How to get URL link on X (Twitter) App
https://twitter.com/BlackMatter23/status/14218727326277836810. The attack was rapid & merciless. The attacker compromised Exchange server via RCE or valid account (we couldn't find the exact initial vector). After that, the attacker dropped China Chopper web shell and established persistence with SYSTEM privs on the server.
https://twitter.com/theGodKilla/status/14188329605649571862. If it's EDR you should know how it works and where it gets telemetry. Which kernel callbacks exist, useful ETW providers, minifilter driver capabilities. Learn the structures and fields you get from these sources, analyse them, think how this info may be useful for you.
https://twitter.com/BlackMatter23/status/14149698776563916871. The detailed events sequence was published here:
https://twitter.com/BlackMatter23/status/1415226209387130880?s=20
https://twitter.com/BlackMatter23/status/14149698776563916871.1 As we know, Wusa.exe has "autoElevate" = TRUE in its manifest, that means it will be automatically elevated by UAC without consent prompt (except "AlwaysNotify" mode). So, svchost.exe spawns consent.exe: