The Elastic Guide To Threat Hunting
The Elastic Guide To Threat Hunting
The Elastic Guide To Threat Hunting
Guide to Threat
Hunting
Brent Murphy
David French
Foreword by Jamie Butler
Tech Lead, Elastic Security
The Elastic Guide to Threat Hunting
Published by:
CyberEdge Group, LLC
1997 Annapolis Exchange Parkway
Suite 300
Annapolis, MD 21401
(800) 327-8711
www.cyber-edge.com
Copyright © 2020, CyberEdge Group, LLC. All rights reserved. Definitive Guide™ and
the CyberEdge Press logo are trademarks of CyberEdge Group, LLC in the United
States and other countries. All other trademarks and registered trademarks are the
property of their respective owners.
Except as permitted under the United States Copyright Act of 1976, no part of this
publication may be reproduced, stored in a retrieval system or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording, scanning
or otherwise, without the prior written permission of the publisher. Requests to the
publisher for permission should be addressed to Permissions Department, CyberEdge
Group, 1997 Annapolis Exchange Parkway, Suite 300, Annapolis, MD, 21401 or
transmitted via email to info@cyber-edge.com.
Publisher’s Acknowledgements
CyberEdge Group thanks the following individuals for their respective contributions:
Editor: Susan Shuttleworth
Designer: Debbi Stocco
Publishing Coordinator: Jon Friedman
Foreword
Chapters at a Glance
Chapter 1, “Be the Hunter,” reviews basic concepts of
threat hunting, the knowledge and experience hunt teams
need, and the kinds of behaviors that teams search for.
Helpful Icons
TIP
Tips provide practical advice that you can apply in your own
organization.
DON’T FORGET
When you see this icon, take note as the related content
contains key information that you won’t want to forget.
CAUTION
Proceed with caution because if you don’t it may prove costly
to you and your organization.
TECH TALK
Content associated with this icon is more technical in nature
and is intended for IT practitioners.
ON THE WEB
Want to learn more? Follow the corresponding URL to
discover additional content available on the web.
Chapter 1
Be the Hunter
In this chapter
Learn basic concepts about threat hunting
Review the knowledge and experience hunt teams need
Understand the kinds of indicators and behaviors that hunters
search for
What Is Hunting?
Most security technologies, tools, and processes are passive.
They’re triggered by events or conditions that generate some
prescribed response ─ not unlike how your immune system
works to detect and address foreign bodies. Enterprise
antivirus is a well-known class of technologies that illustrate
this process particularly well. But these passive controls and
workflows are rarely immediate. Adversaries may be able to
dwell undetected in your environment for hours, days, weeks,
months, or years. Even worse, adversaries have learned to
maximize their success with minimal dwell time, which leaves
you the narrowest margin of error to prevent data theft or
business disruption.
In contrast to passive approaches, threat hunting combines
the knowledge and experience of your team with technology
to create an active capability to seek out evidence of malicious
activity.
2 | The Elastic Guide to Threat Hunting
Expertise
The hunt team needs people with a wide range of expertise:
Roles
Hunt teams should include people who can fulfil a variety of
roles, including:
Intrusion attributes
Hunters can use characteristics of successful intrusions to cre-
ate hypotheses for their hunts. Intrusions often:
Categorizing Unknowns
One of the biggest challenges of threat hunting is the need to
examine events and artifacts that are not inherently malicious
or benign but might be either. However, there are several
techniques you can use to point toward one side or the other.
Prevalence
You can make a good judgement about the likelihood that
events and artifacts are related to attacks by measuring
their prevalence, the frequency with which they occur in an
environment. Because many sophisticated attacks only affect
a relatively small number of systems, events and artifacts that
are scarce are more likely to be malicious than those that are
prevalent.
For example, suppose you find a previously unknown binary
file on 85% of your Windows systems. That is almost certainly
benign software. It is unlikely that an attacker could plant
malware on such a high percentage of your systems.
On the other hand, an unknown binary file on 2% of your
Windows systems could be the result of a successful phishing
campaign. As a guideline, low prevalence is more suspicious
than high prevalence.
However, some financially-motivated threat groups have
turned to mass deployment of ransomware, so prevalence as a
criterion has to be used selectively.
Recency
Generally speaking, the intrusions we care most about are
happening right now, when we are best able to influence the
outcomes. Stopping an intrusion early reduces the risk of data
theft or business disruption. Focusing on recency enables
analysts to group events and artifacts chronologically, working
backwards from the present.
For example, an unknown binary file that appeared on end-
points three days ago is more likely to represent a threat than
one that was first seen three years ago. Likewise, a registry
setting changed two days ago is more suspicious than one that
hasn’t changed in two years.
Chapter 1: Be the Hunter | 9
Patterns of behavior
There are many actions and behaviors that appear innocuous
when considered individually but can show patterns across an
enterprise that indicate malicious intent.
For example, endpoints on the network establish connec-
tions with servers on the web all the time. However, when an
endpoint establishes connections with an unknown server at
regularly scheduled intervals, it is a tip-off that malware might
be “phoning home” to a server controlled by attackers.
In the same way, logons succeed and fail every second of every
day, but logons from invalid or disabled user accounts are
suspicious. Multiple concurrent login attempts by the same
account are suspicious, as are multiple concurrent logins from
several places using one account.
Anomalies
Departures from standard behaviors can also help you catego-
rize unknown events and artifacts.
The types of deviations that merit investigation include:
Structuring Hunts
In this chapter
See suggestions for selecting an attack lifecycle framework
Learn how to structure a hunt process in six steps
Understand different types of metrics for assessing your hunts
Selecting a Framework
Before defining individual hunts, it is useful to select an attack
lifecycle framework that breaks down the phases of a typical
cyberattack and the techniques it might use in each phase.
12 | The Elastic Guide to Threat Hunting
ON THE WEB To learn how security teams can leverage the ATT&CK™
framework (https://attack.mitre.org/) to inform their
cybersecurity strategy and educate themselves about attacker
tradecraft, read How To Use MITRE ATT&CK by Mark
Dufresne, Protections Team Lead at Elastic (https://ela.st/
attack-model).
Custom frameworks
Although we strongly recommend starting with one of the
standard frameworks, you can build on it or combine elements
of several frameworks to create a custom framework of your
own. No one knows your environment like you do.
For instance, if your organization spans a wide geographic
area, you could add time zone-based hunts to your rubric.
If certain servers contain key intellectual property, you may
want to view their logs to hunt for logins during unusual time
periods, or from specific network ranges. By adding awareness
of your specific environment into your threat framework, you
can enrich other searches and reduce the time necessary to
identify malicious activity.
It is worth taking the time to select or build an attack lifecycle
framework to guide your hunt, because it will help your team
members think like attackers and focus on the attack tech-
niques that are most likely to be used against your organiza-
tion. Concentrating on techniques in the early portions of the
attack lifecycle can help hunt teams prioritize detection well
before the adversary succeeds.
Chapter 2: Structuring Hunts | 13
TIP Don’t fall into the trap of looking only for threats associated
with your industry. You don’t know what you don’t know, and
threat groups can dynamically change targeting for reasons
defenders won’t always anticipate. Techniques developed for
one type of victim can inspire threats that target broad
audiences. Frameworks like MITRE ATT&CK can help you
apply a threat-agnostic approach.
Step 4: Automate
Usually you can automate and schedule the processes of
collecting events, performing data reduction, and matching
keywords against data. Automation replaces manual processes
and frees your hunters to apply their judgement to the results.
Ideally, you can allocate tasks that don’t require knowledge or
experience to machines, while reserving those that do require
judgement to human analysts.
Step 5: Document
In the heat of an ongoing hunt, it is very tempting to process
yet more data and put off documentation until later – or
never. However, this is a tactical miscalculation. Usually it is
impossible to recall the details of the hunt after the fact: the
evidence collected, the types of analysis performed, the logic
to eliminate false positives, and the justification for the con-
clusions. This information will be lost unless it is documented
during the course of the hunt.
TIP Have experienced analysts record their methods for identify-
ing suspicious events. The guidance can be extremely valuable
to less-experienced members of the hunt team by bringing
them up to speed on the tactics of attackers and successful
hunt techniques. Consider creating a “training dataset” based
on some commonly-performed hunts that you can use to eval-
uate and train new analysts.
TIP While your analysts are documenting the details of the hunt,
ask them to highlight opportunities to reduce the volume of
data you collect. Typically, this involves filtering out known or
otherwise trusted events. This practice pays substantial divi-
dends, because cutting the amount of data retained ultimately
improves your ability to answer questions quickly.
DON’T FORGET Having made your call and declared an incident, spend some
time thinking through the incident’s priority. Consider the
likelihood that this attack would target your business, indus-
try, or region. Estimate the impact it could have on your
enterprise. You want the incident response team to address
the highest risks quickly, but not be overwhelmed by incidents
that are unlikely to have much impact.
TIP Some hunts may not produce findings of any kind, but that
does not mean they were failures. Quite the contrary; some-
times the only way to detect a technique is by collecting rou-
tine data to use as a baseline of normal behavior. When the
result(s) of the hunt appear to be negative, it is all the more
important to document the process and outcomes.
In-memory malware
Another type of fileless attack represents a more literal
definition of “fileless”: memory-resident malware. For this,
attackers inject a malicious payload into applications that are
already running.
This technique can be used to evade controls like some
application whitelisting and antivirus solutions, because
the attacker’s code executes in applications that have been
approved by the organization.
Part of the reason why the use of in-memory attacks is
growing so rapidly is that they are no longer the province of
sophisticated attackers alone. Off-the-shelf offensive frame-
works freely available on the web enable entire categories of
such attacks. These frameworks have dramatically reduced the
barrier to entry for threat actors of all experience levels.
In-memory execution
Ultimately, a malicious payload will be executed. An in-
memory attack may take the form of process injection, process
hollowing, or side-loading.
In the case of process injection, the malware creates or allo-
cates some space in process memory, then creates a remote
thread to a section of memory within a legitimate process.
This process is illustrated in Figure 3-1.
Chapter 3: Hunting for Fileless Attacks | 25
Spam campaign or
browsing to a malicious
site
ON THE WEB For an in-depth look at process injection techniques, see the
Elastic blog post: Ten Process Injection Techniques: A
Technical Survey of Common and Trending Process Injection
Techniques (https://ela.st/injection-techniques).
Approaches to Hunting
for Fileless Attacks
Isolated memory forensics
One approach to finding in-memory attacks is to examine a
capture of system memory. There are plenty of tools available
to assist in the forensic analysis of memory. For example, you
can use tools like Volatility, which comes with a suite of built-
in plugins, to find injected code residing within legitimate
applications.
Investigators have successfully used tools like Volatility,
margaritashotgun, and PowerForensics to acquire process
memory and apply analytics at scale. For hunting purposes,
you should parse metadata from memory. Usually that only
requires collecting a few hundred megabytes of metadata per
system.
Aggressive approaches like collecting full memory captures
are impractical when you are working at enterprise scale,
because they might require collecting as much as 16GB from
each workstation and 128GB from every server.
26 | The Elastic Guide to Threat Hunting
Drowning in noise
What about living off the land techniques?
You can start by looking for “typical” usage of administrative
tools. You will probably generate mountains of data. You will
find lots of anomalies to investigate (oh boy!). Then you will
spend days discovering all the bizarre and unexpected ways that
users and admins operate while doing their legitimate jobs.
DON’T FORGET An anomaly is not automatically suspicious. Some anomalies
are just noise. If you find too many false positives, either
reclassify what you consider anomalies or find another
behavior to monitor. Hunt teams should establish
relationships with IT and network operations groups.
Working together saves time and helps analysts put anomalies
in context.
Technique-Based Detection
Threat hunting in memory
There are several open source tools to help you examine
memory to find evidence of malicious behavior. One is the
PowerShell library Get-InjectedThreads, developed by Joe
Desimone of Elastic Security and Jared Atkinson. In a rela-
tively low-noise approach, this tool scans active threads on
the system for suspicious start addresses that may indicate
process injection has occurred.
TECH TALK For example, an attacker might call VirtualAllocEx to allocate
space for malicious code to execute, and then utilize
CreateRemoteThread or another API call to execute the mali-
cious code within another application. Get-InjectedThreads
will retrieve the start address of each active thread, then
determine the associated section properties. If there is an
observed executable running within this section, it is deemed
to be injected. But keep in mind that some legitimate applica-
tions perform process injection (and you might also run across
an injected thread and alert).
ON THE WEB For a presentation describing threat hunting in memory in
detail and explaining how to use Get-InjectedThreads, watch
the Taking Hunting to the Next Level video from the SANS
Threat Hunting Summit.
Chapter 3: Hunting for Fileless Attacks | 27
Timing is everything
A theme throughout this guide is how you can use time to
assist you in your hunt, or more precisely, how determining a
sequence of events can point to malicious activities.
In a living off the land scenario, the attacker wants to launch a
native admin tool to execute malicious commands. But while
the tool may be nothing out of the ordinary, like PowerShell,
the way it is launched may indicate malicious intent. If you
examine the parent process lineage of PowerShell or other
admin tools, you might find some interesting artifacts.
For example, you might observe a local admin tool being
executed as a child process of your email application a few
minutes after an email is received. This is a good indicator
of initial compromise, perhaps the result of a spear phishing
attack.
Another example would be seeing many enumeration com-
mands (such as ipconfig, net *, whoami, systeminfo, sc, or
netstat) being run in a very short time. This behavior would be
consistent with an attacker’s attempt to quickly discover more
about a network by running these commands manually or
from a script. System administrators use the same commands,
but not all of them, and not within a few seconds.
Hunting for
Persistence - Basics
In this chapter
Learn why attackers need persistence, and why it can be their
Achilles’ heel
Review basic techniques for hunting for evidence of
persistence
Technique-Based Detection
While it may be tempting to just match IOCs against your
available evidence and call it a success, that’s not really threat
hunting. This section focuses on techniques hunters can begin
with to detect persistence techniques. For most organizations,
this process begins by prioritizing sources of evidence, con-
ducting analyses, and using environmental awareness to help
reduce the volume of data.
TIP You can greatly reduce the volume of data you collect and
retain by profiling the base “gold” image of each system type
in your organization for default persistence locations.
Knowing the profile of workstations and servers when they are
deployed for the first time (including the known good meta-
data of executables, scripts, and other files) makes changes
from the baseline more obvious to analysts.
Data collection
Before you start collecting event data that can be used to
detect persistence techniques, it can be helpful to assess
which sources of evidence capture the metadata most
comprehensively.
Chapter 4: Hunting for Persistence - Basics | 33
--Windows events--
4663(S): An attempt was made to access an object.
4656(S, F): A handle to an object was requested.
4658(S): The handle to an object was closed.
4660(S) An object was deleted.
4657(S): A registry value was modified.
5039(-): A registry key was virtualized.
4670(S): Permissions on an object were changed.
TIP Windows isn’t the only operating system with a notion of per-
sistence. In fact, every operating system has various forms of
persistence. However, gaining visibility into persistence mech-
anisms at enterprise scale outside of the Windows world can
be challenging. One useful tool is OSQuery. Discussed in
Appendix A, OSQuery was developed by Facebook and
released to the public for use inspecting Windows, Linux, and
MacOS systems. OSQuery supports the ability to query a vari-
ety of persistence mechanisms.
Comparative analysis
What better way to find suspicious persistence items than
comparing registry items to a baseline image (assuming you
have one)? Persistence is one area (among many) where
comparisons with baselines can be a very effective method for
data reduction.
If you compare persistence artifacts from your baseline (e.g.,
autoruns) against production systems, you can identify differ-
ences between those datasets. This isn’t a foolproof hunt, and
you may want to dig a little deeper before sounding the alarm,
but it narrows data for further inspection.
Some second-order analyses you can perform include examin-
ing signing certificates and SSL certificates used in network
communication, stacking DNS queries by time-t0-live (a
shorter TTL value means the DNS record is configured to
change IPs quickly), and looking at when associated fully
qualified domain names (FQDNs) were registered.
For a detailed discussion on how to create a Windows baseline
and use it for comparative analysis, see the SANS Institute
white paper: Quick and Effective Windows System Baselining
and Comparative Analysis for Troubleshooting and Incident
Response.
Temporal proximity
You can tell a tremendous amount from looking at the
sequence and timing of events: what we might call “temporal
proximity” or “contemporariness.” It is helpful to know
whether other interesting events occurred when persistence
mechanisms were created or changed.
For example, if a key was created or modified, what was the
order of the operations? Were there corresponding process
events preceding the creation or modification of the key in the
registry? If so, the process event is suspicious, and you should
investigate that key. You might want to ask:
38 | The Elastic Guide to Threat Hunting
;; Was a file created and then executed before the key
change?
;; Did the executable change the DNS servers config-
ured on the endpoint before resolving an FQDN to
an IP address?
;; Did the executable immediately download and
execute scripts that communicated directly with IP
addresses we’ve never seen?
Data enrichment
It can be incredibly difficult to deal with the staggering vol-
umes of data found in modern enterprises. One way to gain a
little control is to improve your data quality through enrich-
ment. You can use popular methods such as:
Visualization
Visualization tools can greatly strengthen your ability to
understand and interpret hunt data. They are especially
important when dealing with large datasets (and autorun data
sets quickly become very large).
There are many free tools for visualizing data. Here we discuss
some approaches to visualization using D3.js, a JavaScript
library that can be used to visualize data.
Here are examples of how you can use visualization to support
outlier analysis and category chaining to parse large amounts
of autorun data.
Figure 5-1: A radial plot makes it easy to see which data points
appear to be outliers.
You can also use bar graphs and histograms to show data;
choose the visualization that makes it easiest for you to iden-
tify anomalies.
40 | The Elastic Guide to Threat Hunting
Category chaining
You can also present data in a hierarchical view. Sysinternals
autoruns provide a lot of useful artifacts, and with a visualiza-
tion tool we can assign levels to all data objects.
In Figure 5-2, D3.js creates a collapsible tree based on a hier-
archy we defined as having three levels: category, value, and
arguments. This visualization highlights a rogue PowerShell
script, and provides insight into scheduled tasks.
Example: WMI
Windows Management Instrumentation (WMI) is Microsoft’s
implementation of web-based enterprise management
(WBEM). WBEM can be described as a way to manage your
enterprise using common interfaces. For practitioners who
have used WMI, this framework exposes a SQL-like command
line utility that is incredibly powerful for both administrators
and adversaries.
You can find more information about WMI and how it can be
maliciously used in two whitepapers: Abusing WMI to Build a
Persistent, Asynchronous, and Fileless Backdoor and WMI
for Detection and Response. You can also watch Devon Kerr,
team lead for Intelligence and Analytics at Elastic Security
giving a presentation: There’s Something About WMI.
Chapter 5: Hunting for Persistence at Scale | 41
About PsExec
PsExec, a utility included in the Sysinternals PsTools suite of
software, is one of the more common lateral movement tools
associated with remote execution. It is described in product
literature as a “telnet replacement” that can be executed using
the Windows console or via third-party software.
PsExec has been widely adopted by administrators at organi-
zations of all kinds and is regularly encountered on Windows
systems. However, attackers were quick to adopt it for the very
same reasons as administrators. In an environment where
both admins and adversaries have the same tools, discovering
malicious actions can be extremely challenging.
If your organization doesn’t employ PsExec, you should imple-
ment controls that prevent it from being used and treat any
detected use of PsExec as a security incident.
Technique-based detection
PsExec is a unique tool for lateral movement and remote
execution (a) because it isn’t native to the operating system,
and (b) because of the way it works.
PsExec starts the remote logon process using supplied cre-
dentials and performs a quick check to see if it can copy a file
and execute it using the hidden $ADMIN share on the target
system.
If no errors are received, it unpacks a binary from within
itself, “PSEXESVC.EXE,” which is executed on the remote
46 | The Elastic Guide to Threat Hunting
Analyze Metadata
We know, based on our understanding of PsExec internals,
that it will check the attributes of shares on the target system.
We also know, based on our understanding of the Windows
operating system, that checking those attributes is something
that generates an EID 5145 event.
Begin by analyzing EID 5145 events. These include the follow-
ing types of metadata:
be able to have your cake and eat it too. Retain the most impor-
tant events in a central location for hunting, while keeping
several days’ worth on endpoints for investigative purposes.
New process creation auditing can be enabled on Windows,
which causes 4688 events to be recorded. These logs contain a
wealth of valuable information about processes but can gener-
ate a substantial amount of data. A 4688 event, generated on
the source and target, contains:
Credential Theft
In this chapter
Understand why attackers need to capture and exploit user
credentials
Explore an example of a credential theft technique –
KERBEROASTING – and how it can be detected
leges, acquire the ability to move around freely, and map the
interesting places.
You should not be surprised to find that there are many ways
to capture valid credentials. Among the multitude of options
are:
Example: KERBEROASTING
The basics of KERBEROS
KERBEROS is used in Active Directory environments to
authenticate users. It is one of the most popular security sup-
port providers (SSPs) – otherwise known as authentication
protocols – available for Windows.
When users on HOSTA want to log onto HOSTB, they type in
a domain username and password, and immediately find out
if the authentication is successful. Behind the scenes, though,
Windows takes a number of steps (illustrated in Figure 7-1):
Getting Started
Endpoint Assets
The definition of endpoint assets has expanded recently to
include mobile and embedded devices in addition to Windows,
Linux, and MacOS systems. Here we focus on traditional
operating systems, which represent the biggest challenge for
organizations just starting out. For each type of endpoint, we
look at native logging applications and share log configuration
resources. This information will help you streamline your data
collection process and begin hunting faster.
Usually the default logging facility and settings of an operating
system will need changes to become useful for hunting.
Windows
Microsoft Windows includes some of the most popular client
and server software in production today. At the time of this
writing, Windows versions 7 and 8 are slowly losing ground
on desktops to Windows 10 – which includes a number of
unique security features and enhancements such as Device
and Credential Guard. Windows Server 2016 is considered
Appendix A: Getting Started | 57
Linux
The Linux operating system achieved a large and very stable
base of support many years ago and represents one of the larg-
est classes of endpoint software for desktops, directory ser-
vices, web servers, proxies, and numerous other applications.
However, few resources exist for gaining visibility into Linux
systems. By default, Linux logging includes authentication
data and cron events, but doesn’t provide much other vis-
ibility into historical process or network events. Modern Linux
systems may have one or more of the following installed:
MacOS
While older version of the MacOS operating system included
large collections of logs in different formats, Sierra (as well as
the iOS10, WatchOS and tvOS versions) introduced unified
logging to replace syslog. The default logging, however, is more
useful for developers than for threat hunters and analysts.
Mobile
Many organizations permit their employees to supply their
own mobile devices, but these devices are rarely managed at
the enterprise level, even though they freely migrate between
corporate and non-corporate networks. This means an
adversary has a much easier time gaining a foothold through
a mobile device than through dealing with your layered corpo-
rate security stack, at least in environments where bring your
own device (BYOD) is allowed.
At the time of this writing, we have not found a default mecha-
nism for auditing authentication, process, or network events
on mobile devices. Further, we know of few open source
enterprise solutions – OSQuery does not provide support for
Android or iOS devices.
Elastic SIEM
Many security operations teams need a solution that functions
out of the box for the majority of their use cases and utilizes a
Security Information and Event Management (SIEM) system
to query and analyze events that have been collected and
stored in a central location.
60 | The Elastic Guide to Threat Hunting
Considerations
Data quality is commonly overlooked by organizations devel-
oping a hunting capability. But data quality is important if
hunters are meant to efficiently and effectively identify threats
using it – especially if one objective is automation. To para-
phrase Roberto Rodriguez, author of the HELK distribution,
data must be:
Platform
We recommend using the Elastic Stack to store your hunting
data (DNS, Sysmon, ETW, etc.). Elastic provides a free SIEM
app that enables security operations and threat hunting teams
to query, analyze, and visualize their security events quickly,
efficiently, and at scale.
Additional resources:
Analysis Techniques
IOC matching
We are not recommending IOC matching, but are discuss-
ing it here for the sake of completeness. Matching involves
using IOCs to detect malicious activity. These can be file
attributes (hashes, filenames, import hashes), network
artifacts (domains, IP addresses), registry keys (key values,
key sources), and known compromised user accounts and
machines. This is a weak approach, because indicators have
short life spans and should be automated as soon as time and
resources permit.
Comparative analysis
Comparative analysis uses a gold or baseline image to find
deltas. The gold image is the clean slate prior to any user
interaction. You can compare workstations to the baseline
image. This is especially important if your users are unable to
install new software or don’t commonly do so. Any deviation
from that baseline gold image might be an anomaly worth
investigating.
Temporal proximity
Using time can be very powerful because it relates to network
and event data. For instance, small packets being sent on a
routine time interval may indicate malware beaconing or show
Windows events in a sequential order. This can illuminate
malicious activity through executions like process create,
process execute, DNS request, network connection, process
terminate, and file delete.
64 | The Elastic Guide to Threat Hunting
Data enrichment
Public data sources and threat intel feeds are immensely
powerful for data enrichment. For instance, you can search
file attributes in VirusTotal and search network artifacts in
WHOIS databases and tools like Domain Tools or Central
Ops.
Quick Wins
How do you detect
persistence techniques?
Ref: sysinternals/downloads/autoruns
<CreateRemoteThread onmatch=”include”>
<TargetImage condition=”image”>lsass.exe</TargetImage>
</CreateRemoteThread >
Is this an administrator?
Living off the land techniques use legitimate tools. Monitor
PowerShell, WMI, InstallUtil, MSBUILD, RegAsm, and other
tools that allow code execution.