Part 7
🚨 PowerShell Invocation from Registry
🔍 1. Attack Breakdown
📝 What is PowerShell Invocation from Registry?
📑 Why Do Attackers Use the Registry for PowerShell Invocation?
📌 Common Attack Scenarios
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Inspect Specific Registry Keys
2️⃣ Trace PowerShell Commands via Sysmon Logs
3️⃣ Analyze Process Tree
🔧 4. Remediation Steps
📌 1. Remove Malicious Registry Keys
📌 2. Disable Registry Editing for Non-Admin Users
📌 3. Monitor Registry Changes Continuously
📌 4. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Unusual ie4uinit Process Path
🔍 1. Attack Breakdown
📝 What is ie4uinit.exe?
ie4uinit.exe?📑 Why Do Attackers Abuse ie4uinit.exe?
ie4uinit.exe?📌 Common Attack Scenarios
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Trace Unusual Process Paths
2️⃣ Analyze Parent Process
3️⃣ Check Registry for Persistence
🔧 4. Remediation Steps
📌 1. Terminate Malicious Process
📌 2. Remove Malicious Files
📌 3. Delete Malicious Registry Keys
📌 4. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Exploit Guard Network Protection Blocked Event:
🔍 1. Attack Breakdown
📝 What is Exploit Guard Network Protection?
📑 Why is Network Protection Blocked?
📌 Common Attack Scenarios
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Trace Process Responsible for Blocked Activity
2️⃣ Inspect Command Line Arguments
3️⃣ Analyze Remote URLs and IPs
🔧 4. Remediation Steps
📌 1. Terminate Malicious Processes
📌 2. Block Malicious IPs or Domains
📌 3. Remove Malicious Scheduled Tasks or Startup Entries
📌 4. Review User Activity
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Privilege Elevation (Linux & macOS):
🔍 1. Attack Breakdown
📝 What is Privilege Elevation?
📑 Why Attackers Seek Privilege Elevation?
📌 Common Privilege Elevation Techniques
🛡️ 2. Detection Techniques
📊 Linux Detection Techniques
📊 macOS Detection Techniques
📊 SIEM Detection Queries
📊 Linux SIEM Query (ELK, Splunk)
📊 macOS SIEM Query (Splunk, ELK)
🛡️ 3. Investigation Techniques
1️⃣ Trace Privilege Escalation Attempts
2️⃣ Analyze Exploit Attempts
3️⃣ Review New Cron Jobs
🔧 4. Remediation Steps
📌 1. Remove Malicious Cron Jobs
📌 2. Revert Permissions
📌 3. Disable Suspicious LaunchAgents
📌 4. Revoke Sudo Permissions for Compromised Accounts
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Credential Dumping Using sqlcmd.exe
sqlcmd.exe🔍 1. Attack Breakdown
📝 What is sqlcmd.exe?
sqlcmd.exe?📑 Why Do Attackers Abuse sqlcmd.exe?
sqlcmd.exe?📌 Common Attack Scenarios
🛡️ 2. Detection Techniques
📊 Manual Inspection with SQLCMD
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Review SQL Server Error Logs
2️⃣ Trace SQLCMD Commands from System Logs
3️⃣ Inspect SQLCMD Parent-Child Processes
🔧 4. Remediation Steps
📌 1. Disable xp_cmdshell
📌 2. Revoke Unnecessary Database Permissions
📌 3. Terminate Malicious SQLCMD Processes
📌 4. Remove Malicious SQL Jobs
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Suspicious Connection by Winlogon.exe
🔍 1. Attack Breakdown
📝 What is Winlogon.exe?
Winlogon.exe?📑 Why Do Attackers Abuse Winlogon.exe?
Winlogon.exe?📌 Common Attack Scenarios
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Validate Winlogon Binary Integrity
2️⃣ Inspect Winlogon Startup Configurations
3️⃣ Trace Winlogon’s Network Traffic
🔧 4. Remediation Steps
📌 1. Terminate Suspicious Winlogon Processes
📌 2. Restore Registry Keys
📌 3. Remove Suspicious Executables
📌 4. Block Malicious IPs
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Image File Execution Options (IFEO) Injection: Advanced Threat Analysis
🔍 1. Attack Breakdown
📝 What is IFEO (Image File Execution Options)?
📑 Why Do Attackers Use IFEO Injection?
📌 Common Attack Scenarios
🛡️ 2. Detection Techniques
📊 🕵️ List IFEO Registry Keys
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Validate IFEO Entries
2️⃣ Inspect Associated Binaries
3️⃣ Trace Parent-Child Process Trees
🔧 4. Remediation Steps
📌 1. Remove Malicious IFEO Registry Entries
📌 2. Validate Application Paths
📌 3. Audit Registry Access
📌 4. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Port Monitors (Registry): Advanced Threat Analysis
🔍 1. Attack Breakdown
📝 What are Port Monitors?
📑 Why Do Attackers Abuse Port Monitors?
📌 Common Registry Paths for Port Monitors
📌 Common Attack Scenarios
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Verify Port Monitor DLL Integrity
2️⃣ Check Loaded DLLs in Spooler Process
3️⃣ Analyze Registry Modifications
🔧 4. Remediation Steps
📌 1. Remove Malicious Port Monitor Entries
📌 2. Restart Print Spooler Service
📌 3. Remove Suspicious DLLs
📌 4. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Potential Tunneled Communication via WebSocket Connection: Advanced Threat Analysis
🔍 1. Attack Breakdown
📝 What is WebSocket?
📑 Why Do Attackers Use WebSocket for Tunneling?
📌 Common Attack Scenarios
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
🕵️ 3. Investigation Techniques
1️⃣ Inspect WebSocket Connections
2️⃣ Trace WebSocket Processes
3️⃣ Analyze Traffic Logs
🔧 4. Remediation Steps
📌 1. Terminate Suspicious Processes
📌 2. Block Malicious IPs or Domains
📌 3. Inspect Configuration Files
📌 4. Clear DNS Cache
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 Unusual DLL Load by Indexer
🔍 1. Attack Breakdown
📝 What is the Windows Indexer (SearchIndexer.exe)?
SearchIndexer.exe)?📑 Why Do Attackers Target SearchIndexer.exe?
SearchIndexer.exe?📌 Common Attack Scenarios
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Validate DLL Hashes
2️⃣ Trace Parent-Child Relationships
3️⃣ Review Recent File Changes
🔧 4. Remediation Steps
📌 1. Terminate Malicious Processes
📌 2. Remove Malicious DLL Files
📌 3. Remove Malicious Registry Entries
📌 4. Restart Search Indexer Service
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
🚨 WinSAT Bypass – Privilege Escalation via File Change: Advanced Threat Analysis
🔍 1. Attack Breakdown
📝 What is WinSAT.exe?
WinSAT.exe?📑 Why Do Attackers Target WinSAT.exe?
WinSAT.exe?📌 Common Attack Scenarios
🛡️ 2. Detection Techniques
📊 Manual Inspection with PowerShell
📊 Microsoft Defender for Endpoint (MDE) Query (KQL)
📊 Event Viewer Logs
🕵️ 3. Investigation Techniques
1️⃣ Validate DLL Hashes
2️⃣ Inspect WinSAT Configurations
3️⃣ Check Symlinks in Temp Directory
🔧 4. Remediation Steps
📌 1. Terminate Malicious WinSAT Processes
📌 2. Remove Malicious DLL Files
📌 3. Remove Malicious Registry Entries
📌 4. Reset Permissions on Critical Directories
📌 5. Perform Full Antivirus Scan
🛡️ 5. Prevention Steps
🧠 6. Key Takeaways
Last updated