part 1
some of SOPs
🚨 Files Added to Windows Defender Exclusion List (Registry)
🔍 Windows Defender Exclusion List in Registry
📂 Registry Paths for Exclusion Lists:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\PathsHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\ProcessesHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Extensions
📑 Values Explanation:
🛡️ How Attackers Abuse Defender Exclusions
🎯 Detection & Investigation
📌 Manual Check (Registry Editor)
📌 PowerShell Check
📊 Microsoft Defender for Endpoint Query (KQL)
What to Look For:
🛡️ Remediation Steps
1️⃣ Remove Suspicious Exclusions (PowerShell):
2️⃣ Reset Defender Preferences (if heavily compromised):
3️⃣ Run a Full Antivirus Scan:
4️⃣ Review Permissions:
🧠 Harden Defender Settings
🚨 Conclusion
🚨 Unusual lsass.exe Parent, Child, or Path Analysis
lsass.exe Parent, Child, or Path Analysis📝 1. Attack Breakdown
📌 Legitimate Behavior of lsass.exe:
lsass.exe:📌 Suspicious Indicators:
📌 Attack Techniques:
🛡️ 2. Detection Techniques
📌 Event Logs:
📌 Microsoft Defender for Endpoint (MDE) Query (KQL):
📌 Manual Investigation with Sysinternals:
📌 PowerShell Command to Identify Suspicious Access:
🕵️♂️ 3. Investigation Techniques
1️⃣ Identify Suspicious Parent Processes:
2️⃣ Identify Child Processes of lsass.exe:
lsass.exe:3️⃣ Verify File Path and Hashes:
4️⃣ Analyze Memory Dumps:
5️⃣ Check Active Network Connections:
🔧 4. Remediation Steps
📌 Immediate Actions:
📌 Clean Up Malicious Files:
📌 Reset Credentials:
📌 Perform Full Security Scans:
🛡️ 5. Prevention Steps
🧠 Key Takeaways
🚨 Next Steps:
🚨 Suspicious LoLBins Process Rename Analysis
🔍 1. Attack Breakdown
📑 Commonly Abused LoLBins:
📌 Suspicious Indicators of Renaming:
🛡️ 2. Detection Techniques
📊 Event Logs:
📌 PowerShell Command: Detect Renamed Processes
📌 Verify Process Hashes:
📊 Microsoft Defender for Endpoint (MDE) Query (KQL):
📊 Alternate Query for File Hash Mismatch:
🕵️ 3. Investigation Techniques
1️⃣ Check File Path and Name:
2️⃣ Check Binary Hash:
3️⃣ Check Parent and Child Relationships:
4️⃣ Analyze Command-Line Arguments:
5️⃣ Network Connections:
🔧 4. Remediation Steps
📌 Immediate Actions:
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Startup Registry Analysis: Persistence Mechanism
🔍 1. Attack Breakdown
📑 2. Common Startup Registry Keys
📌 Run Keys (For User-Specific and System-Wide Persistence)
📌 Service and Drivers Keys
📌 Shell and Explorer Keys
📌 Image File Execution Options (IFEO)
🛡️ 3. Detection Techniques
📊 Manual Check (Registry Editor)
📌 PowerShell Commands for Detection
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
🕵️ 4. Investigation Techniques
1️⃣ Identify the Startup Program/Script
2️⃣ Check File Metadata
3️⃣ Monitor Process Execution
4️⃣ Check Network Connections
5️⃣ Check Event Logs
🔧 5. Remediation Steps
📌 Remove Malicious Registry Entries
📌 Terminate Malicious Processes
📌 Quarantine Malicious Files
📌 Perform Full Antivirus Scan
🛡️ 6. Prevention Steps
🧠 7. Key Takeaways
🚨 Base64 Encoding/Decoding Detected: Threat Analysis
🔍 1. Attack Breakdown
📑 Common Scenarios of Malicious Base64 Usage
📌 Indicators of Suspicious Base64 Activity
🛡️ 2. Detection Techniques
📊 Manual Detection (Command Line History)
📊 Manual Check in Event Viewer
📌 PowerShell Query for Encoded Commands
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
🕵️ 3. Investigation Techniques
1️⃣ Decode the Base64 Payload
2️⃣ Analyze Script Content
3️⃣ Check Parent-Child Process Relationships
4️⃣ Network Traffic Analysis
5️⃣ Correlate with File Activity
🔧 4. Remediation Steps
📌 Kill Suspicious Processes
📌 Quarantine Malicious Scripts or Files
📌 Disable Obfuscated Script Execution
📌 Perform Full Antivirus Scan
📌 Clear PowerShell History
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Communication from the Temp Directory: Threat Analysis
🔍 1. Attack Breakdown
📑 Common Attack Scenarios:
📑 2. Suspicious Indicators of Temp Directory Activity
🛡️ 3. Detection Techniques
📊 Manual Inspection
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
🕵️ 4. Investigation Techniques
1️⃣ File Hash Analysis:
2️⃣ Check File Metadata:
3️⃣ Analyze Process Relationships:
4️⃣ Network Traffic Inspection:
5️⃣ Registry Inspection:
🔧 5. Remediation Steps
📌 Isolate the Affected System:
📌 Terminate Suspicious Processes:
📌 Quarantine Suspicious Files:
📌 Clear Temp Directory (With Caution):
📌 Registry Cleanup:
📌 Perform Full Antivirus Scan:
🛡️ 6. Prevention Steps
🧠 7. Key Takeaways
🚨 Communication to Suspicious Hosting Services: Threat Analysis
🔍 1. Attack Breakdown
📑 2. Common Indicators of Suspicious Communication
📌 3. Detection Techniques
📊 Event Viewer Logs:
🕵️ 4. Investigation Techniques
1️⃣ Identify Initiating Processes:
2️⃣ Inspect Command Lines:
3️⃣ Check DNS Requests:
4️⃣ Analyze Traffic Patterns:
5️⃣ Check Process Persistence:
🔧 5. Remediation Steps
📌 Immediate Actions:
📌 Perform Full Antivirus Scan:
📌 Investigate Files Downloaded from the Remote Server:
🛡️ 6. Prevention Steps
🧠 7. Key Takeaways
---------------
🚨 Interacting with the Windows Registry: Threat Analysis
🔍 1. Attack Breakdown
🛡️ Common Malicious Actions in the Registry
📑 2. Common Commands for Registry Interaction
📝 Using reg.exe Command-Line Tool
reg.exe Command-Line Tool📝 Using PowerShell for Registry Interaction
🛡️ 3. Detection Techniques
📊 Manual Inspection
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
🕵️ 4. Investigation Techniques
1️⃣ Check Registry Backups:
2️⃣ Validate File Paths in Registry:
3️⃣ Correlate Registry Activity with Process Logs:
4️⃣ Audit Registry Changes via Event Logs:
🔧 5. Remediation Steps
📌 Identify and Remove Malicious Keys
📌 Revert Registry Changes:
📌 Terminate Related Processes:
📌 Perform Full Antivirus Scan:
📌 Review Group Policy Settings:
🛡️ 6. Prevention Steps
🧠 7. Key Takeaways
🚨 Startup Registry: Threat Analysis
🔍 1. Attack Breakdown
📑 Common Startup Registry Keys
📌 Suspicious Indicators in Startup Registry
🛡️ 2. Detection Techniques
📊 Manual Detection via PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
🕵️ 3. Investigation Techniques
1️⃣ Validate File Paths in Registry Entries:
2️⃣ Check File Hashes:
3️⃣ Correlate with Process Execution Logs (Event ID 4688):
4️⃣ Verify Recent Changes:
5️⃣ Review File Contents (If Scripts Are Referenced):
🔧 4. Remediation Steps
📌 1. Identify and Remove Malicious Registry Entries
📌 2. Disable Malicious Services:
📌 3. Quarantine Malicious Files:
📌 4. Perform Full Antivirus Scan:
📌 5. Clear AutorunCache:
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Detect BAT/VBS Script Execution: Threat Analysis
🔍 1. Attack Breakdown
📑 Common Malicious Scenarios:
📑 2. Common BAT/VBS Execution Paths
📌 Indicators of Malicious BAT/VBS Scripts
🛡️ 3. Detection Techniques
📊 Manual Detection
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
🕵️ 4. Investigation Techniques
1️⃣ Inspect the Script Content:
2️⃣ Check Script Metadata:
3️⃣ Trace Network Connections:
4️⃣ Correlate with Parent Process:
5️⃣ Check Persistence Mechanisms:
🔧 5. Remediation Steps
📌 Terminate Malicious Scripts:
📌 Quarantine Suspicious Scripts:
📌 Remove Registry Persistence:
📌 Block Outbound Traffic from Suspicious Scripts:
📌 Perform Full Security Scan:
🛡️ 6. Prevention Steps
🧠 7. Key Takeaways
🚨 Process Creating TXT/JSON/DB Files Inside Temp/AppData Directories: Threat Analysis
🔍 1. Attack Breakdown
📑 Common Malicious Activities Involving TXT/JSON/DB Files:
📌 2. Common Suspicious Indicators
🛡️ 3. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
🕵️ 4. Investigation Techniques
1️⃣ Analyze File Contents
2️⃣ Check File Hashes
3️⃣ Trace Parent Processes
4️⃣ Review Event Logs
🔧 5. Remediation Steps
📌 1. Terminate Suspicious Processes
📌 2. Quarantine Suspicious Files
📌 3. Block Malicious Network Connections
📌 4. Perform Full Antivirus Scan
📌 5. Clean Temp Directories
🛡️ 6. Prevention Steps
🧠 7. Key Takeaways
🚨 Signed Binary Proxy Execution - Cmdkey: Threat Analysis
🔍 1. Attack Breakdown
📝 What is cmdkey.exe?
cmdkey.exe?📑 Why is it Abused?
📌 Common Malicious Uses of cmdkey.exe:
cmdkey.exe:🛡️ 2. Detection Techniques
📊 Manual Inspection via Command Line
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Validate the Command Line Arguments:
2️⃣ Trace Parent Process:
3️⃣ Review Credentials in Credential Manager:
4️⃣ Check User Context:
5️⃣ Analyze Related Network Activity:
🔧 4. Remediation Steps
📌 1. Terminate Suspicious Processes
📌 2. Remove Malicious Cached Credentials
📌 3. Monitor and Reset Affected Accounts
📌 4. Block Unauthorized Use of cmdkey:
cmdkey:📌 5. Perform a Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 PowerShell/CMD/WMIC/Rundll32/Regsvr32 Communicating to Public IP: Threat Analysis
🔍 1. Attack Breakdown
📝 Why These Tools Are Abused?
📑 Why Public IP Communication Is Suspicious?
📊 2. Common Malicious Commands
🛡️ 3. Detection Techniques
📊 Manual Inspection
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 4. Investigation Techniques
1️⃣ Validate Remote IP Addresses
2️⃣ Trace Parent-Child Processes
3️⃣ Inspect Command History
4️⃣ Inspect Downloads
🔧 5. Remediation Steps
📌 1. Isolate the System
📌 2. Terminate Malicious Processes
📌 3. Block Suspicious IPs in Firewall
📌 4. Quarantine Suspicious Files
📌 5. Perform Full Antivirus Scan
🛡️ 6. Prevention Steps
🧠 7. Key Takeaways
🚨 Non-Baselined wscript.exe Executed: Threat Analysis
wscript.exe Executed: Threat Analysis🔍 1. Attack Breakdown
📝 What is wscript.exe?
wscript.exe?📑 Why Attackers Abuse wscript.exe?
wscript.exe?📌 2. Common Malicious Uses of wscript.exe
wscript.exe🛡️ 3. Detection Techniques
📊 Manual Detection
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 4. Investigation Techniques
1️⃣ Inspect Script Contents
2️⃣ Check File Hashes
3️⃣ Trace Parent Processes
4️⃣ Review Registry for Persistence
5️⃣ Monitor Network Traffic
🔧 5. Remediation Steps
📌 1. Terminate Suspicious Processes
📌 2. Quarantine Malicious Scripts
📌 3. Remove Registry Persistence
📌 4. Block Outbound Traffic
📌 5. Perform Full Antivirus Scan
🛡️ 6. Prevention Steps
🧠 7. Key Takeaways
Last updated