Skip to content

Commit bb0e21e

Browse files
Merge pull request #89 from esecrpm/master
Update DFIRBatch.reb
2 parents 6011d88 + 594ddbf commit bb0e21e

File tree

2 files changed

+76
-3
lines changed

2 files changed

+76
-3
lines changed

BatchExamples/DFIRBatch.md

+1
Original file line numberDiff line numberDiff line change
@@ -57,6 +57,7 @@ Example entry, please follow this format:
5757
| 2.08 | 2024-12-07 | Added WinSCP DEFAULT artifact back and added Advanced IP Scanner and Advanced Port Scanner Artifacts |
5858
| 2.09 | 2024-12-19 | Added Angry IP Scanner Artifacts |
5959
| 2.10 | 2025-01-18 | Added System ProductType and ProductSuite Artifacts |
60+
| 2.11 | 2025-03-31 | Added Threat Hunt for WinLogon Shell and Userinit values |
6061

6162
# Documentation
6263

BatchExamples/DFIRBatch.reb

+75-3
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
Description: DFIR RECmd Batch File
2-
Author: Andrew Rathbun
3-
Version: 2.10
4-
Id: 2e1589f5-e31a-4bef-822f-075d56afdddd
2+
Author: Andrew Rathbun, esecrpm
3+
Version: 2.11
4+
Id: 6e68cc0b-c945-428b-ab91-c02d91c877b8
55
Keys:
66
#
77
# DFIRBatch README: https://github.com/EricZimmerman/RECmd/blob/master/BatchExamples/DFIRBatch.md
@@ -3561,6 +3561,78 @@ Keys:
35613561
# THREAT HUNTING
35623562
# --------------------
35633563

3564+
-
3565+
Description: WinLogon Shell
3566+
HiveType: NTUSER
3567+
Category: Threat Hunting
3568+
KeyPath: SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon
3569+
ValueName: Shell
3570+
Recursive: false
3571+
Comment: "Contains the default shell environment for Windows, normally 'explorer.exe'"
3572+
3573+
# https://attack.mitre.org/techniques/T1547/004
3574+
# https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1547.004/T1547.004.md
3575+
3576+
-
3577+
Description: WinLogon Shell
3578+
HiveType: SOFTWARE
3579+
Category: Threat Hunting
3580+
KeyPath: Microsoft\Windows NT\CurrentVersion\WinLogon
3581+
ValueName: Shell
3582+
Recursive: false
3583+
Comment: "Contains the default shell environment for Windows, normally 'explorer.exe'"
3584+
3585+
# https://attack.mitre.org/techniques/T1547/004
3586+
# https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1547.004/T1547.004.md
3587+
3588+
-
3589+
Description: WinLogon Shell
3590+
HiveType: SOFTWARE
3591+
Category: Threat Hunting
3592+
KeyPath: WOW6432Node\Microsoft\Windows NT\CurrentVersion\WinLogon
3593+
ValueName: Shell
3594+
Recursive: false
3595+
Comment: "Contains the default shell environment for Windows, normally 'explorer.exe'"
3596+
3597+
# https://attack.mitre.org/techniques/T1547/004
3598+
# https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1547.004/T1547.004.md
3599+
3600+
-
3601+
Description: WinLogon UserInit
3602+
HiveType: NTUSER
3603+
Category: Threat Hunting
3604+
KeyPath: SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinLogon
3605+
ValueName: Userinit
3606+
Recursive: false
3607+
Comment: "Userinit.exe is launched by winlogon.exe and runs logon scripts for the user, reestablishes network connections, and then starts Explorer.exe. It also specifies programs Winlogon should run when a user logs on. Typically contains 'userinit.exe,'."
3608+
3609+
# https://attack.mitre.org/techniques/T1547/004
3610+
# https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1547.004/T1547.004.md
3611+
3612+
-
3613+
Description: WinLogon UserInit
3614+
HiveType: SOFTWARE
3615+
Category: Threat Hunting
3616+
KeyPath: Microsoft\Windows NT\CurrentVersion\WinLogon
3617+
ValueName: Userinit
3618+
Recursive: false
3619+
Comment: "Userinit.exe is launched by winlogon.exe and runs logon scripts for the user, reestablishes network connections, and then starts Explorer.exe. It also specifies programs Winlogon should run when a user logs on. Typically contains 'userinit.exe,'."
3620+
3621+
# https://attack.mitre.org/techniques/T1547/004
3622+
# https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1547.004/T1547.004.md
3623+
3624+
-
3625+
Description: WinLogon UserInit
3626+
HiveType: SOFTWARE
3627+
Category: Threat Hunting
3628+
KeyPath: WOW6432Node\Microsoft\Windows NT\CurrentVersion\WinLogon
3629+
ValueName: Userinit
3630+
Recursive: false
3631+
Comment: "Userinit.exe is launched by winlogon.exe and runs logon scripts for the user, reestablishes network connections, and then starts Explorer.exe. It also specifies programs Winlogon should run when a user logs on. Typically contains 'userinit.exe,'."
3632+
3633+
# https://attack.mitre.org/techniques/T1547/004
3634+
# https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1547.004/T1547.004.md
3635+
35643636
-
35653637
Description: Shadow RDP Sessions
35663638
HiveType: SOFTWARE

0 commit comments

Comments
 (0)