KAPE Artifacts Analysis
1. Initial Access
Description: Collect email attachments from cache and temp directories.
Target: Files
Paths:
- '%UserProfile%\AppData\Local\Microsoft\Windows\INetCache\Content.IE5\*.exe'
- '%UserProfile%\AppData\Local\Temp\*.docx'
- '%UserProfile%\Downloads\*.pdf'
- '%UserProfile%\AppData\Local\Microsoft\Windows\Temporary Internet Files\*.exe'Description: Collect recently created executables from common download locations.
Target: Files
Paths:
- '%UserProfile%\Desktop\*.exe'
- '%UserProfile%\Downloads\*.exe'
- '%UserProfile%\Documents\*.exe'2. Execution
3. Persistence
4. Privilege Escalation
5. Defense Evasion
6. Credential Access
7. Discovery
8. Collection
9. Exfiltration
10. Impact
Additional Resources
Last updated