Windows Live DFIR
System Information
Kill & Remove Services
Resolve Device PublicIP /w Powershell
Obtain list of all files on a computer
Local Temp Cache Folders
Registry Stuff
User and admin information
Logon information
NT Domain/Network Client Information
Running Processes - Remote IP/Port & PID
Hunt a Process/Service/Product
Uninstall Service
Kill malicious process
Firewall Information
Firewall Changes
Pagefile information
Group and access information
Cookies
RecentDocs Information
Startup process information
Startup process information by path/file name
Startup process information by path/file name
Scheduled task/job information
Remediate malicious scheduled tasks
UAC Bypass Fodhelper
Persistence and Automatic Load/Run Reg Keys
Local Machine (SYSTEM HIVE)
MITRE ATT&CK Persistence
T1015 Accessibility Features
T1098 Account Manipulation
T1182 AppCert DLLs
T1103 AppInit DLLs
T1138 Application Shimming
T1197 BITS Jobs
T1067 Bootkit
T1176 Browser Extensions
T1109 Component Firmware
T1122 Component Object Model (COM) Hijacking
T1136 Create Account
T1038 DLL Search Order Hijacking
T1133 External Remote Services
T1044 File System Permissions Weakness
T1158 Hidden Files and Directories
T1179 Hooking
T1062 Hypervisor
T1183 Image File Execution Options Injection
T1037 Logon Scripts
T1177 LSASS Driver
T1031 Modify Existing Service
T1128 Netsh Helper DLL
T1050 New Service
T1137 Office Application Startup
T1034 Path Interception
T1013 Port Monitors
T1504 PowerShell Profile
T1108 Redundant Access
T1060 Registry Run Keys / Startup Folder
T1053 Scheduled Task
T1180 Screensaver
T1101 Security Support Provider
T1505 Server Software Component
T1058 Service Registry Permissions Weakness
T1023 Shortcut Modification
T1198 SIP and Trust Provider Hijacking
T1209 Time Providers
T1078 Valid Accounts
T1100 Web Shell
T1084 Windows Management Instrumentation Event Subscription
T1004 Winlogon Helper DLL
Other Persistence
Winsock Persistence
Check disabled task manager (often from malware)
Review Hivelist
Locate all user registry keys
Load all users registry keys from their ntuser.dat file (perform above first)
Query all users run key
Unload all users registry keys
Remediate Automatic Load/Run Reg Keys
Check Registry for IE Enhanced Security Modification
Check Registry for disabling of UAC (1=UAC Disabled)
Review Software Keys for malicious entries
Scan Registry keys for specified text
Persistent file locations of interest
Search lnk,bat,dll's
Locate LNK Files with a particular string (Special thanks to the notorious)
Master File Table
Determine Timestomping
Enable Date Accessed Timestamps
Remove BITSAdmin Persistence
Check system directories for executables not signed as part of an operating system release
Locate Possible Trickbot
Determine if user Trusted a doc/spreadsheet etc and ran a macro
Check Office Security Settings
Prevent CVE-2017-11882, CVE-2018-0802, CVE-2018-0804, CVE-2018-0805, CVE-2018-0806, CVE-2018-0807 (EQNEDT32.EXE) Exploitation
Determine if user opened a document
Prevent Executable from Running.
Show known file extensions and hidden files (excluding OS hidden files)
Open File Extension (e.g. scripts) with certain application (elevated cmd)
Disable Command Prompt
Locate Possible DLL Search Order Hijacking
Locate Possible Dll Side Loading
Unique Sideload DLL hashes (may take some time)
Find files without extensions
Remediate malicious files
Detect Persistent WMI Subscriptions
Remediate Persistent WMI Subscriptions
Mimikatz/Credential Extraction Detection
NetNTLM Downgrade Attack Detection
Putty Detection
Installed Updates
Installed Software/Packages
Process information
Current Process execution or module loads from temporary directories
Current Process execution or module loads from temporary directories + hash
Scan for malware with Windows Defender
Check Windows Defender for excluded files and default actions
Delete Windows Defender excluded files
Check and Set Access Control Lists
Change ACE for “everyone” on folder and subfiles/folders
Grant everyone full access
Remove ACE entries for “everyone”
Make multiple files visible and remove ‘superhidden’
Check Security Descriptor Definition Language (SDDL) and Access Control Entries (ACE) for services
Kill “Unstoppable” Service/Process
Obtain hash for all running executables
Obtain hash and established network connections for running executables with dns cache
Obtain hash and listening network connections for running executables
Obtain hash and possible tunneled network connections for running executables
Obtain workstation name for tunneled authentication
Obtain hash of DLLs currently loaded by processes
Obtain processes running which are running a DLL
Obtain hash of unsigned or invalid DLLs currently loaded by processes
Obtain list of unsigned DLLs currently loaded by processes
Obtain DLL information ListDLLs
Obtain unsigned DLL information loaded by processes
Obtain DLLs in use by processes
Determine handles on a file
Verify EternalBlue Patch (MS17-010) is installed - Microsoft
Obtain TXT records from recently resolved domains
Check all Appdata files for unsigned or invalid executables
Check for execuables in Local System User Profile and Files
Investigate WMI Usage
Find executables and scripts in Path directories ($env:Path)
Find files created/written based on date
Check running executables for malware via VirusTotal
Scan systems for IOA/IOC (Yara)
Last updated