part 2
some of SOPs
🚨 Signed Binary Proxy Execution - mshta.exe
mshta.exe🔍 1. Attack Breakdown
📝 What is mshta.exe?
mshta.exe?📑 Why Attackers Abuse mshta.exe?
mshta.exe?📌 Common Malicious Uses of mshta.exe
mshta.exe🛡️ 2. Detection Techniques
📊 Manual Inspection
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Inspect Command Line Arguments
2️⃣ Check Remote Connections
3️⃣ Validate Remote URLs or IPs
4️⃣ Inspect Registry Persistence
5️⃣ Analyze HTA Files
🔧 4. Remediation Steps
📌 1. Terminate Suspicious Processes
📌 2. Block Outbound Traffic
📌 3. Remove Registry Persistence
📌 4. Quarantine Malicious Files
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Signed Binary Proxy Execution - regsvr32.exe
regsvr32.exe🔍 1. Attack Breakdown
📝 What is regsvr32.exe?
regsvr32.exe?📑 Why Attackers Abuse regsvr32.exe?
regsvr32.exe?📌 Common Malicious Uses of regsvr32.exe
regsvr32.exe🛡️ 2. Detection Techniques
📊 Manual Inspection
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Inspect Command Line Arguments
2️⃣ Validate Remote URLs or IPs
3️⃣ Trace Parent Processes
4️⃣ Analyze Network Traffic
5️⃣ Inspect Registry for Persistence
🔧 4. Remediation Steps
📌 1. Terminate Suspicious Processes
📌 2. Block Outbound Traffic
📌 3. Remove Registry Persistence
📌 4. Quarantine Malicious Files
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Signed Binary Proxy Execution - rundll32.exe
rundll32.exe🔍 1. Attack Breakdown
📝 What is rundll32.exe?
rundll32.exe?📑 Why Attackers Abuse rundll32.exe?
rundll32.exe?📌 Common Malicious Uses of rundll32.exe
rundll32.exe🛡️ 2. Detection Techniques
📊 Manual Inspection
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Inspect Command Line Arguments
2️⃣ Trace Parent Processes
3️⃣ Validate Remote IPs/URLs
4️⃣ Analyze DLLs
5️⃣ Check Registry for Persistence
🔧 4. Remediation Steps
📌 1. Terminate Suspicious Processes
📌 2. Block Outbound Traffic
📌 3. Remove Registry Persistence
📌 4. Quarantine Suspicious DLLs
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Kerberoasting Attack: Advanced Threat Analysis
🔍 1. Attack Breakdown
📝 What is Kerberoasting?
📑 Why Attackers Use Kerberoasting?
📌 Attack Phases
📊 Tools Commonly Used in Kerberoasting
🛡️ 2. Detection Techniques
📊 Manual Detection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Identify Target Accounts
2️⃣ Trace IP Address of Ticket Requests
3️⃣ Analyze Tools Used
4️⃣ Check Offline Password Cracking Activity
5️⃣ Investigate Credential Use Post-Cracking
🔧 4. Remediation Steps
📌 1. Reset Compromised Account Passwords
📌 2. Enable Kerberos AES Encryption
📌 3. Audit Service Accounts
📌 4. Monitor for Tools and Scripts
📌 5. Enable Account Lockout Policy
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Golden Ticket Attack: Advanced Threat Analysis
🔍 1. Attack Breakdown
📝 What is a Golden Ticket Attack?
📑 Why Attackers Use Golden Tickets?
🛡️ Requirements for a Golden Ticket Attack:
📌 Attack Steps:
📊 Common Tools Used in Golden Ticket Attacks
🛡️ 2. Detection Techniques
📊 Manual Detection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Inspect KRBTGT Account Activity
2️⃣ Trace Kerberos Tickets
3️⃣ Analyze Ticket Requests
4️⃣ Monitor High-Privilege Accounts
5️⃣ Identify Tool Artifacts
🔧 4. Remediation Steps
📌 1. Reset the KRBTGT Account Twice
📌 2. Revoke Active Kerberos Tickets
📌 3. Remove Malicious Tickets
📌 4. Audit Domain Admin Accounts
📌 5. Update and Patch Systems
📌 6. Conduct Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Silver Ticket Attack
🔍 1. Attack Breakdown
📝 What is a Silver Ticket Attack?
📑 Why Attackers Use Silver Tickets?
📌 Attack Steps:
📊 Common Tools for Silver Ticket Attacks
🛡️ 2. Detection Techniques
📊 Manual Detection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Validate TGS Ticket Requests
2️⃣ Identify Hash Dumping Activities
3️⃣ Trace Service Account Usage
4️⃣ Analyze Service Ticket Lifetimes
5️⃣ Validate Source IP Addresses
🔧 4. Remediation Steps
📌 1. Reset Service Account Passwords
📌 2. Revoke Compromised Tickets
📌 3. Monitor Service Accounts
📌 4. Rotate Service Account Passwords Periodically
📌 5. Terminate Malicious Processes
📌 6. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
Last updated