PowerShell For Incident Response
Process Analysis
Get-Process
Purpose: List all running processes to identify malware/spoofed processes. Use Case: Find high-CPU processes, unrecognized paths, or missing vendor info.
Network Connections
Get-NetTCPConnection / Get-NetUDPEndpoint
Purpose: List active network connections to detect C2 traffic. Use Case: Identify unknown remote IPs or ports.
Registry Persistence
Run Keys (User & Machine)
Purpose: Check auto-start locations for malware persistence. Use Case: Find unauthorized startup entries.
UserAssist (ROT13 Encoded)
Purpose: Decode GUI program execution history.
Use Case: Find evidence of executed malware via GUI.
USB Device History
Purpose: List connected USB devices.
Use Case: Identify unauthorized storage devices.
ShimCache (AppCompatCache)
Purpose: List executables seen by the system.
Use Case: Find deleted/cleared malware traces.
Prefetch Files
Purpose: Track program execution history.
Use Case: Identify malware execution frequency.
LNK Files (Recent Shortcuts)
Purpose: Reveal accessed files/executables.
Use Case: Find lateral movement or data exfiltration.
Scheduled Tasks
Purpose: Check for malicious scheduled jobs.
Use Case: Find persistence/backdoor tasks.
DNS Cache
Purpose: List resolved domains.
Use Case: Detect C2 domains.
Browser History (Chrome)
Purpose: Extract browsing activity.
Use Case: Find phishing/exploit kit visits.
Windows Event Logs (4624)
Purpose: Identify successful authentication events
Use Case: Detect lateral movement or unauthorized access
Defender Detection Logs
Purpose: List detected (but possibly unblocked) threats
Use Case: Identify past attack attempts
Recycle Bin Contents
Purpose: List recently deleted files
Use Case: Recover attacker-dropped tools
BITS Transfer Jobs
Purpose: Check for off-hours data transfers
Use Case: Detect exfiltration jobs
PowerShell Operational Logs
Purpose: Extract executed script blocks
Use Case: Find malicious PowerShell activity
Volume Shadow Copies
Purpose: List available system restore points
Use Case: Recover pre-attack file versions
Shellbags (Folder Access History)
Purpose: Reveal accessed folders (including disconnected drives)
Use Case: Identify data staging locations
Group Policy Changes
Purpose: Detect malicious policy modifications
Use Case: Find disabled security controls or attacker-added login scripts
Environment Variables
Purpose: Detect malicious policy modifications
Use Case: Find disabled security controls or attacker-added login scripts
VMI Persistence
Event Filters
Purpose: List all WMI event filters
Use Case: Detect malicious event subscriptions (e.g., process creation triggers)
Event Consumers
Purpose: List active WMI consumers
Use Case: Identify malicious payload delivery mechanisms
Filter-Consumer Bindings
Purpose: Reveal filter-to-consumer relationships
Use Case: Map complete WMI persistence chains
Service Management
List All Services
Purpose: Enumerate all installed services
Use Case: Baseline service inventory for anomaly detection
List Running Services
Purpose: Identify currently active services
Use Case: Spot suspicious services consuming resources
List Stopped Services
Purpose: Identify services that are installed but not running
Use Case: Spot misconfigurations or detect if critical services (e.g., AV) were stopped maliciously
Detailed Service Info
Purpose: Examine service binaries and configurations
Use Case: Detect service hijacking or fake services
Processes in Temp/AppData
Purpose: Find executables running from suspicious locations
Use Case: Detect fileless malware or staged payloads
Last updated
Was this helpful?