Question: You are a security analyst working for Alpha Security Services. Beta Financial Services, it seems, has encountered more suspicious activity on their network. They have
You are a security analyst working for Alpha Security Services. Beta Financial Services, it seems, has encountered more suspicious activity on their network. They have again collected detailed log files from their systems and have sent them to your team for analysis.
Analyze the attached log file, and answer the following questions.
LogevtxDownload Logevtx
Question at position
point
Question at position
Which windows program is the image or parent image used to run all of the commands?
Question Blank of
type your answer...
Question at position
point
Question at position
Which account is hijacked in the attack?
Question Blank of
type your answer...
Question at position
point
Question at position
What flag was used in the PowerShell command to avoid execution policies in EventID
Question Blank of
type your answer...
Question at position
point
Question at position
Which windows executable is used to run the PowerShell command?
Question Blank of
type your answer...
Question at position
point
Question at position
EventID contains a lengthy command. In what encoding language is that command written in
Question Blank of
type your answer...
Question at position
point
Question at position
Decode the lengthy command using any tool you can find. What is the suspicious file referenced in the command? Decode using the commandline or any web tool
Question Blank of
type your answer...
Question at position
point
Question at position
This command utilizes a delay, possibly to avoid detection or to ensure that certain conditions are met before the full program is run. How many seconds is the delay?
Question Blank of
type your answer...
Question at position
point
Question at position
What technique is utilized to make this command more difficult to understand?
What technique is utilized to make this command more difficult to understand?
Confusion
Obfuscation
Garbling
Hiding
Question at position
point
Question at position
Which Mitre ATT&CK tactic does this event log most likely demonstrate?
Which Mitre ATT&CK tactic does this event log most likely demonstrate?
Initial Access
Persistence
Lateral Movement
Execution
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
