Using Peak Framework For Mitre Att&Ck-Aligned Threat Hunting: Scenarios and Simulations
Using Peak Framework For Mitre Att&Ck-Aligned Threat Hunting: Scenarios and Simulations
FRAMEWORK FOR
MITRE ATT&CK-
ALIGNED THREAT
HUNTING:
SCENARIOS AND
SIMULATIONS
BY IZZMIER IZZUDDIN
PEAK Threat Hunting
1. PLAN
Purpose: Define what you're hunting for and why. This includes scoping the hunt, setting
hypotheses, selecting data sources and identifying relevant ATT&CK techniques.
Key Activities:
2. EXECUTE
Purpose: Use tools and queries to search through the relevant data to validate or refute the
hypothesis.
Key Activities:
3. ANALYSE
Purpose: Examine the findings, understand what they mean and determine if further action
is needed (escalation or remediation).
Key Activities:
• Enrich findings with threat intelligence (IP reputation, file hashes, etc.).
• Correlate with known TTPs from MITRE ATT&CK or past incidents.
• Assess impact or risk level based on behaviour, assets and user context.
• Document analysis clearly for repeatability.
4. COMMUNICATE
Key Activities:
Step Action
Plan Hypothesis: A compromised account is being used from an unusual
location.
Data Needed: VPN logs, AD login logs, geolocation lookup, user asset
context.
Execute Query: Find logins from foreign countries in past 30 days.
Filter: Exclude known travel or remote workers.
Pivot: Check what the user did after login, any lateral movement,
sensitive file access?
Analyse Result: User A logged in from IP in Russia at 2AM, accessed finance
folder within 5 minutes.
Assessment: Suspicious. Enrichment shows the IP has high-risk score
on threat intel feeds.
Communicate Write report, alert IR, suggest blocking IP and require MFA for user A.
Background: A user reports that they received an alert from their email provider about a
login from an unusual location. The user did not initiate that login. A quick check by IT
shows no VPN usage from the user’s laptop at that time. SOC decides to initiate a threat
hunt to identify possible misuse of the user account and detect similar cases across the
organisation.
1. PLAN
Hypothesis: An attacker has compromised a valid user account and is using native tools
like PowerShell to conduct post-compromise actions such as reconnaissance or lateral
movement.
Scope of Hunt:
Telemetry to Review:
2. EXECUTE
VPN Logs:
3. ANALYSE
Investigation Summary:
1. Initial Access Observation: The user iffah logs in at 2:31 AM from an IP address not
geolocated within the organisation’s operating countries. No VPN was used.
2. Anomalous Execution: Immediately after the logon, powershell.exe was launched
with hidden window and no profile, using a Base64 encoded payload. This
technique is typical for evading basic monitoring and logging.
3. Outbound Communication: PowerShell initiated an HTTPS connection to an
untrusted IP. No approved service was expected to communicate with this domain.
4. EDR Correlation: EDR alerted that the PowerShell command was high-entropy and
tried to download additional payloads, indicating possible staging for further
exploitation or exfiltration.
5. No User Confirmation: Upon follow-up, the user confirmed they were not active
during this time and was not aware of any logins from outside Malaysia.
This activity matches known post-compromise behaviours, using valid credentials and
built-in tools for command execution. The rapid sequence from login to PowerShell
execution without MFA usage indicates credential compromise.
4. COMMUNICATE
Background: The SOC receives an alert from the EDR platform indicating that a system had
a PowerShell process that created a scheduled task. The host is not part of any IT
automation or DevOps environment and such behaviour is considered unusual. A hunt is
initiated to find if this activity is part of a broader persistence mechanism.
1. PLAN
Scope of Hunt:
Telemetry to Review:
2. EXECUTE
EDR Alert:
User Activity:
• Host: HR-WS-57
• User: hrstaff01
• Confirmed not installing any application
• System has no known legitimate Chrome task scheduler
3. ANALYSE
Investigation Summary:
4. COMMUNICATE
• Title: Threat Hunt Report – Scheduled Task and Registry Persistence via PowerShell
• Date: 2025-07-20
• Hunter: Izzmier (SOC Threat Hunter)
• Hypothesis: Malicious actors may use scheduled tasks and registry autoruns to
maintain persistence
• Findings:
o powershell.exe used to create a scheduled task (ChromeUpdate) with
suspicious action
o Registry Run key (chromeup) points to same malicious PowerShell payload
o Activity observed under user hrstaff01 without valid justification
o Domain used in PowerShell script is not whitelisted and appears in open-
source blocklists
• MITRE Techniques Observed:
o T1053.005 (Scheduled Task)
o T1547.001 (Registry Run Key)
o T1059.001 (PowerShell Execution)
• Recommendations:
1. Disable and remove scheduled task and registry entry
2. Block http://malicious.domain at firewall/proxy
3. Run full malware scan on host HR-WS-57
4. Reset user credentials for hrstaff01
5. Monitor for similar behaviour across other endpoints
6. Implement alerts for non-approved scheduled tasks and registry autoruns
• Next Steps:
o Review Group Policy to restrict registry editing and task creation
o Add logic to EDR/SIEM for early detection of PowerShell-based persistence
o Share findings with IR and malware analysis team to check for deeper
implants
SCENARIO 3: EXFILTRATION VIA CLOUD STORAGE (GOOGLE DRIVE OR DROPBOX)
Background: During routine proxy log review, the security team notices large outbound
data transfers to Google Drive from a workstation that does not typically use cloud storage.
The endpoint belongs to a user in the finance department. A threat hunt is launched to
determine whether this activity is legitimate or a sign of data exfiltration.
1. PLAN
Scope of Hunt:
Telemetry to Review:
2. EXECUTE
Follow-up Logs:
User: finance_mgr01
Host: FIN-WS-02
Date: 2025-07-18
Observed Activity:
- Accessed directory "D:\Company_Financials_2023"
- Zipped multiple Excel and PDF files (~500MB total)
- Compressed file named: "project_docs.zip"
- File opened via Chrome shortly before upload
DLP Events:
3. ANALYSE
Investigation Summary:
The activity shows clear indicators of potential data exfiltration by a legitimate user
account. This may be an insider threat or unauthorised personal action.
4. COMMUNICATE
• Title: Threat Hunt Report – Potential Insider Data Exfiltration to Google Drive
• Date: 2025-07-20
• Hunter: Izzmier (SOC Threat Hunter)
• Hypothesis: Threat actor may use unsanctioned cloud storage platforms to
exfiltrate sensitive company data
• Findings:
o finance_mgr01 uploaded 3.5 GB of data to Google Drive outside normal
hours
o Activity originated from FIN-WS-02, confirmed to be the user's workstation
o Zipped confidential financial files found in local access logs
o No malware or unauthorised tools found; activity was performed using
native apps (Chrome, Zip utility)
o Google Drive is not authorised for use in Finance; violates policy
• MITRE Techniques Observed:
o T1567.002 (Exfiltration to Cloud Storage)
o T1071.001 (Web Protocol – HTTPS)
o T1041 (Exfiltration Over C2 Channel – interpreted here via browser over
HTTPS)
• Recommendations:
1. Escalate to HR and Legal for insider risk investigation
2. Disable Google Drive access at the firewall for non-whitelisted roles
3. Monitor large outbound transfers to cloud apps
4. Deploy DLP block policy for ZIPs containing sensitive keywords
5. Interview the user to determine intent and access legitimacy
6. Review past 90 days of this user’s proxy and file activity for pattern
• Next Steps:
o Inform data protection officer (DPO) and compliance teams
o Integrate this TTP into insider threat monitoring dashboards
o Conduct awareness campaign on proper data handling in sensitive
departments
SCENARIO 4: CREDENTIAL DUMPING VIA LSASS ACCESS ON PRIVILEGED HOST
Background: EDR detects a rare access attempt to lsass.exe (Local Security Authority
Subsystem Service) memory from a process on a domain controller. This action is a known
technique used to dump credentials using tools like Mimikatz. A hunt is initiated to
determine whether other similar credential dumping attempts have occurred across
critical systems.
1. PLAN
Scope of Hunt:
Telemetry to Review:
2. EXECUTE
EDR Alert:
User: svc-backup
Logged in interactively at 01:40:00
Unusual time for scheduled tasks
No interactive login history in past 30 days
3. ANALYSE
Investigation Summary:
Evidence strongly suggests credential dumping was attempted using a malicious binary
disguised as a system utility. The attacker likely compromised svc-backup and used it to
deploy Mimikatz on a domain controller.
4. COMMUNICATE
Background: Threat intelligence team reports a known malware family in the region is using
Domain Generation Algorithm (DGA) domains for command and control (C2)
communication. DGA domains are pseudo-randomly generated and used by malware to
evade static domain blocking. The SOC launches a proactive threat hunt to detect such C2
activity in the environment.
1. PLAN
Scope of Hunt:
Telemetry to Review:
2. EXECUTE
Pattern:
Firewall Log:
EDR Telemetry:
• Process: svchost.exe
• Network: Attempted HTTP POST to vbn9ezqmnm.biz
• File dropped: update-checker.dll in C:\Users\Public\Downloads
• File hash flagged by 7/71 engines on VirusTotal
3. ANALYSE
Key Findings:
The endpoint HR-WS-32 is likely infected with a malware that uses DGA for beaconing.
While most domains failed to resolve (NXDOMAIN), one successful hit indicates active C2
communication, possibly downloading payloads or awaiting further instructions.
4. COMMUNICATE
Background: SOC receives a brute-force detection alert for RDP login attempts to a
domain-joined workstation. The alert indicates successful login after several failed
attempts. SOC suspects lateral movement using stolen or brute-forced credentials and
launches a threat hunt to uncover the extent of compromise.
1. PLAN
Hypothesis: An attacker has gained access to a valid domain user account and is moving
laterally through the network using RDP to access multiple systems.
Scope of Hunt:
Telemetry to Review:
• Event ID 4625 (Logon Failed) and 4624 (Logon Success – Type 10)
• Network connections from new RDP clients
• Account usage anomalies (logins from multiple systems)
• EDR for PowerShell/WMI execution post-RDP
2. EXECUTE
Host: HR-WS-09
Process Created: powershell.exe
Command Line: powershell -enc JAB...
Observed downloading script from pastebin.com
Process Parent: mstsc.exe
User: temp_admin
User: temp_admin
Queried domain group memberships via WMI
Queried logged-on users on multiple hosts using PowerShell remoting
3. ANALYSE
Summary of Findings:
1. Credential Misuse Detected:
temp_admin experienced a brute-force login pattern, followed by a successful login
from a new internal IP (10.10.22.88), indicating stolen or cracked credentials.
2. Lateral Movement Pattern:
RDP logins from ENG-WS-22 to other sensitive endpoints show coordinated
movement. Logon Type 10 confirms RDP usage.
3. Command Execution:
EDR confirms that after each RDP session, PowerShell was executed to run an
encoded script and enumerate user groups—typical recon post-access.
4. Tool Download via Pastebin:
PowerShell was used to pull a script from an external pastebin service, likely stage 2
payload or recon module.
5. No Legitimate Purpose:
temp_admin was not known to be in use recently and has no audit trail before this
date. Its presence on multiple endpoints within an hour is abnormal.
This is a clear case of credential misuse and lateral movement via RDP, followed by recon
and possibly payload staging using PowerShell.
4. COMMUNICATE
• Title: Threat Hunt Report – Lateral Movement Using RDP and Stolen Credentials
• Date: 2025-07-20
• Hunter: Izzmier (SOC Threat Hunter)
• Hypothesis: Threat actor may be using compromised domain credentials to pivot
via RDP across internal systems
• Findings:
o Brute-force pattern detected followed by successful RDP login with
temp_admin
o Lateral RDP connections observed to multiple endpoints within a short time
o PowerShell scripts executed post-login to enumerate users and groups
o External script download attempted from pastebin, indicating potential tool
staging
o No authorised task associated with the use of temp_admin on these systems
• MITRE Techniques Observed:
o T1078 (Valid Accounts)
o T1021.001 (Remote Services: RDP)
o T1087 (Account Discovery)
o T1059.001 (PowerShell)
• Recommendations:
1. Disable and reset password for temp_admin
2. Audit and remove dormant admin accounts across the domain
3. Isolate affected endpoints: ENG-WS-22, FIN-WS-03, HR-WS-09
4. Block outbound access to pastebin.com and similar sites on user endpoints
5. Enable MFA or restrict RDP access to privileged jump servers only
6. Deploy alerts for excessive RDP attempts and encoded PowerShell post-RDP
• Next Steps:
o Escalate to IR for full triage
o Review firewall and DNS logs for any further outbound C2 activity
o Integrate detection rules into SIEM for brute force + lateral movement combo
SCENARIO 7: INITIAL ACCESS VIA MALICIOUS EMAIL ATTACHMENT (PHISHING WITH
MACRO-ENABLED WORD DOCUMENT)
Background: The SOC receives a report from the email security gateway showing multiple
users received an email from a spoofed internal domain. The attachment is a .docm
(macro-enabled Word file) and one user opened the file. No alerts were triggered by
antivirus or EDR, prompting a manual threat hunt to determine whether execution led to
compromise.
1. PLAN
Scope of Hunt:
Telemetry to Review:
2. EXECUTE
Process Tree:
winword.exe
└── powershell.exe -nop -w hidden -exec bypass -enc SQBmACgAJAB...
└── rundll32.exe launch.dll,EntryPoint
Process: rundll32.exe
Destination: 89.45.78.120
Port: 443
Protocol: TCP
Country: Netherlands
EDR Detection:
3. ANALYSE
Findings:
1. Email as Entry Point:
Email was delivered using a spoofed domain (company-update.com) and passed
basic checks due to misconfigured SPF policy. Attachment was .docm.
2. Execution of Malicious Macro:
User opened the file; winword.exe launched PowerShell with base64-encoded
command that created a DLL and executed it using rundll32.exe.
3. External Communication:
The DLL initiated an HTTPS connection to an IP with no known business justification
and is tied to malware infrastructure.
4. AV and EDR:
Antivirus did not block it due to evasion techniques. EDR flagged it after the
execution chain was completed.
5. Scope Limitation:
Only one user confirmed to have opened the file. No lateral movement yet
observed.
User executed a malicious macro that allowed code execution and remote access via DLL.
This activity represents initial access and may lead to further exploitation if not contained.
4. COMMUNICATE
• Title: Threat Hunt Report – Malicious Macro Document Executed via Phishing Email
• Date: 2025-07-20
• Hunter: Izzmier (SOC Threat Hunter)
• Hypothesis: Email phishing delivered macro-enabled document that resulted in
initial access via PowerShell
• Findings:
o Email with spoofed sender and .docm attachment reached multiple users
o User finance_exec01 opened the file on FIN-WS-04
o winword.exe spawned obfuscated PowerShell
o DLL file dropped and executed using rundll32.exe, then made outbound C2
connection
o DLL and PowerShell hash matched known malware on VirusTotal
o EDR flagged behaviour post-execution
• MITRE Techniques Observed:
o T1566.001 (Spearphishing Attachment)
o T1203 (Office Macro Execution)
o T1059.001 (PowerShell)
o T1105 (DLL Download and Execution)
• Recommendations:
1. Isolate host FIN-WS-04 and begin forensic analysis
2. Remove launch.dll and scan for other payloads
3. Block external IPs and domains contacted by DLL
4. Reconfigure email gateway to block macro-enabled Office files
5. Strengthen SPF/DKIM/DMARC policies
6. Educate users on phishing risks, especially with attachments
7. Develop detection for Office spawning scripting tools (PowerShell)
• Next Steps:
o Check for persistence mechanisms (registry run keys, scheduled tasks)
o Run network sweep to identify similar DNS or IP communication
o Tune EDR to alert earlier on Office to PowerShell execution chains
SCENARIO 8: ABUSE OF LIVING-OFF-THE-LAND BINARIES (LOLBINS) FOR DEFENCE
EVASION AND EXECUTION
1. PLAN
Scope of Hunt:
Telemetry to Review:
2. EXECUTE
Process: mshta.exe
Destination IP: 198.51.100.55
Port: 80
Protocol: HTTP
Country: Germany
Outcome: 200 OK
User-Agent: mshta/1.0
EDR Alert:
Proxy Log:
User: marketing_exec01
URL: http://198.51.100.55/payload.hta
URL: http://198.51.100.55/loader.ps1
Referrer: None
Total Bytes Out: 1,200
Total Bytes In: 1,450,000
3. ANALYSE
Investigation Findings:
1. LOLBins Misuse Confirmed:
mshta.exe, a trusted Microsoft binary, was used to load a remote HTA file via HTTP.
This allowed execution to bypass application whitelisting and AV detection.
2. Script Chain Identified:
HTA file decoded to PowerShell, which fetched and executed loader.ps1 – a stager
for a persistent remote access tool.
3. Command Execution Observed:
PowerShell was used to disable or bypass Windows Defender via exclusion
settings.
4. Victim Profile:
User marketing_exec01 claimed to have clicked a document linked in an email that
opened and closed quickly. No warning was shown to the user.
5. Persistence Not Yet Confirmed:
No evidence of scheduled tasks or registry persistence yet observed, but further
investigation required.
This is a clear example of LOLBin abuse for initial execution and evasion. mshta.exe was
used as a signed proxy binary to launch malicious code, followed by PowerShell
downloaders, which attempted to weaken AV defences.
4. COMMUNICATE
• Title: Threat Hunt Report – Abuse of mshta.exe for Remote Code Execution
• Date: 2025-07-20
• Hunter: Izzmier (SOC Threat Hunter)
• Hypothesis: Adversary may be using trusted Windows binaries (LOLBins) to execute
remote payloads and avoid detection
• Findings:
o mshta.exe launched via user click to open http://198.51.100.55/payload.hta
o HTA file contained VBScript that executed PowerShell with encoded
downloader
o Downloader script fetched secondary payload and created AV exclusion
rules
o Network connection logs confirm exfil from MKT-WS-06 to malicious
infrastructure
o Toolset and TTPs align with known LOLBin-based campaigns used by
stealthy APTs
• MITRE Techniques Observed:
o T1218.005 (mshta.exe proxy execution)
o T1059.001 (PowerShell)
o T1105 (Ingress Tool Transfer)
o T1562.001 (Defence Evasion – Disable AV)
• Recommendations:
1. Isolate host MKT-WS-06 immediately
2. Revoke user account credentials and investigate mail source
3. Block outbound access to 198.51.100.55 and similar dynamic infrastructure
4. Prevent execution of mshta.exe via GPO or endpoint protection on user
systems
5. Review all other LOLBin executions organisation-wide (certutil.exe,
regsvr32.exe, etc.)
6. Enable script block logging and advanced PowerShell logging
7. Reimage affected endpoint after triage
• Next Steps:
o Investigate potential persistence mechanisms not yet triggered
o Perform YARA scan across all systems for rat.ps1 indicators
o Update SOC content to detect LOLBin-based execution chains
SCENARIO 9: SUSPICIOUS PERSISTENCE VIA WMI EVENT SUBSCRIPTION
Background: An internal red team simulation uncovered persistence maintained via WMI
(Windows Management Instrumentation) event subscriptions. Since this technique is
stealthy and fileless, the SOC launches a proactive threat hunt to check if any real-world
adversaries are using WMI for persistence inside the environment.
1. PLAN
Scope of Hunt:
Telemetry to Review:
2. EXECUTE
EventFilter:
Name: LogonTrigger
Query: SELECT * FROM __InstanceModificationEvent WITHIN 60 WHERE TargetInstance
ISA 'Win32_ComputerSystem' AND TargetInstance.UserName != NULL
Namespace: root\cimv2
EventConsumer:
Name: EvilConsumer
Type: CommandLineEventConsumer
CommandLineTemplate: powershell.exe -nop -w hidden -enc JAB...
WorkingDirectory: C:\Users\Public
FilterToConsumerBinding:
Filter: LogonTrigger
Consumer: EvilConsumer
Process: powershell.exe
Key: HKCU\Software\Microsoft\Windows\CurrentVersion\Run\svcstart
Value: rundll32.exe "C:\Users\Public\backdoor.dll",Entry
EDR Telemetry:
3. ANALYSE
Findings:
4. COMMUNICATE
• Title: Threat Hunt Report – Stealth Persistence via WMI Event Subscription
• Date: 2025-07-20
• Hunter: Izzmier (SOC Threat Hunter)
• Hypothesis: Adversaries may use WMI event subscriptions to establish hidden
persistence mechanisms
• Findings:
o Host ENG-WS-17 has WMI subscription in ROOT\Subscription triggering
PowerShell on user logon
o Triggered PowerShell command sets autorun key for DLL execution
o DLL opens reverse shell and is flagged malicious on VirusTotal
o Execution chain traced to wmiprvse.exe, no user interaction observed
o No legitimate software or policy explains this WMI activity
• MITRE Techniques Observed:
o T1546.003 (WMI Event Subscription)
o T1059.001 (PowerShell Execution)
o T1055 (DLL Injection)
o T1105 (Remote Access Tool download)
• Recommendations:
1. Remove WMI filter, consumer and binding via wbemtest or PowerShell CIM
commands
2. Isolate ENG-WS-17 for forensic triage
3. Hunt for similar subscriptions in enterprise using WMI dump scripts
4. Block rundll32.exe execution from non-standard folders via endpoint
controls
5. Detect wmiprvse.exe spawning PowerShell in SIEM/EDR
6. Audit domain for other systems with abnormal WMI objects in
ROOT\Subscription
• Next Steps:
o Create detection rules for WMI subscription abuse
o Enforce GPO to restrict creation of WMI consumers
o Train SOC analysts on WMI persistence detection techniques
SCENARIO 10: SUSPICIOUS USE OF CERTUTIL FOR PAYLOAD DOWNLOAD AND
EXECUTION
Background: SOC receives a tip from a threat intel provider that attackers are increasingly
abusing certutil.exe, a legitimate Windows utility, to download malicious files and evade
detection. A recent EDR anomaly shows a rarely used host executing certutil.exe with
network activity. A threat hunt is initiated to check for abuse of certutil across the
enterprise.
1. PLAN
Hypothesis:
An attacker is using certutil.exe to download or decode malicious files as part of initial
access or staging, taking advantage of its trusted, signed nature to bypass defences.
Scope of Hunt:
Telemetry to Review:
2. EXECUTE
EDR Alert:
Proxy Logs:
URL: http://malicious.site/payload.exe
Category: Uncategorised / Newly Registered Domain
Bytes In: 865,000
Bytes Out: 2,500
Downloaded by: certutil.exe
Findings:
4. COMMUNICATE
• Title: Threat Hunt Report – Malicious File Delivery via Certutil Abuse
• Date: 2025-07-20
• Hunter: Izzmier (SOC Threat Hunter)
• Hypothesis: Adversaries are using certutil.exe to download and execute payloads
under the guise of legitimate tools
• Findings:
o certutil.exe executed by staff_admin02 on OPS-WS-23 with flag -urlcache
o Downloaded tools.exe from http://malicious.site/, saved to public
Downloads folder
o File was executed within seconds, connected to C2 server and attempted
persistence
o Tools.exe showed suspicious behaviour including process injection and
registry modification
o No business justification for use of certutil by this user on that endpoint
• MITRE Techniques Observed:
o T1218.010 (Signed Binary Proxy Execution – certutil.exe)
o T1105 (Ingress Tool Transfer)
o T1055 (Process Injection)
o T1547.001 (Registry Run Key Persistence)
• Recommendations:
1. Isolate OPS-WS-23 and submit tools.exe for malware analysis
2. Revoke and reset credentials for staff_admin02
3. Block access to malicious.site and IP 144.76.12.88 at proxy/firewall
4. Add rules to prevent certutil.exe from making outbound connections
5. Monitor for use of certutil, especially with flags -urlcache, -decode or -f
6. Develop SIEM rules to detect LOLBin abuse via command line patterns
• Next Steps:
o Sweep enterprise for similar certutil executions
o Create allowlist of legitimate certutil.exe usage contexts
o Train analysts and red teamers on detection and simulation of LOLBin use