2022-05-07_Lab 15 - Investigating Windows - Cyber_Security
Week 15 Lab
- What’s the version and year of the windows machine?
Answer: Windows Server 2016
- Which user logged in last!
Answer: Administrator
- When did John log onto the system last?
Answer: 03/02/2019 5:48:32 PM
I ran “regedit” to navigate to the UpdateSvc file located in HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
- What IP does the system connect to when it first starts!
Answer: 10.34.2.3
Using the navigation through Control Panel> System and Security> Administrative Tools> Computer Management
I found the two accounts the also had administrative privileges: Local Users and Groups> Groups> Administrators :
- What two accounts had administrative privileges (other than the Administrator user)!
Answer: Jenny, Guest
-
What’s the name of the scheduled task that is malicious? Answer: Clean file system
-
What File was the task trying to run daily? Answer: nc.ps1
-
What port did this file listen locally for? Answer: 1348
Using the “net user Jenny” command in cmd.exe, I found that she never logged on.
-
When did Jenny last logon: Answer: never
-
At what date did the compromise take place? Answer: 03/02/2019
-
At what time did Windows first assign special privileges to a new logon? Answer: 03/02/2019 4:04:49 PM
After looking up the Task that was running I found that the event “GameOver” was running through a “mim.exe” file.
I was not too familiar with the application “mim.exe” so I looked it up and found some useful info in this site: https://www.joesandbox.com/analysis/219878/0/html
-
What tool was used to get Windows Passwords? Answer: Mimikatz
-
What was the attacker’s external control and command servers IP? 76.32.97.132
I was able to find this info in C:\inetpub\wwwroot
- What was the extension name of the shell uploaded via the server’s website? Answer: .jsp
Windows Firewall with Advanced Security stores all Inbound Rules:
- What was the last port the attacker opened! Answer: 1337
I was able to find this info in C:\Windows\System32\drivers\etc\hosts
- Check for DNS poisoning, what site was targeted: Answer: google.com