KAPE Artifacts Analysis
1. Initial Access
1.1. Phishing: Spearphishing Attachment (T1566.001)
Objective: Identify and collect evidence of malicious email attachments that may have been used to gain initial access. Instruction: Use KAPE to collect email attachments and other potential malicious files stored in temporary internet files, downloads, and user directories.
KAPE Target Query: Phishing_Email_Attachments
Description: Collect email attachments from cache and temp directories.
Target: Files
Paths:
- '%UserProfile%\AppData\Local\Microsoft\Windows\INetCache\Content.IE5\*.exe'
- '%UserProfile%\AppData\Local\Temp\*.docx'
- '%UserProfile%\Downloads\*.pdf'
- '%UserProfile%\AppData\Local\Microsoft\Windows\Temporary Internet Files\*.exe'KAPE Target Query: Recent_Executables
Description: Collect recently created executables from common download locations.
Target: Files
Paths:
- '%UserProfile%\Desktop\*.exe'
- '%UserProfile%\Downloads\*.exe'
- '%UserProfile%\Documents\*.exe'KAPE Target Query: Malicious_Office_Documents
KAPE Target Query: Suspicious_PDF_Files
KAPE Target Query: Internet_Cache_Artifacts
2. Execution
2.1. Command and Scripting Interpreter: PowerShell (T1059.001)
Objective: Detect and collect artifacts related to PowerShell usage, which may indicate the execution of malicious scripts. Instruction: Use KAPE to collect PowerShell logs, history, and scripts to analyze potential malicious activity.
KAPE Target Query: PowerShell_Execution_Logs
KAPE Target Query: PowerShell_History
KAPE Target Query: PowerShell_Scripts
KAPE Target Query: Encoded_PowerShell_Commands
KAPE Target Query: PowerShell_Module_Usage
3. Persistence
3.1. Registry Run Keys / Startup Folder (T1547.001)
Objective: Collect evidence of persistence mechanisms established through Registry run keys and startup folders.
Instruction: Use KAPE to collect registry keys and startup folder items that could indicate persistence mechanisms.
KAPE Target Query: Registry_Run_Keys
KAPE Target Query: Startup_Folder_Items
KAPE Target Query: Winlogon_Persistence
KAPE Target Query: Scheduled_Tasks_Persistence
KAPE Target Query: Userinit_Registry_Keys
4. Privilege Escalation
4.1. Scheduled Task/Job (T1053.005)
Objective: Detect and collect evidence of scheduled tasks used to escalate privileges. Instruction: Use KAPE to collect artifacts related to scheduled tasks that could be used for privilege escalation.
KAPE Target Query: Scheduled_Tasks
KAPE Target Query: At_Job_Artifacts
KAPE Target Query: Task_Scheduler_Logs
KAPE Target Query: User_Created_Scheduled_Tasks
KAPE Target Query: Persistence_via_Scheduled_Tasks
5. Defense Evasion
5.1. Obfuscated Files or Information (T1027)
Objective: Detect and collect evidence of obfuscated files and scripts used to evade detection. Instruction: Use KAPE to collect obfuscated or encoded files that may indicate an attempt to evade detection.
KAPE Target Query: Encoded_PowerShell_Scripts
KAPE Target Query: Encoded_Batch_Files
KAPE Target Query: XOR_Encrypted_Files
KAPE Target Query: Obfuscated_Scripts
KAPE Target Query: Encrypted_Payloads
6. Credential Access
6.1. OS Credential Dumping: LSASS Memory (T1003.001)
Objective: Detect and collect artifacts related to attempts to dump credentials from LSASS. Instruction: Use KAPE to collect evidence of credential dumping activities involving LSASS.
KAPE Target Query: LSASS_Process_Dump
KAPE Target Query: Security_Event_Logs
KAPE Target Query: LSASS_Handles
KAPE Target Query: Credential_Dumping_Tools
KAPE Target Query: LSASS_Memory_Analysis
7. Discovery
7.1. System Information Discovery (T1082)
Objective: Detect and collect artifacts related to the gathering of system information. Instruction: Use KAPE to collect evidence of system information discovery activities, such as system enumeration commands.
KAPE Target Query: System_Info_Commands
KAPE Target Query: WMI_Query_Logs
KAPE Target Query: Registry_System_Information
KAPE Target Query: System_Processes
KAPE Target Query: Network_Configuration
8. Collection
8.1. Data from Local System (T1005)
Objective: Detect and collect artifacts related to data collection from the local system. -Instruction: Use KAPE to collect sensitive files and directories that may have been targeted by an attacker.
KAPE Target Query: Sensitive_Files
KAPE Target Query: Recently_Accessed_Files
KAPE Target Query: USB_Device_Logs
KAPE Target Query: Clipboard_Data
KAPE Target Query: Print_Spooler_Logs
9. Exfiltration
9.1. Exfiltration Over C2 Channel (T1041)
Objective: Detect and collect artifacts related to data exfiltration over command-and-control (C2) channels. Instruction: Use KAPE to collect evidence of data exfiltration over network connections.
KAPE Target Query: Network_Traffic_Logs
KAPE Target Query: DNS_Logs
KAPE Target Query: HTTP_Request_Logs
KAPE Target Query: SMB_Traffic_Logs
KAPE Target Query: FTP_Traffic_Logs
10. Impact
10.1. Data Destruction (T1485)
Objective: Detect and collect evidence of data destruction activities, such as file deletion or wiping. Instruction: Use KAPE to collect logs and artifacts related to data destruction attempts. KAPE Target Query: File_Deletion_Logs
KAPE Target Query: Volume_Shadow_Copy_Logs
KAPE Target Query: Disk_Wipe_Tools
KAPE Target Query: Audit_Policy_Logs
KAPE Target Query: Recycle_Bin_Files
Additional Resources
Eric Zimmerman's Tools: https://ericzimmerman.github.io/#!index.md A comprehensive set of DFIR tools accompanied by excellent user guides.
Last updated