part 1
some of SOPs
๐จ Files Added to Windows Defender Exclusion List (Registry)
๐ Windows Defender Exclusion List in Registry
๐ Registry Paths for Exclusion Lists:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\PathsHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\ProcessesHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Defender\Exclusions\Extensions
๐ Values Explanation:
๐ก๏ธ How Attackers Abuse Defender Exclusions
๐ฏ Detection & Investigation
๐ Manual Check (Registry Editor)
๐ PowerShell Check
๐ Microsoft Defender for Endpoint Query (KQL)
What to Look For:
๐ก๏ธ Remediation Steps
1๏ธโฃ Remove Suspicious Exclusions (PowerShell):
2๏ธโฃ Reset Defender Preferences (if heavily compromised):
3๏ธโฃ Run a Full Antivirus Scan:
4๏ธโฃ Review Permissions:
๐ง Harden Defender Settings
๐จ Conclusion
๐จ Unusual lsass.exe Parent, Child, or Path Analysis
lsass.exe Parent, Child, or Path Analysis๐ 1. Attack Breakdown
๐ Legitimate Behavior of lsass.exe:
lsass.exe:๐ Suspicious Indicators:
๐ Attack Techniques:
๐ก๏ธ 2. Detection Techniques
๐ Event Logs:
๐ Microsoft Defender for Endpoint (MDE) Query (KQL):
๐ Manual Investigation with Sysinternals:
๐ PowerShell Command to Identify Suspicious Access:
๐ต๏ธโโ๏ธ 3. Investigation Techniques
1๏ธโฃ Identify Suspicious Parent Processes:
2๏ธโฃ Identify Child Processes of lsass.exe:
lsass.exe:3๏ธโฃ Verify File Path and Hashes:
4๏ธโฃ Analyze Memory Dumps:
5๏ธโฃ Check Active Network Connections:
๐ง 4. Remediation Steps
๐ Immediate Actions:
๐ Clean Up Malicious Files:
๐ Reset Credentials:
๐ Perform Full Security Scans:
๐ก๏ธ 5. Prevention Steps
๐ง Key Takeaways
๐จ Next Steps:
๐จ Suspicious LoLBins Process Rename Analysis
๐ 1. Attack Breakdown
๐ Commonly Abused LoLBins:
๐ Suspicious Indicators of Renaming:
๐ก๏ธ 2. Detection Techniques
๐ Event Logs:
๐ PowerShell Command: Detect Renamed Processes
๐ Verify Process Hashes:
๐ Microsoft Defender for Endpoint (MDE) Query (KQL):
๐ Alternate Query for File Hash Mismatch:
๐ต๏ธ 3. Investigation Techniques
1๏ธโฃ Check File Path and Name:
2๏ธโฃ Check Binary Hash:
3๏ธโฃ Check Parent and Child Relationships:
4๏ธโฃ Analyze Command-Line Arguments:
5๏ธโฃ Network Connections:
๐ง 4. Remediation Steps
๐ Immediate Actions:
๐ก๏ธ 5. Prevention Steps
๐ง 6. Key Takeaways
๐จ Startup Registry Analysis: Persistence Mechanism
๐ 1. Attack Breakdown
๐ 2. Common Startup Registry Keys
๐ Run Keys (For User-Specific and System-Wide Persistence)
๐ Service and Drivers Keys
๐ Shell and Explorer Keys
๐ Image File Execution Options (IFEO)
๐ก๏ธ 3. Detection Techniques
๐ Manual Check (Registry Editor)
๐ PowerShell Commands for Detection
๐ Microsoft Defender for Endpoint (MDE) Query (KQL)
๐ต๏ธ 4. Investigation Techniques
1๏ธโฃ Identify the Startup Program/Script
2๏ธโฃ Check File Metadata
3๏ธโฃ Monitor Process Execution
4๏ธโฃ Check Network Connections
5๏ธโฃ Check Event Logs
๐ง 5. Remediation Steps
๐ Remove Malicious Registry Entries
๐ Terminate Malicious Processes
๐ Quarantine Malicious Files
๐ Perform Full Antivirus Scan
๐ก๏ธ 6. Prevention Steps
๐ง 7. Key Takeaways
๐จ Base64 Encoding/Decoding Detected: Threat Analysis
๐ 1. Attack Breakdown
๐ Common Scenarios of Malicious Base64 Usage
๐ Indicators of Suspicious Base64 Activity
๐ก๏ธ 2. Detection Techniques
๐ Manual Detection (Command Line History)
๐ Manual Check in Event Viewer
๐ PowerShell Query for Encoded Commands
๐ Microsoft Defender for Endpoint (MDE) Query (KQL)
๐ต๏ธ 3. Investigation Techniques
1๏ธโฃ Decode the Base64 Payload
2๏ธโฃ Analyze Script Content
3๏ธโฃ Check Parent-Child Process Relationships
4๏ธโฃ Network Traffic Analysis
5๏ธโฃ Correlate with File Activity
๐ง 4. Remediation Steps
๐ Kill Suspicious Processes
๐ Quarantine Malicious Scripts or Files
๐ Disable Obfuscated Script Execution
๐ Perform Full Antivirus Scan
๐ Clear PowerShell History
๐ก๏ธ 5. Prevention Steps
๐ง 6. Key Takeaways
๐จ Communication from the Temp Directory: Threat Analysis
๐ 1. Attack Breakdown
๐ Common Attack Scenarios:
๐ 2. Suspicious Indicators of Temp Directory Activity
๐ก๏ธ 3. Detection Techniques
๐ Manual Inspection
๐ Microsoft Defender for Endpoint (MDE) Query (KQL)
๐ต๏ธ 4. Investigation Techniques
1๏ธโฃ File Hash Analysis:
2๏ธโฃ Check File Metadata:
3๏ธโฃ Analyze Process Relationships:
4๏ธโฃ Network Traffic Inspection:
5๏ธโฃ Registry Inspection:
๐ง 5. Remediation Steps
๐ Isolate the Affected System:
๐ Terminate Suspicious Processes:
๐ Quarantine Suspicious Files:
๐ Clear Temp Directory (With Caution):
๐ Registry Cleanup:
๐ Perform Full Antivirus Scan:
๐ก๏ธ 6. Prevention Steps
๐ง 7. Key Takeaways
๐จ Communication to Suspicious Hosting Services: Threat Analysis
๐ 1. Attack Breakdown
๐ 2. Common Indicators of Suspicious Communication
๐ 3. Detection Techniques
๐ Event Viewer Logs:
๐ต๏ธ 4. Investigation Techniques
1๏ธโฃ Identify Initiating Processes:
2๏ธโฃ Inspect Command Lines:
3๏ธโฃ Check DNS Requests:
4๏ธโฃ Analyze Traffic Patterns:
5๏ธโฃ Check Process Persistence:
๐ง 5. Remediation Steps
๐ Immediate Actions:
๐ Perform Full Antivirus Scan:
๐ Investigate Files Downloaded from the Remote Server:
๐ก๏ธ 6. Prevention Steps
๐ง 7. Key Takeaways
---------------
๐จ Interacting with the Windows Registry: Threat Analysis
๐ 1. Attack Breakdown
๐ก๏ธ Common Malicious Actions in the Registry
๐ 2. Common Commands for Registry Interaction
๐ Using reg.exe Command-Line Tool
reg.exe Command-Line Tool๐ Using PowerShell for Registry Interaction
๐ก๏ธ 3. Detection Techniques
๐ Manual Inspection
๐ Microsoft Defender for Endpoint (MDE) Query (KQL)
๐ต๏ธ 4. Investigation Techniques
1๏ธโฃ Check Registry Backups:
2๏ธโฃ Validate File Paths in Registry:
3๏ธโฃ Correlate Registry Activity with Process Logs:
4๏ธโฃ Audit Registry Changes via Event Logs:
๐ง 5. Remediation Steps
๐ Identify and Remove Malicious Keys
๐ Revert Registry Changes:
๐ Terminate Related Processes:
๐ Perform Full Antivirus Scan:
๐ Review Group Policy Settings:
๐ก๏ธ 6. Prevention Steps
๐ง 7. Key Takeaways
๐จ Startup Registry: Threat Analysis
๐ 1. Attack Breakdown
๐ Common Startup Registry Keys
๐ Suspicious Indicators in Startup Registry
๐ก๏ธ 2. Detection Techniques
๐ Manual Detection via PowerShell
๐ Microsoft Defender for Endpoint (MDE) Query (KQL)
๐ต๏ธ 3. Investigation Techniques
1๏ธโฃ Validate File Paths in Registry Entries:
2๏ธโฃ Check File Hashes:
3๏ธโฃ Correlate with Process Execution Logs (Event ID 4688):
4๏ธโฃ Verify Recent Changes:
5๏ธโฃ Review File Contents (If Scripts Are Referenced):
๐ง 4. Remediation Steps
๐ 1. Identify and Remove Malicious Registry Entries
๐ 2. Disable Malicious Services:
๐ 3. Quarantine Malicious Files:
๐ 4. Perform Full Antivirus Scan:
๐ 5. Clear AutorunCache:
๐ก๏ธ 5. Prevention Steps
๐ง 6. Key Takeaways
๐จ Detect BAT/VBS Script Execution: Threat Analysis
๐ 1. Attack Breakdown
๐ Common Malicious Scenarios:
๐ 2. Common BAT/VBS Execution Paths
๐ Indicators of Malicious BAT/VBS Scripts
๐ก๏ธ 3. Detection Techniques
๐ Manual Detection
๐ Microsoft Defender for Endpoint (MDE) Query (KQL)
๐ต๏ธ 4. Investigation Techniques
1๏ธโฃ Inspect the Script Content:
2๏ธโฃ Check Script Metadata:
3๏ธโฃ Trace Network Connections:
4๏ธโฃ Correlate with Parent Process:
5๏ธโฃ Check Persistence Mechanisms:
๐ง 5. Remediation Steps
๐ Terminate Malicious Scripts:
๐ Quarantine Suspicious Scripts:
๐ Remove Registry Persistence:
๐ Block Outbound Traffic from Suspicious Scripts:
๐ Perform Full Security Scan:
๐ก๏ธ 6. Prevention Steps
๐ง 7. Key Takeaways
๐จ Process Creating TXT/JSON/DB Files Inside Temp/AppData Directories: Threat Analysis
๐ 1. Attack Breakdown
๐ Common Malicious Activities Involving TXT/JSON/DB Files:
๐ 2. Common Suspicious Indicators
๐ก๏ธ 3. Detection Techniques
๐ Manual Inspection with PowerShell
๐ Microsoft Defender for Endpoint (MDE) Query (KQL)
๐ต๏ธ 4. Investigation Techniques
1๏ธโฃ Analyze File Contents
2๏ธโฃ Check File Hashes
3๏ธโฃ Trace Parent Processes
4๏ธโฃ Review Event Logs
๐ง 5. Remediation Steps
๐ 1. Terminate Suspicious Processes
๐ 2. Quarantine Suspicious Files
๐ 3. Block Malicious Network Connections
๐ 4. Perform Full Antivirus Scan
๐ 5. Clean Temp Directories
๐ก๏ธ 6. Prevention Steps
๐ง 7. Key Takeaways
๐จ Signed Binary Proxy Execution - Cmdkey: Threat Analysis
๐ 1. Attack Breakdown
๐ What is cmdkey.exe?
cmdkey.exe?๐ Why is it Abused?
๐ Common Malicious Uses of cmdkey.exe:
cmdkey.exe:๐ก๏ธ 2. Detection Techniques
๐ Manual Inspection via Command Line
๐ Microsoft Defender for Endpoint (MDE) Query (KQL)
๐ Event Viewer Logs
๐ต๏ธ 3. Investigation Techniques
1๏ธโฃ Validate the Command Line Arguments:
2๏ธโฃ Trace Parent Process:
3๏ธโฃ Review Credentials in Credential Manager:
4๏ธโฃ Check User Context:
5๏ธโฃ Analyze Related Network Activity:
๐ง 4. Remediation Steps
๐ 1. Terminate Suspicious Processes
๐ 2. Remove Malicious Cached Credentials
๐ 3. Monitor and Reset Affected Accounts
๐ 4. Block Unauthorized Use of cmdkey:
cmdkey:๐ 5. Perform a Full Antivirus Scan
๐ก๏ธ 5. Prevention Steps
๐ง 6. Key Takeaways
๐จ PowerShell/CMD/WMIC/Rundll32/Regsvr32 Communicating to Public IP: Threat Analysis
๐ 1. Attack Breakdown
๐ Why These Tools Are Abused?
๐ Why Public IP Communication Is Suspicious?
๐ 2. Common Malicious Commands
๐ก๏ธ 3. Detection Techniques
๐ Manual Inspection
๐ Microsoft Defender for Endpoint (MDE) Query (KQL)
๐ Event Viewer Logs
๐ต๏ธ 4. Investigation Techniques
1๏ธโฃ Validate Remote IP Addresses
2๏ธโฃ Trace Parent-Child Processes
3๏ธโฃ Inspect Command History
4๏ธโฃ Inspect Downloads
๐ง 5. Remediation Steps
๐ 1. Isolate the System
๐ 2. Terminate Malicious Processes
๐ 3. Block Suspicious IPs in Firewall
๐ 4. Quarantine Suspicious Files
๐ 5. Perform Full Antivirus Scan
๐ก๏ธ 6. Prevention Steps
๐ง 7. Key Takeaways
๐จ Non-Baselined wscript.exe Executed: Threat Analysis
wscript.exe Executed: Threat Analysis๐ 1. Attack Breakdown
๐ What is wscript.exe?
wscript.exe?๐ Why Attackers Abuse wscript.exe?
wscript.exe?๐ 2. Common Malicious Uses of wscript.exe
wscript.exe๐ก๏ธ 3. Detection Techniques
๐ Manual Detection
๐ Microsoft Defender for Endpoint (MDE) Query (KQL)
๐ Event Viewer Logs
๐ต๏ธ 4. Investigation Techniques
1๏ธโฃ Inspect Script Contents
2๏ธโฃ Check File Hashes
3๏ธโฃ Trace Parent Processes
4๏ธโฃ Review Registry for Persistence
5๏ธโฃ Monitor Network Traffic
๐ง 5. Remediation Steps
๐ 1. Terminate Suspicious Processes
๐ 2. Quarantine Malicious Scripts
๐ 3. Remove Registry Persistence
๐ 4. Block Outbound Traffic
๐ 5. Perform Full Antivirus Scan
๐ก๏ธ 6. Prevention Steps
๐ง 7. Key Takeaways
Last updated