Home Investigating Windows
Post
Cancel

Investigating Windows

A windows machine has been hacked, its your job to go investigate this windows machine and find clues to what the hacker might have done.

THM Room https://tryhackme.com/room/investigatingwindows

TASK 1 : Investigating Windows

Whats the version and year of the windows machine?

Answer : windows server 2016

Which user logged in last?

Write a little powershell script https://community.spiceworks.com/topic/2025022-find-last-user-logged-into-a-machine-via-powershell lastloguser.ps1 :

1
2
3
4
5
6
$com=read-host "Enter Computer name here"
Get-WmiObject -Class Win32_NetworkLoginProfile -ComputerName $com | 
Sort-Object -Property LastLogon -Descending | 
Select-Object -Property * -First 1 | 
Where-Object {$_.LastLogon -match "(\d{14})"} | 
Foreach-Object { New-Object PSObject -Property @{ Name=$_.Name;LastLogon=[datetime]::ParseExact($matches[0], "yyyyMMddHHmmss", $null)}}

Execute and enter the Hostname of the computer at prompted : EC2AMAZ-I8UHO76 :

1
./lastloguser.ps1

Answer : Administrator

When did John log onto the system last? Answer format: MM/DD/YYYY H:MM:SS AM/PM

Using “net user” command :

1
2
C:\Users>net user john | findstr "log"
Last logon                   3/2/2019 5:48:32 PM

Answer : 03/02/2019 5:48:32 PM

What IP does the system connect to when it first starts?

Let’s check a particular registry entry for start up actions :

1
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run

CurrentVersion\Run CurrentVersion\Run

Answer : 10.34.2.3

What two accounts had administrative privileges (other than the Administrator user)? Answer format: username1, username2

Checking the local Administrator group with net command :

Local Administrator Group Local Administrator Group

Answer : Jenny, Guest

Whats the name of the scheduled task that is malicous.

Open the task scheduler then looking around the few tasks. One of them seems suspect with it’s name : “Clean file system” so i looked its actions tab :

Task Scheduler Task Scheduler

This task is launching a netcat listener to open port 1348

Answer : Clean file system

What file was the task trying to run daily?

As we can see on above screenshot, this task launch a powershell script : nc.ps1

Answer : nc.ps1

What port did this file listen locally for?

As we can see on above screenshot too, the listening port is 1348

Answer : 1348

When did Jenny last logon?

Jenny Jenny

Answer : Never

At what date did the compromise take place? Answer format: MM/DD/YYYY

The suspects elements in the C:\TMP folder are all dated from 03/02/2019 :

C:\TMP C:\TMP

Answer : 03/02/2019

At what time did Windows first assign special privileges to a new logon? Answer format: MM/DD/YYYY HH:MM:SS AM/PM

I searched for the “Special privileges” Windows Event ID and found 4672 on Microsoft documentation https://docs.microsoft.com/en-us/windows/security/threat-protection/auditing/event-4672.

Looking around the time of the attack, the first event is :

Special privileges Special privileges

Answer : 03/02/2019 04:04:49 PM

What tool was used to get Windows passwords?

Looking at mim-out.txt :

mim-out.txt mim-out.txt

Answer : mimikatz

What was the attackers external control and command servers IP?

Looking for redirection of dns traffic in the hosts windows file :

hosts hosts

Answer : 76.32.97.132

What was the extension name of the shell uploaded via the servers website?

The windows server website (IIS) has content stored in C:\inetpub\wwwroot :

C:\inetpub\wwwroot C:\inetpub\wwwroot

Answer : .jsp

hat was the last port the attacker opened?

In order to communicate with the Control and Command Server (see question above) the hacker had set up a firewall rules :

Inbound Firewall Rules Inbound Firewall Rules

Answer : 1337

Check for DNS poisoning, what site was targeted?

DNS record can be manage in the Windows Hosts file :

hosts hosts

Answer : google.com

This post is licensed under CC BY 4.0 by the author.