Splunk Medium Level (TryHackMe)


 



             This room by TryHackMe explores the process of investigating a compromised web server using Splunk SIEM. It focuses on analyzing various Windows data sources such as Sysmon, PowerShell, and event logs to identify indicators of compromise (IOCs). By correlating events, analyzing fields, and pivoting data, anomalies can be detected and the attacker’s actions can be reconstructed. This exercise aims to improve log analysis skills for efficient threat detection and response.






       SOC Analyst Johny has observed some anomalous behaviours in the logs of a few windows machines. It looks like the adversary has access to some of these machines and successfully created some backdoor. His manager has asked him to pull those logs from suspected hosts and ingest them into Splunk for quick investigation. Our task as SOC Analyst is to examine the logs and identify the anomalies.


On one of the infected hosts, the adversary was successful in creating a backdoor user. What is the new username?

Answer: A1berto


Event ID 4720 is logged when a user account is created.



  • On the same host, a registry key was also updated regarding the new backdoor user. What is the full path of that registry key?
Answer: HKLM\SAM\SAM\Domains\Account\Users\Names\A1berto

This would query to Sysmon events that logged modifications of a registry value.


Examine the logs and identify the user that the adversary was trying to impersonate.


  • Answer: Alberto

  • What is the command used to add a backdoor user from a remote computer?
Answer: C:\windows\System32\Wbem\WMIC.exe” /node:WORKSTATION6 process call create “net user /add A1berto paw0rd1

Select the “CommandLine” field. Of the values, the first set of commands is a command a remote user would used because the “wmic” is a command-line tool which can be leveraged for remote execution of commands.

  • How many times was the login attempt from the backdoor user observed during the investigation?

The query will filter events where successful and failed account logon attempts were made by the backdoor user.

Answer: 0

You can use also this query not only from the video "index="main" EventID="4625" OR EventID="4624" A1berto" , the result will be 0 .


  • What is the name of the infected host on which suspicious Powershell commands were executed?
Answer: James.browne


  • PowerShell logging is enabled on this device. How many events were logged for the malicious PowerShell execution?
Answer: 79



  • An encoded Powershell script from the infected host initiated a web request. What is the full URL?
Answer: hxxp[://]10[.]10[.]10[.]5/news[.]php




Comments

Popular posts from this blog

TryHackMe - Threat Hunting Simulator - Health Hazard

TryHackMe - Typo Snare Threat Hunter Simulator (medium level)

Phishing Unfolding SIM (SOC Simulator TryHackMe)