SOC Analyst Reports ‐ Sample - aeonmike/CyberSecurity-BlueTeam GitHub Wiki

📄 HTB CDSA Incident Report


1. Executive Summary

Provide a high-level overview of the incident for non-technical stakeholders.

On March 31, 2025, suspicious activity was detected within the organization's internal network. An attacker exploited a vulnerable web server, gained access to internal systems, performed privilege escalation, and exfiltrated sensitive data. Swift containment and investigation were carried out to assess the impact and prevent further compromise.


2. Timeline of Events

Time (UTC) Event Description
2025-03-31 08:14 Initial exploitation via web shell on IIS
2025-03-31 08:18 User svc_backup credentials dumped via LSASS
2025-03-31 08:30 Lateral movement to DC via SMB
2025-03-31 08:45 Data exfiltration using Rclone to Dropbox

3. Tactics, Techniques, and Procedures (TTPs)

Tactic Technique ID Description
Initial Access Exploit Public-Facing App T1190 IIS Web Shell deployed
Credential Access OS Credential Dumping T1003.001 LSASS memory dump
Lateral Movement SMB/Windows Admin Shares T1021.002 Moved to DC using psexec
Exfiltration Exfiltration Over Web Service T1567.002 Rclone to Dropbox

4. Indicators of Compromise (IOCs)

🔹 Network IOCs

Type Value Description
IP 185.100.87.50 C2 server
Domain dropbox-api[.]com Used for exfiltration

🔹 File Hashes

File Name SHA256 Hash
rclone.exe a1b2c3d4e5f67890abcdef...

🔹 Registry/Artifacts

Key/Value Description
HKCU\Software\Microsoft\Windows\... Persistence mechanism

5. Analysis Summary

Host Logs:

  • Found suspicious cmd.exe spawning PowerShell
  • LSASS dump detected by memory analysis (Sysmon Event ID 10)

Network Logs:

  • Unusual traffic to Dropbox during off-hours
  • SMB traffic spike from compromised server

6. Detection Rules

🔸 Sigma Rule Snippet

title: Suspicious Rclone Execution
logsource:
  category: process_creation
  product: windows
detection:
  selection:
    Image|endswith: '\rclone.exe'
  condition: selection