Closed ION28 closed 4 years ago
ExcludeFromKnownDlls: https://dannyda.com/2020/01/03/common-ways-to-maintaining-privilege-access-in-windows-backdoor-fileless-backdoor/
https://www.jaiminton.com/cheatsheet/DFIR/#t1038-dll-search-order-hijacking
reg query "HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\KnownDLLs"
gci -path C:\Windows\* -include *.dll | Get-AuthenticodeSignature | Where-Object Status -NE "Valid"
gci -path C:\Windows\System32\* -include *.dll | Get-AuthenticodeSignature | Where-Object Status -NE "Valid"
gps | FL ProcessName, @{l="Modules";e={$_.Modules|Out-String}}
gps | ? {$_.Modules -like '*{DLLNAME}*'} | FL ProcessName, @{l="Modules";e={$_.Modules|Out-String}}
$dll = gps | Where {$_.Modules -like '*{DLLNAME}*' } | Select Modules;$dll.Modules;
https://attack.mitre.org/techniques/T1038/
and
https://attack.mitre.org/techniques/T1073/ (specifically see some of the APT group examples)
Also investigate: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\KnownDLLs (note PowerSploit-PowerUp excludes these kinds of DLLs: https://github.com/PowerShellMafia/PowerSploit/blob/master/Privesc/PowerUp.ps1#L2369)