Investigating
How many events were collected and Ingested in the index main?
Index=main
On one of the infected hosts, the adversary was successful in creating a backdoor user. What is the new username?
index=main EventID=4720
Check for "Account Name"
On the same host, a registry key was also updated regarding the new backdoor user. What is the full path of that registry key?
index=main A1berto EventID=12
Check for TargetObject
Examine the logs and identify the user that the adversary was trying to impersonate.
This is simple
What is the command used to add a backdoor user from a remote computer?
index=main A1berto
Check for CommandLine
How many times was the login attempt from the backdoor user observed during the investigation?
Check for EventID:
4624
4625
What is the name of the infected host on which suspicious Powershell commands were executed?
index=main Channel="Windows Powershell"
Check for:
HostApplication
Hostname
PowerShell logging is enabled on this device. How many events were logged for the malicious PowerShell execution?
index=main Channel="Microsoft-Windows-PowerShell/Operational"
An encoded Powershell script from the infected host initiated a web request. What is the full URL?
Find encoded powershell script
Find encoded URL in the encoded powershell script that should be decoded
Decode URL
"Defang URL" via CyberChef
Task â„– 9 is extremely easy.
Don't overthink it.
I've wasted 4 days to get how easy it was.
Last updated