136. Hunting for Discovery Techniques

Hello everyone!

I'm sure you know that threat actors always need to collect information about the compromised system. In most cases it happens at early stages of attack lifecycle, so it's always great to have related hunting queries.

Let's look at the following example related to TA406:

$rc = Get-ChildItem ([Environment]::GetFolderPath('Recent'))

$ic = ipconfig /all

$gp = Get-process

$antivirusInfo = GetWmiObject -Namespace "root\SecurityCenter2" -Class AntivirusProduct

$anvi = $antivirusInfo | Select-Object DisplayName, ProductState, PathToSignedProductExe

$db = GetDisk | Get-Partition | Select-Object DiskNumber, DriveLetter

As you can see, the adversary collects information on recent file names, processes, antivirus software. etc. All of this can be used during your hunting missions, of course!

For example, as it's an excerpt from a PowerShell script, we can search for collecting information on recent file names in ScriptBlock:

event_type: "ScriptExecutionWin"

AND

script_text: ("get-childitem" AND "environment" AND "getfolderpath" AND "recent")

The same can be said about other techniques, of course.

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge