🔏
RootGuard
HomeSOC OperationsIncident ResponseWindows ForensicsLinux ForensicsKQL Investigations
  • Welcome
    • RootGuard
      • Who Am I?
        • Professional Profile
  • Resources Hub
    • Blogs
      • Articles
        • Safeguarding SMEs: The Strategic Importance of a Security Operations Center (SOC)
      • Posts
        • Roadmap to Becoming a Cybersecurity Specialist
        • Starting a Career in Cybersecurity
        • A Guide to Landing Your First Cybersecurity Analyst Role
        • Moving from Intermediate to Expert Incident Responder
  • SOC Operations
    • Introduction
      • Development Resources
        • SOC Analysts Roadmap
        • Becoming A SOC Analyst
        • SOC Analysts Prep Interview Questions
    • Essential Skills
      • Critical Windows EventIDs to Monitor
    • Junior Analyst Skills
      • Splunk Use Cases
      • KQL Use Cases
        • Reconnaissance (TA0043)
        • Initial Access (TA0001)
        • Execution (TA0002)
        • Persistence (TA0003)
        • Privilege Escalation (TA0004)
        • Defence Evasion (TA0005)
        • Credential Access (TA0006)
        • Discovery (TA0007)
        • Lateral Movement (TA0008)
        • Collection (TA0009)
        • Command and Control (TA0011)
        • Exfiltration (TA0010)
        • Impact (TA0040)
      • Investigating Common Attacks
        • Domain Dominance Attacks - Detection & Analysis
        • Investigating a Suspected AD FS Distributed Key Management (DKM) Attack
        • Authentication From Suspicious DeviceName
        • Identifying Interactive or RemoteInteractive Session From Service Account
        • Identifying Split or Part Archive File Transfers
        • Detect Potential Cleartext Credentials in Command Line
        • Detecting Command Line Interpreters Launched via Scheduled Tasks
        • Detecting Files Containing Potentially Sensitive Data
        • Detecting DeviceNetworkEvents From Windows Processes and Domains by TLD
        • Detecting Silent cmd.exe Execution With Redirected STDERR & STDOUT
        • Detecting Low Prevalence DLL Loaded From Process In User Downloads Directory
        • Detecting Virtual Drive Mounted From Archive
        • Identify Execution of Script From User's Downloads Folder
        • Identify Potential RDP Tunneled Sessions
        • Identify Instances of PowerShell Invoke-WebRequest, IWR or Net.WebClient
        • Identify Processes Launched by PowerShell Remoting (WSMProvHost.exe)
        • Detect DeviceNetworkEvents for LOLBAS with Download or Upload Functions
        • Detect Execution of PSEXESVC via Remote Systems
        • Identify Suspicious String in Service Creation ImagePath
        • Identify File with Double Extensions
        • Detect Potential Cleartext Credentials in Commandline
        • Detect When Large Number of Files Downloaded From OneDrive or SharePoint
        • Identify and Investigate Phishing Attacks with KQL
      • PowerShell for SecOps
        • Powershell Remoting
        • Reconnaissance Discovery
        • Initial Access Discovery
        • Execution Discovery
        • Persistence Discovery
        • Privilege Escalation Discovery
        • Defence Evasion Discovery
        • Credential Access Discovery
        • Discovery
        • Lateral Movement Discovery
        • Collection Discovery
        • Command & Control (C2) Discovery
        • Exfiltration Discovery
        • Impact Discovery
      • Packet Analysis (pcap)
        • Tcpdump
        • Tcpdump (Intermediate)
        • Tshark
        • Ngrep
      • Investigating Suspicious Emails Using KQL
    • Intermediate and Advanced Skills
      • Investigate Using MITRE ATT&CK Methodology
        • Reconnaissance (TA0043) Techniques
        • Resource Development (TA0042) Techniques
        • Initial Access (TA0001) Techniques
        • Command Execution (TA0002) Techniques
        • Persistence (TA0003) Techniques
        • Privilege Escalation (TA0004) Techniques
        • Defence Evasion (TA0005) Techniques
        • Credential Access (TA0006) Techniques
        • Discovery (TA0007) Techniques
        • Lateral Movement (TA0008) Techniques
        • Collection (TA0009) Techniques
        • Command and Control (C2) (TA0011) Techniques
        • Exfiltration (TA0010) Techniques
        • Impact (TA0040) Techniques
    • Vulnerability Management
    • Malware Analysis
  • DFIR
    • Incident Response
      • Incident Triage
        • Triage Types and Processes
        • PowerShell for Detection and Analysis
          • Malware or Compromise Investigation
          • Lateral Movement Discovery
        • Registry Analysis
        • Sysinternals Intrusion Analysis
        • PowerShell Intrusion Analysis
        • Velociraptor Intrusion Analysis
        • Zimmerman Tools Intrusion Analysis
      • KAPE Artifacts Analysis
      • Velociraptor Artifacts Analysis
      • Using The Unified Kill Chain Model to Analyse Individual Cyber Attacks
        • Phase 1 - Gaining an Initial Foothold
          • Gaining Access to the Network
          • Establishing a Foothold
          • Network Discovery
      • Response Strategies
        • Privilege Escalation Assessment
        • Command and Control Assessment
        • Command Execution Assessment
        • Defence Evasion Assessment
        • Detection Assessment
        • Discovery Assessment
        • Exfiltration Assessment
        • Initial Access Assessment
        • Initial Impact Assessment Techniques
        • Lateral Movement Assessment
        • Persistence Assessment
    • Windows Forensics
      • Evidence of Execution
      • Window Artifact Analysis
        • Account Usage
        • User Activity Tracking (Event Logs)
        • Program Execution
        • File and Folder Opening
        • File Download
        • Browser Usage
        • Deleted File or File Knowledge
        • External Device & USB Usage
    • Linux Forensics
      • Linux Commandline Basics
      • Host Compromise Assessment
    • KQL for Defender & Sentinel
      • MDO (Office)
      • MDI (Identity)
      • MDE (Endpoint)
    • Memory Forensics
      • Memory Forensics (Volatility 3)
    • Playbooks
      • First Responder DFIR Playbook
        • Device Isolation
        • Evidence Collection
          • Acquire Triage Image Using KAPE
          • Acquire Triage Data Using Velociraptor
          • Acquire Triage Data Using Powershell
          • Acquire Triage Memory Image
          • Acquire Image Using FTK
          • AXIOM Cyber Data Collection
        • Windows Forensic Artefacts
          • Application Execution
          • File & Folder Knowledge
          • External Device Usage
          • Network Activity
          • Windows Event Logs
        • Initial Analysis
          • Memory Analysis (Vol 3)
          • Axiom Cyber Examiner
  • Detection Engineering
    • AD Attack Detections & Mitigations
      • Kerberoasting
      • Authentication Server Response (AS-REP) Roasting
      • Password Spraying
      • MachineAccountQuota Compromise
      • Unconstrained Delegation
      • Password in Group Policy Preferences (GPP) Compromise
      • Active Directory Certificate Services (AD CS) Compromise
      • Golden Certificate
      • DCSync
      • Dumping ntds.dit
      • Golden Ticket
      • Silver Ticket
      • Golden Security Assertion Markup Language (SAML)
      • Microsoft Entra Connect Compromise
      • One-way Domain Trust Bypass
      • Security Identifier (SID) History Compromise
      • Skeleton Key
      • Active Directory Security Controls
      • Active Directory Events for Detecting Compromise
    • Attack Triage Playbooks (KQL Triage)
      • Windows Malware Detection Playbook
      • Linux Host Intrusion Detection Playbook (CLI)
      • Linux Intrusion Detection Playbook
      • Large-Scale Compromise Detection Playbook
      • Ransomware Detection Playbook
      • Phishing Email Compromise Detection Playbook
      • Scam Detection Playbook
      • Customer Phishing Detection Playbook
      • Insider Abuse Detection Playbook
      • Information Leakage Detection Playbook
      • Social Engineering Detection Playbook
      • Malicious Network Behaviour Detection Playbook
      • Windows Intrusion Detection Playbook
      • Vulnerability Detection Playbook
      • Business Email Compromise Detection Playbook
    • Process Execution (KQL Triage)
    • Threat Hunting
      • Hunting Ransomware Indicators
      • Hunting With KQL
        • Detecting Malware Infection (MITRE ATT&CK: T1566, T1059)
        • Discovery Activities (MITRE ATT&CK: T1016, T1083, T1046)
        • Credential Theft (MITRE ATT&CK: T1003, T1078)
        • Lateral Movement (MITRE ATT&CK: T1076, T1021)
        • Data Theft (MITRE ATT&CK: T1041, T1071)
        • Detecting CommandLine Executions (MITRE ATT&CK: T1059)
        • Windows Security Logs (Identity and Logon Activities)
      • Hunting With Splunk
Powered by GitBook
On this page
  • 2. Execution
  • 3. Persistence
  • 4. Privilege Escalation
  • 5. Defence Evasion
  • 6. Credential Access
  • 7. Discovery
  • 8. Collection
  • 9. Exfiltration
Edit on GitHub
  1. DFIR
  2. Incident Response
  3. Incident Triage

Zimmerman Tools Intrusion Analysis

1. Initial Access

1.1. Phishing: Spearphishing Attachment (T1566.001)

Objective: Detect and collect evidence of malicious email attachments that might have been used to gain initial access.

Tool: MFTECmd (Master File Table Parser)

Instruction: Parse the Master File Table (MFT) to identify recently accessed or created files that may include malicious email attachments. Command:

MFTECmd.exe -d C:\ -o C:\Output\ -csv C:\Output\MFTECmd_Output.csv

Analysis: Review the output for files with extensions like .exe, .docx, or .pdf in directories such as Downloads, Temp, or INetCache.

Tool: RBCmd (Recycle Bin Command Line)

Instruction: Check the Recycle Bin for recently deleted files that could have been malicious attachments. Command:

RBCmd.exe -d C:\$Recycle.Bin\ -csv C:\Output\RBCmd_Output.csv

Analysis: Look for files with suspicious names or extensions in the output CSV.

Tool: LECmd (LNK File Explorer Command Line)

Instruction: Parse LNK files to identify recently accessed files, including those accessed via phishing attachments. Command:

LECmd.exe -d C:\Users\ -csv C:\Output\LECmd_Output.csv

Analysis: Look for LNK files pointing to unusual or suspicious file paths, particularly in the Downloads and Documents directories.

Tool: JLECmd (Jump List Explorer Command Line)

Instruction: Analyze Jump Lists to determine recently accessed files or programs that could be related to phishing. Command:

JLECmd.exe -d C:\Users\ -csv C:\Output\JLECmd_Output.csv

Analysis: Review the Jump Lists for references to potentially malicious documents or executables.

Tool: EvtxECmd (Windows Event Log Parser)

Instruction: Parse Windows Event Logs to detect file execution events related to email attachments. Command:

EvtxECmd.exe -f C:\Windows\System32\winevt\Logs\Security.evtx -csv C:\Output\Security_Events.csv`

Analysis: Focus on Event IDs 4688 (Process Creation) and 4656 (Handle Operation) to detect the execution of suspicious files.

2. Execution

2.1. Command and Scripting Interpreter: PowerShell (T1059.001)

Objective: Detect and analyze PowerShell usage, which may indicate the execution of malicious scripts.

Tool: EvtxECmd (Windows Event Log Parser)

Instruction: Parse Windows Event Logs for PowerShell activity to identify potentially malicious scripts. Command:

EvtxECmd.exe -f C:\Windows\System32\winevt\Logs\Microsoft-Windows-PowerShell%4Operational.evtx -csv C:\Output\PowerShell_Logs.csv

Analysis: Review Event IDs 4103 (Script Block Logging), 4104 (Script Block Logging – Detailed), and 4105 (Execution Events) for signs of malicious activity.

Tool: Registry Explorer

Instruction: Manually explore PowerShell-related registry keys for command history or changes in execution policies. - Path: HKEY_CURRENT_USER\Software\Microsoft\PowerShell\ - Analysis: Check ConsoleHost and ExecutionPolicy subkeys for suspicious entries or policies that deviate from the organization's standards.

Tool: PECmd (Prefetch Explorer Command Line)

Instruction: Analyze Prefetch files to identify evidence of executed PowerShell scripts. Command:

PECmd.exe -d C:\Windows\Prefetch\ -csv C:\Output\Prefetch_Output.csv

Analysis: Review the Prefetch entries for PowerShell executables and scripts that may indicate suspicious activity.

Tool: AppCompatCacheParser

Instruction: Examine the Application Compatibility Cache to find evidence of executed PowerShell scripts. Command:

AppCompatCacheParser.exe -d C:\Windows\System32\config\SYSTEM -csv C:\Output\AppCompatCache_Output.csv

Analysis: Look for PowerShell-related entries that suggest recent script execution.

Tool: RECmd (Registry Explorer Command Line)

Instruction: Search the registry for persistence mechanisms involving PowerShell, such as scripts set to run at startup. Command:

RECmd.exe -r C:\Windows\System32\config\SOFTWARE -b C:\Output\ -csv C:\Output\PowerShell_Persistence.csv

Analysis: Focus on Run and RunOnce registry keys for references to PowerShell scripts or commands.

3. Persistence

3.1. Registry Run Keys / Startup Folder (T1547.001)

Objective: Detect and collect evidence of persistence mechanisms established through registry run keys and startup folders.

Tool: RECmd (Registry Explorer Command Line)

Instruction: Scan the registry for run keys that might be used for persistence. Command:

RECmd.exe -r C:\Windows\System32\config\SOFTWARE -b C:\Output\ -csv C:\Output\Registry_RunKeys.csv

Analysis: Look for suspicious entries in HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run and RunOnce.

Tool: PECmd (Prefetch Explorer Command Line)

Instruction: Analyze Prefetch files to identify programs that persist through system startup. Command:

PECmd.exe -d C:\Windows\Prefetch\ -csv C:\Output\Prefetch_Output.csv

Analysis: Look for executables associated with persistence, particularly those starting automatically on boot.

Tool: JLECmd (Jump List Explorer Command Line)

Instruction: Investigate Jump Lists for references to programs or scripts used for persistence. Command:

JLECmd.exe -d C:\Users\ -csv C:\Output\JumpLists_Persistence.csv

Analysis: Focus on Jump Lists pointing to unusual executables or scripts that could be used for persistence.

Tool: LECmd (LNK File Explorer Command Line)

Instruction: Examine LNK files for references to executables that might have been set to run at startup. Command:

LECmd.exe -d C:\Users\ -csv C:\Output\LNK_Persistence.csv

Analysis: Analyze LNK files that point to suspicious executables or scripts potentially set up for persistence.

Tool: Registry Explorer

Instruction: Use Registry Explorer to manually inspect the Run keys for persistence mechanisms. Path:

 HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

Analysis: Look for any entries pointing to unusual executables or scripts, especially those stored in non-standard directories.

4. Privilege Escalation

4.1. Scheduled Task/Job (T1053.005)

Objective: Detect and analyze scheduled tasks that may have been created to escalate privileges.

Tool: Scheduled Task Parser (STS)

Instruction: Parse and analyze scheduled tasks on the system to identify those used for privilege escalation. Command:

STS.exe -d C:\Windows\System32\Tasks\ -csv C:\Output\Scheduled_Tasks.csv

Analysis: Review the output for scheduled tasks that are set to run with elevated privileges or under unusual accounts.

Tool: EvtxECmd (Windows Event Log Parser)

Instruction: Parse Event Logs related to the creation and execution of scheduled tasks. Command:

EvtxECmd.exe -f C:\Windows\System32\winevt\Logs\Microsoft-Windows-TaskScheduler%4Operational.evtx -csv C:\Output\Scheduled_Tasks_Events.csv

Analysis: Look for Event IDs 106 (Task Created) and 200 (Task Action Started) for signs of suspicious task creation.

Tool: RECmd (Registry Explorer Command Line)

Instruction: Search the registry for scheduled tasks that may be used for privilege escalation. Command:

RECmd.exe -r C:\Windows\System32\config\SOFTWARE -b C:\Output\ -csv C:\Output\Scheduled_Task_Registry.csv

Analysis: Focus on registry entries related to tasks scheduled to run with high privileges.

Tool: Registry Explorer

Instruction: Manually inspect registry keys related to scheduled tasks. Path: `

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\

Analysis: Look for any tasks with elevated privileges or unusual triggers.

Tool: MFTECmd (Master File Table Parser)

Instruction: Parse the MFT for evidence of scheduled task files that may have been deleted or modified. Command:

MFTECmd.exe -d C:\ -o C:\Output\Scheduled_Task_MFT.csv

Analysis: Look for traces of deleted or altered scheduled tasks that may have been used for privilege escalation.

5. Defence Evasion

5.1. Obfuscated Files or Information (T1027)

Objective: Detect and analyse obfuscated files and scripts used to evade detection.

Tool: RECmd (Registry Explorer Command Line)

Instruction: Search the registry for encoded or obfuscated scripts and commands that may indicate defence evasion. Command:

RECmd.exe -r C:\Windows\System32\config\SOFTWARE -b C:\Output\ -csv C:\Output\Obfuscated_Registry.csv

Analysis: Look for obfuscated entries in PowerShell and WScript registry keys.

Tool: LECmd (LNK File Explorer Command Line)

Instruction: Analyze LNK files for references to obfuscated scripts or files that may have been used to evade detection. Command:

LECmd.exe -d C:\Users\ -csv C:\Output\Obfuscated_LNK.csv

Analysis: Look for LNK files pointing to obfuscated or encoded scripts.

Tool: JLECmd (Jump List Explorer Command Line)

Instruction: Analyze Jump Lists for references to obfuscated scripts or files that may have been executed. Command:

JLECmd.exe -d C:\Users\ -csv C:\Output\Obfuscated_JumpLists.csv

Analysis: Review Jump Lists for evidence of encoded or obfuscated scripts being executed.

Tool: EvtxECmd (Windows Event Log Parser)

Instruction: Parse Event Logs to identify the execution of obfuscated scripts or commands. Command:

EvtxECmd.exe -f C:\Windows\System32\winevt\Logs\Microsoft-Windows-PowerShell%4Operational.evtx -csv C:\Output\Obfuscated_Scripts.csv

Analysis: Look for Event IDs indicating the execution of encoded or obfuscated scripts, especially under PowerShell.

Tool: MFTECmd (Master File Table Parser)

Instruction: Parse the MFT to identify files that have been obfuscated or encoded as part of defense evasion tactics. Command:

MFTECmd.exe -d C:\ -o C:\Output\Obfuscated_Files_MFT.csv

Analysis: Look for encoded or obfuscated files that may have been used to hide malicious activity.

6. Credential Access

6.1. OS Credential Dumping: LSASS Memory (T1003.001)

Objective: Detect and analyze attempts to dump credentials from the LSASS process.

Tool: EvtxECmd (Windows Event Log Parser)

Instruction: Parse Security Event Logs for evidence of credential dumping attempts. Command:

EvtxECmd.exe -f C:\Windows\System32\winevt\Logs\Security.evtx -csv C:\Output\Security_Events.csv

Analysis: Focus on Event IDs 4624 (Successful Logon), 4625 (Failed Logon), and 4656 (Handle Opened) for signs of credential dumping.

Tool: RBCmd (Recycle Bin Command Line)

Instruction: Check the Recycle Bin for deleted tools used for credential dumping, such as Mimikatz. Command:

RBCmd.exe -d C:\$Recycle.Bin\ -csv C:\Output\RBCmd_Output.csv

Analysis: Look for deleted files related to known credential dumping tools.

Tool: PECmd (Prefetch Explorer Command Line)

Instruction: Analyze Prefetch files for evidence of credential dumping tools being executed. Command:

PECmd.exe -d C:\Windows\Prefetch\ -csv C:\Output\Prefetch_Output.csv

Analysis: Look for entries related to known credential dumping tools like mimikatz.exe.

Tool: MFTECmd (Master File Table Parser

Instruction: Parse the MFT to identify files related to credential dumping tools being created or executed. Command:

MFTECmd.exe -d C:\ -o C:\Output\MFTECmd_Credential_Dumping.csv

Analysis: Look for entries related to known credential dumping tools in the MFT.

Tool: RECmd (Registry Explorer Command Line)

Instruction: Search the registry for references to credential dumping tools or activity. Command:

RECmd.exe -r C:\Windows\System32\config\SYSTEM -b C:\Output\ -csv C:\Output\Registry_Credential_Dumping.csv

Analysis: Check for suspicious entries in Run keys or other autorun locations referencing credential dumping tools.

7. Discovery

7.1. System Information Discovery (T1082)

Objective: Detect and collect evidence of system information discovery commands executed by an attacker.

Tool: EvtxECmd (Windows Event Log Parser)

Instruction: Parse Event Logs for system information discovery activities. Command:

EvtxECmd.exe -f C:\Windows\System32\winevt\Logs\Microsoft-Windows-Security-Auditing.evtx -csv C:\Output\System_Info_Logs.csv

Analysis: Look for Event IDs indicating the execution of commands like systeminfo, ipconfig, and hostname.

Tool: Registry Explorer

Instruction: Manually check the registry for evidence of executed system information discovery commands. Path:

HKEY_CURRENT_USER\Software\Microsoft\Command Processor\AutoRun

Analysis: Look for any command execution history indicating system information discovery.

Tool: PECmd (Prefetch Explorer Command Line)

Instruction: Analyze Prefetch files for evidence of system information discovery commands being executed. Command:

PECmd.exe -d C:\Windows\Prefetch\ -csv C:\Output\Prefetch_System_Info.csv

Analysis: Look for Prefetch entries related to cmd.exe, systeminfo.exe, ipconfig.exe, and other discovery tools.

Tool: MFTECmd (Master File Table Parser)

Instruction: Parse the MFT to identify files related to system information discovery tools being created or executed. Command:

MFTECmd.exe -d C:\ -o C:\Output\System_Info_MFT.csv

Analysis: Look for entries related to system discovery commands in directories like System32.

Tool: JLECmd (Jump List Explorer Command Line)

Instruction: Analyze Jump Lists for evidence of executed system discovery commands. Command:

JLECmd.exe -d C:\Users\ -csv C:\Output\JumpLists_System_Info.csv

Analysis: Review the output for Jump List entries related to system information discovery tools or commands.

8. Collection

8.1. Data from Local System (T1005)

Objective: Detect and collect artefacts related to data collection from the local system.

Tool: MFTECmd (Master File Table Parser)

Instruction: Parse the MFT for evidence of files being accessed or copied for data exfiltration. Command:

MFTECmd.exe -d C:\ -o C:\Output\Data_Collection_MFT.csv

Analysis: Look for files accessed or copied in user directories like Documents and Downloads.

Tool: EvtxECmd (Windows Event Log Parser)

Instruction: Parse Security Event Logs for evidence of file access and copying. Command:

EvtxECmd.exe -f C:\Windows\System32\winevt\Logs\Security.evtx -csv C:\Output\File_Access_Logs.csv

Analysis: Focus on Event IDs such as 4663 (File Accessed) to detect data collection activities.

Tool: RECmd (Registry Explorer Command Line)

Instruction: Search for registry keys related to file access or data collection tools. Command:

RECmd.exe -r C:\Windows\System32\config\SYSTEM -b C:\Output\ -csv C:\Output\Data_Collection_Registry.csv

Analysis: Look for registry entries referencing known data collection tools or scripts.

Tool: JLECmd (Jump List Explorer Command Line)

Instruction: Analyze Jump Lists for evidence of recently accessed files that may have been collected for exfiltration. Command:

JLECmd.exe -d C:\Users\ -csv C:\Output\JumpLists_Data_Collection.csv

Analysis: Review Jump Lists for references to sensitive files in user directories.

Tool: LECmd (LNK File Explorer Command Line)

Instruction: Examine LNK files for shortcuts to files that may have been collected by an attacker. Command:

LECmd.exe -d C:\Users\ -csv C:\Output\LNK_Data_Collection.csv

Analysis: Focus on LNK files pointing to sensitive or recently accessed files.

9. Exfiltration

9.1. Exfiltration Over C2 Channel (T1041)

Objective: Detect and collect artefacts related to data exfiltration over command-and-control (C2) channels.

Tool: EvtxECmd (Windows Event Log Parser)

Instruction: Parse Event Logs for evidence of data exfiltration over network connections. Command:

EvtxECmd.exe -f C:\Windows\System32\winevt\Logs\Microsoft-Windows-Sysmon%4Operational.evtx -csv C:\Output\Sysmon_Network_Logs.csv

Analysis: Look for Event IDs related to network connections, focusing on unusual outbound traffic that may indicate data exfiltration.

Tool: PECmd (Prefetch Explorer Command Line)

Instruction: Analyze Prefetch files to identify executables used for data exfiltration, such as FTP clients or custom exfiltration tools. Command:

PECmd.exe -d C:\Windows\Prefetch\ -csv C:\Output\Exfiltration_Prefetch.csv

Analysis: Look for Prefetch entries associated with network utilities or tools commonly used for exfiltration.

Tool: Registry Explorer

Instruction: Check the registry for configuration changes related to network settings or proxies that could facilitate data exfiltration. Path:

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Internet Settings\

Analysis: Look for changes to proxy settings, VPN configurations, or other network-related keys.

Tool: MFTECmd (Master File Table Parser)

Instruction: Parse the MFT to identify files that were staged for exfiltration, such as large archives or compressed files. Command:

MFTECmd.exe -d C:\ -o C:\Output\Exfiltration_MFT.csv

Analysis: Look for large files or directories with recent modification dates in directories like Downloads or Desktop.

Tool: JLECmd (Jump List Explorer Command Line)

Instruction: Analyze Jump Lists for references to network tools or applications that may have been used for data exfiltration. Command:

JLECmd.exe -d C:\Users\ -csv C:\Output\JumpLists_Exfiltration.csv

Analysis: Review Jump Lists for evidence of data transfer applications, such as FTP clients, VPNs, or remote desktop tools.

PreviousVelociraptor Intrusion AnalysisNextKAPE Artifacts Analysis

Last updated 3 months ago

For more on Eric Zimmerman's Tools, visit his website at:

Eric Zimmerman's Tools
40MB
Eric Zimmerman's Tools Commandline Cheatsheet.pdf
pdf