Splunk Medium Leval Second Scenario (Tryhackme Benign Scenario)
Hey all, welcome to my walkthrough series on TryHackMe’s SOC Level 1 path which covers the seventh and final room in this module on Security Information and Event Management, where we will come to understand how SIEM works and get comfortable creating simple and advanced search queries to look for specific answers from the ingested logs.
- Imposter Alert: There seems to be an imposter account observed in the logs, what is the name of that user?
Answer: Amel1a
- Which user from the HR department executed a system process (LOLBIN) to download a payload from a file-sharing host.
Answer: haroon
- To bypass the security controls, which system process (lolbin) was used to download a payload from the internet?
Answer: certutil.exe
- What was the date that this binary was executed by the infected host? format (YYYY-MM-DD)?
Answer: 2022–03–04
- Which third-party site was accessed to download the malicious payload?
Answer: controlc.com
- What is the name of the file that was saved on the host machine from the C2 server during the post-exploitation phase?
Answer: benign.exe
- The suspicious file downloaded from the C2 server contained malicious content with the pattern THM{……….}; what is that pattern?
Answer: THM{KJ&*H^B0}
- What is the URL that the infected host connected to?
Answer: https://controlc.com/e4d11035

Comments
Post a Comment