Part 7
๐จ PowerShell Invocation from Registry
๐ 1. Attack Breakdown
๐ What is PowerShell Invocation from Registry?
๐ Why Do Attackers Use the Registry for PowerShell Invocation?
๐ Common Attack Scenarios
๐ก๏ธ 2. Detection Techniques
๐ Manual Inspection with PowerShell
๐ Microsoft Defender for Endpoint (MDE) Query (KQL)
๐ Event Viewer Logs
๐ต๏ธ 3. Investigation Techniques
1๏ธโฃ Inspect Specific Registry Keys
2๏ธโฃ Trace PowerShell Commands via Sysmon Logs
3๏ธโฃ Analyze Process Tree
๐ง 4. Remediation Steps
๐ 1. Remove Malicious Registry Keys
๐ 2. Disable Registry Editing for Non-Admin Users
๐ 3. Monitor Registry Changes Continuously
๐ 4. Perform Full Antivirus Scan
๐ก๏ธ 5. Prevention Steps
๐ง 6. Key Takeaways
๐จ Unusual ie4uinit Process Path
๐ 1. Attack Breakdown
๐ What is ie4uinit.exe?
ie4uinit.exe?๐ Why Do Attackers Abuse ie4uinit.exe?
ie4uinit.exe?๐ Common Attack Scenarios
๐ก๏ธ 2. Detection Techniques
๐ Manual Inspection with PowerShell
๐ Microsoft Defender for Endpoint (MDE) Query (KQL)
๐ Event Viewer Logs
๐ต๏ธ 3. Investigation Techniques
1๏ธโฃ Trace Unusual Process Paths
2๏ธโฃ Analyze Parent Process
3๏ธโฃ Check Registry for Persistence
๐ง 4. Remediation Steps
๐ 1. Terminate Malicious Process
๐ 2. Remove Malicious Files
๐ 3. Delete Malicious Registry Keys
๐ 4. Perform Full Antivirus Scan
๐ก๏ธ 5. Prevention Steps
๐ง 6. Key Takeaways
๐จ Exploit Guard Network Protection Blocked Event:
๐ 1. Attack Breakdown
๐ What is Exploit Guard Network Protection?
๐ Why is Network Protection Blocked?
๐ Common Attack Scenarios
๐ก๏ธ 2. Detection Techniques
๐ Manual Inspection with PowerShell
๐ Microsoft Defender for Endpoint (MDE) Query (KQL)
๐ Event Viewer Logs
๐ต๏ธ 3. Investigation Techniques
1๏ธโฃ Trace Process Responsible for Blocked Activity
2๏ธโฃ Inspect Command Line Arguments
3๏ธโฃ Analyze Remote URLs and IPs
๐ง 4. Remediation Steps
๐ 1. Terminate Malicious Processes
๐ 2. Block Malicious IPs or Domains
๐ 3. Remove Malicious Scheduled Tasks or Startup Entries
๐ 4. Review User Activity
๐ 5. Perform Full Antivirus Scan
๐ก๏ธ 5. Prevention Steps
๐ง 6. Key Takeaways
๐จ Privilege Elevation (Linux & macOS):
๐ 1. Attack Breakdown
๐ What is Privilege Elevation?
๐ Why Attackers Seek Privilege Elevation?
๐ Common Privilege Elevation Techniques
๐ก๏ธ 2. Detection Techniques
๐ Linux Detection Techniques
๐ macOS Detection Techniques
๐ SIEM Detection Queries
๐ Linux SIEM Query (ELK, Splunk)
๐ macOS SIEM Query (Splunk, ELK)
๐ก๏ธ 3. Investigation Techniques
1๏ธโฃ Trace Privilege Escalation Attempts
2๏ธโฃ Analyze Exploit Attempts
3๏ธโฃ Review New Cron Jobs
๐ง 4. Remediation Steps
๐ 1. Remove Malicious Cron Jobs
๐ 2. Revert Permissions
๐ 3. Disable Suspicious LaunchAgents
๐ 4. Revoke Sudo Permissions for Compromised Accounts
๐ 5. Perform Full Antivirus Scan
๐ก๏ธ 5. Prevention Steps
๐ง 6. Key Takeaways
๐จ Credential Dumping Using sqlcmd.exe
sqlcmd.exe๐ 1. Attack Breakdown
๐ What is sqlcmd.exe?
sqlcmd.exe?๐ Why Do Attackers Abuse sqlcmd.exe?
sqlcmd.exe?๐ Common Attack Scenarios
๐ก๏ธ 2. Detection Techniques
๐ Manual Inspection with SQLCMD
๐ Manual Inspection with PowerShell
๐ Microsoft Defender for Endpoint (MDE) Query (KQL)
๐ Event Viewer Logs
๐ต๏ธ 3. Investigation Techniques
1๏ธโฃ Review SQL Server Error Logs
2๏ธโฃ Trace SQLCMD Commands from System Logs
3๏ธโฃ Inspect SQLCMD Parent-Child Processes
๐ง 4. Remediation Steps
๐ 1. Disable xp_cmdshell
๐ 2. Revoke Unnecessary Database Permissions
๐ 3. Terminate Malicious SQLCMD Processes
๐ 4. Remove Malicious SQL Jobs
๐ 5. Perform Full Antivirus Scan
๐ก๏ธ 5. Prevention Steps
๐ง 6. Key Takeaways
๐จ Suspicious Connection by Winlogon.exe
๐ 1. Attack Breakdown
๐ What is Winlogon.exe?
Winlogon.exe?๐ Why Do Attackers Abuse Winlogon.exe?
Winlogon.exe?๐ Common Attack Scenarios
๐ก๏ธ 2. Detection Techniques
๐ Manual Inspection with PowerShell
๐ Microsoft Defender for Endpoint (MDE) Query (KQL)
๐ Event Viewer Logs
๐ต๏ธ 3. Investigation Techniques
1๏ธโฃ Validate Winlogon Binary Integrity
2๏ธโฃ Inspect Winlogon Startup Configurations
3๏ธโฃ Trace Winlogonโs Network Traffic
๐ง 4. Remediation Steps
๐ 1. Terminate Suspicious Winlogon Processes
๐ 2. Restore Registry Keys
๐ 3. Remove Suspicious Executables
๐ 4. Block Malicious IPs
๐ 5. Perform Full Antivirus Scan
๐ก๏ธ 5. Prevention Steps
๐ง 6. Key Takeaways
๐จ Image File Execution Options (IFEO) Injection: Advanced Threat Analysis
๐ 1. Attack Breakdown
๐ What is IFEO (Image File Execution Options)?
๐ Why Do Attackers Use IFEO Injection?
๐ Common Attack Scenarios
๐ก๏ธ 2. Detection Techniques
๐ ๐ต๏ธ List IFEO Registry Keys
๐ Microsoft Defender for Endpoint (MDE) Query (KQL)
๐ Event Viewer Logs
๐ต๏ธ 3. Investigation Techniques
1๏ธโฃ Validate IFEO Entries
2๏ธโฃ Inspect Associated Binaries
3๏ธโฃ Trace Parent-Child Process Trees
๐ง 4. Remediation Steps
๐ 1. Remove Malicious IFEO Registry Entries
๐ 2. Validate Application Paths
๐ 3. Audit Registry Access
๐ 4. Perform Full Antivirus Scan
๐ก๏ธ 5. Prevention Steps
๐ง 6. Key Takeaways
๐จ Port Monitors (Registry): Advanced Threat Analysis
๐ 1. Attack Breakdown
๐ What are Port Monitors?
๐ Why Do Attackers Abuse Port Monitors?
๐ Common Registry Paths for Port Monitors
๐ Common Attack Scenarios
๐ก๏ธ 2. Detection Techniques
๐ Manual Inspection with PowerShell
๐ Microsoft Defender for Endpoint (MDE) Query (KQL)
๐ Event Viewer Logs
๐ต๏ธ 3. Investigation Techniques
1๏ธโฃ Verify Port Monitor DLL Integrity
2๏ธโฃ Check Loaded DLLs in Spooler Process
3๏ธโฃ Analyze Registry Modifications
๐ง 4. Remediation Steps
๐ 1. Remove Malicious Port Monitor Entries
๐ 2. Restart Print Spooler Service
๐ 3. Remove Suspicious DLLs
๐ 4. Perform Full Antivirus Scan
๐ก๏ธ 5. Prevention Steps
๐ง 6. Key Takeaways
๐จ Potential Tunneled Communication via WebSocket Connection: Advanced Threat Analysis
๐ 1. Attack Breakdown
๐ What is WebSocket?
๐ Why Do Attackers Use WebSocket for Tunneling?
๐ Common Attack Scenarios
๐ก๏ธ 2. Detection Techniques
๐ Manual Inspection with PowerShell
๐ Microsoft Defender for Endpoint (MDE) Query (KQL)
๐ต๏ธ 3. Investigation Techniques
1๏ธโฃ Inspect WebSocket Connections
2๏ธโฃ Trace WebSocket Processes
3๏ธโฃ Analyze Traffic Logs
๐ง 4. Remediation Steps
๐ 1. Terminate Suspicious Processes
๐ 2. Block Malicious IPs or Domains
๐ 3. Inspect Configuration Files
๐ 4. Clear DNS Cache
๐ 5. Perform Full Antivirus Scan
๐ก๏ธ 5. Prevention Steps
๐ง 6. Key Takeaways
๐จ Unusual DLL Load by Indexer
๐ 1. Attack Breakdown
๐ What is the Windows Indexer (SearchIndexer.exe)?
SearchIndexer.exe)?๐ Why Do Attackers Target SearchIndexer.exe?
SearchIndexer.exe?๐ Common Attack Scenarios
๐ก๏ธ 2. Detection Techniques
๐ Manual Inspection with PowerShell
๐ Microsoft Defender for Endpoint (MDE) Query (KQL)
๐ Event Viewer Logs
๐ต๏ธ 3. Investigation Techniques
1๏ธโฃ Validate DLL Hashes
2๏ธโฃ Trace Parent-Child Relationships
3๏ธโฃ Review Recent File Changes
๐ง 4. Remediation Steps
๐ 1. Terminate Malicious Processes
๐ 2. Remove Malicious DLL Files
๐ 3. Remove Malicious Registry Entries
๐ 4. Restart Search Indexer Service
๐ 5. Perform Full Antivirus Scan
๐ก๏ธ 5. Prevention Steps
๐ง 6. Key Takeaways
๐จ WinSAT Bypass โ Privilege Escalation via File Change: Advanced Threat Analysis
๐ 1. Attack Breakdown
๐ What is WinSAT.exe?
WinSAT.exe?๐ Why Do Attackers Target WinSAT.exe?
WinSAT.exe?๐ Common Attack Scenarios
๐ก๏ธ 2. Detection Techniques
๐ Manual Inspection with PowerShell
๐ Microsoft Defender for Endpoint (MDE) Query (KQL)
๐ Event Viewer Logs
๐ต๏ธ 3. Investigation Techniques
1๏ธโฃ Validate DLL Hashes
2๏ธโฃ Inspect WinSAT Configurations
3๏ธโฃ Check Symlinks in Temp Directory
๐ง 4. Remediation Steps
๐ 1. Terminate Malicious WinSAT Processes
๐ 2. Remove Malicious DLL Files
๐ 3. Remove Malicious Registry Entries
๐ 4. Reset Permissions on Critical Directories
๐ 5. Perform Full Antivirus Scan
๐ก๏ธ 5. Prevention Steps
๐ง 6. Key Takeaways
Last updated