This post is a write-up or clues on how to resolve the KC7 investigation case of Inside Encryptodera . You can use it as a helpful guide when you encounter an obstacle, as it structured as a fill-in-the-blanks solution.
Section 1: Offensive Odor 👽"
Question 1: What is Barry’s role at the company?
Employees
| where name contains "Barry"
| project name , role
Question 2: What is Barry’s email address?
Employees
| where name contains "Barry"
| project name , role, email_addr
Question 3: What was the subject of the interesting email (the one on January 16th) that Barry sent?
Email
| where sender == "barry_shmelly@encryptoderafinancial.com"
| where timestamp between (datetime(2024-01-16T00:00:00Z) .. datetime(2024-01-16T23:59:59Z))
Question 4: What was the role of the employees that received Barry’s email?
- Find the list of the recipients.
Email
| where sender == "barry_shmelly@encryptoderafinancial.com"
| where subject == "I'm not coming in today. I'm sick of this place. We're all getting laid off anyway."
- Find the role.
Employees
| where email_addr in ("christopher_naylor@encryptoderafinancial.com", "michelle_collins@encryptoderafinancial.com", "jarrod_rodriguez@encryptoderafinancial.com")
| distinct role
- Advanced operators:
Email
| where sender == "barry_shmelly@encryptoderafinancial.com"
| where subject == "I'm not coming in today. I'm sick of this place. We're all getting laid off anyway."
| project recipient
| join kind=inner (
Employees
| project email_addr, role
) on $left.recipient == $right.email_addr
| project recipient, role
| distinct role
Question 5: What was the role of the recipient of that email?
Email
| where subject == "YOU ARE A GREEDY PIG!!!! WHAT IS WRONG WITH YOU?????"
Employees
| where email_addr == "les_goh@encryptoderafinancial.com"
| project role
Question 6: What’s Barry’s IP address? (Paste the full IP address )
Employees
| where name contains "Barry"
| project ip_addr
Question 7: What was the complete URL that Barry was browsing on his computer regarding Cybersecurity Insiders on the afternoon of December 26th?(Paste the full url)
OutboundNetworkEvents
| where src_ip == "10.10.0.1"
| where url contains "Insiders"
| project url
Question 8: What website did he visit first on January 15th? (Paste the full URL)
OutboundNetworkEvents
| where src_ip == "10.10.0.1"
| where timestamp >= datetime(2024-01-15T00:00:00Z)
| top 1 by timestamp asc
| project url
Question 9: Could you provide the full URL for the website Barry searched for USB Flash Drives?
OutboundNetworkEvents
| where src_ip == "10.10.0.1"
| where url contains "usb"
| project url
Question 10: What “secret” document on business transactions did Barry download?
InboundNetworkEvents
| where src_ip == "10.10.0.1"
| where url contains "secret"
| project url
Question 11: What document (docx) did Barry download about salaries?
InboundNetworkEvents | where src_ip == “10.10.0.1” and url contains “salary” and url contains “docx” | project url
- Advanced operators:
InboundNetworkEvents
| where src_ip == "10.10.0.1" and url contains "salary" and url contains "docx"
| extend parsed_url = parse_url(url)
| extend path_segments = split(parsed_url["Path"], "/")
| project FileName = tostring(path_segments[-1])
InboundNetworkEvents
| where src_ip == "10.10.0.1" and url contains "salary" and url contains "docx"
| extend fileName = tostring(split(parse_url(url)["Path"], "/")[-1])
| project fileName
Question 12: What document (zip) did Barry download to get this?
InboundNetworkEvents
| where src_ip == "10.10.0.1"
| where url contains "zip"
| extend fileName = tostring(split(parse_url(url)["Path"], "/")[-1])
| project fileName
Question 13: Do you know the password he used to zip the files?
We know the file name is Encryptodera_Proprietary_Algorithms.zip and by checking the ProcessEvents
table, we observe the parent_process_hash
is 614ca7b627533e22aa3e5c3594605dc6fe6f000b0cc2b845ece47ca60673ec7f
ProcessEvents
| where process_commandline contains "Encryptodera_Proprietary_Algorithms.zip"
I narrowed down the results by the day the event took place to shoren my results and find the password.
ProcessEvents
| where timestamp between (datetime(2024-01-16T00:00:00Z) .. datetime(2024-01-16T23:59:59Z))
| where hostname == "IGOY-DESKTOP"
| where parent_process_hash == "614ca7b627533e22aa3e5c3594605dc6fe6f000b0cc2b845ece47ca60673ec7f"
Question 14: What is the name of the drive on which Barry stored the final files?
Ans from question 13.
ProcessEvents
| where timestamp between (datetime(2024-01-16T00:00:00Z) .. datetime(2024-01-16T23:59:59Z))
| where hostname == "IGOY-DESKTOP"
| where parent_process_hash == "614ca7b627533e22aa3e5c3594605dc6fe6f000b0cc2b845ece47ca60673ec7f"
Section 2: Crypto Conquest
Question 1: What is the filename of this note?
Do you see it? It is the .txt
file name.
FileCreationEvents
| where path contains "GIMME"
| distinct filename
| project filename
Question 2: What kind of attack is this?
Data encrypted for impact T1486 .
Question 3: On how many machines was this .txt file seen?
FileCreationEvents
| where path has "YOU_GOT_CRYTOED_SO_GIMME_CRYPTO.txt"
| distinct hostname
| count
Question 4: What time was the ransom note first seen?
FileCreationEvents
| where path has "YOU_GOT_CRYTOED_SO_GIMME_CRYPTO.txt"
| top 1 by timestamp asc
| project timestamp
Question 5: What is the hostname of the system where the ransom note was first seen?
FileCreationEvents
| where path has "YOU_GOT_CRYTOED_SO_GIMME_CRYPTO.txt"
| top 1 by timestamp asc
| project timestamp, hostname
Question 6: How many files were encrypted on this machine?
The question provided us with the hostname *UL8R-MACHINE *and the timestamp 2024-02-17. By running the following KQL we can review the activities:
FileCreationEvents
| where hostname == "UL8R-MACHINE"
| where timestamp >= datetime(2024-02-17)
After adding | distinct filename
to the KQL above I found two files files_go_byebye.exe and YOU_GOT_CRYTOED_SO_GIMME_CRYPTO.txt that don’t end with .umadbro
This should allow you to find the answer but let me do a challenge to stretch my brain! From the filename column I found 3 find extension types .txt , .exe and .umadbro. Let’s assume there were more instead of scrolling I want an efficient way to get all the file types.
FileCreationEvents
| where hostname == "UL8R-MACHINE"
| where timestamp >= datetime(2024-02-17)
| extend FileExtension = tostring(split(filename, ".")[-1])
| project FileExtension
| summarize Count = count() by FileExtension
| sort by Count desc
extend FileExtension = tostring(split(filename, ".")[-1])
:- In this line, we are using the
extend
operator to create a new column calledFileExtension
. - We are using the
split
function to split thefilename
by the dot (".") character. This will create an array of substrings where the dot is the delimiter. - The
[-1]
index is used to extract the last element of the array, which represents the file extension. - We are converting the extracted file extension to a string using
tostring
function and storing it in theFileExtension
column.
- In this line, we are using the
Question 7: What is the extension that was used on the encrypted files?
The answer is the extension with the most count from the answer to question number 6.
Question 8: What command was run that references the ransomware extension?
The questions provides the KQL and the answer is the one in ‘process_commandline’.
Question 9: When did files_go_byebye.exe appear on this machine?
FileCreationEvents
| where hostname == "UL8R-MACHINE"
| where filename contains "byebye"
| project timestamp
Question 10: How many commands were run on UL8R-MACHINE during this timeframe?
The question provides the KQL and you can see the count or records or add | count
at the end of the KQL.
Question 11: What domain does the encoded PowerShell reference?
ProcessEvents
| where hostname == "UL8R-MACHINE"
| where timestamp between (datetime("2024-02-16") .. datetime("2024-02-18"))
| distinct process_commandline
The question gave us a hint powershell. I added the following line to decread the amount of lines to analyze.
| where process_commandline contains "powershell"
Copy the base64 and decode it with your favorite tool, script or using Base64 Decode online .
Question 12: What command is run right before the base64-encoded PowerShell?
The KQL from the answer to question 11 would reveal the answer or we can get the timestamp by using the following KQL.
ProcessEvents
| where hostname == "UL8R-MACHINE"
| where timestamp < datetime(2024-02-17T02:29:53Z)
| project timestamp , process_commandline
| top 1 by timestamp desc
Question 13: How many devices ran the gpupdate /force command?
ProcessEvents
| where process_commandline has "gpupdate /force"
| distinct hostname
| count
Question 14: How many machines at Encryptodera ran “systeminfo”?
ProcessEvents
| where process_commandline has "systeminfo"
| count
Question 15: What was the timestamp for the first time the command was run?
ProcessEvents
| where process_commandline has "systeminfo"
| top 1 by timestamp asc
Question 16: How many days elapsed between when the attackers ran discovery commands and when the ransomware attack started?
Calculate the date 🤯!
Question 17: What is the hostname of the device on which the attackers first ran systeminfo?
ProcessEvents
| where process_commandline contains "systeminfo"
| project timestamp , hostname
| top 1 by timestamp asc
Question 18: What was the full commandline used by the threat actor when running nltest /dclist? (paste the full commandline)
ProcessEvents
| where process_commandline contains "nltest /dclist"
Question 19: What is the full name of the .xlsx.exe file on 41QI-LAPTOP?
FileCreationEvents
| where hostname == "41QI-LAPTOP"
| where path contains ".xlsx.exe"
| project filename
Question 20: What file shows up a few seconds after the .xlsx.exe file?
FileCreationEvents
| where hostname == "41QI-LAPTOP"
| where timestamp > datetime(2024-02-01T08:50:12Z)
| top 1 by timestamp asc
| project timestamp , hostname, filename
Question 21: How many devices does screenconnect_client.exe appear on?
FileCreationEvents
| where filename contains "screenconnect_client.exe"
| count
Question 22: Check the Email logs to see if the .xlsx.exe file was sent in a link. What email address was used to send this file?
Email
| where link contains "xlsx.exe"
| distinct sender
Question 23: How many unusual emails were sent by Barry?
Email
| where sender == "barry_shmelly@encryptoderafinancial.com"
| where timestamp > (datetime("2024-02-01"))
| distinct subject
| count
Question 24: Type got it once you’ve made a note of these recipients.
got it
Question 25: What IP was used to sign into Barry’s account on February 1st?
The AuthenticationEvents allows us to check filter the tables by the username
. To find Barry’s user name we can locate it from the Employees table.
Employees
| where name contains "Barry"
| project name, username
AuthenticationEvents
| where username == "bashmelly"
| where timestamp between (datetime('2024-02-01T00:00:00Z') ..datetime('2024-02-01T23:59:59') )
| order by timestamp desc
Question 26: How many other accounts did that IP log into?
AuthenticationEvents
| where src_ip contains "143.38.175.105"
Question 27: How many IPs logged in to all 8 devices where the attacker ran systeminfo?
let hosts = ProcessEvents
| where process_commandline has "systeminfo"
| distinct hostname;
AuthenticationEvents
| where hostname in (hosts)
| summarize dcount(hostname) by src_ip
| order by dcount_hostname desc
Question 28: What is the role of the employee who this IP address belongs to?
Employees
| where ip_addr == "10.10.0.138"
| project role
Question 29: How many successful logins were made from this IP?
AuthenticationEvents
| where src_ip == "10.10.0.138"
| where result == "Successful Login"
| count
Question 30: What is the hostname of the server the attackers logged into?
AuthenticationEvents
| where src_ip == "10.10.0.138"
| where result == "Successful Login"
| where hostname contains "server" and hostname !contains "mail"
Section 3: F in the chat
Question 1: What username was used to log into the DOMAIN_CONTROLLER_SERVER?
AuthenticationEvents
| where hostname == "DOMAIN_CONTROLLER_SERVER"
| project username
Question 2: What laptop did the lihenry_domain_admin
account sign into?
AuthenticationEvents
| where username == "lihenry_domain_admin"
| project hostname
Just for Kqling!
let SusUserName = AuthenticationEvents
| where hostname == "DOMAIN_CONTROLLER_SERVER"
| project username;
AuthenticationEvents
| where username in (SusUserName)
| project hostname, username
Question 3: What is the MITRE ATT&CK ID for mimikatz?
Question 4: Did the threat actor run mimikatz on this device? If so, enter the command line the attacker ran. If not, enter no
.
ProcessEvents
| where process_commandline contains "mimikatz"
| distinct process_commandline
Question 5: Who does this device belong to? (Enter the employee’s name)
The question is asking about the device from question 4.
Employees
| where hostname == "GJ95-LAPTOP"
| project name
Question 6: Was Valerie Orozco targeted in the phishing emails sent from Barry Shmelly?
We all know! Yes
.
Question 7: What is the name of the file that was sent to Valerie in the phishing email?
From the notes I know the sender email address KC7 Inside Encryptodera - Section 1: Offensive Odor .
Valerie’s email address is in the Employees
table.
Employees
| where name contains "valerie Orozco"
| project email_addr
Email
| where sender == "barry_shmelly@encryptoderafinancial.com"
| where recipient == "valerie_orozco@encryptoderafinancial.com"
| project link
| extend fileName = tostring(split(parse_url(link).Path, "/")[-1])
| project fileName
The expression | extend fileName = tostring(split(parse_url(link).Path, "/")[-1])
is used to extract the last part (the filename) from a URL in the link column.
| extend fileName =
The extend operator adds a new column called fileName with the extracted filename as the value.
tostring()
This converts the extracted value (which is the filename) to a string type.
split(parse_url(link).Path, "/")
This splits the path into an array of strings, using / as the delimiter.
parse_url(link).Path
This extracts the path portion of the URL from the link column.
[-1]
This selects the last element of the array, which is the file name.
Question 8: Did Valerie click the link? If so, enter the timestamp when she clicked the link. If not, enter ’no'
OutboundNetworkEvents
| where url has "Employee_Contact_List_Updated_March_2024.docx.exe"
| where src_ip == "10.10.0.18"
Question 9: How many different user accounts logged into Valerie’s machine?
AuthenticationEvents
| where hostname == "GJ95-LAPTOP"
| distinct username
| count
Question 10: How many unique hosts did this user account attempt to log into?
AuthenticationEvents
| where username == "systadmi_local_admin"
| distinct hostname
| count
Just for Kqling!
AuthenticationEvents
| where username == "systadmi_local_admin"
| distinct hostname
| count
Question 11: Which user NOT in an IT role was improperly using the systadmi_local_admin
credentials? (This is likely a sign of compromise)
You Got this 👾
Question 12: When was Robin phished by Barry Shmelly’s account?
let employeeEmail = Employees
| where name == "Robin Kirby"
| project email_addr;
Email
| where recipient in (employeeEmail) and sender == "barry_shmelly@encryptoderafinancial.com"
| project timestamp
Community Help
Join Discord to discuss the module KC7 Discord #encryptodera .