<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Aynura Agamirzayeva</title>
    <description>The latest articles on DEV Community by Aynura Agamirzayeva (@aynura_agamirzayeva).</description>
    <link>https://dev.to/aynura_agamirzayeva</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3847534%2Fbb79de4b-3ac5-4574-802a-a3adf25bb157.jpg</url>
      <title>DEV Community: Aynura Agamirzayeva</title>
      <link>https://dev.to/aynura_agamirzayeva</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/aynura_agamirzayeva"/>
    <language>en</language>
    <item>
      <title>Hack The Box Sherlock: GhostTrace Write-up</title>
      <dc:creator>Aynura Agamirzayeva</dc:creator>
      <pubDate>Sat, 28 Mar 2026 11:22:18 +0000</pubDate>
      <link>https://dev.to/aynura_agamirzayeva/hack-the-box-sherlock-ghosttrace-1lip</link>
      <guid>https://dev.to/aynura_agamirzayeva/hack-the-box-sherlock-ghosttrace-1lip</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh1e504oo4h4p6d8aalgk.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fh1e504oo4h4p6d8aalgk.png" alt=" " width="192" height="192"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Sherlock Scenario&lt;/strong&gt;&lt;br&gt;
You are a blue team analyst tasked with investigating a suspected breach in an Active Directory environment named Main.local. The network includes a Domain Controller (DC01 and two client machines (Client02 and Client03). A user on Client03 received a phishing email, leading to a series of attacks that compromised the domain. Your job is to analyze the provided Windows Event Logs and Sysmon logs from Client02, Client03, and DC01 to reconstruct the attack chain, identify the attacker’s actions, and uncover critical artifacts such as credentials, hashes, and persistence mechanisms.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 1. What is the name of the malicious phishing attachment downloaded by the user on Client02?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;We download the file provided for analysis and extract it using WinRAR.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Farognlfn9o5bd4ty2e2z.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Farognlfn9o5bd4ty2e2z.png" alt=" " width="800" height="346"&gt;&lt;/a&gt;&lt;br&gt;
As shown, the dataset contains logs from two clients and one server.&lt;br&gt;
Based on the first question, we will focus on the Logs-Client02 data. Since we are looking for attachments, we apply filters such as &lt;em&gt;.doc&lt;/em&gt; and &lt;em&gt;.zip&lt;/em&gt; during the search.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4tc3v9kge43dousyseh6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4tc3v9kge43dousyseh6.png" alt=" " width="800" height="318"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4mfmakog9b0ezwi73vq9.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F4mfmakog9b0ezwi73vq9.png" alt=" " width="800" height="378"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;As observed, the victim downloaded the attachment using a Microsoft Office application.&lt;br&gt;
&lt;strong&gt;Answer:&lt;/strong&gt; &lt;em&gt;Profits.docm&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 2. What is the IP address from which the malicious attachment was downloaded?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;To proceed, we need to perform a search using this file name.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9ye4t9t6fcuqs27gpyv3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9ye4t9t6fcuqs27gpyv3.png" alt=" " width="800" height="239"&gt;&lt;/a&gt;&lt;br&gt;
As observed, the IP address is &lt;strong&gt;192.168.204.152&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 3. After the victim opened the file the malware initiated a network connections to a remote IP address. What is the IP address and the port number?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;For this, we will apply a filter for the &lt;strong&gt;“Network Connection Detected”&lt;/strong&gt; event ID (Event ID 3).&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F175cd1ok4kau19ii3hu3.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F175cd1ok4kau19ii3hu3.png" alt=" " width="800" height="454"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Upon reviewing the logs, I encountered an event similar to the one shown above. It involves a non-standard port and the use of a Microsoft Office application (&lt;em&gt;winword.exe&lt;/em&gt;).&lt;br&gt;
&lt;strong&gt;Answer:&lt;/strong&gt; &lt;em&gt;192.168.204.152:4444&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 4: What is the name of the second-stage payload uploaded to Client02?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F71cfofb1r80vil4gollp.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F71cfofb1r80vil4gollp.png" alt=" " width="800" height="305"&gt;&lt;/a&gt;&lt;br&gt;
By applying a filter for &lt;em&gt;Downloads&lt;/em&gt;, we can see that, in addition to the previously identified &lt;em&gt;Profits.docm&lt;/em&gt; file, there is also a file named &lt;em&gt;UpdatePolicy.exe&lt;/em&gt; in the Downloads folder. This file is associated with the IP address &lt;em&gt;192.168.204.152&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Answer:&lt;/strong&gt; &lt;em&gt;UpdatePolicy.exe&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 5: What port was used for the reverse shell connection from the second-stage payload on Client02?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9qdu4ymwduae3kx2f7ir.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F9qdu4ymwduae3kx2f7ir.png" alt=" " width="652" height="314"&gt;&lt;/a&gt;&lt;br&gt;
As observed, the port used is &lt;strong&gt;1337&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 6: The attacker subsequently downloaded a tool to enumerate the Active Directory environment. What is the name of this tool?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fazg614dph5aech5h5vvd.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fazg614dph5aech5h5vvd.png" alt=" " width="800" height="369"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Upon searching the Downloads folder again, we can see a PowerShell script named &lt;em&gt;PowerView.ps1&lt;/em&gt;. This is a well-known tool frequently used by attackers.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 7: What is the username of the targeted service account?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;After enumerating the AD environment, attackers typically perform a Kerberoasting attack targeting service accounts. To identify these accounts, Domain Controller logs are particularly useful.&lt;br&gt;
In the &lt;em&gt;Logs-DC&lt;/em&gt; file, which contains Domain Controller logs, we open the security logs and apply a filter for &lt;strong&gt;Event ID 4769&lt;/strong&gt;. Reviewing the logs, we can see that the &lt;strong&gt;Service Name&lt;/strong&gt; is &lt;em&gt;sqlsvc&lt;/em&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3axtj92rworfxstydoqx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3axtj92rworfxstydoqx.png" alt=" " width="800" height="337"&gt;&lt;/a&gt;&lt;br&gt;
&lt;strong&gt;Answer: sqlsvc&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 8: After acquiring the account credentials, the attacker was able to crack the ticket. When did the attacker first use them to log in?(UTC)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;For this, I applied filters on DC-01’s Security logs for &lt;strong&gt;Event IDs 4624 and 4625&lt;/strong&gt;. Then, using the &lt;em&gt;Find&lt;/em&gt; filter, I searched for the &lt;strong&gt;sqlsvc&lt;/strong&gt; Service Name.&lt;br&gt;
As shown below, we encountered both &lt;strong&gt;Login Failure&lt;/strong&gt; and &lt;strong&gt;Login Success&lt;/strong&gt; logs. Focusing on the Login Failure log, we can see that the attacker is attempting to log in via a Kali machine.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd7jztztydkstizd3xv8d.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fd7jztztydkstizd3xv8d.png" alt=" " width="800" height="466"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3wmdt4p3hohl99iwtgxx.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F3wmdt4p3hohl99iwtgxx.png" alt=" " width="799" height="635"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Answer:&lt;/strong&gt; &lt;em&gt;2025-05-25 04:03:47 (UTC)&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task:9 What is the executable associated with the first service created by a Sysinternals tool on the target system following the attacker's initial login attempt?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;To answer this, I applied a filter for &lt;strong&gt;Event ID 11 (File Create)&lt;/strong&gt; in Client03’s Sysmon events.&lt;br&gt;
The key point is to focus on events that occurred &lt;strong&gt;immediately after 2025-05-25 04:03:47&lt;/strong&gt;, which is the timestamp of the attacker’s initial login attempt.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frlo7hfv2ls29h1yzyz5w.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frlo7hfv2ls29h1yzyz5w.png" alt=" " width="800" height="430"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Answer: VgYTbFEK.exe&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 10: On Client03, what was the file name of the executable used to dump cleartext credentials from memory?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;To solve this task, I accessed the Sysmon logs on the Client-03 computer and searched through the dump files.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkv1qayb62up9f2cr5sqj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fkv1qayb62up9f2cr5sqj.png" alt=" " width="800" height="416"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flhnayqcgr33ez2agsyun.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Flhnayqcgr33ez2agsyun.png" alt=" " width="717" height="191"&gt;&lt;/a&gt;&lt;br&gt;
As observed, the executable in the Downloads folder is named &lt;em&gt;netdiag.exe&lt;/em&gt;. Mimikatz is masquerading under this name, and in some logs, the &lt;strong&gt;Masquerading Technique Name&lt;/strong&gt; can also be seen.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 11: What is the username of the account whose cleartext password was found on Client03?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;For this, I applied a filter for &lt;strong&gt;Event ID 1&lt;/strong&gt; in Client03’s Sysmon logs. When the attacker ran the command &lt;code&gt;runas /user:Main\lucas cmd&lt;/code&gt;, Windows prompted for a password. The attacker, however, injected code into &lt;em&gt;runas&lt;/em&gt;’s memory via PowerShell.&lt;br&gt;
In general, &lt;strong&gt;runas.exe&lt;/strong&gt; allows you to run a program under a different user account—such as an administrator—without changing the current user.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2x205pp8nr9tkv1zw36z.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2x205pp8nr9tkv1zw36z.png" alt=" " width="800" height="579"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;The attacker executes exactly that action at this point.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1zolrb8vci19njriqwzn.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1zolrb8vci19njriqwzn.png" alt=" " width="800" height="366"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;By filtering for &lt;strong&gt;Event ID 4624&lt;/strong&gt;, we can see that the attacker successfully logged in using the &lt;strong&gt;lucas&lt;/strong&gt; username.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 12: After obtaining the cleartext password of this account, the attacker carried out a domain-level credential extraction attack. At what time did the compromised account perform this attack on the domain? (UTC)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;After obtaining the &lt;strong&gt;cleartext password&lt;/strong&gt; of the lucas account, the attacker performed a &lt;strong&gt;domain-level credential extraction (DCSync)&lt;/strong&gt;. During this attack, the attacker impersonates a Domain Controller and requests password hashes for all other users (e.g., KRBTGT).&lt;br&gt;
To detect this, I applied a filter for &lt;strong&gt;Event ID 4662&lt;/strong&gt; in DC01’s Security logs. As observed, a large number of events were recorded at &lt;strong&gt;08:26:36&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F28od7djl98s0ftg1jp2k.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F28od7djl98s0ftg1jp2k.png" alt=" " width="800" height="337"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fai154llzup276zl2cmj4.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fai154llzup276zl2cmj4.png" alt=" " width="752" height="613"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Answer: 2025-05-25 04:26:36&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 13: At what time did the attacker initially authenticate using the administrator account? (UTC)&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;For this, we filter &lt;strong&gt;Event ID 4624&lt;/strong&gt; in DC01’s Security logs and look for the &lt;strong&gt;first login of the Administrator account&lt;/strong&gt; after &lt;strong&gt;2025-05-25 04:26:36&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1qjysizr96vh99d70c9g.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F1qjysizr96vh99d70c9g.png" alt=" " width="784" height="486"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 14: What is the name of the service created by the attacker on DC01 for persistence?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5qxou1a25r1tursihudw.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F5qxou1a25r1tursihudw.png" alt=" " width="800" height="399"&gt;&lt;/a&gt;&lt;br&gt;
As observed here, the attacker uses the &lt;code&gt;sc.exe create&lt;/code&gt; command to create a service named &lt;strong&gt;WindowsUpdateSvc&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 15: What is the name of the scheduled task created by the attacker on DC01 for persistence?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;For this, if we search using &lt;strong&gt;schtasks.exe&lt;/strong&gt; or &lt;strong&gt;Event IDs 4698/4699&lt;/strong&gt;, we will encounter two events as shown. The screenshot below shows the search result for &lt;strong&gt;Event ID 4698&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa36jzh473xouxul1li6c.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fa36jzh473xouxul1li6c.png" alt=" " width="718" height="500"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjsce04c62nldula11teu.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fjsce04c62nldula11teu.png" alt=" " width="800" height="420"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frs6va22auf2pkj9yyihh.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Frs6va22auf2pkj9yyihh.png" alt=" " width="800" height="46"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbvqfcwmtph387n0usgtj.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbvqfcwmtph387n0usgtj.png" alt=" " width="800" height="545"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We can see that the task was later deleted on &lt;strong&gt;05/25/2025 08:38:53 AM&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Answer:&lt;/strong&gt; &lt;em&gt;windowsupdatecheck&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Task 16: What is the registry key name created by the attacker on DC01 for persistence?&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;For this, I applied a filter for &lt;strong&gt;Event ID 13&lt;/strong&gt; in DC01’s Sysmon logs and reviewed the entries. There, we encountered an unusual value as shown. &lt;strong&gt;Event ID 13&lt;/strong&gt; in Sysmon logs indicates a &lt;strong&gt;Registry value set&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2f6qage5rqpeb496mku6.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2f6qage5rqpeb496mku6.png" alt=" " width="800" height="282"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Answer: xcvafctr&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Thanks for reading!!!🪄&lt;/em&gt;&lt;/p&gt;

</description>
      <category>security</category>
      <category>hackthebox</category>
      <category>ghosttrace</category>
      <category>investigate</category>
    </item>
  </channel>
</rss>
