├── README.md ├── css ├── bootstrap.min.css └── dashboard.css ├── details ├── AceHash.htm ├── BITS.htm ├── BeginX.htm ├── FakeWpad.htm ├── Find-GPOPasswords.htm ├── Htran.htm ├── MS14-058.htm ├── MS14-068.htm ├── MS15-078.htm ├── Mimikatz_GoldenTicket.htm ├── Mimikatz_SilverTicket.htm ├── Mimikatz_lsadump-sam.htm ├── Mimikatz_sekurlsa-logonpasswords.htm ├── Mimikatz_sekurlsa-tickets.htm ├── PWDumpX.htm ├── PowerMemory.htm ├── PowerSploit_GetGPPPassword.htm ├── PowerSploit_Invoke-Mimikatz.htm ├── PowerSploit_Out-Minidump.htm ├── PsExec.htm ├── PwDump7.htm ├── QuarksPWDump.htm ├── RemoteLogin-Mimikatz.htm ├── RemoteLogin-WCE.htm ├── SDB-UAC-Bypass.htm ├── WCE.htm ├── WebBrowserPassView.htm ├── WinRM.htm ├── WinRS.htm ├── common │ ├── script.js │ └── style.css ├── csvde.htm ├── dcdiag.htm ├── dsquery.htm ├── gsecdump.htm ├── klist-purge.htm ├── ldifde.htm ├── lslsass.htm ├── mstsc.htm ├── net-use.htm ├── net-user.htm ├── nltest.htm ├── nmap.htm ├── ntdsutil.htm ├── schtasks.htm ├── sdelete.htm ├── timestomp.htm ├── vssadmin.htm ├── wevtutil.htm ├── wmic.htm └── wmiexec-vbs.htm ├── index.html ├── js ├── bootstrap.min.js └── jquery.min.js ├── overview.html └── tool-list.html /README.md: -------------------------------------------------------------------------------- 1 | # Tool Analysis Result Sheet 2 | This repository summarizes the results of examining logs recorded in Windows upon execution of the 49 tools which are likely to be used by the attacker that has infiltrated a network. 3 | Tool Analysis Result Sheet is created in HTML and can be checked from the following URL. 4 | 5 | https://jpcertcc.github.io/ToolAnalysisResultSheet/ 6 | 7 | A report that outlines and usage of this research is published below. When using Tool Analysis Result Sheet, we recommend you to check the report. 8 | 9 | [Detecting Lateral Movement through Tracking Event Logs (Version 2)](http://www.jpcert.or.jp/english/pub/sr/ir_research.html) 10 | -------------------------------------------------------------------------------- /css/dashboard.css: -------------------------------------------------------------------------------- 1 | /* 2 | * Base structure 3 | */ 4 | 5 | /* Move down content because we have a fixed navbar that is 50px tall */ 6 | body { 7 | padding-top: 50px; 8 | } 9 | 10 | /* 11 | * Typography 12 | */ 13 | 14 | h1 { 15 | margin-bottom: 20px; 16 | padding-bottom: 9px; 17 | border-bottom: 1px solid #eee; 18 | } 19 | 20 | /* 21 | * Sidebar 22 | */ 23 | 24 | .sidebar { 25 | position: fixed; 26 | top: 51px; 27 | bottom: 0; 28 | left: 0; 29 | z-index: 1000; 30 | padding: 10px; 31 | overflow-x: hidden; 32 | overflow-y: auto; /* Scrollable contents if viewport is shorter than content. */ 33 | border-right: 1px solid #eee; 34 | background-color: #c0c0c0; 35 | } 36 | 37 | /* Sidebar navigation */ 38 | .sidebar { 39 | padding-left: 0; 40 | padding-right: 0; 41 | } 42 | 43 | .sidebar .nav { 44 | margin-bottom: 10px; 45 | font-weight: bold; 46 | color: #fffafa; 47 | } 48 | 49 | .sidebar .nav-item { 50 | width: 100%; 51 | padding: 0px 0px 0px 10px; 52 | font-weight: normal; 53 | } 54 | 55 | .sidebar .nav-item + .nav-item { 56 | margin-left: 0; 57 | } 58 | 59 | .sidebar .nav-link { 60 | border-radius: 0; 61 | } 62 | 63 | /* 64 | * Dashboard 65 | */ 66 | 67 | /* Placeholders */ 68 | .placeholders { 69 | padding-bottom: 3rem; 70 | } 71 | 72 | .placeholder img { 73 | padding-top: 1.5rem; 74 | padding-bottom: 1.5rem; 75 | } 76 | -------------------------------------------------------------------------------- /details/Mimikatz_lsadump-sam.htm: -------------------------------------------------------------------------------- 1 | 2 | 3 |
4 | 5 |Open all sections | Close all sections
22 |Item | 41 |Description | 42 |
---|---|
OS | 47 |Windows | 48 |
Belonging to Domain | 51 |Not required | 52 |
Rights | 55 |Administrator | 56 |
# | 93 |Log | 94 |Event ID | 95 |Task Category | 96 |Event Details | 97 |
---|---|---|---|---|
1 | 102 |Microsoft-Windows-Sysmon/Operational | 103 |1 | 104 |Process Create (rule: ProcessCreate) | 105 |Process Create.
|
112 |
2 | 115 |Microsoft-Windows-Sysmon/Operational | 116 |10 | 117 |Process accessed (rule: ProcessAccess) | 118 |Process accessed.
|
124 |
# | 142 |Event Log | 143 |Event ID | 144 |Task Category | 145 |Event Details | 146 |
---|---|---|---|---|
1 | 151 |Microsoft-Windows-Sysmon/Operational | 152 |1 | 153 |Process Create (rule: ProcessCreate) | 154 |Process Create.
|
168 |
Security | 172 |4688 | 173 |Process Create | 174 |A new process has been created.
|
185 | |
2 | 188 |Security | 189 |4673 | 190 |Sensitive Privilege Use | 191 |A privileged service was called.
|
198 |
3 | 201 |Microsoft-Windows-Sysmon/Operational | 202 |11 | 203 |File created (rule: FileCreate) | 204 |File created.
|
210 |
Security | 214 |4656 | 215 |File System/Other Object Access Events | 216 |A handle to an object was requested.
|
226 | |
Security | 230 |4663 | 231 |File System | 232 |An attempt was made to access an object.
|
243 | |
Security | 247 |4658 | 248 |File System | 249 |The handle to an object was closed.
|
256 | |
4 | 259 |Security | 260 |4703 | 261 |Token Right Adjusted Events | 262 |A token right was adjusted.
|
272 |
Microsoft-Windows-Sysmon/Operational | 276 |10 | 277 |Process accessed (rule: ProcessAccess) | 278 |Process accessed.
|
285 | |
5 | 288 |Microsoft-Windows-Sysmon/Operational | 289 |5 | 290 |Process terminated (rule: ProcessTerminate) | 291 |Process terminated.
|
296 |
Security | 300 |4689 | 301 |Process Termination | 302 |A process has exited.
|
310 |
# | 320 |File Name | 321 |Process | 322 |Attribute | 323 |
---|---|---|---|
1 | 328 |[Executable File Name of Tool]-[RANDOM].pf | 329 |FILE_CREATE | 330 |archive+not_indexed | 331 |
[Executable File Name of Tool]-[RANDOM].pf | 335 |DATA_EXTEND+FILE_CREATE | 336 |archive+not_indexed | 337 ||
[Executable File Name of Tool]-[RANDOM].pf | 341 |CLOSE+DATA_EXTEND+FILE_CREATE | 342 |archive+not_indexed | 343 |
# | 353 |Path | 354 |Header Flag | 355 |Validity | 356 |
---|---|---|---|
1 | 361 |[Drive Name]:\Windows\Prefetch\[Executable File Name of Tool]-[RANDOM].pf | 362 |FILE | 363 |ALLOCATED | 364 |
# | 374 |Prefetch File | 375 |Process Name | 376 |Process Path | 377 |Information That Can Be Confirmed | 378 |
---|---|---|---|---|
1 | 383 |C:\Windows\Prefetch\[Executable File Name of Tool]-[RANDOM].pf | 384 |[Executable File Name of Tool] | 385 |[Path to Tool] | 386 |Last Run Time (last execution date and time) | 387 |
Open all sections | Close all sections
22 |Item | 41 |Description | 42 |
---|---|
OS | 47 |Windows | 48 |
Belonging to Domain | 51 |Not required | 52 |
Rights | 55 |Administrator | 56 |
# | 92 |Log | 93 |Event ID | 94 |Task Category | 95 |Event Details | 96 |
---|---|---|---|---|
1 | 101 |Microsoft-Windows-Sysmon/Operational | 102 |1 | 103 |Process Create (rule: ProcessCreate) | 104 |Process Create.
|
111 |
2 | 114 |Security | 115 |4689 | 116 |Process Termination | 117 |A process has exited.
|
124 |
# | 132 |File Name | 133 |Process | 134 |
---|---|---|
1 | 139 |[Executable File Name of Tool]-[RANDOM].pf | 140 |CLOSE+DATA_EXTEND+FILE_CREATE | 141 |
# | 149 |Path | 150 |Header Flag | 151 |Validity | 152 |
---|---|---|---|
1 | 157 |[Drive Name]:\Windows\Prefetch\[Executable File Name of Tool]-[RANDOM].pf | 158 |FILE | 159 |ALLOCATED | 160 |
# | 178 |Event log | 179 |Event ID | 180 |Task Category | 181 |Event Details | 182 |
---|---|---|---|---|
1 | 187 |Microsoft-Windows-Sysmon/Operational | 188 |1 | 189 |Process Create (rule: ProcessCreate) | 190 |Process Create.
|
202 |
Security | 206 |4688 | 207 |Process Create | 208 |A new process has been created.
|
219 | |
2 | 222 |Microsoft-Windows-Sysmon/Operational | 223 |5 | 224 |Process terminated (rule: ProcessTerminate) | 225 |Process terminated.
|
230 |
Security | 234 |4689 | 235 |Process Termination | 236 |A process has exited.
|
244 | |
3 | 247 |Microsoft-Windows-Sysmon/Operational | 248 |11 | 249 |File created (rule: FileCreate) | 250 |File created.
|
256 |
Security | 260 |4656 | 261 |File System/Other Object Access Events | 262 |A handle to an object was requested.
|
272 | |
Security | 276 |4663 | 277 |File System | 278 |An attempt was made to access an object.
|
288 | |
Security | 292 |4658 | 293 |File System | 294 |The handle to an object was closed.
|
301 |
# | 311 |File Name | 312 |Process | 313 |Attribute | 314 |
---|---|---|---|
1 | 319 |[Executable File Name of Tool]-[RANDOM].pf | 320 |FILE_CREATE | 321 |archive+not_indexed | 322 |
[Executable File Name of Tool]-[RANDOM].pf | 326 |DATA_EXTEND+FILE_CREATE | 327 |archive+not_indexed | 328 ||
[Executable File Name of Tool]-[RANDOM].pf | 332 |CLOSE+DATA_EXTEND+FILE_CREATE | 333 |archive+not_indexed | 334 |
# | 344 |Path | 345 |Header Flag | 346 |Validity | 347 |
---|---|---|---|
1 | 352 |[Drive Name]:\Windows\Prefetch\[Executable File Name of Tool]-[RANDOM].pf | 353 |FILE | 354 |ALLOCATED | 355 |
# | 365 |Prefetch File | 366 |Process Name | 367 |Process Path | 368 |Information That Can Be Confirmed | 369 |
---|---|---|---|---|
1 | 374 |C:\Windows\Prefetch\[Executable File Name of Tool]-[RANDOM].pf | 375 |[Executable File Name of Tool] | 376 |\VOLUME{[GUID]}\[Path to the Tool] | 377 |Last Run Time (last execution date and time) | 378 |
Open all sections | Close all sections
23 |Item | 42 |Description | 43 |
---|---|
OS | 48 |Windows Server | 49 |
Belonging to Domain | 52 |Not required | 53 |
Rights | 56 |Standard user (However, information that cannot be acquired exists depending on the user privileges.) | 57 |
Communication Protocol | 60 |389/tcp | 61 |
Service | 64 |Active Directory Domain Services | 65 |
# | 101 |Log | 102 |Event ID | 103 |Task Category | 104 |Event Details | 105 |
---|---|---|---|---|
1 | 110 |Microsoft-Windows-Sysmon/Operational | 111 |1 | 112 |Process Create (rule: ProcessCreate) | 113 |Process Create.
|
120 |
2 | 123 |Security | 124 |4689 | 125 |Process Termination | 126 |A process has exited.
|
133 |
3 | 136 |Microsoft-Windows-Sysmon/Operational | 137 |3 | 138 |Network connection detected (rule: NetworkConnect) | 139 |Network connection detected.
|
146 |
# | 160 |Event Log | 161 |Event ID | 162 |Task Category | 163 |Event Details | 164 |
---|---|---|---|---|
1 | 169 |Microsoft-Windows-Sysmon/Operational | 170 |1 | 171 |Process Create (rule: ProcessCreate) | 172 |Process Create.
|
184 |
Security | 188 |4688 | 189 |Process Create | 190 |A new process has been created.
|
199 | |
2 | 202 |Microsoft-Windows-Sysmon/Operational | 203 |3 | 204 |Network connection detected (rule: NetworkConnect) | 205 |Network connection detected.
|
213 |
Security | 217 |5158 | 218 |Filtering Platform Connection | 219 |The Windows Filtering Platform has permitted a bind to a local port.
|
225 | |
Security | 229 |5156 | 230 |Filtering Platform Connection | 231 |The Windows Filtering Platform has allowed a connection.
|
241 | |
3 | 244 |Microsoft-Windows-Sysmon/Operational | 245 |3 | 246 |Network connection detected (rule: NetworkConnect) | 247 |Network connection detected.
|
255 |
Security | 259 |5156 | 260 |Filtering Platform Connection | 261 |The Windows Filtering Platform has allowed a connection.
|
271 | |
4 | 274 |Microsoft-Windows-Sysmon/Operational | 275 |5 | 276 |Process terminated (rule: ProcessTerminate) | 277 |Process terminated.
|
282 |
Security | 286 |4689 | 287 |Process Termination | 288 |A process has exited.
|
296 |
Open all sections | Close all sections
22 |Item | 41 |Description | 42 |
---|---|
OS | 47 |Windows | 48 |
Belonging to Domain | 51 |Required | 52 |
Rights | 55 |Standard user | 56 |
# | 92 |Log | 93 |Event ID | 94 |Task Category | 95 |Event Details | 96 |
---|---|---|---|---|
1 | 101 |Microsoft-Windows-Sysmon/Operational | 102 |1 | 103 |Process Create (rule: ProcessCreate) | 104 |Process Create.
|
111 |
2 | 114 |Security | 115 |4689 | 116 |Process Termination | 117 |A process has exited.
|
123 |
# | 137 |Event Log | 138 |Event ID | 139 |Task Category | 140 |Event Details | 141 |
---|---|---|---|---|
1 | 146 |Microsoft-Windows-Sysmon/Operational | 147 |1 | 148 |Process Create (rule: ProcessCreate) | 149 |Process Create.
|
163 |
Security | 167 |4688 | 168 |Process Create | 169 |A new process has been created.
|
180 | |
2 | 183 |Microsoft-Windows-Sysmon/Operational | 184 |5 | 185 |Process terminated (rule: ProcessTerminate) | 186 |Process terminated.
|
191 |
Security | 195 |4689 | 196 |Process Termination | 197 |A process has exited.
|
205 | |
3 | 208 |Security | 209 |4656 | 210 |File System/Other Object Access Events | 211 |A handle to an object was requested.
|
221 |
Security | 225 |4663 | 226 |File System | 227 |An attempt was made to access an object.
|
239 | |
Security | 243 |4658 | 244 |File System | 245 |The handle to an object was closed.
|
252 |
# | 262 |File Name | 263 |Process | 264 |Attribute | 265 |
---|---|---|---|
1 | 270 |KLIST.EXE-[RANDOM].pf | 271 |FILE_CREATE | 272 |archive+not_indexed | 273 |
KLIST.EXE-[RANDOM].pf | 277 |DATA_EXTEND+FILE_CREATE | 278 |archive+not_indexed | 279 ||
KLIST.EXE-[RANDOM].pf | 283 |CLOSE+DATA_EXTEND+FILE_CREATE | 284 |archive+not_indexed | 285 |
# | 295 |Path | 296 |Header Flag | 297 |Validity | 298 |
---|---|---|---|
1 | 303 |[Drive Name]:\Windows\Prefetch\KLIST.EXE-[RANDOM].pf | 304 |FILE | 305 |ALLOCATED | 306 |
# | 316 |Prefetch File | 317 |Process Name | 318 |Process Path | 319 |Information That Can Be Confirmed | 320 |
---|---|---|---|---|
1 | 325 |C:\Windows\Prefetch\KLIST.EXE-[RANDOM].pf | 326 |KLIST.EXE | 327 |C:\WINDOWS\SYSTEM32\KLIST.EXE | 328 |Last Run Time (last execution date and time) | 329 |
Open all sections | Close all sections
23 |Item | 42 |Description | 43 |
---|---|
OS | 48 |Windows Server | 49 |
Belonging to Domain | 52 |Not required | 53 |
Rights | 56 |Standard user | 57 |
Communication Protocol | 60 |389/tcp | 61 |
Service | 64 |Active Directory Domain Services | 65 |
# | 101 |Log | 102 |Event ID | 103 |Task Category | 104 |Event Details | 105 |
---|---|---|---|---|
1 | 110 |Microsoft-Windows-Sysmon/Operational | 111 |1 | 112 |Process Create (rule: ProcessCreate) | 113 |Process Create.
|
120 |
2 | 123 |Security | 124 |4663 | 125 |File System | 126 |An attempt was made to access an object.
|
132 |
# | 140 |File Name | 141 |Process | 142 |
---|---|---|
1 | 147 |[LDIF file specified by the "-f" option at tool execution] | 148 |FILE_CREATE | 149 |
# | 163 |Event Log | 164 |Event ID | 165 |Task Category | 166 |Event Details | 167 |
---|---|---|---|---|
1 | 172 |Microsoft-Windows-Sysmon/Operational | 173 |1 | 174 |Process Create (rule: ProcessCreate) | 175 |Process Create.
|
187 |
Security | 191 |4688 | 192 |Process Create | 193 |A new process has been created.
|
204 | |
2 | 207 |Security | 208 |5158 | 209 |Filtering Platform Connection | 210 |The Windows Filtering Platform has permitted a bind to a local port.
|
216 |
Security | 220 |5156 | 221 |Filtering Platform Connection | 222 |The Windows Filtering Platform has allowed a connection.
|
229 | |
3 | 232 |Security | 233 |5156 | 234 |Filtering Platform Connection | 235 |The Windows Filtering Platform has allowed a connection.
|
242 |
Microsoft-Windows-Sysmon/Operational | 246 |10 | 247 |Process accessed (rule: ProcessAccess) | 248 |Process accessed.
|
255 | |
4 | 258 |Security | 259 |4656 | 260 |File System/Other Object Access Events | 261 |A handle to an object was requested.
|
271 |
Security | 275 |4663 | 276 |File System | 277 |An attempt was made to access an object.
|
288 | |
Security | 292 |4658 | 293 |File System | 294 |The handle to an object was closed.
|
301 | |
Microsoft-Windows-Sysmon/Operational | 305 |11 | 306 |File created (rule: FileCreate) | 307 |File created.
|
313 | |
5 | 316 |Security | 317 |4689 | 318 |Process Termination | 319 |A process has exited.
|
325 |
Microsoft-Windows-Sysmon/Operational | 329 |5 | 330 |Process terminated (rule: ProcessTerminate) | 331 |Process terminated.
|
336 |
# | 346 |File Name | 347 |Process | 348 |Attribute | 349 |
---|---|---|---|
1 | 354 |[LDIF file specified by the "-f" option at tool execution] | 355 |FILE_CREATE | 356 |archive | 357 |
[LDIF file specified by the "-f" option at tool execution] | 361 |DATA_EXTEND+FILE_CREATE | 362 |archive | 363 ||
[LDIF file specified by the "-f" option at tool execution] | 367 |CLOSE+DATA_EXTEND+FILE_CREATE | 368 |archive | 369 |
# | 379 |Path | 380 |Header Flag | 381 |Validity | 382 |
---|---|---|---|
1 | 387 |[LDIF file specified by the "-f" option at tool execution] | 388 |FILE | 389 |ALLOCATED | 390 |
Open all sections | Close all sections
22 |Item | 41 |Description | 42 |
---|---|
OS | 47 |Windows 7 32bit | 48 |
Belonging to Domain | 51 |Not required | 52 |
Rights | 55 |Administrator | 56 |
# | 93 |Log | 94 |Event ID | 95 |Task Category | 96 |Event Details | 97 |
---|---|---|---|---|
1 | 102 |Microsoft-Windows-Sysmon/Operational | 103 |1 | 104 |Process Create (rule: ProcessCreate) | 105 |Process Create.
|
112 |
2 | 115 |Security | 116 |4689 | 117 |Process Termination | 118 |A process has exited.
|
126 |
3 | 129 |Microsoft-Windows-Sysmon/Operational | 130 |10 | 131 |Process accessed (rule: ProcessAccess) | 132 |Process accessed.
|
139 |
# | 147 |File Name | 148 |Process | 149 |
---|---|---|
1 | 154 |[Executable File Name of Tool]-[RANDOM].pf | 155 |CLOSE+DATA_EXTEND+FILE_CREATE | 156 |
# | 164 |Path | 165 |Header Flag | 166 |Validity | 167 |
---|---|---|---|
1 | 172 |[Drive Name]:\Windows\Prefetch\[Executable File Name of Tool]-[RANDOM].pf | 173 |FILE | 174 |ALLOCATED | 175 |
# | 193 |Event Log | 194 |Event ID | 195 |Task Category | 196 |Event Details | 197 |
---|---|---|---|---|
1 | 202 |Microsoft-Windows-Sysmon/Operational | 203 |1 | 204 |Process Create (rule: ProcessCreate) | 205 |Process Create.
|
219 |
Security | 223 |4688 | 224 |Process Create | 225 |A new process has been created.
|
234 | |
2 | 237 |Microsoft-Windows-Sysmon/Operational | 238 |10 | 239 |Process accessed (rule: ProcessAccess) | 240 |Process accessed.
|
247 |
3 | 250 |Microsoft-Windows-Sysmon/Operational | 251 |5 | 252 |Process terminated (rule: ProcessTerminate) | 253 |Process terminated.
|
258 |
Security | 262 |4689 | 263 |Process Termination | 264 |A process has exited.
|
272 | |
4 | 275 |Microsoft-Windows-Sysmon/Operational | 276 |11 | 277 |File created (rule: FileCreate) | 278 |File created.
|
284 |
Security | 288 |4656 | 289 |File System/Other Object Access Events | 290 |A handle to an object was requested.
|
300 | |
Security | 304 |4663 | 305 |File System | 306 |An attempt was made to access an object.
|
316 | |
Security | 320 |4658 | 321 |File System | 322 |The handle to an object was closed.
|
329 |
# | 339 |File Name | 340 |Process | 341 |Attribute | 342 |
---|---|---|---|
1 | 347 |[Executable File Name of Tool]-[RANDOM].pf | 348 |FILE_CREATE | 349 |archive+not_indexed | 350 |
[Executable File Name of Tool]-[RANDOM].pf | 354 |DATA_EXTEND+FILE_CREATE | 355 |archive+not_indexed | 356 ||
[Executable File Name of Tool]-[RANDOM].pf | 360 |CLOSE+DATA_EXTEND+FILE_CREATE | 361 |archive+not_indexed | 362 |
# | 372 |Path | 373 |Header Flag | 374 |Validity | 375 |
---|---|---|---|
1 | 380 |[Drive Name]:\Windows\Prefetch\[Executable File Name of Tool]-[RANDOM].pf | 381 |FILE | 382 |ALLOCATED | 383 |
# | 393 |Prefetch File | 394 |Process Name | 395 |Process Path | 396 |Information That Can Be Confirmed | 397 |
---|---|---|---|---|
1 | 402 |C:\Windows\Prefetch\[Executable File Name of Tool]-[RANDOM].pf | 403 |Executable file name of the tool | 404 |\VOLUME{[GUID]}\[Path to the Tool] | 405 |Last Run Time (last execution date and time) | 406 |
Open all sections | Close all sections
22 |Item | 41 |Description | 42 |
---|---|
OS | 47 |Windows | 48 |
Belonging to Domain | 51 |Not required | 52 |
Rights | 55 |Administrator | 56 |
# | 93 |Log | 94 |Event ID | 95 |Task Category | 96 |Event Details | 97 |
---|---|---|---|---|
1 | 102 |Microsoft-Windows-Sysmon/Operational | 103 |1 | 104 |Process Create (rule: ProcessCreate) | 105 |Process Create.
|
112 |
2 | 115 |Security | 116 |4663 | 117 |File System | 118 |An attempt was made to access an object.
|
125 |
3 | 128 |Security | 129 |4656 | 130 |File System/Other Object Access Events | 131 |A handle to an object was requested.
|
136 |
4 | 139 |Microsoft-Windows-Sysmon/Operational | 140 |2 | 141 |File creation time changed (rule: FileCreateTime) | 142 |File creation time changed.
|
148 |
# | 156 |File Name | 157 |Process | 158 |
---|---|---|
1 | 163 |[File to be Changed] | 164 |BASIC_INFO_CHANGE+CLOSE | 165 |
2 | 168 |[Executable File Name of Tool]-[RANDOM].pf | 169 |CLOSE+DATA_EXTEND+FILE_CREATE | 170 |
# | 188 |Event Log | 189 |Event ID | 190 |Task Category | 191 |Event Details | 192 |
---|---|---|---|---|
1 | 197 |Microsoft-Windows-Sysmon/Operational | 198 |1 | 199 |Process Create (rule: ProcessCreate) | 200 |Process Create.
|
212 |
Security | 216 |4688 | 217 |Process Create | 218 |A new process has been created.
|
229 | |
2 | 232 |Security | 233 |4656 | 234 |File System/Other Object Access Events | 235 |A handle to an object was requested.
|
242 |
Security | 246 |4663 | 247 |File System | 248 |An attempt was made to access an object.
|
256 | |
Security | 260 |4658 | 261 |File System | 262 |The handle to an object was closed.
|
269 | |
3 | 272 |Microsoft-Windows-Sysmon/Operational | 273 |2 | 274 |File creation time changed (rule: FileCreateTime) | 275 |File creation time changed.
|
281 |
Microsoft-Windows-Sysmon/Operational | 285 |9 | 286 |RawAccessRead detected (rule: RawAccessRead) | 287 |RawAccessRead detected.
|
291 | |
Security | 295 |4656 | 296 |File System/Other Object Access Events | 297 |A handle to an object was requested.
|
304 | |
Security | 308 |4663 | 309 |File System | 310 |An attempt was made to access an object.
|
317 | |
Security | 321 |4658 | 322 |File System | 323 |The handle to an object was closed.
|
327 | |
4 | 330 |Security | 331 |4689 | 332 |Process Termination | 333 |A process has exited.
|
338 |
Microsoft-Windows-Sysmon/Operational | 342 |5 | 343 |Process terminated (rule: ProcessTerminate) | 344 |Process terminated.
|
349 |
# | 359 |File Name | 360 |Process | 361 |Attribute | 362 |
---|---|---|---|
1 | 367 |[File to be Changed] | 368 |BASIC_INFO_CHANGE | 369 |archive | 370 |
[File to be Changed] | 374 |BASIC_INFO_CHANGE+CLOSE | 375 |archive | 376 ||
2 | 379 |[Executable File Name of Tool]-[RANDOM].pf | 380 |FILE_CREATE | 381 |archive+not_indexed | 382 |
[Executable File Name of Tool]-[RANDOM].pf | 386 |DATA_EXTEND+FILE_CREATE | 387 |archive+not_indexed | 388 ||
[Executable File Name of Tool]-[RANDOM].pf | 392 |CLOSE+DATA_EXTEND+FILE_CREATE | 393 |archive+not_indexed | 394 |
# | 404 |Path | 405 |Header Flag | 406 |Validity | 407 |
---|---|---|---|
1 | 412 |[File to be Changed] | 413 |FILE | 414 |ALLOCATED (Although the timestamp will change, other information will remain unchanged.) | 415 |
2 | 418 |[Drive Name]:\Windows\Prefetch\[Executable File Name of Tool]-[RANDOM].pf | 419 |FILE | 420 |ALLOCATED | 421 |
This site summarizes the results of examining logs recorded in Windows upon execution of the 49 tools which are likely to be used by the attacker that has infiltrated a network. The following logs were examined. Note that it was confirmed that traces of tool execution is most likely to be left in event logs. Accordingly, examination of event logs is the main focus here. 17 |
18 |A report that outlines and usage of this research is published below. When using Tool Analysis Result Sheet, we recommend you to check the report.
30 |Detecting Lateral Movement through Tracking Event Logs (Version 2)
31 |The analysis results for each tool are described in a table format. The content described for each item is explained as follows.
34 |Item | 38 |Content | 39 |
---|---|
Tool Overview | 44 |An explanation of the tool and an example of presumed tool use during an attack are described. | 45 |
Tool Operation Overview | 48 |Privileges for using the tool, communication protocol, and related services are described. | 49 |
Information Acquired from Log | 52 |An overview of logs acquired at tool execution with the default settings (standard settings) as well as when an audit policy is set or Sysmon is installed is described. | 53 |
Evidence That Can Be Confirmed when Execution is Successful | 56 |The method to confirm successful execution of the tool. | 57 |
Main Information Recorded at Execution | 60 |Important information that can be used for the investigation of records in the targeted event logs, registry, USN Journal, MFT, and so on. | 61 |
Details | 64 |All logs to be recorded, except ones included in "Details", are described. | 65 |
Remarks | 68 |Any logs that may be additionally recorded and items confirmed during verification are described. | 69 |
Note that a sufficient amount of event logs cannot be acquired with the default Windows settings. In this research, logs that are recorded with the following settings were examined.
75 |For instruction on how to enable the audit policy and install Sysmon, see the report.
82 |Category | 20 |Tool | 21 |Detals | 22 |
---|---|---|
Command Execution | 27 |PsExec | 28 |Executes a command on a remote host. | 29 |
wmic | 32 |Used for Windows system management. | 33 ||
schtasks | 36 |Executes a task at the specified time. | 37 ||
wmiexec.vbs | 40 |Used for Windows system management. | 41 ||
BeginX | 44 |Executes a command from a client to the server. | 45 ||
WinRM | 48 |Steals information from a remote host. | 49 ||
WinRS | 52 |Executes a command on a remote host. | 53 ||
BITS | 56 |Sends and receives files in background. | 57 ||
Password and Hash Dump | 60 |PWDump7 | 61 |Displays a list of password hashes in the host. | 62 |
PWDumpX | 65 |Acquires a password hash from a remote host. | 66 ||
Quarks PwDump | 69 |Acquires the password hashes of domain and local accounts as well as cached passwords. | 70 ||
Mimikatz (Password and Hash Dump lsadump::sam) |
73 | Steals authentication information stored in the OS. | 74 ||
Mimikatz (Password and Hash Dump sekurlsa::logonpasswords) |
77 | Steals authentication information stored in the OS. | 78 ||
Mimikatz (Ticket Acquisition sekurlsa::tickets) |
81 | Acquires tickets for logged-on sessions. | 82 ||
WCE | 85 |Acquires a password hash in the memory of a host. | 86 ||
gsecdump | 89 |SAM/Extracts a password hash from SAM/AD or logon sessions. | 90 ||
lslsass | 93 |Acquires a password hash of active logon sessions from the Isass process. | 94 ||
AceHash | 97 |Acquires the password hash value and logs on to the host. | 98 ||
Find-GPOPasswords.ps1 | 101 |Acquires passwords written in a group policy file. | 102 ||
Get-GPPPassword (PowerSploit) |
105 | Acquires plaintext passwords and other account information written in the group policy. | 106 ||
Invoke-Mimikatz (PowerSploit) |
109 | Loads Mimikatz into memory and starts it up. | 110 ||
Out-Minidump (PowerSploit) |
113 | Dumps a process into memory. | 114 ||
PowerMemory (RWMC Tool) |
117 | Acquires authentication information existing in files and memory. | 118 ||
WebBrowserPassView | 121 |Extracts user names and passwords saved in the web browser. | 122 ||
Malicious Communication Relay | 125 |Htran | 126 |Bypasses communications. | 127 |
Fake wpad | 130 |Acquires and changes communication contents from the client by operating as the wpad server. | 131 ||
Remote Login | 134 |RDP | 135 |Connects to a server on which Remote Desktop Service (RDS) is running. | 136 |
Pass-the-hash Pass-the-ticket |
139 | WCE (Remote Login) | 140 |Executes a command from a remote host using the acquired password hash. | 141 |
Mimikatz (Remote Login) | 144 |Executes a command from a remote host using the acquired password hash. | 145 ||
Escalation to SYSTEM Privilege | 148 |MS14-058 Exploit | 149 |Executes a specified executable file with SYSTEM privileges. | 150 |
MS15-078 Exploit | 153 |Executes a specified executable file with SYSTEM privileges. | 154 ||
SDB UAC Bypass | 157 |Uses Application Compatibility Database (SDB) to execute applications that are controlled by User Account Control (UAC) as a user with administrator privileges. | 158 ||
Capturing Domain Administrator Rights Account | 161 |MS14-068 Exploit | 162 |Changes the privileges of the domain user to domain administrator privileges. | 163 |
Golden Ticket (Mimikatz) |
166 | Forges Kerberos authentication tickets and connects to a remote host. | 167 ||
Silver Ticket (Mimikatz) |
170 | Forges Kerberos authentication tickets and connects to a remote host. | 171 ||
Information Collection | 174 |ntdsutil | 175 |Used to maintain Active Directory databases. | 176 |
vssadmin | 179 |Creates Volume Shadow Copy and extracts NTDS.DIT, registries, and other system files. | 180 ||
csvde | 183 |Outputs account information on the Active Directory in CSV format. | 184 ||
ldifde | 187 |Outputs account information on the Active Directory in LDIF format. | 188 ||
dsquery | 191 |Acquires information, such as users and groups, from the Active Directory. | 192 ||
dcdiag | 195 |Analyzes and examines the status of the Domain Controller. | 196 ||
nltest | 199 |Acquires the Domain Controller used and its IP address. | 200 ||
nmap | 203 |Used for network investigation. | 204 ||
Adding or Deleting Local User and Group | 207 |net user | 208 |Adds a user account in a host or domain. | 209 |
File Sharing | 212 |net use | 213 |Connects to shared folders that are publicly available on the network. | 214 |
Deleting Evidence | 217 |sdelete | 218 |Deletes a file after overwriting it several times. | 219 |
timestomp | 222 |Changes the file timestamp. | 223 ||
klist purge | 226 |Deletes saved Kerberos tickets. | 227 ||
wevtutil | 230 |Deletes Windows event logs. | 231 |