Lab 12: Threat Hunting Methodology

Time: 50 minutes | Level: Architect | Docker: docker run -it --rm zchencow/innozverse-cybersec:latest bash

Objectives

  • Apply PEAK framework for structured threat hunting

  • Build hypothesis-driven hunts using MITRE ATT&CK

  • Detect lateral movement, persistence, and C2 patterns

  • Implement a Python log analyser for lateral movement detection


Step 1: Threat Hunting Philosophy

What is threat hunting?

Proactive, human-led investigation to find threats that have evaded automated detection. Assumes breach has occurred; seeks evidence.

Hunting vs monitoring:

Monitoring
Hunting

Reactive (alert-driven)

Proactive (hypothesis-driven)

Automated

Human-led

Known-bad detection

Unknown/novel threat discovery

L1/L2 analyst

L3 senior analyst

Continuous

Sprint-based (2-4 week cycles)

PEAK Framework (Prepare, Execute, Act on Knowledge):


Step 2: MITRE ATT&CK — Hunt Hypotheses

Hypothesis structure:

High-priority TTPs to hunt (financial sector):

ATT&CK ID
Technique
Hunt Signal

T1078

Valid Accounts

Unusual login times, locations

T1021.002

SMB Lateral Movement

Horizontal login spread, ADMIN$ access

T1003.001

LSASS Memory Dump

Event ID 4688 + lsass.exe access

T1059.001

PowerShell

Encoded commands, download cradles

T1105

Ingress Tool Transfer

Outbound downloads from unexpected processes

T1071.001

HTTP C2

Beaconing patterns, high periodicity connections

T1053.005

Scheduled Tasks

New tasks pointing to unusual locations


Step 3: Windows Event IDs for Hunting

Event ID
Description
Hunt Value

4624

Successful logon

Lateral movement, after-hours access

4625

Failed logon

Brute force, password spray

4648

Logon with explicit credentials

Pass-the-hash, pass-the-ticket

4688

New process created (+ cmdline with Sysmon)

Suspicious processes, execution

4697

Service installed

Persistence mechanisms

4698

Scheduled task created

Persistence

4719

System audit policy changed

Defence evasion

4720

User account created

Backdoor accounts

4732

Member added to security-enabled group

Privilege escalation

7045

New service installed

Persistence, malware installation

💡 Enable Sysmon — it adds critical fields to Event 4688 (full command line, parent process, hash). Without Sysmon, Windows process auditing is severely limited.


Step 4: Lateral Movement Detector

📸 Verified Output:


Step 5: TTP-Based Hunt — C2 Beaconing

C2 beaconing characteristics:

  • Regular periodic connections (jitter ±10-30%)

  • Small request, larger response pattern

  • Uncommon destination (new domain, CDN abuse)

  • Process making network connection: Office apps, notepad, non-browser

Statistical approach:


Step 6: Persistence Hunt — Scheduled Tasks

Hunt: new scheduled tasks pointing to suspicious locations

Registry run key persistence:


Step 7: Hunting Cycle and Documentation

2-week hunt sprint:

Hunt report template:


Step 8: Capstone — Threat Hunting Programme

Scenario: Build a threat hunting function for an energy sector SOC


Summary

Concept
Key Points

PEAK Framework

Prepare → Execute → Act on Knowledge

Hypothesis

"Threat actor using [TTP] may be [doing X] based on [signal]"

Key Event IDs

4624 (logon), 4688 (process), 4648 (explicit creds), 4698 (sched task)

Lateral movement

Horizontal login spread >3 hosts, admin share access

C2 detection

Statistical beaconing (low jitter = automated = beacon)

Sysmon

Essential: full command line, hashes, network connections

Hunt output

Detections + recommendations + threat intel updates

Last updated