Original sending to Mockbin (use a new mockbin)
[byte[]]$NTLMType2 =
@(
0x4e,0x54,0x4c,0x4d,
0x53,0x53,0x50,0x00,
0x02,0x00,0x00,0x00,
0x00,0x00,0x00,0x00,
0x00,0x28,0x00,0x00,
Original sending to Mockbin (use a new mockbin)
[byte[]]$NTLMType2 =
@(
0x4e,0x54,0x4c,0x4d,
0x53,0x53,0x50,0x00,
0x02,0x00,0x00,0x00,
0x00,0x00,0x00,0x00,
0x00,0x28,0x00,0x00,
- name: Modify Internet Zone Protocol Defaults in Current User Registry - cmd | |
description: | | |
This test simulates an adversary modifying the Internet Zone Protocol Defaults in the registry of the currently logged-in user using the reg.exe utility via the command prompt. Such modifications can be indicative of an adversary trying to weaken browser security settings. Upon execution, if successful, the message "The operation completed successfully." will be displayed. | |
To verify the effects of the test: | |
1. Open the Registry Editor (regedit.exe). | |
2. Navigate to "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProtocolDefaults". | |
3. Check for the presence of the "http" and "https" DWORD values set to `0`. | |
Or run: | |
```batch |
Inventory Protocol Handlers
Splunk:
[powershell://LOLProtocolHandlers]
script = Get-Item Registry::HKEY_CLASSES_ROOT\*| Select-Object "Property", "PSChildName" | ForEach-Object { $_ | ConvertTo-Json; Write-Host "" }
#schedule = 0 0 * * *
schedule = */1 * * * *
sourcetype = PwSh:LOLProtocolHandlers
index=win
#include <windows.h> | |
#include <iostream> | |
#include <dbghelp.h> | |
#include <TlHelp32.h> | |
#define IOCTL_BASE 0x80012008 | |
constexpr DWORD IREC_IOCTL(DWORD x) { return IOCTL_BASE + x; } | |
#define IOTCL_IREC_OPEN_PROCESS IREC_IOCTL( 0x20 ) | |
static const char* DeviceName = R"(\\.\IREC)"; |
My script, PowerDropping, currently accomplishes the following parts of the PowerDrop behavior:
Rapid7 incident response consultants have identified a method to determine what was exfiltrated from compromised MOVEit customer environments. MOVEit writes its own Windows EVTX file, which is located at C:\Windows\System32\winevt\Logs\MOVEit.evtx. The MOVEit event logs contain a single event ID (Event ID 0) that provides a plethora of information, including the following:
function Scan-LOLDrivers { | |
param( | |
[Parameter(Mandatory=$true)] | |
[string]$path | |
) | |
Add-Type -TypeDefinition @" | |
using System; | |
using System.Security.Cryptography; | |
using System.Security.Cryptography.X509Certificates; |
# Define the typical path of the Snake Queue File | |
$filePath = "$env:windir\registration\" | |
# Create the folder if it doesn't exist | |
$null = New-Item -Path $filePath -ItemType Directory -Force | |
# Generate a random GUID | |
$guid = [guid]::NewGuid().ToString() | |
# Define the file name using the generated GUID and the regex pattern |
To collect Windows-TerminalServices-RemoteConnectionManager/Operational, add the following to a inputs.conf
We've found that multiline data parses better natively without having to create a props/transforms.
[WinEventLog://Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational]
disabled = False
renderXml = False
index = win