sisoc-tokyo / mimikatz_detection

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Tracking mimikatz by Sysmon and Elasticsearch

These are tools for helping to detect execution of mimikatz using Sysmon logs. We focus on dlls loaded by mimikatz. Our research details is the following.

HITCON Community 2017 DAY 2 (8/26): Tracking mimikatz by Sysmon and Elasticsearch.

We provide the DLL Lists for helping mimikatz detection.

https://github.com/sisoc-tokyo/mimikatz_detection/tree/master/DLLLists

  • DLLlist_{environment name}-mimi{yyyymmdd}.csv: DLL Lists loaded by mimikatz in specific environment
  • CommonDLLlist.csv: DLL Lists that is commonly loaded regardless of Windows and mimikatz versions
  • AllDLLs.csv: All results of mimikatz DLL loading of all tested Windows and mimikatz versions

We provide the following tools.

  • Tools to create Common DLL List from exported event logs and detect processes that matches the Common DLL List (Java)

https://github.com/sisoc-tokyo/mimikatz_detection/tree/master/javaTool

  • A tool to detect processes that matches Common DLL List from Elasticsearch results (Python 3)

https://github.com/sisoc-tokyo/mimikatz_detection/tree/master/pythonTool

Before using our tools, you should procees the following steps.

  • Install sysmon and gather event logs on the computer which you want to investigate. Please make sure that Event Id 7:Image loaded are recorded.

  • To know the details of tools, please refer README for each tool.

Published by Wataru Matsuda & Mariko Fujimoto

About


Languages

Language:HTML 70.5%Language:Java 13.4%Language:CSS 13.3%Language:Python 2.0%Language:JavaScript 0.9%