318. Adversaries Use PowerShell to Hunt for Password Stores

Hello everyone!

It's time to update your PowerShell collection with another procedure example, this time it's related to discovery and credential access.

Let's look into the report on Red Likho. The adversary leveraged PowerShell to collect information on KeePass-related files:

powershell.exe "Get-ChildItem -Path 'C:\Users\','$env:PROGRAMFILES','env:ProgramFiles(x86)' -Recurse -Force -Include ('KeePass.config.xml','KeePass.exe','*.kdbx') -ErrorAction SilentlyContinue | Select FullName -ExpandProperty FullName"

And here we have another hunting opportunity:

event_type: "processcreatewin"

AND

proc_file_path: "powershell.exe"

AND

cmdline: (*keepass* AND *kdbx*)

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge