GoldenSpray Lab

Q1) What's the attacker IP?

event.action: Logon AND event.outcome: failure
event.action: Logon AND event.outcome: failure AND winlog.event_data.IpAddress: "77.91.78.115"

Too many failed login attempts in a small time frame.

Answer: 77.91.78.115

Q2) What country is the attack originating from?

Answer: Finland

Q3) What's the compromised account username used for initial access?

Answer: SECURETECH\mwilliams

Q4) What's the name of the malicious file utilized by the attacker for persistence on ST-WIN02?

Now we know that the attacker used the mwilliams user to gain initial access.

Answer: OfficeUpdater.exe

Q5) What's the full path used by the attacker for storing his tools?

Answer: C:\Users\Public\Backup_Tools\

Q6) What's the process ID of the tool responsible for dumping credentials on ST-WIN02?

Answer: 3708

Q7) What's the second account username the attacker compromised and used for lateral movement?

Answer: SECURETECH\jsmith

Q8)

Answer: FilesCheck

Q9) What's the encryption type used in the environment Kerberos tickets?

Answer: RC4-HMAC

Q10) Can you provide the full path of the output file in preparation for data exfiltration?

Answer: C:\Users\Public\Documents\Archive_8673812.zip

Last updated