KAPE Artifacts Analysis

1. Initial Access

1.1. Phishing: Spearphishing Attachment (T1566.001)

Objective: Identify and collect evidence of malicious email attachments that may have been used to gain initial access. Instruction: Use KAPE to collect email attachments and other potential malicious files stored in temporary internet files, downloads, and user directories.

KAPE Target Query: Phishing_Email_Attachments

Description: Collect email attachments from cache and temp directories. 
Target: Files 
Paths:   
- '%UserProfile%\AppData\Local\Microsoft\Windows\INetCache\Content.IE5\*.exe'   
- '%UserProfile%\AppData\Local\Temp\*.docx'   
- '%UserProfile%\Downloads\*.pdf'   
- '%UserProfile%\AppData\Local\Microsoft\Windows\Temporary Internet Files\*.exe'

KAPE Target Query: Recent_Executables

Description: Collect recently created executables from common download locations. 
Target: Files 
Paths:   
- '%UserProfile%\Desktop\*.exe'   
- '%UserProfile%\Downloads\*.exe'   
- '%UserProfile%\Documents\*.exe'

KAPE Target Query: Malicious_Office_Documents

KAPE Target Query: Suspicious_PDF_Files

KAPE Target Query: Internet_Cache_Artifacts

2. Execution

2.1. Command and Scripting Interpreter: PowerShell (T1059.001)

Objective: Detect and collect artifacts related to PowerShell usage, which may indicate the execution of malicious scripts. Instruction: Use KAPE to collect PowerShell logs, history, and scripts to analyze potential malicious activity.

KAPE Target Query: PowerShell_Execution_Logs

KAPE Target Query: PowerShell_History

KAPE Target Query: PowerShell_Scripts

KAPE Target Query: Encoded_PowerShell_Commands

KAPE Target Query: PowerShell_Module_Usage

3. Persistence

3.1. Registry Run Keys / Startup Folder (T1547.001)

Objective: Collect evidence of persistence mechanisms established through Registry run keys and startup folders.

Instruction: Use KAPE to collect registry keys and startup folder items that could indicate persistence mechanisms.

KAPE Target Query: Registry_Run_Keys

KAPE Target Query: Startup_Folder_Items

KAPE Target Query: Winlogon_Persistence

KAPE Target Query: Scheduled_Tasks_Persistence

KAPE Target Query: Userinit_Registry_Keys

4. Privilege Escalation

4.1. Scheduled Task/Job (T1053.005)

Objective: Detect and collect evidence of scheduled tasks used to escalate privileges. Instruction: Use KAPE to collect artifacts related to scheduled tasks that could be used for privilege escalation.

KAPE Target Query: Scheduled_Tasks

KAPE Target Query: At_Job_Artifacts

KAPE Target Query: Task_Scheduler_Logs

KAPE Target Query: User_Created_Scheduled_Tasks

KAPE Target Query: Persistence_via_Scheduled_Tasks

5. Defense Evasion

5.1. Obfuscated Files or Information (T1027)

Objective: Detect and collect evidence of obfuscated files and scripts used to evade detection. Instruction: Use KAPE to collect obfuscated or encoded files that may indicate an attempt to evade detection.

KAPE Target Query: Encoded_PowerShell_Scripts

KAPE Target Query: Encoded_Batch_Files

KAPE Target Query: XOR_Encrypted_Files

KAPE Target Query: Obfuscated_Scripts

KAPE Target Query: Encrypted_Payloads

6. Credential Access

6.1. OS Credential Dumping: LSASS Memory (T1003.001)

Objective: Detect and collect artifacts related to attempts to dump credentials from LSASS. Instruction: Use KAPE to collect evidence of credential dumping activities involving LSASS.

KAPE Target Query: LSASS_Process_Dump

KAPE Target Query: Security_Event_Logs

KAPE Target Query: LSASS_Handles

KAPE Target Query: Credential_Dumping_Tools

KAPE Target Query: LSASS_Memory_Analysis

7. Discovery

7.1. System Information Discovery (T1082)

Objective: Detect and collect artifacts related to the gathering of system information. Instruction: Use KAPE to collect evidence of system information discovery activities, such as system enumeration commands.

KAPE Target Query: System_Info_Commands

KAPE Target Query: WMI_Query_Logs

KAPE Target Query: Registry_System_Information

KAPE Target Query: System_Processes

KAPE Target Query: Network_Configuration

8. Collection

8.1. Data from Local System (T1005)

Objective: Detect and collect artifacts related to data collection from the local system. -Instruction: Use KAPE to collect sensitive files and directories that may have been targeted by an attacker.

KAPE Target Query: Sensitive_Files

KAPE Target Query: Recently_Accessed_Files

KAPE Target Query: USB_Device_Logs

KAPE Target Query: Clipboard_Data

KAPE Target Query: Print_Spooler_Logs

9. Exfiltration

9.1. Exfiltration Over C2 Channel (T1041)

Objective: Detect and collect artifacts related to data exfiltration over command-and-control (C2) channels. Instruction: Use KAPE to collect evidence of data exfiltration over network connections.

KAPE Target Query: Network_Traffic_Logs

KAPE Target Query: DNS_Logs

KAPE Target Query: HTTP_Request_Logs

KAPE Target Query: SMB_Traffic_Logs

KAPE Target Query: FTP_Traffic_Logs

10. Impact

10.1. Data Destruction (T1485)

Objective: Detect and collect evidence of data destruction activities, such as file deletion or wiping. Instruction: Use KAPE to collect logs and artifacts related to data destruction attempts. KAPE Target Query: File_Deletion_Logs

KAPE Target Query: Volume_Shadow_Copy_Logs

KAPE Target Query: Disk_Wipe_Tools

KAPE Target Query: Audit_Policy_Logs

KAPE Target Query: Recycle_Bin_Files

Additional Resources

Eric Zimmerman's Tools: https://ericzimmerman.github.io/#!index.md A comprehensive set of DFIR tools accompanied by excellent user guides.

Last updated