PowerShell for Detection and Analysis
Incident Identification
General Indicators Of Compromise
1. Attack Surface Vulnerability Exists
2. Corroboration From Multiple Intelligence Assets
3. Unusual Ingress/Egress Network Traffic
4. Anomalies In Privileged User Account Activity
5. Geographical Irregularities
6. Log-In Anomalies
7. Volume Increase For Database Reads
8. HTTP Response Size Anomalies
9. Large Numbers Of Requests For The Same File
10. Mismatched Port-Application Traffic
11. Suspicious Registry Or System File Changes
12. DNS Request Anomalies
13. Unexpected Patching Of Systems
14. Mobile Device Profile Changes
15. Data In The Wrong Places
16. Unusual Lateral Movement
17. Velocity Increase For Share / Mount Activity
18. Time Based Anomalies
19. Suspicious Byte Counts
20. Suspicious Domain Controller Activity
21. Subsequent Activity By Attacker Address / GEO
22. HTTP Response Code Success
23. File HashesInternal Threat Indicators
Network Forensic Indicators
Suspicious Domain Indicators
Azure & Office 365 Indicators
Important event logs
Identify Notable Processes
System Processes
User Processes
Accounts and Groups
T1176 Browser Extensions
Query WMI Persistence
Check MS Office Logs for High-Risk File Names
Alternate Data Streams Discovery
Programs Using Microphone
Last updated