Lateral Movement
RDP:
Security EVTX
4648 - Logon specifying alternate credentials - if NLA enabled on destination
4624 - Logon 4672 - Logon Admin 4778/4779 - IP address source/ system & username
RDPClient-Operational
1024 - Destination Hostname 1102 - Destination IP Address
RemoteConnectionManager-Operational
1149 - Source IP/ Logon username (Blank username may indicate sticky keys)
RemoteDesktopServices-RdpCore-Operational
131 - Connection attempts - source IP 98 - Successful connection
TermainalServices-LocalSessionManager-Operational
21,22,25 - Source IP/ Logon Name 41 - Logon user name
Registry
NTUser\Software\Microsoft\Terminal Server Client\Servers
ShimCache: mstsc.exe
(SYSTEM)
Bam/DAM: (SYSTEM) Last time executed
AmCache.hve - First time executed
UserAssist - NTUSER.dat: mstsc.exe
- last time and number of times executed
RecentApps - NTUSER.dat: mstsc.exe
- last time and number of times executed
Shimcache - (SYSTEM) - rdclip.exe, tstheme.exe
Amcache.hve - First time executed - rdclip.exe, tstheme.exe
FileSystem
Jumplists - AutomaticDestinations\{MSTSC-APPID} - Connection destination and times
Prefetch - mstsc.exe-{hash}.pf
bitmap Cache: AppData\Local\Microsoft\Terminal Server Client\Cache
: bcache##.bmc
& cache####.bin
Prefetch - rdpclip.exe / tstheme.exe
Share Drive:
net use z: \\host\C$ /user:domain\username <password>
Security EVTX
4648 - Logon specifying alternate credentials
4624 - Logon 4672 - Logon Admin 4776 - IP address source/ system & username 4768 - TGT Granted - source hostname/logon username (only on DC) 4769 - Service Ticket Granted (only on DC) 5140 - Share Access 5145 - Auditing of Shared Files
SMBClient-Security
31001- failed logon to Destination
Registry
NTUSER\Software\Microsoft\Explorer\MountPoints2
Shellbags - USRCLASS.dat - remote folder accessed
ShimCache: net.exe & net1.exe
(SYSTEM)
Bam/DAM: (NTUSER.dat) net.exe & net1.exe
(SYSTEM)
AmCache.hve - First time executed
FileSystem
Prefetch - net.exe-{hash}.pf, net1.exe-{hash}.pf
Remote Service control:
sc \\host create servicename binpath=C:\temp\Evil.ex
sc \\host start servicename
Security EVTX
4624 - Logon 4697 - Service Install
System EVTX
7034 - Service crashed unexpectedly 7035 - Service sent start/stop 7040 - Start type change 7045 - Service was installed
Registry
shimCache - sc.exe
BAM/DAM - Last time executed
Amcache- First time executed
SYSTEM\CurrentControlSet\Services
- new service creation
ShimCache: evil.exe
(SYSTEM)
AmCache.hve - First time executed
FileSystem
Prefetch - sc.exe-{hash}.pf
Remote scheduled task control:
at \\host 13:00 C:\temp\evil.exe
schtasks /CREATE /TN taskname /TR C:\evi.exe /sc once /RU "SYSTEM" /ST 13:00 /s host /U user
Security EVTX
4648 - Logon specifying alternate credentials
4624 - Logon 4672 - Logon Admin 4698 - Scheduled task created 4702 - Scheduled task updated 4699 - Scheduled task deleted 4700/4701 - Scheduled task enabled/disabled
Windows-TaskScheduled-Operational
106 - Task created 140 - Task updated 141 - Task Deleted 200/201 - Task executed/completed
Registry
ShimCache: at.exe & schtasks.exe
(SYSTEM)
Bam/DAM: (NTUSER.dat) at.exe & schtasks.exe
(SYSTEM)
AmCache.hve - First time executed
Software: Microsoft\WindowsNT\CurrentVersion\Schedule\TaskCache\Tasks & \Tree
ShimCache: - SYSTEM - evil.exe
AmCache.hve - First time executed
FileSystem
Prefetch - at.exe-{hash}.pf, schtasks.exe-{hash}.pf
File creation Prefetch - exe.exe-{hash}.pf
Remote Registry control:
reg add \\host\HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Data /t REG_SZ /d C:\evil.exe
WMI
Host: wmic.exe
-> Target: wmiprvse.exe
wmic /node:host /user:user process call create C:\temp\evil.exe
Invoke-WmiMethod - computer host -class Win32_Process -Name create - Argument C:\evil.exe
wmic.exe PROCESS CALL CREATE "C:\\Windows\\System32\\rundll32.exe C:\evil.dll"
Security EVTX
4648 - Logon specifying alternate credentials
4624 - Logon 4672 - Logon Admin
WMI-Activity Operational
5857 - Indicates WMIC execution and path of DLL 5860/5861 - Registry of temporary/permanent event consumer
Registry
Shimcache: SYSTEM - wmic.exe
BAM/DAM - last time executed
amcache - First time executed
shimcache: scrons.exe, mofcomp.exe, wmiprivse.exe, evil.exe
amcache: scrons.exe, mofcomp.exe, wmiprivse.exe, evil.exe
Prefect - wmic.exe-{hash}.pf
File Creation - evil.exe & evil.mof
(used to manage WMI Repository)
Prefetch - scrons.exe-{hash}.pf, mofcomp.exe-{hash}.pf, wmiprivse.exe-{hash}.pf, evil.exe-{hash}.pf
changes to C:\Windows\System32\wbem\Repository
PowerShell:
Host: powershell.exe
-> Target: wsmprovhost.exe
Enter-PSSession -ComputerName host
Invoke-Command -ComputerName host -ScriptBlock {Start-Process C:\evil.exe}
Security EVTX
4648 - credential logon
4624 - Logon (Type 3) 4672 - Logon Admin
WinRM-Operational
6 - WSMan session initialised - Session created, destination host IP/Name - current logged on user 8, 15, 16, 33 - WSMan Session deinitliased
91 - session created 168 - Records authenticating user
Powershell.evtx
400, 403 - ServeRemoteHost - indicates start/end of Remoting session 800 - includes partial script code
PowerShell-Operational
40691, 40692 - records local initiation of PowerShell and user 8193, 8194 - session created 8197 - Session closed
4103, 4104 - Script Block Logging (logs suspicious scripts - Default in PSv5) 53504 - Records the authenticating user
Registry
Shimcache - SYSTEM powershell.exe
BAM/DAM - Last time executed
Amcache - First Time executed
ShimCache - wsmprovhost.exe
SOFTWARE - \Microsoft\PowerShell\1\ShellIds\Microsoft.PowerShell\ExecutionPolicy
AmCache.hve - wsmprovhost.exe
Prefetch - powershell.exe-{hash}.pf
Command history - AppData\Roaming\Microsoft\Windows\Powershell\PSReadline\ConsoleHost_History.txt
prefectch - wsmprovhost.exe-{hash}.pf
PsExec:
psexec,exe \\host -accepteula -d -c C:\temp\evil.exe
Host: psexec.exe
-> psexecsvc.exe
Security EVTX
4648 - Logon specifying alternate credentials - if NLA enabled on destination
4624 - Logon 4672 - Logon Admin 5140 - Share Access ADMIN$
Registry
Software\SysInternals\PsExec\EulaAccepted
ShimCache: PsExec.exe
(SYSTEM)
Bam/DAM: psexec.exe
(SYSTEM) - last time exectued
AmCache.hve - First time executed
New service creation: SYSTEM\CurrentControlSet\Services\PSEXESVC
(can be renamed)
ShimCache: SYSTEM - psexesvc.exe
AmCache - psexesvc.exe
FileSystem
Prefectch - C:\windows\prefectch
File Creation
Prefetch - Psexesvc.exe-{hash}.pf
Last updated