Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Designing With AI, Not Around It: Practical Advanced Techniques For Product Design Use Cases

      August 11, 2025

      Why Companies Are Investing in AI-Powered React.js Development Services in 2025

      August 11, 2025

      The coming AI smartphone: Redefining personal tech

      August 11, 2025

      Modern React animation libraries: Real examples for engaging UIs

      August 11, 2025

      How Debian 13’s little improvements add up to the distro’s surprisingly big leap forward

      August 11, 2025

      Why xAI is giving you ‘limited’ free access to Grok 4

      August 11, 2025

      How Apple may revamp Siri to a voice assistant I’d actually use (and ditch Gemini for)

      August 11, 2025

      I jump-started a bus from the 1930s with this power bank – here’s the verdict

      August 11, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Laravel’s UsePolicy Attribute: Explicit Authorization Control

      August 11, 2025
      Recent

      Laravel’s UsePolicy Attribute: Explicit Authorization Control

      August 11, 2025

      The Laravel Way to Build AI Agents That Actually Work

      August 11, 2025

      The Laravel Way to Build AI Agents That Actually Work

      August 11, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft sued over killing support for Windows 10

      August 11, 2025
      Recent

      Microsoft sued over killing support for Windows 10

      August 11, 2025

      Grok 4 rolled out for free-tier users worldwide, with some limits

      August 11, 2025

      Firefox AI slammed for hogging CPU and draining battery

      August 11, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Operating Systems»Program Execution, follow-up pt II

    Program Execution, follow-up pt II

    June 26, 2025

    On the heels of my previous post on this topic, it occurred to me that this tendency to incorrectly refer to ShimCache and AmCache artifacts as “evidence of execution” strongly indicates that we’re also not validating program execution. That is to say, when we “see” a program execution event, or something that indicates that a program may have executed, are we validating that it was successful? Are we looking to determine if it completed its intended task, or are we simply assuming that it did?

    For example, let’s say we have an alert based on a threat actor running a net user command to add a new user account to an endpoint; when I see this command, I want to check the Security Event Log to see if there are any Security-Auditing/4720 records at about the same time, to indicate that the command succeeded. The command will very likely be accompanied by other Security Event Log records related to the account being enabled, the password being reset, etc; however, the ../4720 event record is what primarily interests me, because sometimes, you’ll see the net user command that does not include the /add or /ad switch, but is still reported as a “new user being created”, when, in fact, the account already exists and the password is being changed.

    Regardless of what’s reported, the point here is, are we validating what we’re seeing? Another example is the use of msiexec.exe; when we see a command using this LOLBin run, do we also see accompanying MsiInstaller records in the Application Event Log? I’ve seen reports of msiexec.exe being run against HTTP resources, stating that something was installed; however, there are no corresponding MsiInstaller records in the Application Event Log.

    Another use of the Application Event Log, when validating program execution, comes when you timeline the log records alongside EDR telemetry or process launch (Sysmon, Security-Auditing/4688) records. For example, if you see Application Pop-up or Windows Error Reporting messages for the program around the same time as the program execution, this would indicate that the program did not successfully launch. 

    Another similarly valuable resource is AV logs. You may see the program execution attempt, followed by an AV message indicating that the process was detected and quarantined. Or, as has occurred several times, Window Defender may generate a detection record, and rather than a successful quarantine message, the detection is followed by a critical failure message, and the malware continues to execute.

    The great folks over at Cyber Triage posted this guide on Malware WMI Event Consumers; pg 6 illustrates the “Classic Detection” techniques. Looking at these, EDR/Sysmon, and the WMI-Activity/Operational Event Log can be incorporated into a timeline to not only illustrate program execution, but that the execution succeeded and resulted in the intended (by the threat actor) outcome. For example, if you incorporate EDR into a timeline that includes the Windows Event Logs, then you’d likely look for WMI-Activity/5861 event records to see if a new event consumer had been successfully created. 

    From there, the next step would be to parse the Objects.DATA file to determine if the event consumer is still visible in the WMI repository. 

    Summary
    Continuing to see artifacts such as ShimCache and AmCache referred to in the community as “evidence of execution” really showed me how we’re overall too focused on the one thing that illustrates that something happened. While it’s important to have a correct, accurate understanding of the nature of various individual artifacts, as a community we need to start processing this understanding within a system framework, understanding that each data source plays an important role within the system, as a whole. Nothing happens in isolation; whenever something happens on a live system, impressions and tool marks are going to be left in a variety of data sources. Some may be extremely transient, existing in memory for only a very short time, while others may be written to logs or to the Registry, and persist well beyond the removal of the “offending” application. 

    But, I get it. It’s easy to simply state that something happened, and hope that no one questions your statement. It’s much harder to make a statement supported by data, because doing so isn’t something we’re familiar with, it’s not something we’ve been doing for years at this point. It’s not part of our process, nor is it part of our culture. But remember…everything is difficult, sometimes even after the first time we do it. Climbing a rope in gym class was hard, until you first did it. It may even have been hard the second or third time, but eventually you realized you could do it. 

    Validation of your findings is important, because when you complete the ticket or the report you’re writing, and send it off to your “customer”, someone may be making a decision and allocating resources based on those findings. My previous blog post provides one example of how I’ve experienced the need to validate findings during my time in the industry. Whether you see it right now or not, at some point, someone’s very likely going to take your findings and make a decision based on what you’re provided, and you want to be as sure as you can that those findings are correct, and supported by the data.

    Source: Read More 

    windows
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleMicrosoft says new Outlook for Windows 11 is now better. It’s time to embrace it
    Next Article Windows 11 KB5060829 adds taskbar features, direct download for 24H2

    Related Posts

    Operating Systems

    Microsoft sued over killing support for Windows 10

    August 11, 2025
    Operating Systems

    Grok 4 rolled out for free-tier users worldwide, with some limits

    August 11, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Microsoft gives Copilot a face – here’s how to try your new Appearance chat buddy

    News & Updates

    CVE-2025-47599 – Facturante SQL Injection

    Common Vulnerabilities and Exposures (CVEs)

    An Holistic Framework for Shared Design Leadership

    News & Updates
    Last Week in AI #306: Astrocade, Llama 4, Nova Act

    Last Week in AI #306: Astrocade, Llama 4, Nova Act

    Artificial Intelligence

    Highlights

    CVE-2025-5479 – Sony XAV-AX8500 Bluetooth AVCTP Protocol Heap-based Buffer Overflow Remote Code Execution

    June 20, 2025

    CVE ID : CVE-2025-5479

    Published : June 21, 2025, 1:15 a.m. | 31 minutes ago

    Description : Sony XAV-AX8500 Bluetooth AVCTP Protocol Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Sony XAV-AX8500 devices. An attacker must first obtain the ability to pair a malicious Bluetooth device with the target system in order to exploit this vulnerability.

    The specific flaw exists within the implementation of the Bluetooth AVCTP protocol. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26290.

    Severity: 7.5 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Building Robust ViewModels [SUBSCRIBER]

    April 10, 2025

    Fixing ‘failed to synchronize all databases’ Pacman Error in Arch Linux

    July 6, 2025

    Linux CentOS Web Panel Vulnerability Let Attackers Execute Malicious Remote Code – PoC Released

    June 25, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.