Nasreddine Bencherchali Profile picture
Detection @nextronsystems | @sigma_hq & LOLDrivers maintainer | Avid learner and passionate about all things #Detection #Sigma
Jan 8 15 tweets 7 min read
As we all know, true APTs and TAs avoid using "whoami" as its a sign of weakness.

So here is a thread of 14 examples of APTs and TAs executing it over the years.

MosesStaff By Checkpoint

1/🧵 research.checkpoint.com/2021/mosesstaf…
Image RATANKBA by TrendMicro

2/🧵 trendmicro.com/en_us/research…
Image
Jan 12, 2023 6 tweets 2 min read
A lesser-known event log I recently found for tracking malicious AppX installations is the "Microsoft-Windows-AppXDeploymentServer/Operational". Here are a couple of ways how you can leverage it with some free SIGMA rules at the end. 🧵 EID 401 with ErrorCode "0x80073cff" (related to policy errors). This could indicate an attempt of installing unsigned packages that perhaps require sideloading to be enabled.
Feb 6, 2022 5 tweets 1 min read
EDRs/AVs sometimes trust certain locations or perform certain behavior when met with unexpected weirdness. Here are some ideas to check/test for, the next time you have some alone time with your solution

1/🧵 -EDRs often times are configured to send telemetry via a pulling mechanism or via batches that can't exceed certain sizes per X time. Generating a lot of benign events before starting the attack could temporarily blind the EDR console

2/
Dec 11, 2021 8 tweets 12 min read
Feb 2, 2021 6 tweets 7 min read
Following @SwiftOnSecurity amazing thread ().

I’ve compiled some the tools mentioned in it with their corresponding links in the thread below (For reference and easy find). 1. Pressing the F5 key in notepad will insert a timestamp
2. RpcPing (docs.microsoft.com/en-us/windows-…)
3. Qwinsta (docs.microsoft.com/en-us/windows-…)
4. Log Parser Lizard (lizard-labs.com/log_parser_liz…)
5. Dependency Walker (dependencywalker.com)
6. Sysinternals (docs.microsoft.com/en-us/sysinter…)