SOC ALPHA 1
Difficulty: Easy
Scenario: You are a SOC analyst and handling the alerts within your SIEM, ELK, is part of daily duties. Answer the following questions by analysing the alerts provided in README.txt!
ELK should start within 5 minutes, if not please try to start the services manually : sudo systemctl start elasticsearch sudo systemctl start kibana sudo systemctl start logstash
Tools: ELK | LogAnalysis | Network Analysis
Q1) Alert 1 (1/2) - What is the cmdlet used for downloading?
README.txt shows us that in order to see the logs that triggered the Alert 1 we need to filter for "*.DownloadFile*" OR "*.DownloadString*" OR "*Invoke-WebRequest*"
and set the TimeFrame for 14-4-2021 10:00 to 14-4-2021 11:00
:

Answer

Q2) Alert 1 (2/2) - What is the full URL from which the file is downloaded?
Looking at the same logs as in the first question, we can see the full command containing the URL we are interested in:

Answer

Q3) Alert 2 (1/1) - What is the name of the suspicious EXE that is added for Persistence?
To see the logs that triggered the Alert 2, we need to filter for (Event_System_EventID :"11" AND Event_EventData_Image : *Windows\\Start*\\Programs\\\Startup*)
and set the TimeFrame for 14-4-2021 10:00 to 14-4-2021 11:00
:

Answer

Q4) Alert 3 (1/2) - What is the name of the suspicious executable file involved?
To see the logs that triggered the Alert 3 we need to filter for (Event_System_EventID:("12" OR "13" OR "14") AND (Event_EventData_TargetObject:("*\SOFTWARE\Wow6432Node\Microsoft\Active
Setup\Installed
Components*" OR "
\SOFTWARE\Microsoft\Windows
CE*Services\AutoStartOnDisconnect*" OR "
\SOFTWARE\Microsoft\Windows
CE
Services\AutoStartOnConnect
" OR "
\SYSTEM\Setup\CmdLine
" OR "\Software\Microsoft\Ctf\LangBarAddin*" OR "*\Software\Microsoft\Command
Processor\Autorun
" OR "
\Run
")))
and set the TimeFrame for 15-4-2021 8:00 to 15-4-2021 9:00
. Sysmon Event ID 13 records the registry value modifications. Within the Event_EventData_TargetObject field, at the very end we can see the suspicious executable:

Answer

Q5) Alert 3 (2/2) - What is the name of the key path?
Looking at the same log as in Q4, we can find the key path in the same field (Event_EventData_TargetObject). However the answer to the question is not the full path, only the key itself:

Answer

Q6) Alert 4 (1/2) - What is the name of the task?
To see the log that triggered the Alert 3 we need to filter for Event_EventData_Image:
schtasks.exe
AND Event_EventData_CommandLine:
Create
and set the TimeFrame for 20-4-2021 10:00 to 20-4-2021 15:00
. In the log we can see that "SchTasks" command has been run. The name of the task is what's coming after the "/TN" (task name):

Answer

Q7) Alert 4 (2/2) - What is the full path of the program?
Looking at the same log as in Q6, we can find the full path of the program following the "/TR" (task run) parameter:

Answer

Was this helpful?