Tapping Into ETW
Overview
Detection Example 1: Detecting Strange Parent-Child Relationships
Attack Simulation - Parent PID Spoofing
PS C:\Tools\psgetsystem> powershell -ep bypass Import-Module .\psgetsys.ps1 [MyProcess]::CreateProcessFromParent([Process ID of spoolsv.exe],"C:\Windows\System32\cmd.exe","")
Using SilkETW
c:\Tools\SilkETW_SilkService_v8\v8\SilkETW>SilkETW.exe -t user -pn Microsoft-Windows-Kernel-Process -ot file -p C:\windows\temp\etw.jsonDetection Example 2: Detecting Malicious .NET Assembly Loading
Attack Simulation - Malicious .NET Assembly Load
Using ETW with SilkETW for Deeper Insights
References
Last updated