Windows.Detection.WonkaVision

This artifact analyzes Kerberos tickets and attempts to determine if they are forged, using WonkaVision by @4ndr3w6s and @exploitph.

After analysis, notable events are documented in the native Windows Application log, and are easily reviewable using the Exhange.Windows.EventLogs.WonkaVision artifact.

https://github.com/0xe7/WonkaVision


name: Windows.Detection.WonkaVision
description: |
 
 This artifact analyzes Kerberos tickets and attempts to determine if they are forged, using WonkaVision by @4ndr3w6s and @exploitph.
 
 After analysis, notable events are documented in the native Windows Application log, and are easily reviewable using the `Exhange.Windows.EventLogs.WonkaVision` artifact.
 
 https://github.com/0xe7/WonkaVision
 
author: Wes Lambert -- @therealwlambert
reference:
  - https://github.com/0xe7/WonkaVision
tools:
  - name: WonkaVision
    url: https://github.com/weslambert/WonkaVision/releases/download/testing/WonkaVision.exe

sources:
    - name: RunWonkaVison
      query: |
        LET WV <= SELECT FullPath FROM Artifact.Generic.Utils.FetchBinary(ToolName="WonkaVision", IsExecutable=FALSE)
        LET KeyDir <= tempdir(remove_last=true)
        LET DumpDir <= tempdir(remove_last=true)
        LET CreateKeys = SELECT * FROM execve(argv=[WV.FullPath[0], '/createkeys', '/outdir:' + KeyDir])
        LET DumpIt = SELECT * FROM execve(argv=[WV.FullPath[0], '/dump', '/publickey:' + KeyDir + '/public.key', '/dumpdir:' + DumpDir])
        LET AnalyzeIt = SELECT * FROM execve(argv=[WV.FullPath[0], '/analyze', '/privatekey:' + KeyDir + '/private.key', '/dumpdir:' + DumpDir])
        SELECT * FROM chain(
          a=CreateKeys,
          b=DumpIt,
          c=AnalyzeIt
        )