Windows PowerShell Remoting: Host Based Investigation and Containment Techniques
Tags
Common Information
Type | Value |
---|---|
UUID | 929dae1f-d00d-460f-ad75-b1fc956b1dcc |
Fingerprint | 24a9dc51a021fb80 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Nov. 13, 2018, 4:34 p.m. |
Added to db | Jan. 18, 2023, 8:08 p.m. |
Last updated | Nov. 18, 2024, 1:38 a.m. |
Headline | B2dfir |
Title | Windows PowerShell Remoting: Host Based Investigation and Containment Techniques |
Detected Hints/Tags/Attributes | 42/1/14 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 2 | boot.to |
|
Details | Domain | 291 | raw.githubusercontent.com |
|
Details | Domain | 2 | bad.com |
|
Details | File | 1 | file.ps1 |
|
Details | File | 1 | c:\users\bob\downloads\maliciousdoc.docx |
|
Details | File | 1 | raw-socket-sniffer.ps1 |
|
Details | File | 1209 | powershell.exe |
|
Details | File | 1 | blockdomains.ps1 |
|
Details | Github username | 1 | nospaceships |
|
Details | IPv4 | 81 | 192.168.1.100 |
|
Details | IPv4 | 1441 | 127.0.0.1 |
|
Details | IPv4 | 1 | 173.182.192.43 |
|
Details | Url | 1 | https://raw.githubusercontent.com/nospaceships/raw-socket-sniffer/master/raw-socket-sniffer.ps1 |
|
Details | Windows Registry Key | 48 | HKLM\Software\Microsoft\Windows\CurrentVersion\Run |