Investigating Windows

                TASK 1 : Investigating Windows
                • Whats the version and year of the windows machine?

                Answer : windows server 2016

                • Which user logged in last?

                Write a little powershell script lastloguser.ps1 :

                $com=read-host "Enter Computer name here"
                Get-WmiObject -Class Win32_NetworkLoginProfile -ComputerName $com | 
                Sort-Object -Property LastLogon -Descending | 
                Select-Object -Property * -First 1 | 
                Where-Object {$_.LastLogon -match "(\d{14})"} | 
                Foreach-Object { New-Object PSObject -Property @{ Name=$_.Name;LastLogon=[datetime]::ParseExact($matches[0], "yyyyMMddHHmmss", $null)}}

                Execute and enter the Hostname of the computer at prompted : EC2AMAZ-I8UHO76 :

                ./lastloguser.ps1

                Answer : Administrator

                • When did John log onto the system last?
                  Answer format: MM/DD/YYYY H:MM:SS AM/PM

                Using "net user" command :

                C:\Users>net user john | findstr "log"
                Last logon 3/2/2019 5:48:32 PM

                Answer : 03/02/2019 5:48:32 PM

                • What IP does the system connect to when it first starts?

                Let's check a particular registry entry for start up actions :

                HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
                                    
                                    

                Answer : 10.34.2.3

                • What two accounts had administrative privileges (other than the Administrator user)?
                  Answer format: username1, username2

                Checking the local Administrator group with net command :

                 

                Answer : Jenny, Guest

                • Whats the name of the scheduled task that is malicous.

                Open the task scheduler then looking around the few tasks. One of them seems suspect with it's name : "Clean file system" so i looked its actions tab :


                This task is launching a netcat listener to open port 1348

                Answer : Clean file system

                • What file was the task trying to run daily?

                As we can see on above screenshot, this task launch a powershell script : nc.ps1

                Answer : nc.ps1

                • What port did this file listen locally for?

                As we can see on above screenshot too, the listening port is 1348

                Answer : 1348

                • When did Jenny last logon?


                Answer : Never

                • At what date did the compromise take place?
                  Answer format: MM/DD/YYYY

                The suspects elements in the C:\TMP folder are  all dated from 03/02/2019 :


                Answer : 03/02/2019

                • At what time did Windows first assign special privileges to a new logon?
                  Answer format: MM/DD/YYYY HH:MM:SS AM/PM

                I searched for the "Special privileges" Windows Event ID and found 4672 on Microsoft documentation.

                Looking around the time of the attack, the first event is :


                Answer : 03/02/2019 04:04:49 PM

                • What tool was used to get Windows passwords?

                Looking at mim-out.txt :


                Answer : mimikatz

                • What was the attackers external control and command servers IP?

                Looking for redirection of dns traffic in the hosts windows file :


                Answer : 76.32.97.132

                • What was the extension name of the shell uploaded via the servers website?

                The windows server website (IIS) has content stored in C:\inetpub\wwwroot :


                Answer : .jsp

                • What was the last port the attacker opened?

                In order to communicate with the Control and Command Server (see question above) the hacker had set up a firewall rules :


                Answer : 1337

                • Check for DNS poisoning, what site was targeted?

                DNS record can be manage in the Windows Hosts file :


                Answer : google.com