Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

New Atomic - T1654 Log Enumeration #2584

Merged
merged 6 commits into from
Nov 7, 2023
Merged

Conversation

0-etep
Copy link
Contributor

@0-etep 0-etep commented Nov 2, 2023

Details:
New Mitre technique for log enumeration using the Powershell Get-EventLog. This technique was observed in a TheDFIRReport case [https://thedfirreport.com/2023/04/03/malicious-iso-file-leads-to-domain-wide-ransomware/] where the threat actor enumerated the Windows Security audit log to determine user accounts and associated IPv4 addresses.

Testing:
Local testing, YAML file generated via Atomic GUI. The test generates a staging file of matching Windows events based on the keyword 'SYSTEM'.

Associated Issues:
NA

@0-etep 0-etep changed the title Create T1654.yml New Atomic - T1654 Log Enumeration Nov 2, 2023
Copy link
Collaborator

@clr2of8 clr2of8 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Excellent! Thank you for your first-time contribution. Keep it up! Don't forget to claim your free Atomic Red Team t-shirt

@clr2of8 clr2of8 merged commit 02b6a5a into redcanaryco:master Nov 7, 2023
3 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants