threat hunting for beginners: hunting standard dll-injected c2 implants

Posted on Aug 12, 2023

Hello friend, so glad you could make it.

for the video version of this chapter

This is the first in an ongoing + always-evolving series on threat hunting.

The main thing I want you to know about this course is that we will learn by doing.

| Set up | We’ll start off by creating + configuring our own virtual network, including VMs for the victim, attacker, and analyst.

| Attack | Then, instead of using prepackaged data we’ll generate data by performing the attack ourselves. We’ll use Metasploit and Powersploit to perform a standard DLL-injection attack. Once we have C2 established we’ll simulate a few rudimentary actions such as data exfiltration.

| Live Analysis | We’ll then perform the actual threat hunt. We’ll initially perform two rounds of live analysis - first using only Windows native tools to check the vitals, and then using Process Hacker we’ll dig deeper into the memory.

| Post-mortem Analysis | In the post-mortem analysis we’ll look at the memory dump (Volatility3) and perform log analysis (Sysmon + PowerShell ScriptBlock), before wrapping things up with an abbreviated traffic analysis (WireShark).

| Review | Finally we’ll crystallize all our insights so we can both reinforce what we’ve learned, as well as learn how to effectively communicate our findings to the greater cybersecurity ecosystem.

| Theory + References | I will interject with theory when and where necessary, as well as provide references. If something is unclear I encourage you to take a sojourn in the spirit of returning with an improved understanding of our topic at hand. This is after all a journey that need not be linear - the goal is to learn, and hopefully have as much fun as possible. Act accordingly.

Course Outline

#Section
0Pre-Course Banter
1Setting Up Our Virtual Environment
2Performing the Attack
3Live Analysis - Native Windows Tools
4Live Analysis - Process Hacker
5Post-Mortem Forensics - Memory
6Post-Mortem Forensics - Log Analysis
7Post-Mortem Forensics - Traffic Analysis
8Course Review

If you’d like to see a detailed overview of the the entire course click here.

If your’re ready to move ahead to our Pre-Course Banter click here.