Download sysmon
Author: m | 2025-04-24
Download Sysmon: In the Remote desktop → Open Edge → Download Sysmon to the system. Extract the download Sysmon Zip file. Downlaod Sysmon configuration file: To install Sysmon on a Windows system, follow these steps: Download Sysmon: Visit the official Sysinternals Sysmon page to download the latest version of Sysmon
Sysmon 101. Introduction to Sysmon
BLX stealer, also known as XLABB Stealer is a malware designed to steal sensitive information like credentials, payment data, and cryptocurrency wallets from infected endpoints. It uses advanced evasion techniques, process injection, and file encryption to bypass traditional security tools, making it a serious threat to individuals and organizations. BLX Stealer is actively promoted on platforms like Telegram and Discord and comes in both free and premium versions. This blog post demonstrates how to detect and respond to BLX stealer on an infected Windows endpoint with Wazuh.Behavioral analysis of BLX stealerUpon infecting an endpoint, BLX stealer exhibits the following behaviors:The malware creates a PowerShell script temp.ps1 in the working directory.It starts a command prompt and runs a command that executes the previously created PowerShell script:C:\Windows\system32\cmd.exe /d /s /c “powershell.exe -ExecutionPolicy Bypass -File “Triggers Csc.exe and Cvtres.exe which are both legitimate Microsoft utilities that BLX abuses to compile and manipulate executable files.It executes the decrypted_executable file which is dropped in the %TeMP% folder and the users’ %Startup% folder to ensure persistence.It attempts to discover the victim’s IP and Geolocation details by querying api.ipify.org and geolocation-db.com.Analyzed malware sampleHash algorithmValueMD555bd26a6b610fc1748d0ea905a13f4f0SHA2568c4daf5e4ced10c3b7fd7c17c7c75a158f08867aeb6bccab6da116affa424a89InfrastructureWe use the following infrastructure to demonstrate the detection of BLX Stealer with Wazuh:A pre-built ready-to-use Wazuh OVA 4.9.2. Follow this guide to download the virtual machine.A Windows 11 victim endpoint with Wazuh agent 4.9.2 installed and enrolled to the Wazuh server. Refer to the installation guide for installing the Wazuh agent. We use the following techniques to detect the BLX Stealer on the infected Windows endpoint:Creating custom detection rules to detect BLX Stealer activities.Using a YARA integration to scan and remove files with malicious patterns.Creating detection rulesWe use Sysmon to monitor critical system events on Windows endpoints, such as process creation, file modifications, registry changes, network connections, and script executions. These events are correlated with custom rules on the Wazuh server to detect malicious behaviors specific to BLX Stealer activities.Windows endpointPerform the following steps to configure the Wazuh agent to capture and send Sysmon logs to the Wazuh server for analysis.1. Download Sysmon from the Microsoft Sysinternals page.2. Using Powershell with administrator privilege, create a Sysmon folder in the endpoint C:\ folder:> New-Item -ItemType Directory -Path C:\Sysmon3. Extract the compressed Sysmon file to the folder created above C:\Sysmon:> Expand-Archive -Path "\Sysmon.zip" -DestinationPath "C:\Sysmon"Replace with the path where Sysmon.zip was downloaded.4. Download the Sysmon configuration file – sysmonconfig.xml to C:\Sysmon using the Powershell command below:> wget -Uri -OutFile C:\Sysmon\sysmonconfig.xml5. Switch to the directory with the Sysmon executable and run the command below to install and start Sysmon using PowerShell with administrator privileges: > cd C:\Sysmon > .\Sysmon64.exe -accepteula -i sysmonconfig.xml6. Add the following configuration within the block of the C:\Program Files (x86)\ossec-agent\ossec.conf file: Microsoft-Windows-Sysmon/Operational
dritonshoshi/n-sysmon: n-sysmon is a fork of a-sysmon - GitHub
Sysmon2splunkGenerating Sysmon events with the SwiftOnSecurity configuration and ingesting/normalizing the dataset in a remote Splunk instance.ObjectivesUse Microsoft Sysinternals Sysmon on several Microsoft Windows endpoints to generate granular security-related event logs.Push the Sysmon event logs to an index on a remote Splunk virtual machine.Parse all the things.PrerequisitesSplunk serverRequirementsSplunk.com AccountSplunk Universal ForwarderMicrosoft Windows HostMicrosoft Sysinternals SysmonSwiftOnSecurity Sysmon ConfigText EditorSysmonWhat is Sysmon?System Monitor (Sysmon) is a Windows system service and device driver that, once installed on a system, remains resident across system reboots to monitor and log system activity to the Windows event log. It provides detailed information about process creations, network connections, and changes to file creation time. configThe Sysmon configuration file from SwiftOnSecurity provides high-quality event tracing to support threat hunting, compromise assessments, incident response, etc. is Splunk?Splunk is a powerful data analytic tool that allows for the parsing and visualizations of big data. Splunk deployments can have several different architectures but for the purpose of this write-up, all components of Splunk have been deployed into a single VM. A Splunk.com Account will be required to download the necessary components of this capability.Universal ForwarderSplunk utilizes its own Universal Forwarder to send data to the Splunk indexer. In this case, the data sent from our endpoints to the Splunk server will be our Sysmon event logs. Add-on for Microsoft SysmonThe Splunk Add-on for Microsoft Sysmon is a highly-rated application built by Splunk Works in an effort to provide a data input and CIM-compliant field extractions for Microsoft Sysmon. Essentially, this add-on willSystem Monitor Sysmon. What is Sysmon?
The following sections describe the differences between versions 10.6.2 of the Splunk Add-on for Microsoft Sysmon and 1.0.1 of the Splunk Add-on for Sysmon:Field mapping comparison for versions 10.6.2 of the Splunk Add-on for Microsoft Sysmon and 1.0.1 of the Splunk Add-on for SysmonVersion 1.0.1 of the Splunk Add-on for Sysmon introduces field mapping changes to the XmlWinEventLog sourcetype. See the following table for information in field changes between version 10.6.2 of the Splunk Add-on for Microsoft Sysmon and 1.0.1 of the Splunk Add-on for SysmonSource typeEventCodeFields addedFields modifiedFields removed10.6.2 extractions1.0.1 extractionsXmlWinEventLog1original_file_nameossignatureEventDescriptionappcmdlinedirectiondvchashessession_iduser_idProcess Create, Process CreateProcess creation, Process creationXmlWinEventLog2actiondestfile_modify_timesignatureEventDescriptiontag::eventtypetagappdirectiondvcsession_iduser_idFile Create Time, File Create Time, change endpoint filesystem, change endpoint filesystemA process changed a file creation time, A process changed a file creation time, endpoint filesystem, endpoint filesystemXmlWinEventLog3actiondvc_ipprotocol_versiontransport_dest_portsignatureprotocoldeststateEventDescriptiontagtag::eventtypedest_hostprocess_pathsession_iduser_idNetwork Connect, https, -, listening, Network Connect, listening port communicate network, listening port communicate networkNetwork connection, ip, 52.46.216.120, estabished, Network connection, communicate network, communicate networkXmlWinEventLog4descriptiondesteventtypeserviceservice_namestatustagtag::eventtypesignatureEventDescriptiondirectiondvcparent_process_execparent_process_nameprocess_execprocess_nameuser_idSysmon Start, Sysmon StartSysmon service state changed, Sysmon service state changedXmlWinEventLog5actiondestosprocesssignatureEventDescriptionappdirectiondvcsession_iduser_idProcess Terminate, Process TerminateProcess terminated, Process terminatedXmlWinEventLog6actiondestosprocess_pathservice_signature_existsservice_signature_verifiedsignaturedirectiondvchashesparent_process_execparent_process_nameprocess_execprocess_nameuser_idDriver LoadDriver loadedXmlWinEventLog7actiondesteventtypeosparent_process_execparent_process_guidparent_process_idparent_process_nameparent_process_pathservice_dll_signature_existsservice_dll_signature_verifiedtagtag::actiontag::eventtypesignatureprocess_execEventDescriptionprocess_pathprocess_nameappdirectiondvchashesprocess_guidprocess_idsession_iduser_idImage Load, unsecapp.exe, Image Load, C:\Windows\System32\wbem\unsecapp.exe, unsecapp.exeImage loaded, oleaut32.dll, Image loaded, C:\Windows\System32\oleaut32.dll, oleaut32.dllXmlWinEventLog8actiondestosparent_process_guidparent_process_idparent_process_pathprocess_guidprocess_idprocess_pathsrc_addresssrc_functionsrc_modulesignatureprocess_nameparent_process_nameEventDescriptionparent_process_execprocess_execdirectiondvcuser_idCreate Remote Thread, csrss.exe, , Create Remote Thread, csrss.exeCreateRemoteThread, splunkd.exe, csrss.exe, CreateRemoteThread, csrss.exe, splunkd.exeXmlWinEventLog9actiondestossignatureEventDescriptionappdirectiondvcsession_iduser_idRaw Access Read, Raw Access ReadRawAccessRead, RawAccessReadXmlWinEventLog10actiondestgranted_accessosparent_process_guidparent_process_idparent_process_pathprocess_guidprocess_idprocess_pathprocess_execparent_process_execEventDescriptionparent_process_nameprocess_namesignaturedirectionuser_idsvchost.exe,, Process Access,, svchost.exe, Process AccessMsMpEng.exe, svchost.exe, ProcessAccess, svchost.exe, MsMpEng.exe, ProcessAccessXmlWinEventLog11actiontag::eventtypetagEventDescriptionsignatureappdirectiondvcsession_iduser_idchange endpoint filesystem, change endpoint filesystem, File Created, File Createdendpoint filesystem, endpoint filesystem, FileCreate, FileCreateXmlWinEventLog12registry_hivestatustag::eventtypetag,registry_key_nameEventDescriptionsignatureappdirectiondvcobjectsession_iduser_idchange endpoint registry, change endpoint registry, Parameters, Registry object added or deleted, Registry object added or deletedendpoint registry, endpoint registry, HKLM\System\CurrentControlSet\Services\Tcpip\Parameters, RegistryEvent (Object create and delete), RegistryEvent (Object create and delete)XmlWinEventLog13RegistryValueDataregistry_hiveregistry_value_dataregistry_value_typestatustag::eventtypetagregistry_key_nameEventDescriptionregistry_value_namesignatureappdirectionobjectsession_iduser_idchange endpoint registry, change endpoint registry, SecureTimeHigh, Registry value set, QWORD (0x01d76449-0xb4beb640), Registry value setendpoint registry, endpoint registry, HKLM\System\CurrentControlSet\Services\W32Time\SecureTimeLimits, RegistryEvent (Value Set), SecureTimeHigh, RegistryEvent (Value Set)XmlWinEventLog14actionregistry_hivestatustag::eventtypetagregistry_key_nameEventDescriptionsignatureappdirectiondvcobjectsession_iduser_idchange endpoint registry, change endpoint registry, test1, Registry object renamed, Registry object renamedendpoint registry, endpoint registry, HKU\S-1-5-21-2763475848-2734699699-1333640867-1011\test1, RegistryEvent (Key and Value Rename). RegistryEvent (Key and Value Rename)XmlWinEventLog15actiondestfile_hashhttp_referrerhttp_referrer_domainosuri_pathurlurl_domainfile_pathEventDescriptionfile_namesignatureappdirectiondvcsession_iduser_idC:\Users\splunker\Downloads\Sublime Text Build 3211 x64 Setup.exe:Zone.Identifier, File stream created, Sublime Text Build 3211 x64 Setup.exe:Zone.Identifier, File stream createdC:\Users\splunker\Downloads\Sublime Text Build 3211 x64 Setup.exe, FileCreateStreamHash, Sublime Text Build 3211 x64 Setup.exe, FileCreateStreamHashXmlWinEventLog16descriptiondesteventtypeprocess_idserviceservice_namestatustagtag::eventtypeEventDescriptionsignaturedirectiondvcparent_process_execparent_process_nameprocess_execprocess_nameuser_idSysmon Configuration Changed, Sysmon Configuration ChangedServiceConfigurationChange, ServiceConfigurationChangeXmlWinEventLog17actiondestospipe_nameEventDescriptionsignatureappdirectiondvcsession_iduser_idPipe Created, Pipe CreatedPipeEvent (Pipe Created), PipeEvent (Pipe Created)XmlWinEventLog18actiondestospipe_nameEventDescriptionsignatureappdirectiondvcsession_iduser_idPipe Connected, Pipe ConnectedPipeEvent (Pipe Connected), PipeEvent (Pipe Connected)XmlWinEventLog19actionchange_typedestresultsrcstatususer_nameEventDescriptionsignaturedirectionparent_process_execparent_process_nameprocess_execprocess_nameuser_idWmiEventFilter activity detected, WmiEventFilter activity detectedWmiEvent (WmiEventFilter activity detected), WmiEvent (WmiEventFilter activity detected)XmlWinEventLog20actionchange_typedestobjectobject_pathsrcstatususer_nameEventDescriptionsignaturedirectionparent_process_execparent_process_nameprocess_execprocess_nameuser_idWmiEventConsumer activity detected, WmiEventConsumer activity detectedWmiEvent (WmiEventConsumer activity detected), WmiEvent (WmiEventConsumer activity detected)XmlWinEventLog21actionchange_typedestobjectobject_attrsobject_pathresultsrcstatususer_nameEventDescriptionsignaturedirectionparent_process_execparent_process_nameprocess_execprocess_nameuser_idWmiEventConsumerToFilter activity detected, WmiEventConsumerToFilter activity detectedWmiEvent (WmiEventConsumerToFilter activity detected),WmiEvent (WmiEventConsumerToFilter activity detected)XmlWinEventLog22answer_countquery_countsrcEventDescriptionsignatureappdirectiondvcparent_process_execparent_process_nameprocess_idprocess_pathrecordsession_iduser_idDNS Query, DNS QueryDNSEvent (DNS query), DNSEvent (DNS query)XmlWinEventLog23actiondesteventtypefile_hashfile_modify_timeobject_categorytagtag::eventtypetag::object_categoryprocess_execEventDescriptionprocess_namesignatureappdirectiondvchashesparent_process_execparent_process_nameprocess_hashsession_iduser_id,Unknown,, Unknownsplunk-winevtlog.exe, FileDelete (File Delete archived), splunk-winevtlog.exe, FileDelete (File Delete archived)XmlWinEventLog24SrcHostactiondesteventtypeossrc_hosttagtag::eventtypeuserprocess_execEventDescriptionprocess_namesignatureappdirectionhashesparent_process_execparent_process_namesession_iduser_id,Unknown,, Unknownrdpclip.exe, ClipboardChange (New content in the clipboard), rdpclip.exe, ClipboardChange (New content in the clipboard)XmlWinEventLog25actiondesteventtypeosresulttagtag::eventtypeEventDescriptionsignatureappdirectiondvcparent_process_execparent_process_nameprocess_execprocess_namesession_iduser_idUnknown, UnknownProcessTampering (Process image change), ProcessTampering (Process image change)XmlWinEventLog26actiondesteventtypefile_access_timefile_hashfile_modify_timeobject_categorytagtag::eventtypetag::object_categoryprocess_execEventDescriptionprocess_namesignatureappdirectionhashesparent_process_execparent_process_nameprocess_hashsession_iduser_id, Unknown,, Unknownchrome.exe, FileDeleteDetected (File Delete logged), chrome.exe, FileDeleteDetected (File Delete logged)XmlWinEventLog255descriptiondestprocess_idresultserviceservice_namestatustag::eventtypeeventtypetagdirectionparent_process_execparent_process_nameprocess_execprocess_nameuser_idservice report, ms-sysmon-service, service reportCIM model comparison for versions 10.6.2 of the Splunk Add-on for Microsoft Sysmon and 1.0.1 of the Splunk Add-on for SysmonSourceEventIDPrevious CIM modelNew CIM modelXmlWinEventLog1, 10, 15, 17, 18, 19, 20, 21, 22, 5, 6, 8, 9XmlWinEventLog11, 12, 13, 14, 2ChangeXmlWinEventLog3EndpointXmlWinEventLog16, 255, 4EndpointXmlWinEventLog23, 26EndpointXmlWinEventLog24, 25, 7Endpoint. Download Sysmon: In the Remote desktop → Open Edge → Download Sysmon to the system. Extract the download Sysmon Zip file. Downlaod Sysmon configuration file:GitHub - SwiftOnSecurity/sysmon-config: Sysmon
Organize all your e-books within the library by their metadata (data that provide information about other data) from sources such as online booksellers, the Internet Archive, Munsey's, and ISBNdb.com for example. Download Calibre - MajorGeeksSystem Monitor (Sysmon) 12.01System Monitor (Sysmon) is a Windows system service and device driver that remains resident across system reboots to monitor and log system activity to the Windows event log. Download System Monitor (Sysmon) - MajorGeeksGrub2Win 2.2.0.3Grub2Win is an open source program to safely dual-boot Windows and Linux. Using the simple Windows GUI and instructions, you can install Grub2Win quickly and safely. Boot-time messages and help can be displayed in multiple languages. Once installed, the interface makes it simple to boot into whatever operating system you want with ease. Download Grub2Win - MajorGeeksPegasun System Utilities 6.00Pegasun System Utilities is a complete computer care package that will clean, speed up, maintain, secure, and repair your system to run like brand new. Download Pegasun System Utilities - MajorGeekssysmon-config/ at master SwiftOnSecurity/sysmon
Send on national and international network at any time. Bulk SMS sending application is ... Shareware | $69.00 tags: Bulk, SMS, application, sending, tool, broadcast, messaging, service, compose, unlimited, text, forward, job, messages, software, globally, advertising, promote, business, products, deliver, marketing, advertisement, alerts, greeting, notifications Sysmon 15.15 ... Monitor, is a powerful and versatile system monitoring utility developed by Sysinternals, a subsidiary of Microsoft. Designed ... high degree of precision. This includes process creations, network connections, file modifications, and changes to the system's ... Freeware tags: Sysmon free download, Windows, logging, tracker, download Sysmon, Sysinternals, monitor, monitoring, security, Sysmon, system monitor, log, activity logger, logger, event log Screen Paver 4.8 ... jpeg, png, or bitmap pictures from local and/or network directories. Features include picture sorting, stretching/shrinking/tiling, transition effects, ... CD or from music files. Its a great utility for digital camera owners. A bonus screen saver ... Shareware | $14.95 tags: screensaver, jpeg, bitmap, png, slide show, images, digital, pictures, photo, wallpaper, saver Omnify Hotspot 4.0 ... connection. - Reduce your Wi-Fi costs. - Monitor network traffic of each connected device. - Create a ... 3G/4G LTE connection. - Repeat an existing wireless network and boost its signal. - Connect devices directly ... Freeware tags: repeater, hotspot, vpn, firewall, access, monitoring, traffic, performance, network, lte, wifi, wireless, internet, sharing, ad block, windows, utility, free, freeware, bridge, mode BlueLife Hosts Editor 1.6 ... This software is particularly useful for IT professionals, network administrators, and tech enthusiasts who require a reliable methodGitHub - olafhartong/sysmon-modular: A repository of sysmon
Can conclude that the malicious process is created in memory and it should be logged.To hunt the malicious process, let's filter the logs displayed to logs which have EventID 1.RESULTWe got 6 results. Long story short, after reviewing each logs, found one log with suspicious binary name.It has double extension. The easiest way to bust whether it's the malware or not is not by contextual analysis. But sends the hash values provided at the sysmon log to virustotal.RESULT IN VIRUSTOTALIt's tagged as malicious! Noticed it's categorized as Trojan and it's family is winvnc. Exactly what is the scenario told us.Hence we hunted the malware.NOTES:WinVNC (Windows Virtual Network Computing) malware is a specific type of malicious software that exploitsthe VNC protocol to gain unauthorized remote desktop access to a victim's computer running the Windows operating system.3RD QUESTION --> ANS: dropboxAt the first sysmon log, we can identified that there is an access to a cloud storage named dropbox from the victim's system.EventID 22 itself indicates a DNSEvent.The next sysmon log has eventID 11 which indicates a file creation event.Interesting! We can speculate that the dropbox google cloud is accessed and the malware is downloaded to the victim's system from there.Our speculation can be proven by reviewing the 2nd eventID 11 log and the 4th eventID 11 log.There is a .part file for skZdsnwf.exe file. This indicates a download is attempted and not finished.Then at the 4th log with eventID 11, we can see a firefox.exe still used at the same timestampGitHub - SwiftOnSecurity/sysmon-config: Sysmon configuration
Take the unstructured chunk of data that makes up each log and chop it up into structured fields and values. access to the Splunk web console (Default: IP):8000)If web console is inaccessible, validate appropriate firewall configuration. Splunk defaults:TCP/8000TCP/9997Login to Splunk web console and set up config to receive data.If Splunk is not configured to receive data from a remote source:Settings > Forwarding and receiving > + Add new under Configure receivingDefault port is 9997 > SaveIf Splunk is configured to receive data from a remote source:Take note of receiving port by reviewing Forwarding and receiving under SettingsCreate index for SysmonSettings > Indexes > New IndexType sysmon for the index name, make necessary environment configuration changes, and click SaveInstall the Splunk Add-on for Microsoft Sysmon on the Splunk server ( Microsoft Sysinternals Sysmon ( the SwiftOnSecurity Sysmon configuration file ( the Sysmon executables and this config into the same folder. I chose C:\sysmon for ease of use.Open a Command Prompt or PowerShell window with the appropriate permissions to install software on the host and run the following command to initiate the Sysmon installation:sysmon.exe -accepteula -i sysmonconfig-export.xmlVerify logs are being generated by reviewing the Sysmon/Operational events the Windows Event Viewer.Start > Event Viewer (eventvwr.msc)Application and Service Logs > Microsoft > Windows > Sysmon > OperationalInstall the Splunk Universal Forwarder ( inputs.conf file with the code below at the following file location:C:\Program Files\SplunkUniversalForwarder\etc\system\local\inputs.conf #CHANGE ME[WinEventLog://Microsoft-Windows-Sysmon/Operational]disabled = falserenderXml = trueindex = sysmonsource = XmlWinEventLog:Microsoft-Windows-Sysmon/Operational">[default]host = #CHANGE ME[WinEventLog://Microsoft-Windows-Sysmon/Operational]disabled = falserenderXml = trueindex = sysmonsource =. Download Sysmon: In the Remote desktop → Open Edge → Download Sysmon to the system. Extract the download Sysmon Zip file. Downlaod Sysmon configuration file:
Sysmon 101. Introduction to Sysmon
Write-up author: jon-brandyLessons Learned:Sysmon EventID definition.Reviewing sysmon logs using Event Viewer.Analyzing UltraVNC Infection Incident.SCENARIO:In this Sherlock, you will familiarize yourself with Sysmon logs and various useful EventIDs for identifying and analyzing malicious activities on a Windows system.Palo Alto's Unit42 recently conducted research on an UltraVNC campaign, wherein attackers utilized a backdoored version of UltraVNC to maintain access to systems.This lab is inspired by that campaign and guides participants through the initial access stage of the campaign.STEPS:In this challenge, we're tasked to analyze malicious act on a Windows system by reviewing a Windows Event Log file which contains sysmon logs.NOTES:Sysmon (System Monitor) logs are a type of log generated by the Sysinternals Sysmon utility, which is a Windows systemservice and device driver thatprovides advanced system monitoring and logging capabilities. Sysmon logs capturedetailed information about various activities happening on a Windows system, including process creation,network connections, file creation, registry modifications, and more.To analyze this type of log file we can use Event Viewer.Result in Event Viewer1ST QUESTION --> ANS: 56There are 2 ways to identify the total logs for EventID 11. The first one is by filtering the log displayed in EventViewer then count it manually or check the top diplayed number.Or, simply execute this powershell command.COMMANDGet-WinEvent -Path '.\Microsoft-Windows-Sysmon-Operational.evtx' -FilterXPath "*[System[(EventID=11)]]" | Measure-ObjectTHE RESULT OF PS COMMAND2ND QUESTION --> ANS: C:\Users\CyberJunkie\Downloads\Preventivo24.02.14.exe.exeIn analyzing sysmon logs, I used this online WIKI to help me identify the meaning of each eventID.It said that there is a malicious process that infected the victim's system, hence wedritonshoshi/n-sysmon: n-sysmon is a fork of a-sysmon - GitHub
Sysmon-config | A Sysmon configuration fileThis is a forked and modified version of @SwiftOnSecurity's sysmon config.It started as a is simply copy of the original repository. We merged most of the 30+ open pull requests. Thus we have fixed many of the issues that are still present in the original version and extended the coverage with important new extensions.Maintainers of this ForkFlorian Roth @Neo23x0Tobias Michalski @humpalumChristian Burkard @phantinussNasreddine Bencherchali @nas_benchAdditional coverage includesCobalt Strike named pipesPrinterNightmareHiveNightmareConfigs in this RepositoryThis repo includes the original and two additional configurationssysmonconfig-export.xml the original config provided by @SwiftOnSecuritysysmonconfig-export-block.xml the original config provided by @SwiftOnSecurity with some basic blocking rules usable since Sysmon v14 (WARNING: use it with care!)sysmonconfig-trace.xml a config by @Cyb3rWard0g that logs just everything with a few examples for debugging or threat research purposesOther Sysmon ConfigsOlaf Hartong's Sysmon Modular - modular Sysmon config for easier maintenance and generation of specific configsTestingThis configuration is focused on detection coverage. We have only one rather small testing environment to avoid problematic expressions that trigger too often. It is recommended to test the downloaded configuration on a small set of systems in your environment in any case.FeedbackSince we don't have more than one environment to test the config ourselves, we rely on feedback from the community.Please report:Expressions that cause a high volume of eventsBroken configuration elements (typos, wrong conditions)Missing coverage (preferrably as a pull request)UsageInstallRun with administrator rightssysmon.exe -accepteula -i sysmonconfig-export.xmlUpdate existing configurationRun with administrator rightssysmon.exe -c sysmonconfig-export.xmlUninstallRun with administrator rightsCreditsSince we wanted to be able to receive new pull requests this repository, we had to squash all open(!) pull requests of the original reposiory into a single commit on this one.We've pull the following requests:Registry key to detect definitions of Windows Defender Exclusions155 opened 12 days ago by @phantinussOutlook Webview URL changes154 opened on 14 Jun by @humpalumEvent id 26153 opened on 14 Jun by @Richman711Important and relevant NamedPipe names151 opened on 27 May by @Neo23x0Added named pipe used by @Cobalt Strike150 opened on 26 May by @WojciechLesickiFix FileDelete example.149 opened on 26 May by @sigalpesAdd exclusion for WUDFHost.exe to Event 11148 opened on 19 Apr by @lord-garmadonCorrected event name for Event ID 23147 opened on 16 Apr by @lord-garmadonMonitor for .js files for Microsoft JScript146 opened on 7 Apr by @KevinDeNotariisAdded WinRM ports and Service names145 opened on 16 Mar by @tobor88Add ASP files for webshells144 opened on 8 Mar by @GossiTheDogUpdate NetworkConnect rule to fix. Download Sysmon: In the Remote desktop → Open Edge → Download Sysmon to the system. Extract the download Sysmon Zip file. Downlaod Sysmon configuration file:System Monitor Sysmon. What is Sysmon?
Ipconfig again should showcase the new IP address.If your Splunk server is running, you can visit it via the browser on your target machine's browser by typing 192.168.10.10:8000 in as the URL. In the target machine visit and navigate to Products > Free Trials & Downloads > Universal Forwarder > Get my free download and download the correct version for your target machine. Double-click the installed MSI file, set up basic information but don't create a password. Skip deployment server, but for Receiving Indexer set the IP/port to 192.168.10.10:9997 and install.Now install Sysmon by navigating to Next, navigate to scroll down and select sysmonconfig.xml. Click "raw", and save the file. Extract the sysmon file, copy URL of the extracted directory, take the sysmonconfig.xml file and place it in the extracted Sysmon file.and open Powershell as administrator, and navigate to that directory. Run .\Sysmon64.exe -i ..\sysmonconfig.xml, then click agree.Now for the most important step, navigate to File Explorer> Local Disk (C:) > Program Files > SplunkUniversalForwarder > etc > system > local. Open Notepad as administrator and enter the following:Save this file as all file types in the local folder accessed previously as "inputs.conf".Open Services as administrator, navigate and double click SplunkForwarder, log on, and check Local System Account. Right-click Splunk Forwarder, and restart. Now, navigate to 192.168.10.10:8000 and login. Now navigate Apps > Search & Reporting and search for "index=endpoint".If you have done everything right, when you view your Splunk Server, you should be able to see under “Selected fields” > “Host” your Target-PC and ADDC01.Part 3- Configuring Active DirectoryOn the Windows Server, open Server Manager and select Add Roles and Features. Select Next > Next, and check Active Directory Domain Services > Add Features. Advance until you can select install.Once you receive the message "Configuration required. Installation succeeded on ADDC01, you can advance to the next steps. Locate the flag icon at the top of the window, and select "Promote this server to a domain controller". Select "Add a new forest", because we are creating a brand-new domain. Give your domain a name, for example; ‘demo.local’. On the nextComments
BLX stealer, also known as XLABB Stealer is a malware designed to steal sensitive information like credentials, payment data, and cryptocurrency wallets from infected endpoints. It uses advanced evasion techniques, process injection, and file encryption to bypass traditional security tools, making it a serious threat to individuals and organizations. BLX Stealer is actively promoted on platforms like Telegram and Discord and comes in both free and premium versions. This blog post demonstrates how to detect and respond to BLX stealer on an infected Windows endpoint with Wazuh.Behavioral analysis of BLX stealerUpon infecting an endpoint, BLX stealer exhibits the following behaviors:The malware creates a PowerShell script temp.ps1 in the working directory.It starts a command prompt and runs a command that executes the previously created PowerShell script:C:\Windows\system32\cmd.exe /d /s /c “powershell.exe -ExecutionPolicy Bypass -File “Triggers Csc.exe and Cvtres.exe which are both legitimate Microsoft utilities that BLX abuses to compile and manipulate executable files.It executes the decrypted_executable file which is dropped in the %TeMP% folder and the users’ %Startup% folder to ensure persistence.It attempts to discover the victim’s IP and Geolocation details by querying api.ipify.org and geolocation-db.com.Analyzed malware sampleHash algorithmValueMD555bd26a6b610fc1748d0ea905a13f4f0SHA2568c4daf5e4ced10c3b7fd7c17c7c75a158f08867aeb6bccab6da116affa424a89InfrastructureWe use the following infrastructure to demonstrate the detection of BLX Stealer with Wazuh:A pre-built ready-to-use Wazuh OVA 4.9.2. Follow this guide to download the virtual machine.A Windows 11 victim endpoint with Wazuh agent 4.9.2 installed and enrolled to the Wazuh server. Refer to the installation guide for installing the Wazuh agent. We use the following techniques to detect the BLX Stealer on the infected Windows endpoint:Creating custom detection rules to detect BLX Stealer activities.Using a YARA integration to scan and remove files with malicious patterns.Creating detection rulesWe use Sysmon to monitor critical system events on Windows endpoints, such as process creation, file modifications, registry changes, network connections, and script executions. These events are correlated with custom rules on the Wazuh server to detect malicious behaviors specific to BLX Stealer activities.Windows endpointPerform the following steps to configure the Wazuh agent to capture and send Sysmon logs to the Wazuh server for analysis.1. Download Sysmon from the Microsoft Sysinternals page.2. Using Powershell with administrator privilege, create a Sysmon folder in the endpoint C:\ folder:> New-Item -ItemType Directory -Path C:\Sysmon3. Extract the compressed Sysmon file to the folder created above C:\Sysmon:> Expand-Archive -Path "\Sysmon.zip" -DestinationPath "C:\Sysmon"Replace with the path where Sysmon.zip was downloaded.4. Download the Sysmon configuration file – sysmonconfig.xml to C:\Sysmon using the Powershell command below:> wget -Uri -OutFile C:\Sysmon\sysmonconfig.xml5. Switch to the directory with the Sysmon executable and run the command below to install and start Sysmon using PowerShell with administrator privileges: > cd C:\Sysmon > .\Sysmon64.exe -accepteula -i sysmonconfig.xml6. Add the following configuration within the block of the C:\Program Files (x86)\ossec-agent\ossec.conf file: Microsoft-Windows-Sysmon/Operational
2025-03-27Sysmon2splunkGenerating Sysmon events with the SwiftOnSecurity configuration and ingesting/normalizing the dataset in a remote Splunk instance.ObjectivesUse Microsoft Sysinternals Sysmon on several Microsoft Windows endpoints to generate granular security-related event logs.Push the Sysmon event logs to an index on a remote Splunk virtual machine.Parse all the things.PrerequisitesSplunk serverRequirementsSplunk.com AccountSplunk Universal ForwarderMicrosoft Windows HostMicrosoft Sysinternals SysmonSwiftOnSecurity Sysmon ConfigText EditorSysmonWhat is Sysmon?System Monitor (Sysmon) is a Windows system service and device driver that, once installed on a system, remains resident across system reboots to monitor and log system activity to the Windows event log. It provides detailed information about process creations, network connections, and changes to file creation time. configThe Sysmon configuration file from SwiftOnSecurity provides high-quality event tracing to support threat hunting, compromise assessments, incident response, etc. is Splunk?Splunk is a powerful data analytic tool that allows for the parsing and visualizations of big data. Splunk deployments can have several different architectures but for the purpose of this write-up, all components of Splunk have been deployed into a single VM. A Splunk.com Account will be required to download the necessary components of this capability.Universal ForwarderSplunk utilizes its own Universal Forwarder to send data to the Splunk indexer. In this case, the data sent from our endpoints to the Splunk server will be our Sysmon event logs. Add-on for Microsoft SysmonThe Splunk Add-on for Microsoft Sysmon is a highly-rated application built by Splunk Works in an effort to provide a data input and CIM-compliant field extractions for Microsoft Sysmon. Essentially, this add-on will
2025-04-22Organize all your e-books within the library by their metadata (data that provide information about other data) from sources such as online booksellers, the Internet Archive, Munsey's, and ISBNdb.com for example. Download Calibre - MajorGeeksSystem Monitor (Sysmon) 12.01System Monitor (Sysmon) is a Windows system service and device driver that remains resident across system reboots to monitor and log system activity to the Windows event log. Download System Monitor (Sysmon) - MajorGeeksGrub2Win 2.2.0.3Grub2Win is an open source program to safely dual-boot Windows and Linux. Using the simple Windows GUI and instructions, you can install Grub2Win quickly and safely. Boot-time messages and help can be displayed in multiple languages. Once installed, the interface makes it simple to boot into whatever operating system you want with ease. Download Grub2Win - MajorGeeksPegasun System Utilities 6.00Pegasun System Utilities is a complete computer care package that will clean, speed up, maintain, secure, and repair your system to run like brand new. Download Pegasun System Utilities - MajorGeeks
2025-04-10Send on national and international network at any time. Bulk SMS sending application is ... Shareware | $69.00 tags: Bulk, SMS, application, sending, tool, broadcast, messaging, service, compose, unlimited, text, forward, job, messages, software, globally, advertising, promote, business, products, deliver, marketing, advertisement, alerts, greeting, notifications Sysmon 15.15 ... Monitor, is a powerful and versatile system monitoring utility developed by Sysinternals, a subsidiary of Microsoft. Designed ... high degree of precision. This includes process creations, network connections, file modifications, and changes to the system's ... Freeware tags: Sysmon free download, Windows, logging, tracker, download Sysmon, Sysinternals, monitor, monitoring, security, Sysmon, system monitor, log, activity logger, logger, event log Screen Paver 4.8 ... jpeg, png, or bitmap pictures from local and/or network directories. Features include picture sorting, stretching/shrinking/tiling, transition effects, ... CD or from music files. Its a great utility for digital camera owners. A bonus screen saver ... Shareware | $14.95 tags: screensaver, jpeg, bitmap, png, slide show, images, digital, pictures, photo, wallpaper, saver Omnify Hotspot 4.0 ... connection. - Reduce your Wi-Fi costs. - Monitor network traffic of each connected device. - Create a ... 3G/4G LTE connection. - Repeat an existing wireless network and boost its signal. - Connect devices directly ... Freeware tags: repeater, hotspot, vpn, firewall, access, monitoring, traffic, performance, network, lte, wifi, wireless, internet, sharing, ad block, windows, utility, free, freeware, bridge, mode BlueLife Hosts Editor 1.6 ... This software is particularly useful for IT professionals, network administrators, and tech enthusiasts who require a reliable method
2025-04-24Take the unstructured chunk of data that makes up each log and chop it up into structured fields and values. access to the Splunk web console (Default: IP):8000)If web console is inaccessible, validate appropriate firewall configuration. Splunk defaults:TCP/8000TCP/9997Login to Splunk web console and set up config to receive data.If Splunk is not configured to receive data from a remote source:Settings > Forwarding and receiving > + Add new under Configure receivingDefault port is 9997 > SaveIf Splunk is configured to receive data from a remote source:Take note of receiving port by reviewing Forwarding and receiving under SettingsCreate index for SysmonSettings > Indexes > New IndexType sysmon for the index name, make necessary environment configuration changes, and click SaveInstall the Splunk Add-on for Microsoft Sysmon on the Splunk server ( Microsoft Sysinternals Sysmon ( the SwiftOnSecurity Sysmon configuration file ( the Sysmon executables and this config into the same folder. I chose C:\sysmon for ease of use.Open a Command Prompt or PowerShell window with the appropriate permissions to install software on the host and run the following command to initiate the Sysmon installation:sysmon.exe -accepteula -i sysmonconfig-export.xmlVerify logs are being generated by reviewing the Sysmon/Operational events the Windows Event Viewer.Start > Event Viewer (eventvwr.msc)Application and Service Logs > Microsoft > Windows > Sysmon > OperationalInstall the Splunk Universal Forwarder ( inputs.conf file with the code below at the following file location:C:\Program Files\SplunkUniversalForwarder\etc\system\local\inputs.conf #CHANGE ME[WinEventLog://Microsoft-Windows-Sysmon/Operational]disabled = falserenderXml = trueindex = sysmonsource = XmlWinEventLog:Microsoft-Windows-Sysmon/Operational">[default]host = #CHANGE ME[WinEventLog://Microsoft-Windows-Sysmon/Operational]disabled = falserenderXml = trueindex = sysmonsource =
2025-03-26Write-up author: jon-brandyLessons Learned:Sysmon EventID definition.Reviewing sysmon logs using Event Viewer.Analyzing UltraVNC Infection Incident.SCENARIO:In this Sherlock, you will familiarize yourself with Sysmon logs and various useful EventIDs for identifying and analyzing malicious activities on a Windows system.Palo Alto's Unit42 recently conducted research on an UltraVNC campaign, wherein attackers utilized a backdoored version of UltraVNC to maintain access to systems.This lab is inspired by that campaign and guides participants through the initial access stage of the campaign.STEPS:In this challenge, we're tasked to analyze malicious act on a Windows system by reviewing a Windows Event Log file which contains sysmon logs.NOTES:Sysmon (System Monitor) logs are a type of log generated by the Sysinternals Sysmon utility, which is a Windows systemservice and device driver thatprovides advanced system monitoring and logging capabilities. Sysmon logs capturedetailed information about various activities happening on a Windows system, including process creation,network connections, file creation, registry modifications, and more.To analyze this type of log file we can use Event Viewer.Result in Event Viewer1ST QUESTION --> ANS: 56There are 2 ways to identify the total logs for EventID 11. The first one is by filtering the log displayed in EventViewer then count it manually or check the top diplayed number.Or, simply execute this powershell command.COMMANDGet-WinEvent -Path '.\Microsoft-Windows-Sysmon-Operational.evtx' -FilterXPath "*[System[(EventID=11)]]" | Measure-ObjectTHE RESULT OF PS COMMAND2ND QUESTION --> ANS: C:\Users\CyberJunkie\Downloads\Preventivo24.02.14.exe.exeIn analyzing sysmon logs, I used this online WIKI to help me identify the meaning of each eventID.It said that there is a malicious process that infected the victim's system, hence we
2025-04-02