part 3
🚨 Modify Registry
🔍 1. Attack Breakdown
📝 What is Registry Modification?
📑 Why Attackers Use Registry Modifications?
📌 Common Registry Keys Abused by Attackers
🛡️ 2. Detection Techniques
📊 Manual Detection via PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Identify Processes Making Registry Changes
2️⃣ Trace Suspicious Registry Values
3️⃣ Look for Fileless Malware
4️⃣ Correlate with Process Execution
🔧 4. Remediation Steps
📌 1. Identify and Remove Malicious Registry Keys
📌 2. Restore Default Security Settings
📌 3. Terminate Related Processes
📌 4. Quarantine Malicious Files
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Boot or Logon Autostart Execution: Shortcut Modification
🔍 1. Attack Breakdown
📝 What is Shortcut Modification Attack?
📑 Why Attackers Use Shortcut Modification?
📌 Common Shortcut Modification Techniques
🛡️ 2. Detection Techniques
📊 Manual Inspection
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Analyze Shortcut Target Paths
2️⃣ Trace Parent Processes
3️⃣ Check for Suspicious Files in Startup Folders
4️⃣ Review Recently Modified Shortcuts
5️⃣ Inspect Registry Keys
🔧 4. Remediation Steps
📌 1. Remove Malicious Shortcuts
📌 2. Quarantine Malicious Payloads
📌 3. Remove Registry Persistence
📌 4. Terminate Malicious Processes
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Masquerade Task or Service
🔍 1. Attack Breakdown
📝 What is Task or Service Masquerading?
📑 Why Attackers Use Task or Service Masquerading?
📌 Common Techniques
🛡️ 2. Detection Techniques
📊 Manual Inspection
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Review Scheduled Task Details
2️⃣ Inspect Service Binary Paths
3️⃣ Trace Parent Processes
4️⃣ Validate File Hashes
5️⃣ Check Registry for Service Entries
🔧 4. Remediation Steps
📌 1. Disable and Remove Malicious Tasks
📌 2. Stop and Delete Malicious Services
📌 3. Remove Registry Entries
📌 4. Quarantine Malicious Files
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Indicator Removal on Host: Advanced Threat Analysis
🔍 1. Attack Breakdown
📝 What is Indicator Removal on Host?
📑 Why Attackers Remove Indicators?
📌 Common Techniques for Indicator Removal
🛡️ 2. Detection Techniques
📊 Manual Inspection
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Trace Log Clearing Activities
2️⃣ Correlate Deleted Files with Processes
3️⃣ Review Command History
4️⃣ Inspect Registry for Evidence
5️⃣ Cross-Reference File Hashes
🔧 4. Remediation Steps
📌 1. Restart Event Logging
📌 2. Restore Logs from Backup
📌 3. Investigate Deleted Files and Artifacts
📌 4. Remove Malicious Registry Entries
📌 5. Quarantine Suspicious Files
📌 6. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 OS Credential Dumping: Security Account Manager (SAM)
🔍 1. Attack Breakdown
📝 What is SAM Credential Dumping?
📑 Why Attackers Use SAM Credential Dumping?
📌 Common Methods for SAM Credential Dumping
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Identify Registry Export Commands
2️⃣ Inspect Shadow Copies
3️⃣ Analyze Active Processes
4️⃣ Trace Malicious Tools
5️⃣ Check for Remote Credential Dumps
🔧 4. Remediation Steps
📌 1. Change Local Account Passwords
📌 2. Remove Malicious Shadow Copies
📌 3. Block Tools (Mimikatz, Impacket)
📌 4. Review Local Admin Group Memberships
📌 5. Enable Logging and Auditing
📌 6. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Remote File Copy: Advanced Threat Analysis
🔍 1. Attack Breakdown
📝 What is Remote File Copy?
📑 Why Attackers Use Remote File Copy?
📌 Common Techniques for Remote File Copy
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Inspect SMB Sessions
2️⃣ Trace Command-Line Activity
3️⃣ Check BITSAdmin Transfers
4️⃣ Inspect RDP Session Logs
5️⃣ Check FTP or SCP Activity
🔧 4. Remediation Steps
📌 1. Terminate Malicious Connections
📌 2. Disable Suspicious SMB Sessions
📌 3. Remove Malicious BITS Jobs
📌 4. Quarantine Malicious Files
📌 5. Block Known Tools via AppLocker
📌 6. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Network Service Scanning
🔍 1. Attack Breakdown
📝 What is Network Service Scanning?
📑 Why Attackers Use Network Service Scanning?
📌 Common Tools Used for Network Scanning
📊 Common Techniques for Network Scanning
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Trace the Source IP
2️⃣ Inspect Command-Line History
3️⃣ Check Suspicious Processes
4️⃣ Inspect Firewall Logs
5️⃣ Analyze Network Flows
🔧 4. Remediation Steps
📌 1. Block Suspicious IP Addresses
📌 2. Disable Unused Services and Ports
📌 3. Terminate Suspicious Processes
📌 4. Enable Firewall Logging
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Replication Through Removable Media: Advanced Threat Analysis
🔍 1. Attack Breakdown
📝 What is Replication Through Removable Media?
📑 Why Attackers Use Removable Media?
📌 Common Techniques for USB-Based Replication
📌 Common Malware Examples
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Identify USB Device Details
2️⃣ Review USB Device History
3️⃣ Trace Executed Files from USB
4️⃣ Check Recent File Transfers
5️⃣ Extract Autorun Configurations
🔧 4. Remediation Steps
📌 1. Disable Autorun for Removable Devices
📌 2. Quarantine Suspicious Files
📌 3. Block Malicious Processes
📌 4. Remove Suspicious Autorun Files
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Process Injection
🔍 **1. Attack Breakdown
📝 What is Process Injection?
📑 Why Attackers Use Process Injection?
📌 Common Techniques for Process Injection
📊 Common Tools for Process Injection
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Trace Injected Processes
2️⃣ Analyze DLL Loading Paths
3️⃣ Monitor Memory Activity
4️⃣ Check Running Threads
5️⃣ Review Command-Line Activity
🔧 4. Remediation Steps
📌 1. Kill Malicious Processes
📌 2. Quarantine Malicious DLLs
📌 3. Disable Suspicious Services
📌 4. Remove Malicious Threads
📌 5. Enable Advanced Threat Protection (ATP)
📌 6. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Account Manipulation
🔍 1. Attack Breakdown
📝 What is Account Manipulation?
📑 Why Attackers Use Account Manipulation?
📌 Common Techniques for Account Manipulation
📊 Common Tools for Account Manipulation
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Identify Suspicious Accounts
2️⃣ Inspect Privileged Group Membership
3️⃣ Trace Password Changes
4️⃣ Audit Account Policies
5️⃣ Review Suspicious Commands
🔧 4. Remediation Steps
📌 1. Disable Suspicious Accounts
📌 2. Remove Unauthorized Group Membership
📌 3. Reset Compromised Account Passwords
📌 4. Enable Security Auditing
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
Last updated