Skip to content

Latest commit

 

History

History
48 lines (35 loc) · 2.34 KB

README.md

File metadata and controls

48 lines (35 loc) · 2.34 KB

install-sysmon

Install Sysmon on target machine with some obfuscation techniques

Resources

Details

This role install sysmon on the target machine and apply the following obfuscation mechanisms:

And applies the following SACL Audit rules to the following FileSystem and Registry items:

  • Sysmon config filename
  • HKCU:\Software\Sysinternals\System Monitor
  • HKLM:\SOFTWARE\Microsoft\Windows\CurrentVersion\WINEVT\Channels\Microsoft-Windows-Sysmon/Operational
  • "HKLM:\SYSTEM\CurrentControlSet\Services\{{sysmon_obfuscated_drivername}}\Instances\Sysmon Instance"

When a preceding Secureble Object have been opened by a process, the 4663 EventId code will be fired.

To generates these events, the below audit role must be enabled from the Local Group Policy Editor:

  • Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\System Audit Policies - Local Group Policy Object\Object Access\Audit File System
  • Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\System Audit Policies - Local Group Policy Object\Object Access\Audit Registry

Example Playbook

  - name: Install obfuscated sysmon
      import_role:
        name: install-sysmon
      vars:
        sysmon_obfuscated_filename: "abc"
        sysmon_obfuscated_drivername: "abcdrv"
        sysmon_obfuscated_description: "Sample Description"
        sysmon_obfuscated_driver_altitude: 371234
        sysmon_config_filename: "sysmonconfig-export.xml"