318. Adversaries Use PowerShell to Hunt for Password Stores
Hello everyone!
It's time to update your PowerShell collection with another procedure example, this time it's related to discovery and credential access.
Let's look into the report on Red Likho. The adversary leveraged PowerShell to collect information on KeePass-related files:
powershell.exe "Get-ChildItem -Path 'C:\Users\','$env:PROGRAMFILES','env:ProgramFiles(x86)' -Recurse -Force -Include ('KeePass.config.xml','KeePass.exe','*.kdbx') -ErrorAction SilentlyContinue | Select FullName -ExpandProperty FullName"
And here we have another hunting opportunity:
event_type: "processcreatewin"
AND
proc_file_path: "powershell.exe"
AND
cmdline: (*keepass* AND *kdbx*)
See you tomorrow!

Comments
Post a Comment