LOT-Squatch • LOTL Detection for Small Business
Detection Report
Generated: 2026-02-22 06:45:00

LOTL Threat Detection Summary

Scan completed: 2026-02-22 06:45:00 • System: TEST-PC-01\Administrator

4
Total Findings
1
High Risk
2
Medium Risk
1
Low Risk

PowerShell Findings (2)

Encoded PowerShell in Scheduled Task HIGH

Category: PowerShell

Description: Scheduled task contains encoded PowerShell command (common LOTL technique).

Evidence:

Task: LOT-Squatch-Test-Task
Arguments: -EncodedCommand VwByAGkAdABlAC0ASABvAHMAdAAgACcAVABlAHMAdAAgAHQAYQBzAGsAIAByAHUAbgBuAGkAbgBnACcA

Remediation: Review scheduled task 'LOT-Squatch-Test-Task' for legitimacy. Remove if suspicious.

Detected: 06:44:32

Encoded PowerShell in Registry MEDIUM

Category: PowerShell

Description: Registry run key contains encoded PowerShell command.

Evidence:

Registry: HKCU:\Software\Microsoft\Windows\CurrentVersion\Run\LOT-Squatch-Test
Value: powershell.exe -Command Write-Host 'Test registry entry'

Remediation: Review registry entry and remove if suspicious.

Detected: 06:44:35

LOLBAS Findings (1)

Potential LOLBAS Usage in PowerShell History MEDIUM

Category: LOLBAS

Description: PowerShell history contains command matching known LOLBAS pattern.

Evidence:

Command: certutil -decode encoded.txt decoded.txt

Remediation: Review PowerShell history and investigate command context.

Detected: 06:44:38

Process Findings (1)

Suspicious Process Ancestry LOW

Category: Process

Description: powershell.exe spawned by svchost.exe (unusual parent).

Evidence:

Process: powershell.exe (PID: 1234)
Parent: svchost.exe (PID: 567)

Remediation: Investigate process and parent relationship.

Detected: 06:44:41

System Information

PropertyValue
Computer NameTEST-PC-01
User NameAdministrator
OS VersionMicrosoft Windows 10 Pro (10.0.19045)
PowerShell Version5.1.19041.1234
Scan Time2026-02-22 06:45:00
Scan DepthBasic

Remediation Guidance

General LOTL Remediation Steps:

  1. Isolate affected systems from the network if high-risk findings are present.
  2. Review findings carefully – some may be legitimate administrative activity.
  3. Remove malicious artifacts – delete suspicious scheduled tasks, registry entries, WMI subscriptions.
  4. Monitor for recurrence – implement continuous monitoring for similar patterns.
  5. Consider implementing application whitelisting (AppLocker, Windows Defender Application Control) to prevent unauthorized script/executable execution.

Note: This tool provides detection only. Always validate findings before taking action.