Velociraptor Intrusion Analysis
1. Initial Access
1.1. Phishing: Spearphishing Attachment (T1566.001)
SELECT FullPath, Size, CreationTime FROM FileSystem WHERE FullPath LIKE 'C:\\Users\\%\\AppData\\Local\\Microsoft\\Windows\\INetCache\\IE\\%.exe'SELECT FullPath, CreationTime, Size FROM FileSystem WHERE FullPath LIKE 'C:\\Users\\%\\*.exe' AND CreationTime > now() - 86400SELECT FullPath FROM FileSystem WHERE FullPath LIKE 'C:\\Users\\%\\AppData\\Local\\Microsoft\\Windows\\INetCache\\IE\\%.exe'SELECT FullPath, Size, CreationTime FROM FileSystem WHERE FullPath LIKE 'C:\\Users\\%\\AppData\\Local\\Temp\\%.pdf'SELECT FullPath, CreationTime, Size FROM FileSystem WHERE FullPath LIKE 'C:\\Users\\%\\AppData\\Local\\Temp\\%.docx'2. Execution
2.1. Command and Scripting Interpreter: PowerShell (T1059.001)
SELECT * FROM pslist() WHERE name = 'powershell.exe' OR name = 'pwsh.exe'3. Persistence
3.1. Registry Run Keys / Startup Folder (T1547.001)
4. Privilege Escalation
4.1. Process Injection (T1055)
5. Defence Evasion
5.1. Obfuscated Files or Information (T1027)
6. Credential Access
6.1. Credential Dumping: LSASS Memory (T1003.001)
7. Discovery
7.1. System Information Discovery (T1082)
8. Lateral Movement
8.1. Remote Services: Remote Desktop Protocol (RDP) (T1021.001)
9. Collection
9.1. Data from Local System (T1005)
10. Command and Control
10.1. Command and Control: Web Protocols (T1071.001)
11. Exfiltration
11.1. Exfiltration Over C2 Channel (T1041)
12. Impact
12.1. Inhibit System Recovery: Disable or Modify Tools (T1490)
13. Execution (Continued)
13.1. User Execution: Malicious File (T1204.002)
14. Persistence (Continued)
14.1. Boot or Logon Autostart Execution: Registry Run Keys (T1547.001)
15. Defence Evasion (Continued)
15.1. Process Injection: Process Hollowing (T1055.012)
16. Credential Access (Continued)
16.1. OS Credential Dumping: NTDS (T1003.003)
17. Discovery (Continued)
17.1. File and Directory Discovery (T1083)
18. Lateral Movement (Continued)
18.1. Pass the Hash (T1550.002)
19. Collection (Continued)
19.1. Screen Capture (T1113)
20. Impact (Continued)
20.1. Data Encrypted for Impact (T1486)
Last updated