Balloons Over Iowa
Section 1: KQL 101 🐣
Section 2: Aliens 👽
Question 1: Which email address sent a message containing the domain invasion.xyz?
Email
| take 10

Question 2: How many users received email with links to the domain invasion.xyz?
Question 3: What was the subject of the email sent in (1)?
Question 4: Who received the email in (1)? (Provide the email address of any of them)
Question 5: What file (name) was sent as a link in the email in (1)?

Question 6: What is the IP of the user who clicked on the link from the email containing the domain invasion.xyz?

Question 7: What is the name of the user from (6)?

Question 8: When did the the user in (6) click on the link? Provide an exact timestamp
Question 9: What is the hostname of the user in (6)
Question 10: Did the user in (6) download the file on the link? (yes/no)
Question 11: How many total emails were sent by the email address in (1)?
Question 12: How many unique filenames were sent by the email address in (1)?


Question 13: What domain did the email address in (1) use to target Richard Clements?

Question 14: When did Richard Clements click on the link sent by the sender in (1)?

Question 15: When did Richard Clements download the file in the link?

Question 16: What was the name of the file that Richard Clements downloaded (after clicking on the link?)
Question 17: What file was observed on Richard Clement's machine immediately after he downloaded file in (16)? Provide the full path
Question 18: What was the Sha256 hash of the file in (17)?
Question 19: The hash in (18) can be found on virustotal.com. Virustotal is a malware repository used by many security researchers. What is the reported name of this file on Virustotal?

Question 20: What is the popular threat label for the file in (18) on Virustotal.com?

Question 21: How many processes were spawned on Richard Clement's machine by the file in (18)?

Question 22: The file in (18) established a remote connection from Richard Clement's machine to an external IP over port 443. What was this IP?
Question 23: Shortly after the malware ran, the attackers came back to Richard's machine to enumerate Enterprise Admins. What command did they run?

Question 24: What commands did the attacks run to dump credentials on Richard's machine?


Question 25: The attackers enumerated the contents of this folder (name) on Richard's machine and dumped the contents to a text file
Question 26: How many machines have similar commands connecting to C2 (command and control) channels as those observed in (22)?

Question 27: How many unique implants were used to establish these C2 connections?
Question 28: One of these C2 connections was observed on hostname 0KYU-DESKTOP. When did this occur?

Question 29: On hostname 0KYU-DESKTOP, attackers ran this command to delete data backups

Question 30: It is likely that the observed actor (the one responsible for activity seen in 29) conducted this type of destructive attack.
Section 3: TopSecret 🤫
Question 1: On 2023-02-19 at 05:02, Son Johnson downloaded a suspicious Word document file. What was the name of this file?

Question 2: From which domain did Son Johnson download the file identified in (1)?

Question 3: What IP address does the domain identified in (2) resolve to?

Question 4: What time was the resolution seen in (3) recorded in Passive DNS data? (enter exact timestamp)
Question 5: What other Top Level Domain (TLD) such as .com, .org etc. is used by the domains hosted on the IP identified in (3)?

Question 6: How many domains resolve to the IP identified in (3)?

Question 7: One of the domains identified in (6) resolves to an IP that starts with 194. What is this IP?

Question 8: The attackers performed reconnaisance against our organization using the IP identified in (7). As part of this reconnaissance, the attackers searched for a three-word phrase. What was this phrase?

Question 9: Just before downloading the file identified in (1), Son Johnson browsed to a domain. What was this domain?

Question 10: What kind of attack was Son Johnson a victim of?
Event
Timestamp

Question 11: How many different domains did the attackers use in this kind of attack? (The attack type identified in [10])
Question 12: How many employees at Balloons Over Iowa were victims of this kind of attack? (The attack type identified in [10])
Question 13: How many different employee roles did the attackers target using this type of attack? (The attack type identified in [10])
Question 14: You have received an alert that this employees' device, - hostname 3CIU-LAPTOP - may have malware on it involving this hash: 4c199019661ef7ef79023e2c960617ec9a2f275ad578b1b1a027adb201c165f3 that was the parent of suspicious processes. What is the name of the file?

Question 15: What is the username associated with the device found in 14?
Question 16: What is the role of (15) in the organization?

Question 17: You observe that this the file (from 14) is launching a process on 3CIU-LAPTOP named rundll32.exe with an external IP address. What is that IP address?

Question 18: What does this connection (from 17) indicate? (one of the phases of the kill chain)

Question 19: Investigating compromised devices in the org you find malicious activity using a tool called rclone. What domain is listed in its command line on Julie Well's device?

Question 20: What IP address does (19) resolve to?

Question 21: How many total domains have also resolved to this IP (the one found in 20)?
Question 22: What does the command found in (19) represent? (Hint: It's a MITRE ATT&CK Tactic)
Question 23: How many other devices on the org had similar threat activity using rclone on them?
Question 24: The attackers disabled Defender (antivirus) on some devices in the network. How many systems did they do this on?
Question 25: A member of your investigation team reported that host GWB7-DESKTOP was compromised. What is the timestamp of the earliest suspicious process event you observe on this device? (Paste full timestamp)

Question 26: What is the command and control (C2) IP address observed on GWB7-DESKTOP

Question 27: What is the timestamp of the earliest Passive DNS resolution seen on the IP found in (26)?

Question 28: Which of the domains hosted on the IP found in (26) resolve to the most number of unique IPs? If there is a tie, enter any one of the domains.

Question 29: What is the domain using the ".air" TLD that resolves to the IP found in (26)?
Question 30: The domain found in (29) resolves to an IP that starts with "144." What is the hostname on which this IP was used for command and control?

Section 4: Helpdesk ☎️
Question 1: How many emails contained the domain "database.io"?
Question 2: What IP does the domain "database.io" resolve to

Question 3: How many domains resolve to the same Ip as "database.io"?
Question 4: How many emails contained domains sharing the same IP as "database.io"?
Question 5: What was the most prevalent sender of emails seen in (4)?
Question 6: How many total emails were sent by the sender in (5)?
Question 7: What was the most prevalent email subject used by the sender in (5)?

Question 8: Which user named Carolyn clicked on a link containing the domain "hardware.com"? (Provide full name)

Question 9: What attacker IP was used to login to Carolyn's account after she clicked the link?

Question 10: How many accounts did the attacker try to log into (successfully or unsuccessfully) from the IP in (9)?
Question 11: What filename did the attackers use to exfiltrate data from Carolyn's email? (Hint: Look at the parameters in the URL)

Question 12: When did the attackers exfiltrate data from Carolyn's email? (exact timestamp)
Question 13: What IP does the domain 'hardware.com' resolve to?
Question 14: This IP (from question 13) is used to find out information about the company. What is the first URL the attackers browsed to from this IP?

Question 15: What is this type of research technique (from 14) called?
Section 5: Security Jeopardy 🎤
Question 1: In this type of attack, adversaries compromise software developers, hardware manufacturers, or service providers and use that access to target downstream users of the software, hardware, or service. Solarwinds was impacted by this type of compromise in 2020.
Question 2: Attackers often use this legitimate Windows feature as a way to establish persistence on a compromised device.
Question 3: In an --- phishing attack, an attacker may steal credentials or cookies to bypass multi-factor authentication and gain access to critical systems.
Question 4: When using this technique, attackers guess many combinations of usernames and passwords in an attempt to access a system
Question 5: A attack is when an attacker uses common passwords to try to gain access to multiple accounts in a single environment
Question 6: This type of malware is designed to permanently erase data from an infected system
Question 7: This is a collection of databases for configuration settings for the Windows operating system
Question 8: This describes techniques used by attackers to communicate with systems they control within a victim network.
Question 9: This happens when malware or a malicious actor carries out an unauthorized transfer of data from a system
Question 10: What binary-to-text encoding scheme is used to convert "hello world" to "aGVsbG8gd29ybGQ="
Question 11: In this type of attack, attackers gain unauthorized access to information, then release that information to the public, often in an attempt to exert influence
Question 12: This is a one-way cryptographic algorithm that converts an input of any length to an output of a fixed length.
Question 13: This is a cryptographic hashing function that outputs a value that is 256 bits long.
Question 14: This is the process of tracking and identifying the perpetrator of a cyber attack or intrusion.
Question 15: This Twitter user, also known as "Hutch", co-authored the paper that introduced the kill chain to information security. (enter their @ username)
Question 16: This Twitter user is the Director of Intel at Red Canary and an instructor for SANS FOR578. (enter their @ username)
Question 17: In this type of attack, adversaries encrypt an organization's files and demand a payment in exchange for the decyption key
Question 18: In this type of attack, adversaries gain access to an organization's intellectual property or other sensitive data and threatens to release the data publicly unless the organization pays the adversary.
Question 19: This type of vulnerability is unknown to the people responsible for patching or fixing it
Question 20: In this phase of the kill chain, attackers try to gather as much information as possible about their victims
Question 21: Attackers use this technique to probe victim infrastructure for vulnerabilities via network traffic
Question 22: This data source can be used to get additional information about registered users or assignees of an Internet resource, such as a domain name, an IP address block or an autonomous system.
Question 23: In this type of attack, adversaries compromise a legitimate website and add malicious code in an attempt to target users who visit that site.
Last updated