Castle & Sand
Pre
Section 1: KQL 101 🧰
Section 2: Shark Attack! 🦈
1: What email address did the threat actor provide to Castle&Sand to communicate with them?
2: What is the unique decryption ID?
3: Should this be something you post publicly about? Yes or no?
4: How many notes appeared in Castle&Sand's environment?
5: How many distinct hostnames had the ransom note?
6: How many distinct employee roles were affected by the ransomware attack?
7: How many unique hostnames belong to IT employees?
8: One of the IT employees has their IP address ending in 46. What's their name?
9: How many security alerts involved the different hosts?
10: How about just the unique hostnames belonging to the IT Helpdesk from Question 7?
11: Who owns the machine that flagged on that alert?
12: When did the file appear on that user's machine?
13: What's the SHA256 hash of that file?
14: What application created that file?
15: Let's look for other files with that same name. How many unique hosts had that file on their systems?
16: How many unique domains did employees download this file from?
17: Based on the employee we've been tracking from Question 11, which domain did they download the file from?
18: How many unique IP addresses did the domain resolve to?
19: Which IP address is closest to when the employee had the file created on their host machine?
20: How many unique IPs did that domain resolve to?
21: Let's take all of the IP addresses from the two domains and search them against network events on Castle&Sand's website. How many records returned from your query?
22: When was the first time we saw any of these actor IP addresses from Q21 against Castle&Sand's network?
23: Let's search the actor IPs against AuthenticationEvents to see if they logged into any user machines or email accounts. How many records did you get back?
24: Let's look for the malicious domains in Emails. How many records did you get back?
25: When was the earliest email sent?
26: Who was the sender?
27: How many emails total did that sender send to Castle&Sand employees?
28: Take all of the distinct sender or reply_to emails from the last question. How many emails total are associated with these email addresses?
29: How many unique domains did the email addresses use in their emails?
30: How many distinct IP addresses total were used by all of the domains identified in Q28?
31: How many user accounts did these IPs log into?
32: Looking at these emails (from question 31), how many unique filenames were served by these domains?
33: How many files with these names were created on employee host machines?
34: When was the first file observed?
35: How many records total are associated with the identified host machines from Q33?
36: How many records total do you have now?
37: What IP address is referenced in that command?
38: Which host machine did the powershell activity execute on?
39: There's a weird repeating command right before this activity. What's the parent process of the first time this repeated activity occurs?
40: What legitimate Windows process was this file trying to masquerade as?
41: How many hosts had their passwords dumped?
42: How many hosts did that powershell command execute on?
43: How many unique IP addresses were used in these commands?
44: Which of these IP addresses was seen the most?
45: How many records total involved those processes?
46: Let's look to see if any of these files are referenced in the command line. How many records did you find?
47: When was the earliest time found in Q46?
48: When was the earliest time you saw these files?
Section 3: Hunting the Shark 🔍
1: How many hours does Castle&Sand have before the gang releases the information?
2: What do the ransomware gang call themselves?
3: What Mitre Technique is aligned with what this group did on Castle&Sand systems?
4: Let's search for the email domain used in the ransom note. What is the ZIP code of their headquarters?
5: What country is this email service located in?
6: How many continents total are these IP addresses from?
7: What is the Autonomous System (AS) number for the IP address?
8: Which one is assigned to a University?
9: Which email address is associated with a company outside of the United States?
10: For the tool found in Section 2, Q41, What is the MITRE ID for that specific software?
11: For the tool found in Section 2, Q41, what is the MITRE ID for that that type of technique that this tool is typically used for?
12: How many unique SHA256 hashes are found in Castle&Sand's environment with these filenames?
13: How many were flagged as malicious on VirusTotal?
14: Which file hash was reported by the security community as the ransomware's encrypted payload?
15: What ransomware family uses a command similar to this process execution?
Section 4: Sand in my 👁️👁️ (New Threat Actor)
1: How many emails were sent from this email to Castle&Sand employees?
2: There appears to be another email account. How many emails total are referenced by these two email accounts?
3: How many unique domains were used by these email accounts?
4: Based on these domains, what type of attack did this threat actor conduct?
5: How many distinct job roles were targeted by this type of attack?
6: How many external IP addresses were used to successfully log into those user accounts?
7: These IP addresses may have accessed email inboxes and downloaded data. How many unique filenames were downloaded by these IP addresses?
8: How many distinct IPs were involved in the stealing of downloaded data from the previous questions?
9: Based on the IPs from Q6, how many unique domains did they resolve to?
10: Let's go back to the user accounts that may have been affected by the phishing campaign. How many hosts have they logged into?
11: Investigate the domains from Q9. How many files are present on Castle&Sand systems that originated from these domains?
12: Investigate what happens after these files are downloaded and find malicious activity. How many unique malware filenames are created from these files?
13: How many of these files total are present on Castle&Sand systems?
14: How many distinct C2 servers are associated with the malware?
15: When is the first time you see this final action by the threat actor? Copy & paste the full timestamp.
16: What MITRE Technique is this aligned with?
17: How many hosts are affected by this action?
18: How many distinct job roles were affected by this action?
Section 5: A clean sweep 🧹
1: Look up the IP addresses from Q8. Which IP address is in the country that hosted the winter olympics a few years ago?
IP Address
Location
Network
Postal Code
Lat / Long / Accuracy Radius
ISP / Organization
Domain
Connection Type
2: Which one hosted the winter Olympics recently? If there's more than one, post any of them.
3: Search the malicious files found in Q12 on VirusTotal.com. Which file appears to not be malicious? Copy and paste the SHA256 hash.
4: Who signed the file?
5: Research the malware files some more. Which threat actor group may have used these in the past?
6: For what you found in Section 4, Q15, who developed this malware? Paste their username.
Section 6: Security Jeopardy REDUX 🕺
1: What is KC7 Cyber's Twitter Handle?
2: What was the Sharky Ransomware Gang's Twitter Handle?
3: What KC7 Learning Module did we post on November 26, 2023? Copy and paste the name of the module
4: What was the name of the company from KC7's game module about the culinary arts?
5: How many bits are in a byte?
6: How many megabytes are in a gigabyte?
7: Who on Twitter likes to IMPOSE COST to adversaries, and really likes Spiderman?
8: What cybersecurity conference is focused on Detection Engineering And Threat Hunting? Provide the domain name of their website.
9: What SssSssSecurity conference focused on cyber crime is typically hosted recently in Arlington VA?
10: What recent ZERO DAY vulnerability in late May / June 2023 where it was reported that the LACE TEMPEST group took responsibility for it? Copy & paste the CVE.
11: Who is claiming responsibility for the DDOS attacks at a well know tech company? (June 2023)
12: 🤫 📡 You intercepted a secret transmission
13: Binary blob
5: Who's KC7's Software Engineering Intern?
6: Who's KC7's Content Development Intern?
Last updated