Writeup: Investigating Windows - AtomicMaya/knowledge-base GitHub Wiki
Investigating Windows
For this box I used the browser based remote.
Link: Investigating Windows Room on TryHackMe
Task 1
Question 1
What's the version and year of the windows machine?
Go to Settings -> System -> About
Answer: Windows Server 2016
Question 2
Which user logged in last?
We can go to the EventViewer -> WindowsLogs -> Security
and scroll to all events predating the date where you're logging into the box.
If we look at the Logoff event, we can see the Account Name.
Answer: Administrator
Question 3
When did John log onto the system last? Answer format: MM/DD/YYYY H:MM:SS AM/PM
In the same logs, we can filter by any Task Category
being Logoff
, but this doesn't lead us to the correct result.
If we open cmd
, we can use the net user
command to find the fully qualified user name (John
) and then find the last logon using:
net user John | findstr "Last"
Answer: 03/02/2019 5:48:32 PM
Question 4
What IP does the system connect to when it first starts?
I actually had to reboot the machine to grab the following screenshot, but it was worth it.
Answer: 10.34.2.3
Question 5
What two accounts had administrative privileges (other than the Administrator user)? Answer format: username1, username2
We can expand upon the netuser command and filter for groups using net user $USER | findstr "Local Group"
Answer: Guest, Jenny
Question 6
What's the name of the scheduled task that is malicious.
We can go to the Task Scheduler and look through the scheduled tasks.
One of them stands out by launching a process in C:/TMP
.
Answer: clean file system
Question 7
What file was the task trying to run daily?
From the previous image.
Answer: nc.ps1
Question 8
What port did this file listen locally for?
From the previous image.
Answer: 1348
Question 9
When did Jenny last logon?
net user Jenny | findstr "Last"
Answer: Never
Question 10
At what date did the compromise take place? Answer format: MM/DD/YYYY
If we look further at the C:/TMP
directory, we can look at the modification date of the files.
Answer: 03/02/2019
Question 11
At what time did Windows first assign special privileges to a new logon? Answer format: MM/DD/YYYY HH:MM:SS AM/PM
If we look at the event logs on that date, we can see a lot of activity around 4:04:47
, including a suspicious system time blip, started by rundll32.exe
:
The next special logon is at 4:04:49 PM
.
Answer: 03/02/2019 04:04:49 PM
Question 12
What tool was used to get Windows passwords?
If we look at the files within C:/TMP
we can see a mim-out.txt
file, which if opened shows mimikatz(powershell)
.
Answer: mimikatz
Question 13
What was the attackers external control and command servers IP?
If we look at the C:/Windows/System32/drivers/etc/hosts
file, we can see that a lot of IP's are rerouted to localhost or to other IPs:
The only nonstandard IP is the one in 76.x.x.x
and is tied to the domain in question for question 16.
Answer: 76.32.97.132
Question 14
What was the extension name of the shell uploaded via the servers website?
If we look in C:/inetpub/wwwroot
, we can see *.jsp
files.
Answer: .jsp
Question 15
What was the last port the attacker opened?
If we look at the Firewall Inbound rules, we can see a rule "for development", on port 1337.
Answer: 1337
Question 16
Check for DNS poisoning, what site was targeted?
Beyond what we saw in question 13, if we look at C:/TMP/schtasks.backdoor.ps1
, we can see requests being made to 8.8.8.8
, which is the IP address for Google.
Answer: google.com