Skip to content

sisoc-tokyo/mimikatz_detection

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

36 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Tracking mimikatz by Sysmon and Elasticsearch

These are tools for helping to detect execution of mimikatz using Sysmon logs. We focus on dlls loaded by mimikatz. Our research details is the following.

HITCON Community 2017 DAY 2 (8/26): Tracking mimikatz by Sysmon and Elasticsearch.

We provide the DLL Lists for helping mimikatz detection.

https://github.com/sisoc-tokyo/mimikatz_detection/tree/master/DLLLists

  • DLLlist_{environment name}-mimi{yyyymmdd}.csv: DLL Lists loaded by mimikatz in specific environment
  • CommonDLLlist.csv: DLL Lists that is commonly loaded regardless of Windows and mimikatz versions
  • AllDLLs.csv: All results of mimikatz DLL loading of all tested Windows and mimikatz versions

We provide the following tools.

  • Tools to create Common DLL List from exported event logs and detect processes that matches the Common DLL List (Java)

https://github.com/sisoc-tokyo/mimikatz_detection/tree/master/javaTool

  • A tool to detect processes that matches Common DLL List from Elasticsearch results (Python 3)

https://github.com/sisoc-tokyo/mimikatz_detection/tree/master/pythonTool

Before using our tools, you should procees the following steps.

  • Install sysmon and gather event logs on the computer which you want to investigate. Please make sure that Event Id 7:Image loaded are recorded.

  • To know the details of tools, please refer README for each tool.

Published by Wataru Matsuda & Mariko Fujimoto

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published