Analyzing Evil With Sysmon & Event Logs
Overview
Sysmon Basics
C:\Tools\Sysmon> sysmon.exe -i -accepteula -h md5,sha256,imphash -l -nDetection Example 1: DLL Hijacking Detection
Indicators of Compromise (IOCs)
Detection Example 2: Unmanaged PowerShell/C# Injection Detection
Example of Injection:
Detection Example 3: Credential Dumping Detection (e.g., Mimikatz)
Detection Method
Sample Mimikatz Execution
Last updated