Unit42
Description
Files
➜ 7z x .\unit42.zip -p"hacktheblue" -o"unit42"
➜ ls .\unit42\
Directory: ~\VBoxShare\unit42
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a--- 14.02.2024 07:43 1118208 Microsoft-Windows-Sysmon-Operational.evtx
Tasks
1. How many Event logs are there with Event ID 11?

2. Whenever a process is created in memory, an event with Event ID 1 is recorded with details such as command line, hashes, process path, parent process path, etc. This information is very useful for an analyst because it allows us to see all programs executed on a system, which means we can spot any malicious processes being executed. What is the malicious process that infected the victim's system?

3. Which Cloud drive was used to distribute the malware?
4. The initial malicious file time-stamped (a defense evasion technique, where the file creation date is changed to make it appear old) many files it created on disk. What was the timestamp changed to for a PDF file?
5. The malicious file dropped a few files on disk. Where was "once.cmd" created on disk? Please answer with the full path along with the filename.
6. The malicious file attempted to reach a dummy domain, most likely to check the internet connection status. What domain name did it try to connect to?
7. Which IP address did the malicious process try to reach out to?

8. The malicious process terminated itself after infecting the PC with a backdoored variant of UltraVNC. When did the process terminate itself?
Last updated