104. Hunting for Paper Werewolf: FlashFileGrabber
Hello everyone! The last one on Paper Werewolf - I promise! This time we'll look at FlashFileGrabber. This module allows the adversary to collect various files from removable media.
If we look inside the script, we can see that there are lots of file extensions. Of course, we can use it for threat hunting!
You can find various extensions inside PowerShell scripts adversaries use for sensitive data collection, so you can definitely experiment with a number of them, for example:
event_type: "ScriptExecutionWin"
AND
script_text: ("txt" AND "doc" AND "docx" AND "xls" AND "xlsx" AND "pdf" AND "rar" AND "zip")
I hope your threat hunting missions are going well!
See you tomorrow!
Comments
Post a Comment