383. Hunting for Warlock's Tactics, Techniques and Procedures
Hello everyone! Today we’ll go over several techniques from the Warlock ransomware attack report that caught my attention. So, the first technique is Windows Credential Manager (T1555.004) . The attackers used the following command to access saved passwords: C:\Windows\System32\rundll32.exe keymgr.dll,KRShowKeyMgr This kind of behavioral indicator isn’t very common, so it works well for threat hunting: event_type: "processcreatewin" AND proc_file_path: "rundll32.exe" AND cmdline: ("keymgr.dll" AND "KRShowKeyMgr") The next technique is PowerShell (T1059.001) . This time, the attackers abused it to enable PowerShell Remoting: C:\windows\System32\WindowsPowerShell\v1.0\powershell.exe "Enable-PSRemoting -Force -SkipNetworkProfileCheck" Although this behavior can be legitimate, it’s still a good target for threat hunting: event_type: "processcreatewin" AND proc_file_path: "powershell.exe" AND cmdline: "Enable-PSRemo...