{"id":8189,"date":"2022-08-05T20:45:52","date_gmt":"2022-08-05T20:45:52","guid":{"rendered":"https:\/\/www.hexacorn.com\/blog\/?p=8189"},"modified":"2022-08-05T21:01:34","modified_gmt":"2022-08-05T21:01:34","slug":"week-of-data-dumps-part-6-file-names","status":"publish","type":"post","link":"https:\/\/www.hexacorn.com\/blog\/2022\/08\/05\/week-of-data-dumps-part-6-file-names\/","title":{"rendered":"Week of Data Dumps, Part 6 &#8211; file names"},"content":{"rendered":"\n<p>This week is longer than I thought, so time to catch up&#8230; \ud83d\ude42<\/p>\n\n\n\n<p>This one is a mess, but sometimes a bit of a mess is not a bad thing. Useful for at least cherry-picking breadcrumbs in a vast amount of sandbox or EDR logs&#8230;<\/p>\n\n\n\n<p>Yes&#8230; file names&#8230; we can love them, we can hate them, but many of them are so characteristic that it really would be a mistake to ignore them. Whether they are accessed for reading, writing, locking, or whatever else &#8211; we can pick up a lot of behavioral patterns from a simple fact these files are somehow targeted by a program that touches them&#8230;<\/p>\n\n\n\n<p>On that note&#8230; I am not aware of any EDRs collecting attempts to open non-existing files, or other objects &#8211; this would be a nice detective feature to have available (I actually bet it&#8217;s in place just not available to customers). The ability to see what programs are attempting to use what objects, load non-existing libraries, create\/open mutexes, semaphores, pipes, as well as &#8216;find&#8217; and &#8216;search&#8217; operations etc is something we all want to see more.<\/p>\n\n\n\n<p>Here&#8217;s a relatively long list of <a href=\"https:\/\/hexacorn.com\/d\/files.txt\">file-related artifacts<\/a> of any sort, sometimes with some loose &#8216;attribution&#8217;.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This week is longer than I thought, so time to catch up&#8230; \ud83d\ude42 This one is a mess, but sometimes a bit of a mess is not a bad thing. Useful for at least cherry-picking breadcrumbs in a vast amount &hellip; <a href=\"https:\/\/www.hexacorn.com\/blog\/2022\/08\/05\/week-of-data-dumps-part-6-file-names\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[53,39,21],"tags":[],"_links":{"self":[{"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/posts\/8189"}],"collection":[{"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/comments?post=8189"}],"version-history":[{"count":4,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/posts\/8189\/revisions"}],"predecessor-version":[{"id":8194,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/posts\/8189\/revisions\/8194"}],"wp:attachment":[{"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/media?parent=8189"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/categories?post=8189"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hexacorn.com\/blog\/wp-json\/wp\/v2\/tags?post=8189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}