#HuntingTipOfTheDay
If you're in a SOC or IR role and don't use @GitHub because "you're not a developer", read on! It can be powerful when paired with #VirusTotal.
Came across this interesting command. What is it doing? π€
It certainly seems to be mucking with the event log, given the security parameter, it seems clear it's interested in the Windows security event log.
The most obvious explanation is that it is deleting records--the ones that correspond to the EventRecordIDs listed.
How can we find out more about this tool? The tool name (comrelg.exe) is fakedπ€₯ and the hash didn't lead anywhere and I didn't have a copy of the sample. (set aside pivoting on imphash etc for nowπ§ )
#HuntingTipOfTheDay
Battle test your rules. Here is an incomplete detection rule for saving a specific registry key. How many ways can you come up with to bypass it? (reply!)
(?i)(reg)[\.(exe)]*\s+save\s+hklm\\HARDWARE
Here's how you playπΉοΈ:
πππ
1β£ Go to regex101.com and paste the regex in.
2β£ Develop test strings. A highlighted match means blueteam wins. Keep trying.
3β£ Once you have a string with no match, verify the test string successfully dumps the regkey.
4β£ π»
This simulates an attack to dump the SAM database, but uses the HARDWARE keep to prevent you from flooding your SOC with benign alerts π
πired.team/offensive-secuβ¦
"The best way to show that a stick is crooked is not to argue about it or to spend time denouncing it, but to lay a straight stick alongside it"
β D.L. Moody