Scenario:
Your role as a Tier 2 SOC Analyst at EliteSystems Corp is put to the test following an alert from the Tier 1 team about a confirmed phishing email leading to a potential network wide intrusion. With disk data already triaged and ready for analysis, you must uncover the extent of this intrusion and identify the compromised assets within the network.
Well, looking at the image I can immediately identify this as a spearphishing attempt.
Red flags in the body of the email:
This indicates to me that the original Yahoo mail server that sent the email attachment likely targeted other individuals as well, and that we are on the right track.
I’m going to start with using Eric Zimmerman’s LECmd.exe to parse the LNK files in emily’s Desktop directory, and output them to a csv file to be imported to TimelineExplorer.
It looks like the documents.zip file started in the Downloads folder, nothing too intresting here so far, so I will pivot to Event Logs.
This appears to be a malicious executable used for C2 communications, which we will come back to later.
For now, I saw an encoded PowerShell command which I was able to decode using CyberChef.
As well as a command that downloads and uses the Invoke-ShareFinder module from PowerView.