|
1 | 1 | Description: DFIR RECmd Batch File
|
2 |
| -Author: Andrew Rathbun |
3 |
| -Version: 2.10 |
4 |
| -Id: 2e1589f5-e31a-4bef-822f-075d56afdddd |
| 2 | +Author: Andrew Rathbun, esecrpm |
| 3 | +Version: 2.11 |
| 4 | +Id: 6e68cc0b-c945-428b-ab91-c02d91c877b8 |
5 | 5 | Keys:
|
6 | 6 | #
|
7 | 7 | # DFIRBatch README: https://github.com/EricZimmerman/RECmd/blob/master/BatchExamples/DFIRBatch.md
|
@@ -3561,6 +3561,78 @@ Keys:
|
3561 | 3561 | # THREAT HUNTING
|
3562 | 3562 | # --------------------
|
3563 | 3563 |
|
| 3564 | + - |
| 3565 | + Description: WinLogon Shell |
| 3566 | + HiveType: NTUSER |
| 3567 | + Category: Threat Hunting |
| 3568 | + KeyPath: SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon |
| 3569 | + ValueName: Shell |
| 3570 | + Recursive: false |
| 3571 | + Comment: "Contains the default shell environment for Windows, normally 'explorer.exe'" |
| 3572 | + |
| 3573 | +# https://attack.mitre.org/techniques/T1547/004 |
| 3574 | +# https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1547.004/T1547.004.md |
| 3575 | + |
| 3576 | + - |
| 3577 | + Description: WinLogon Shell |
| 3578 | + HiveType: SOFTWARE |
| 3579 | + Category: Threat Hunting |
| 3580 | + KeyPath: Microsoft\Windows NT\CurrentVersion\WinLogon |
| 3581 | + ValueName: Shell |
| 3582 | + Recursive: false |
| 3583 | + Comment: "Contains the default shell environment for Windows, normally 'explorer.exe'" |
| 3584 | + |
| 3585 | +# https://attack.mitre.org/techniques/T1547/004 |
| 3586 | +# https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1547.004/T1547.004.md |
| 3587 | + |
| 3588 | + - |
| 3589 | + Description: WinLogon Shell |
| 3590 | + HiveType: SOFTWARE |
| 3591 | + Category: Threat Hunting |
| 3592 | + KeyPath: WOW6432Node\Microsoft\Windows NT\CurrentVersion\WinLogon |
| 3593 | + ValueName: Shell |
| 3594 | + Recursive: false |
| 3595 | + Comment: "Contains the default shell environment for Windows, normally 'explorer.exe'" |
| 3596 | + |
| 3597 | +# https://attack.mitre.org/techniques/T1547/004 |
| 3598 | +# https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1547.004/T1547.004.md |
| 3599 | + |
| 3600 | + - |
| 3601 | + Description: WinLogon UserInit |
| 3602 | + HiveType: NTUSER |
| 3603 | + Category: Threat Hunting |
| 3604 | + KeyPath: SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon |
| 3605 | + ValueName: Userinit |
| 3606 | + Recursive: false |
| 3607 | + Comment: "Userinit.exe is launched by winlogon.exe and runs logon scripts for the user, reestablishes network connections, and then starts Explorer.exe. It also specifies programs Winlogon should run when a user logs on. Typically contains 'userinit.exe,'." |
| 3608 | + |
| 3609 | +# https://attack.mitre.org/techniques/T1547/004 |
| 3610 | +# https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1547.004/T1547.004.md |
| 3611 | + |
| 3612 | + - |
| 3613 | + Description: WinLogon UserInit |
| 3614 | + HiveType: SOFTWARE |
| 3615 | + Category: Threat Hunting |
| 3616 | + KeyPath: Microsoft\Windows NT\CurrentVersion\WinLogon |
| 3617 | + ValueName: Userinit |
| 3618 | + Recursive: false |
| 3619 | + Comment: "Userinit.exe is launched by winlogon.exe and runs logon scripts for the user, reestablishes network connections, and then starts Explorer.exe. It also specifies programs Winlogon should run when a user logs on. Typically contains 'userinit.exe,'." |
| 3620 | + |
| 3621 | +# https://attack.mitre.org/techniques/T1547/004 |
| 3622 | +# https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1547.004/T1547.004.md |
| 3623 | + |
| 3624 | + - |
| 3625 | + Description: WinLogon UserInit |
| 3626 | + HiveType: SOFTWARE |
| 3627 | + Category: Threat Hunting |
| 3628 | + KeyPath: WOW6432Node\Microsoft\Windows NT\CurrentVersion\WinLogon |
| 3629 | + ValueName: Userinit |
| 3630 | + Recursive: false |
| 3631 | + Comment: "Userinit.exe is launched by winlogon.exe and runs logon scripts for the user, reestablishes network connections, and then starts Explorer.exe. It also specifies programs Winlogon should run when a user logs on. Typically contains 'userinit.exe,'." |
| 3632 | + |
| 3633 | +# https://attack.mitre.org/techniques/T1547/004 |
| 3634 | +# https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1547.004/T1547.004.md |
| 3635 | + |
3564 | 3636 | -
|
3565 | 3637 | Description: Shadow RDP Sessions
|
3566 | 3638 | HiveType: SOFTWARE
|
|
0 commit comments