Writeup: Investigating Windows - AtomicMaya/knowledge-base GitHub Wiki
Investigating Windows
For this box I used the browser based remote.
Link: Investigating Windows Room on TryHackMe
Task 1
Question 1
What's the version and year of the windows machine?
Go to Settings -> System -> About

Answer: Windows Server 2016
Question 2
Which user logged in last?
We can go to the EventViewer -> WindowsLogs -> Security and scroll to all events predating the date where you're logging into the box.
If we look at the Logoff event, we can see the Account Name.

Answer: Administrator
Question 3
When did John log onto the system last? Answer format: MM/DD/YYYY H:MM:SS AM/PM
In the same logs, we can filter by any Task Category being Logoff, but this doesn't lead us to the correct result.
If we open cmd, we can use the net user command to find the fully qualified user name (John) and then find the last logon using:
net user John | findstr "Last"

Answer: 03/02/2019 5:48:32 PM
Question 4
What IP does the system connect to when it first starts?
I actually had to reboot the machine to grab the following screenshot, but it was worth it.

Answer: 10.34.2.3
Question 5
What two accounts had administrative privileges (other than the Administrator user)? Answer format: username1, username2
We can expand upon the netuser command and filter for groups using net user $USER | findstr "Local Group"

Answer: Guest, Jenny
Question 6
What's the name of the scheduled task that is malicious.
We can go to the Task Scheduler and look through the scheduled tasks.
One of them stands out by launching a process in C:/TMP.

Answer: clean file system
Question 7
What file was the task trying to run daily?
From the previous image.
Answer: nc.ps1
Question 8
What port did this file listen locally for?
From the previous image.
Answer: 1348
Question 9
When did Jenny last logon?
net user Jenny | findstr "Last"

Answer: Never
Question 10
At what date did the compromise take place? Answer format: MM/DD/YYYY
If we look further at the C:/TMP directory, we can look at the modification date of the files.

Answer: 03/02/2019
Question 11
At what time did Windows first assign special privileges to a new logon? Answer format: MM/DD/YYYY HH:MM:SS AM/PM
If we look at the event logs on that date, we can see a lot of activity around 4:04:47, including a suspicious system time blip, started by rundll32.exe:

The next special logon is at 4:04:49 PM.

Answer: 03/02/2019 04:04:49 PM
Question 12
What tool was used to get Windows passwords?
If we look at the files within C:/TMP we can see a mim-out.txt file, which if opened shows mimikatz(powershell).

Answer: mimikatz
Question 13
What was the attackers external control and command servers IP?
If we look at the C:/Windows/System32/drivers/etc/hosts file, we can see that a lot of IP's are rerouted to localhost or to other IPs:

The only nonstandard IP is the one in 76.x.x.x and is tied to the domain in question for question 16.
Answer: 76.32.97.132
Question 14
What was the extension name of the shell uploaded via the servers website?
If we look in C:/inetpub/wwwroot, we can see *.jsp files.

Answer: .jsp
Question 15
What was the last port the attacker opened?
If we look at the Firewall Inbound rules, we can see a rule "for development", on port 1337.

Answer: 1337
Question 16
Check for DNS poisoning, what site was targeted?
Beyond what we saw in question 13, if we look at C:/TMP/schtasks.backdoor.ps1, we can see requests being made to 8.8.8.8, which is the IP address for Google.

Answer: google.com