Investigating
How many events were collected and Ingested in the index main?
Index=main
On one of the infected hosts, the adversary was successful in creating a backdoor user. What is the new username?
index=main EventID=4720
Check for "Account Name"
On the same host, a registry key was also updated regarding the new backdoor user. What is the full path of that registry key?
index=main A1berto EventID=12
Check for TargetObject
Examine the logs and identify the user that the adversary was trying to impersonate.
This is simple
What is the command used to add a backdoor user from a remote computer?
index=main A1berto
Check for CommandLine
How many times was the login attempt from the backdoor user observed during the investigation?
Check for EventID:
4624
4625
What is the name of the infected host on which suspicious Powershell commands were executed?
index=main Channel="Windows Powershell"
Check for:
HostApplication
Hostname
PowerShell logging is enabled on this device. How many events were logged for the malicious PowerShell execution?
index=main Channel="Microsoft-Windows-PowerShell/Operational"
An encoded Powershell script from the infected host initiated a web request. What is the full URL?
Find encoded powershell script
Find encoded URL in the encoded powershell script that should be decoded
Decode URL
"Defang URL" via CyberChef
Task β 9 is extremely easy.
Don't overthink it.
I've wasted 4 days to get how easy it was.
Last updated