TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

The Methods Behind a Huntress Managed Antivirus Investigation | Huntress

2023-01-19 · Read original ↗

ATT&CK techniques detected

8 predictions
T1569.002Service Execution
84%
“from the intrusion. nonetheless, chainsaw ’ s hunt mode rips through the windows defender wevtx. here, we ’ re given some more context on the defender alerts we saw in the huntress dashboard. now we can copy / paste the name of the executable and prepare to detonate chainsaw in s…”
T1550.002Pass the Hash
74%
“is the corresponding user name for this sid? - was the executable defender detected, attempting a service install, some kind of beacon or lateral movement relic? tracking down lateral movement now, we need a username and to see if there is any event id 4624 evidence of a machine …”
T1021Remote Services
63%
“is the corresponding user name for this sid? - was the executable defender detected, attempting a service install, some kind of beacon or lateral movement relic? tracking down lateral movement now, we need a username and to see if there is any event id 4624 evidence of a machine …”
T1078Valid Accounts
44%
“is the corresponding user name for this sid? - was the executable defender detected, attempting a service install, some kind of beacon or lateral movement relic? tracking down lateral movement now, we need a username and to see if there is any event id 4624 evidence of a machine …”
T1021Remote Services
43%
“you to conduct security investigations with the same lethality, tenacity and accuracy that huntress strives for. lacking in most people — often — is confidence. we see it again and again, in and out of huntress. personnel have the capability but lack confidence in their execution…”
T1654Log Enumeration
40%
“just showing off for the blog! after receiving an alert like this, our first moves will be to collect some choice default forensic telemetry on a windows machine : - the windows event logs ( wevtxs ) - prefetch and powershell history - nothing ended up being relevant in here, but…”
T1685.001Disable or Modify Windows Event Log
37%
“just showing off for the blog! after receiving an alert like this, our first moves will be to collect some choice default forensic telemetry on a windows machine : - the windows event logs ( wevtxs ) - prefetch and powershell history - nothing ended up being relevant in here, but…”
T1518.001Security Software Discovery
30%
“the methods behind a huntress managed antivirus investigation | huntress at huntress, we love to thread and share our investigative approaches to our interesting findings internally so other teams can see what we ’ re up to and learn a thing or two. in this blog, we ’ ll go on a …”

Summary

In this blog, we’ll go on a short journey of how we dissected a vague Managed Antivirus alert and offer some ideas and methods for security analysts.