Part 5
Some
🚨 Remote Process Memory Injection via Rundll32
🔍 1. Attack Breakdown
📝 What is Remote Process Memory Injection via Rundll32?
📑 Why Attackers Use Rundll32 for Memory Injection?
📌 How Rundll32 is Abused for Memory Injection
📌 Common Tools for Rundll32 Injection
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Trace Rundll32 Command History
2️⃣ Inspect Loaded DLLs
3️⃣ Analyze Remote Threads
4️⃣ Memory Dump Analysis
🔧 4. Remediation Steps
📌 1. Terminate Suspicious Rundll32 Processes
📌 2. Remove Malicious DLLs
📌 3. Quarantine Suspicious Files
📌 4. Block Rundll32 Execution in Specific Folders
📌 5. Enable Advanced Threat Protection (ATP) Policies
📌 6. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
Non-Baselined LNK Target Command:
🔍 1. Attack Breakdown
📝 What is a Non-Baselined LNK Target Command?
📑 Why Attackers Use LNK Files?
📌 Common Techniques for LNK Target Abuse
📌 Common Attack Scenarios
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Inspect LNK File Metadata
2️⃣ Trace Process Relationships
3️⃣ Examine LNK File Creation History
4️⃣ Check Startup Folder
🔧 4. Remediation Steps
📌 1. Remove Suspicious LNK Files
📌 2. Disable Executables from Non-Standard Paths
📌 3. Terminate Malicious Processes
📌 4. Reset User Accounts
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Collecting UUID from a Device
🔍 1. Attack Breakdown
📝 What is UUID Collection?
📑 Why Do Attackers Collect UUIDs?
📌 Common Methods to Retrieve UUIDs
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Trace Commands Used for UUID Retrieval
2️⃣ Inspect Registry Access
3️⃣ Trace PowerShell Activity
4️⃣ Inspect Scripts on the Device
🔧 4. Remediation Steps
📌 1. Terminate Suspicious Processes
📌 2. Block Unauthorized WMI Queries
📌 3. Audit and Reset Compromised Accounts
📌 4. Quarantine Suspicious Scripts
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Detect Suspicious WerFault Child Process
🔍 1. Attack Breakown
📝 What is WerFault.exe?
📑 Why Attackers Abuse WerFault.exe?
📌 Common WerFault Attack Techniques
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Trace WerFault Child Processes
2️⃣ Inspect Loaded DLLs
3️⃣ Check WerFault Registry Hijacking
4️⃣ Review Process Command Lines
🔧 4. Remediation Steps
📌 1. Terminate Malicious WerFault Processes
📌 2. Remove Malicious DLLs
📌 3. Restore WER Registry Values
📌 4. Block Execution from Suspicious Paths
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Abnormal File Extension in Public User Directory
🔍 1. Attack Breakdown
📝 What is an Abnormal File Extension in Public User Directory?
📑 Why Attackers Use Public Directories?
📌 Common Abnormal File Extensions Used by Attackers
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Inspect Suspicious Files in Public Directory
2️⃣ Trace Process Tree from Suspicious Files
3️⃣ Inspect File Hashes
4️⃣ Review Recent Events in Public Directory
🔧 4. Remediation Steps
📌 1. Quarantine Suspicious Files
📌 2. Terminate Malicious Processes
📌 3. Restrict Public Directory Permissions
📌 4. Block Executables in Public Directory
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
Last updated