Process Analysis
Get-Process
Purpose : List all running processes to identify malware/spoofed processes. Use Case : Find high-CPU processes, unrecognized paths, or missing vendor info.
Copy Get-Process | Select-Object Name , Id , CPU , Path | Sort-Object CPU - Descending Network Connections
Get-NetTCPConnection / Get-NetUDPEndpoint
Purpose : List active network connections to detect C2 traffic. Use Case : Identify unknown remote IPs or ports.
Copy Get-NetTCPConnection - State Established | Select-Object LocalAddress , RemoteAddress , OwningProcess Registry Persistence
Run Keys (User & Machine)
Purpose : Check auto-start locations for malware persistence. Use Case : Find unauthorized startup entries.
Copy Get-ItemProperty - Path " HKCU:\Software\Microsoft\Windows\CurrentVersion\Run " , " HKLM:\Software\Microsoft\Windows\CurrentVersion\Run " UserAssist (ROT13 Encoded)
Purpose : Decode GUI program execution history.
Use Case : Find evidence of executed malware via GUI.
USB Device History
Purpose : List connected USB devices.
Use Case : Identify unauthorized storage devices.
ShimCache (AppCompatCache)
Purpose : List executables seen by the system.
Use Case : Find deleted/cleared malware traces.
Purpose : Track program execution history.
Use Case : Identify malware execution frequency.
LNK Files (Recent Shortcuts)
Purpose : Reveal accessed files/executables.
Use Case : Find lateral movement or data exfiltration.
Scheduled Tasks
Purpose : Check for malicious scheduled jobs.
Use Case : Find persistence/backdoor tasks.
Purpose : List resolved domains.
Use Case : Detect C2 domains.
Browser History (Chrome)
Purpose : Extract browsing activity.
Use Case : Find phishing/exploit kit visits.
Windows Event Logs (4624)
Purpose : Identify successful authentication events
Use Case : Detect lateral movement or unauthorized access
Defender Detection Logs
Purpose : List detected (but possibly unblocked) threats
Use Case : Identify past attack attempts
Recycle Bin Contents
Purpose : List recently deleted files
Use Case : Recover attacker-dropped tools
BITS Transfer Jobs
Purpose : Check for off-hours data transfers
Use Case : Detect exfiltration jobs
PowerShell Operational Logs
Purpose : Extract executed script blocks
Use Case : Find malicious PowerShell activity
Volume Shadow Copies
Purpose : List available system restore points
Use Case : Recover pre-attack file versions
Shellbags (Folder Access History)
Purpose : Reveal accessed folders (including disconnected drives)
Use Case : Identify data staging locations
Group Policy Changes
Purpose : Detect malicious policy modifications
Use Case : Find disabled security controls or attacker-added login scripts
Environment Variables
Purpose : Detect malicious policy modifications
Use Case : Find disabled security controls or attacker-added login scripts
VMI Persistence
Purpose : List all WMI event filters
Use Case : Detect malicious event subscriptions (e.g., process creation triggers)
Event Consumers
Purpose : List active WMI consumers
Use Case : Identify malicious payload delivery mechanisms
Filter-Consumer Bindings
Purpose : Reveal filter-to-consumer relationships
Use Case : Map complete WMI persistence chains
Service Management
List All Services
Purpose : Enumerate all installed services
Use Case : Baseline service inventory for anomaly detection
List Running Services
Purpose : Identify currently active services
Use Case : Spot suspicious services consuming resources
List Stopped Services
Purpose : Identify services that are installed but not running
Use Case : Spot misconfigurations or detect if critical services (e.g., AV) were stopped maliciously
Detailed Service Info
Purpose : Examine service binaries and configurations
Use Case : Detect service hijacking or fake services
Processes in Temp/AppData
Purpose : Find executables running from suspicious locations
Use Case : Detect fileless malware or staged payloads
Last updated 9 months ago