136. Hunting for Discovery Techniques
Hello everyone!
I'm sure you know that threat actors always need to collect information about the compromised system. In most cases it happens at early stages of attack lifecycle, so it's always great to have related hunting queries.
Let's look at the following example related to TA406:
$rc = Get-ChildItem ([Environment]::GetFolderPath('Recent'))
$ic = ipconfig /all
$gp = Get-process
$antivirusInfo = GetWmiObject -Namespace "root\SecurityCenter2" -Class AntivirusProduct
$anvi = $antivirusInfo | Select-Object DisplayName, ProductState, PathToSignedProductExe
$db = GetDisk | Get-Partition | Select-Object DiskNumber, DriveLetter
As you can see, the adversary collects information on recent file names, processes, antivirus software. etc. All of this can be used during your hunting missions, of course!
For example, as it's an excerpt from a PowerShell script, we can search for collecting information on recent file names in ScriptBlock:
event_type: "ScriptExecutionWin"
AND
script_text: ("get-childitem" AND "environment" AND "getfolderpath" AND "recent")
The same can be said about other techniques, of course.
See you tomorrow!
Comments
Post a Comment