• Stars
    star
    2,690
  • Rank 16,975 (Top 0.4 %)
  • Language
    Python
  • License
    Other
  • Created about 7 years ago
  • Updated 6 months ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Investigate malicious Windows logon by visualizing and analyzing Windows event log

Arsenal Version Docker pull test

Concept

LogonTracer is a tool to investigate malicious logon by visualizing and analyzing Windows Active Directory event logs. This tool associates a host name (or an IP address) and account name found in logon-related events and displays it as a graph. This way, it is possible to see in which account login attempt occurs and which host is used.
This tool can visualize the following event id related to Windows logon based on this research.

  • 4624: Successful logon
  • 4625: Logon failure
  • 4768: Kerberos Authentication (TGT Request)
  • 4769: Kerberos Service Ticket (ST Request)
  • 4776: NTLM Authentication
  • 4672: Assign special privileges

More details are described in the following documents:

LogonTracer sample

Additional Analysis

LogonTracer uses PageRank, Hidden Markov model and ChangeFinder to detect malicious hosts and accounts from event log.
PageRank List
With LogonTracer, it is also possible to display event logs in a chronological order.
Timeline

Use LogonTracer

To use LogonTracer, you can:

Documentation

If you want to know more details, please check the LogonTracer wiki.

Demonstration

Following YouTube's video shows how to use LogonTracer.

LogonTracer_Demonstration

Architecture

LogonTracer is written in Python and uses Neo4j for database. The following tools are used.

More Repositories

1

EmoCheck

Emotet detection tool for Windows OS
C++
669
star
2

MalConfScan

Volatility plugin for extracts configuration data of known malware
Python
478
star
3

aa-tools

Artifact analysis tools by JPCERT/CC Analysis Center
Python
452
star
4

SysmonSearch

Investigate suspicious activity by visualizing Sysmon's event log
JavaScript
417
star
5

ToolAnalysisResultSheet

Tool Analysis Result Sheet
HTML
341
star
6

YAMA

Yet Another Memory Analyzer for malware detection
C++
171
star
7

phishurl-list

Phishing URL dataset from JPCERT/CC
HTML
150
star
8

DetectLM

Detecting Lateral Movement with Machine Learning
Python
137
star
9

MalConfScan-with-Cuckoo

Cuckoo Sandbox plugin for extracts configuration data of known malware
Python
134
star
10

jpcert-yara

JPCERT/CC public YARA rules repository
YARA
96
star
11

log-analysis-training

γƒ­γ‚°εˆ†ζžγƒˆγƒ¬γƒΌγƒ‹γƒ³γ‚°η”¨γ‚³γƒ³γƒ†γƒ³γƒ„
HTML
88
star
12

impfuzzy

Fuzzy Hash calculated from import API of PE files
Python
87
star
13

MemoryForensic-on-Cloud

Memory Forensic System on Cloud
HTML
84
star
14

Windows-Symbol-Tables

Windows symbol tables for Volatility 3
Python
71
star
15

cordova

Vulnerability Analysis of Hybrid Applications using Apache Cordova
HTML
55
star
16

Lazarus-research

Lazarus analysis tools and research report
Python
54
star
17

OWASPdocuments

Japanese translation of OWASP documents
HTML
52
star
18

STrelok

Application for STIX v2.0 objects management and analysis
Python
27
star
19

CobaltStrike-Config

Repository for archiving Cobalt Strike configuration
27
star
20

QuasarRAT-Analysis

QuasarRAT analysis tools and research report
Python
24
star
21

Lucky-Visitor-Scam-IoC

Automatically update IoC for lucky visitor scam
24
star
22

SurfaceAnalysis-on-Cloud

Surface Analysis System on Cloud
HCL
18
star
23

ToolAnalysisResultSheet_jp

εˆ†ζžγƒ„γƒΌγƒ«η΅ζžœγ‚·γƒΌγƒˆ
HTML
16
star
24

AutoYara4FLIRT

Python
14
star
25

cwe-1003-ja

CWE-1003 ζ—₯本θͺžθ¨³
9
star
26

vdo-json-schema

JSON Schema for Vulnerability Description Ontology (VDO)
JavaScript
8
star
27

JPCERT-IR-Statistics

JPCERT/CC Incident handling statistics
HTML
6
star
28

xml2evtx

Convert Event Log XML to EVTX file
Python
5
star
29

HUILoader-research

HUI Loader analysis research
4
star
30

GobRAT-Analysis

Python
1
star