Part 6
Some of SOPs
🚨 Signed Binary Proxy Execution: Bash.exe or Gitbash.exe
🔍 1. Attack Breakdown
📝 What is Signed Binary Proxy Execution (Bash.exe or Gitbash.exe)?
📑 Why Attackers Use Bash.exe or Gitbash.exe?
📌 Common Attack Scenarios
📌 Tools Commonly Abused
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Trace Bash or Gitbash Execution History
2️⃣ Inspect Script Files Called by Bash or Gitbash
3️⃣ Trace Parent-Child Process Tree
4️⃣ Inspect Registry for Persistence Mechanisms
🔧 4. Remediation Steps
📌 1. Terminate Malicious Processes
📌 2. Remove Malicious Scripts
📌 3. Disable Bash or Gitbash for Untrusted Users
📌 4. Clear Scheduled Tasks Involving Bash/Gitbash
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Log4j Invocation: Advanced Threat Analysis
🔍 1. Attack Breakdown
📝 What is Log4j?
📑 Why is Log4j Dangerous?
📌 Common Attack Scenarios
🛡️ 2. Detection Techniques
📊 Manual Inspection with Logs
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Trace Java Processes
2️⃣ Inspect Java Application Logs
3️⃣ Check Firewall Logs for Suspicious LDAP/DNS Traffic
4️⃣ Network Traffic Analysis
🔧 4. Remediation Steps
📌 1. Patch and Update Log4j
📌 2. Disable JNDI Lookups
📌 3. Block Outbound LDAP and RMI Traffic
📌 4. Remove Suspicious Artifacts
📌 5. Rotate Credentials and Secrets
📌 6. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Reflective DLL Injection
🔍 1. Attack Breakdown
📝 What is Reflective DLL Injection?
📑 Why Attackers Use Reflective DLL Injection?
📌 How Reflective DLL Injection Works
📌 Common Tools for Reflective DLL Injection
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Analyze Memory with Volatility Framework
2️⃣ Inspect Process Modules
3️⃣ Inspect RWX Memory Regions
4️⃣ Trace Parent-Child Processes
🔧 4. Remediation Steps
📌 1. Terminate Malicious Processes
📌 2. Dump and Analyze Memory
📌 3. Remove Malicious DLLs
📌 4. Block Suspicious API Calls
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Detected Non-Baselined Csc.exe Parent Process
🔍 1. Attack Breakdown
📝 What is Csc.exe?
📑 Why is Csc.exe Abused by Attackers?
📌 Common Attack Scenarios
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Trace Parent-Child Relationships
2️⃣ Analyze Command-Line History
3️⃣ Check for Temporary C# Files
4️⃣ Review Network Activity
🔧 4. Remediation Steps
📌 1. Terminate Malicious Processes
📌 2. Remove Malicious C# Scripts
📌 3. Disable Csc.exe Execution in User Directories
📌 4. Audit Scheduled Tasks
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Cscript Launching CMD or PowerShell
🔍 1. Attack Breakdown
📝 What is Cscript.exe?
📑 Why Attackers Abuse Cscript.exe?
📌 Common Attack Scenarios
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Trace Script Origin
2️⃣ Analyze Parent-Child Process Tree
3️⃣ Check Scheduled Tasks for Script Execution
4️⃣ Validate Script File Hashes
🔧 4. Remediation Steps
📌 1. Terminate Malicious Processes
📌 2. Remove Malicious Script Files
📌 3. Disable Windows Script Host
📌 4. Audit Scheduled Tasks
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🚨 Payload Performing Network Activity
🔍 1. Attack Breakdown
📝 What is a Network Payload Activity?
📑 Why Attackers Use Network Payloads?
📌 Common Attack Scenarios
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Trace Network Connections
2️⃣ Inspect Process Trees
3️⃣ Analyze DNS Queries
🔧 4. Remediation Steps
📌 1. Terminate Malicious Processes
📌 2. Block Malicious IPs and Domains
📌 3. Remove Malicious Scripts
📌 4. Clear DNS Cache
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 HTA File Created
🔍 1. Attack Breakdown
📝 What is an HTA File?
📑 Why Do Attackers Use HTA Files?
📌 Common Attack Scenarios
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Analyze HTA File Contents
2️⃣ Trace HTA Network Activity
3️⃣ Review Parent Process
4️⃣ Check for Persistence
🔧 4. Remediation Steps
📌 1. Terminate Malicious Processes
📌 2. Delete Malicious HTA Files
📌 3. Audit Scheduled Tasks
📌 4. Block HTA Execution
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🚨 Spoofed Privileged Parent Process Detected
🔍 1. Attack Breakdown
📝 What is a Spoofed Privileged Parent Process?
📑 Why Attackers Use Privileged Parent Process Spoofing?
📌 Common Attack Scenarios
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Trace Parent Process Anomalies
2️⃣ Inspect DLLs Loaded in Suspicious Processes
3️⃣ Inspect Temporary Directories for Scripts or Payloads
🔧 4. Remediation Steps
📌 1. Terminate Malicious Processes
📌 2. Quarantine Suspicious Payloads
📌 3. Audit Scheduled Tasks
📌 4. Remove Malicious Registry Entries
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Suspicious WMI Process: Active Script Event Consumer
🔍 1. Attack Breakdown
📝 What is an Active Script Event Consumer?
📑 Why Attackers Use WMI Active Script Event Consumers?
📌 Common Attack Scenarios
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Review Active WMI Consumers
2️⃣ Analyze EventConsumer Scripts
3️⃣ Inspect Remote WMI Execution
🔧 4. Remediation Steps
📌 1. Remove Suspicious WMI Event Consumers
📌 2. Disable WMI Service (if not in use)
📌 3. Audit WMI Access Permissions
📌 4. Block Malicious Scripts
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 First Time Seen WSL Process Running on Machine: Advanced Threat Analysis
🔍 **1. Attack Breakdown
📝 What is WSL?
📑 Why Attackers Exploit WSL?
📌 Common Attack Scenarios
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Analyze WSL Processes
2️⃣ Trace Network Activity from WSL
3️⃣ Inspect File Access via WSL
🔧 4. Remediation Steps
📌 1. Terminate Malicious WSL Processes
📌 2. Disable WSL (if unused)
📌 3. Audit User Permissions
📌 4. Block Suspicious IPs
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
Last updated