The artifact exchange contains many artifacts
When triaging an endpoint we want to quickly answer some questions
Ideally a fire and forget approach
VQL Artifacts can be externally managed
SQLite Hunter
: Automatically hunt and parse all Browser/OS artifacts
Registry Hunter
: Automatically parse all registry relevant data.
Evtx Hunter
: Hunt for event logs.
Sigma Hayabusa
: Automatically detect suspicious activity in the
event logs.
The Windows Registry is a treasure trove of information!
Contains thousands of keys and values
We really need to automate this!
Velociraptor
=~
operator means Regular Expression Match
SELECT * FROM source()
WHERE Details =~ "velociraptor"
Velociraptor
!SELECT EventTime, Provider, EventID, EventData, Message
FROM source(artifact="Windows.EventLogs.EvtxHunter")
So far we saw what happened on the system
But - what bad happened on the system?
Sigma is a way to write detection rules for event logs
title: PSExec Lateral Movement
logsource:
product: windows
service: system
detection:
selection:
Channel: System
EventID: 7045
selection_PSEXESVC_in_service:
Service: PSEXESVC
selection_PSEXESVC_in_path:
ImagePath|contains: PSEXESVC
condition: selection and (selection_PSEXESVC_in_service or selection_PSEXESVC_in_path)