Post

Benign: Host Compromise Investigation

Investigate a compromised host using Splunk by analyzing host-centric logs to detect suspicious process execution.

Benign: Host Compromise Investigation

📝 Note:
Before moving forward, deploy the machine. Once deployed, it will be assigned an IP address.
Access this room via the AttackBox, or through the VPN at 10.10.57.67.
The machine may take 3–5 minutes to start.
All required logs are ingested in the index: win_eventlogs.

Scenario: Identify and Investigate an Infected Host

Incident Overview

One of the client’s IDS (Intrusion Detection Systems) indicated a potentially suspicious process execution, suggesting that one of the hosts from the HR department was compromised. Tools related to network information gathering and scheduled tasks were executed, confirming the suspicion.

Due to limited resources, only process execution logs (Event ID: 4688) were pulled and ingested into Splunk using the index win_eventlogs for further investigation.


Network Segmentation

Understanding the network layout is essential for the investigation. The network is logically divided into the following segments:

IT Department

  • James
  • Moin
  • Katrina

HR Department

  • Haroon
  • Chris
  • Diana

Marketing Department

  • Bell
  • Amelia
  • Deepak

Investigation Questions

  1. How many logs are ingested from the month of March, 2022?

Desktop View

  1. Alert: There seems to be an imposter account observed in the logs.
    What is the name of that user?

    Desktop View

  2. Which user from the HR department was observed to be running scheduled tasks?

Desktop View

  1. Which user from the HR department executed a system process (LOLBIN) to download a payload from a file-sharing host?

Desktop View

  1. To bypass security controls, which system process (LOLBIN) was used to download a payload from the internet?

Desktop View

  1. What was the date that this binary was executed by the infected host?
    Format: YYYY-MM-DD

    Desktop View

  2. Which third-party site was accessed to download the malicious payload?

controlc.com

  1. What is the name of the file that was saved on the host machine from the C2 server during the post-exploitation phase?

benign.exe

  1. The suspicious file downloaded from the C2 server contained malicious content with the pattern:
    THM{..........}
    What is that pattern?

    Desktop View

  2. What is the URL that the infected host connected to?

https://controlc.com/e4d11035

This post is licensed under CC BY 4.0 by the author.