Challenge:Monday Monitor: WALKTHROUGH

Challenge:Monday Monitor: WALKTHROUGH

Scenario

Swiftspend Finance, the coolest fintech company in town, is on a mission to level up its cyber security game to keep those digital adversaries at bay and ensure their customers stay safe and sound.

Led by the tech-savvy Senior Security Engineer John Sterling, Swiftspend’s latest project is about beefing up their endpoint monitoring using Wazuh and Sysmon. They’ve been running some tests to see how well their cyber guardians can sniff out trouble. And guess what? You’re the cyber sleuth they’ve called in to crack the code!

The tests were run on Apr 29, 2024, between 12:00:00 and 20:00:00. As you dive into the logs, you’ll look for any suspicious process shenanigans or weird network connections, you name it! Your mission? Unravel the mysteries within the logs and dish out some epic insights to fine-tune Swiftspend’s defences.

Booted up machine, attempted to connect via my browser and received “Wazuh dashboard server is not ready yet”, Waited further 5 mins, refreshed and logged in using: admin Mond*yM0nit0r7

 

Navigated to Security events

Changed date range to Apr 29 2024 between 12:00:00 and 20:00:00

Searched localhost in the events searchbar

Click on detects suspicious file notification and answer is under eventdata.commandLine section

Initial access was established using a downloaded file. What is the file name saved on the host? ANSWER: SwiftSpend_Financial_Expenses.xlsm

 

Search ‘Scheduler’ in events searchbar

One entry has long command

What is the full command run to create a scheduled task?

ANSWER: ”cmd.exe” /c ”reg add HKCU\SOFTWARE\ATOMIC-T1053.005 /v test /t REG_SZ /d cGluZyB3d3cueW91YXJldnVsbmVyYWJsZS50aG0= /f & schtasks.exe /Create /F /TN ”ATOMIC-T1053.005” /TR ”cmd /c start /min \”\” powershell.exe -Command IEX([System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String((Get-ItemProperty -Path HKCU:\\SOFTWARE\\ATOMIC-T1053.005).test)))” /sc daily /st 12:34”

 

What time is the scheduled task meant to run? ANSWER: 12:34

There was an encoded string in the command

What was encoded? ANSWER:

ping www.youarevulnerable.thm

 

Search ‘Net’ in searchbar

 

Examine expanded results to find relevant commandline

What password was set for the new user account? ANSWER: I_AM_M0NIT0R1NG

 

Search mimikatz in searchbar as credential dumping is menitoned

Filter by

What is the name of the .exe that was used to dump credentials? ANSWER: memotech.exe

Searched THM in searchbar, found flag in commandline

Data was exfiltrated from the host. What was the flag that was part of the data? ANSWER: THM{M0N1T0R_1$_1N_3FF3CT}

Doneskies.

r0tZ Avatar

One response to “Challenge:Monday Monitor: WALKTHROUGH”

Leave a Reply to Wazuh: WALKTHROUGH – A Cyber Journey Cancel reply

Your email address will not be published. Required fields are marked *