Home (BTLO/Investigation) - Total Recall
Post
Cancel
image alternative text

(BTLO/Investigation) - Total Recall

Microsoft Defender Antivirus has been there for over a decade now. It provides security against known threats until it has not been tampered with.

  • CTF is hosted on https://blueteamlabs.online/

    Scenario

    Unfortunately an Account Executive was just got let go from the company due to downsizing efforts. Before wiping his machine to be reissued in the future a threat hunter wants to conduct memory analysis after other suspicious activity was observed coming from the user in question before his termination was confirmed. Hopefully there’s nothing bad, but this could be an incident waiting to be discovered. See if you can find any malicious activity on their system.

Instructions

Redline investigation

Checking users

First of all let’s try to get some basic info like existing users:

There are many users but apparently only Jason and hacker have been recently logged in. We should note us this two. Both are members of Administrators group and Jason is also member of Remote Desktop Users. Checking for RDP events we can also see that Firewall rule was changed

What service was enabled by the attacker between 7-8 PM on 03/03/2021 which involves the netsh command and exception on the firewall? Provide the protocol and execution PID(5 points): RDP, 1028

Other users were created which can be seen in event logs searching for 4720 Event ID

What user accounts were created by the insider? (alphabetical order)(5 points): Alice, Bob, Carlos, Jason, Smith

Checking browser history

There are few interesting entries like, we get account which might be from attacker (or not, but it could be right?).

We also see that WinPwnage (https://github.com/rootm0s/WinPwnage) was visited.

Let’s check downloads:

The user tried to download an .exe file to the system but cancelled it. What was the filename?(5 points): Openvpn (1).exe

What is the IP and port used to download other files to the system?(5 points): 10.201.1.105:8080

Checking Tasks

Checking the Tasks, there are two interesting entries as it can be seen below.

The task will grab the file from the attacker’s machine. What file is scheduled to run on the tasks? Include the full path to the file within the URL(5 points): http://10.201.1.105:8080/catchmeifyoucan.exe

Both powershell Tasks have names as DailyTask and OnIdleTask and will be trigered at Logon or on Idle status.

Can you find two scheduled tasks created by the malicious insider? (alphabetical order)(5 points): DailyTask, OnIdleTask

What is the time creation for these scheduled tasks? (alphabetical order)(5 points): 2021-03-03 21:41:23Z, 2021-03-03 21:43:08Z

Task creation can be found in Timeline. I think it’s the easiest way to search.

Checking services

If we remove all Microsoft signed binaries we get short list of services.

Aparently there is Meterpreter service which is pretty much self-explainatory

We know the file name: C:\Users\hacker\AppData\Local\Temp\OHpObWvB\metsvc.exe.

Another common persistence method is using Windows Services. Identify any suspicious running services(5 points): C:\Users\hacker\AppData\Local\Temp\OHpObWvB\metsvc.exe, 31337

Checking Registry

There’s an entry in registry (checking manually), which runs UserInit.exe and evil.exe on logon.

The insider has likely utilized ATT&CK ID T1547.001 to obtain persistence. Find the malicious registry entry and submit the Registry Key Value and modified date(5 points): Userinit.exe, evil.exe, 2021-03-07 11:15:29Z

An attempt was made to reset a newly-created user’s password some time after 9 PM on 03/03/2021. Find the Execution PID and Execution Thread ID(5 points): 472, 2872

This post is licensed under CC BY 4.0 by the author.