DLL followed by download activity)

    • .rdp files in environment

    • .hta files in environment

    • .iso files in environment

    • .ink files in environment

    • Passwords.txt in environment

    • Network Recon Activity

      • Using windows utilities

    • Password Dumping activity tools

      • Mimikatz

      • Lass.exe dumping

    • Additional tools

      • Lazangne

      • RDPV

      • NirSoft Tools

    • Network port scan activity

    • windows utilities such as WMI, wmic, taskkill, WEVTUTIL, sc, net.exe to kill processes and remove logs from the system

    • Utilman.exe to manipulate/disable cmd.exe

    • writing a rule to detect findstr.exe

    • Hunting for password protected zip files ( need to check possibilities)

    • WScript to downloading files

    • DLL dropping in %appdata% with different file format

    • Regsrv32 loads DLL

    • Ping beaconing/ICMP

    • VNC protocol usage

    • RDP protocol usage connections to and from public IP range

    • FTP protocol usage

    • Detecting Cobalt Strike activity

    • Powershell download (invoke-webrequest)

    • Persistence using schedule task

    • wermgr.exe process injection

    • Svchost.exe process injection

    • ARP for enumeration

    • Word document with macro

    • Detection rules

    • Windows documentation

    • PyXie RAT and a Logmein signed binary used to load the RAT

    • Sharphound

    • activiyt arround ntds.dit

    • Psexec

    • Group policies

    • Word document with macro

    • Notepad file followed by xsl file

    • Wmic calling xsl file

    • Registry key for persistence

    • Auditing scheduled tasks

    • Powershell empire c2

    • .lnk files

  • advanced port scanner

  • advanced IP scanner

  • powershell empire

  • koadic

  • psexec

  • mimikatz

  • disableing windows defender

  • deleting system restore snapshots and shodow copies

  • winscp for data exfiltration

  • cryptoPP C++ library for data encryption

  • AES and RSA encryption

  • file extension .pysa

  • mutex object creation

  • drive enumeration

  • file enumeration

  • is file bigger than 1 kb

  • is file whitelisted encryption

  • is file blacklisted encryption

  • event ID's

  • 4624/4672 sucessful network logon as admin

  • 5140 share mount

  • 106/200/201/141 show sched tasks

  • 4634 logoff

An unpacked PE file contains sections such as .text, .data, .idata, .rsrc, and .reloc

packed files contain specific section names, such as UPX0, .aspack, .stub, and so on

CreateToolhelp32Snapshot Windows application programming interface (API) to iterate through running processes

Process Injection: spawning new processes in a suspended state,

allocating memory within them,

writing malicious code into this created memory space (process hollowing)

injecting a thread into an existing process.

Following api calls used for process injection

CreateToolHelp32Snapshot

  • VirtualAllocEx

  • WriteProcessMemory

  • CreateRemoteThread

  • NtCreateThreadEx

  • QueueThreadAPC

DLL injection

CreateToolHelp32Snapshot : to iterate process

utilize VirtualAlloc and WriteProcessMemory to write the path for a malicious DLL the malicious process will utilize CreateRemoteThread in order to force the process to load the malicious library.

PE Injection: malware will create address space utilizing VirtualAlloc, then write a PE directly into the memory address space using WriteProcessMemory, and ensure code execution by utilizing CreateRemoteThread or similar undocumented APIs such as NTCreateThreadEx.

Thread execution hijacking suspend an existing thread of a process. First, the malware will suspend the thread, utilize VirtualAlloc to clear memory space for the path of the DLL, and inject the path to the DLL and a call to LoadLibrary in order to load the malicious DLL into the existing thread in the process. The malware will then instruct the thread to resume.

AppInit DLLs, AppCert DLLs, Image File Execution Options

HKLM\Software\Microsoft\Windows NT\CurrentVersion\Windows\Appinit_Dlls

HKLM\Software\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Windows\Appinit_Dlls

HKLM\System\CurrentControlSet\Control\Session Manager\AppCertDlls

HKLM\Software\Microsoft\Windows NT\CurrentVersion\image file execution options

Image File Execution Options

Process hallowing

Virtual alloc

Writeprocess memory

Sysmon porcess ID's

calling mshta.exe to open malicious HTA files or calling binaries from SMB shares. TCP on ports 139 and 445 inbound

https://www.elastic.co/guide/en/security/current/rules-ui-create.html
https://bloodhound.readthedocs.io/en/latest/data-collection/sharphound.html
https://github.com/its-a-feature/Mythic