Case Overview:

The SOC team got an alert regarding some illegal port scanning activity coming from an employee's system. The employee was not authorized to do any port scanning or any offensive hacking activity within the network. The employee claimed that he had no idea about that, and it is probably a malware acting on his behalf. The IR team managed to respond immediately and take a full forensic image of the user's system to perform some investigations.

There is a theory that the user intentionally installed illegal applications to do port scanning and maybe other things. He was probably planning for something bigger, far beyond a port scanning!

It all began when the user asked for a salary raise that was rejected. After that, his behavior was abnormal and different. The suspect is believed to have weak technical skills, and there might be an outsider helping him!

Your objective is to analyze the image and to either confirm or deny this theory.


Supportive Tools:

# Question Weight Solved
1 What is the computer name of the suspect machine? 25 180

2 What is the computer IP? 25 167

3 What was the DHCP LeaseObtainedTime? 25 138

4 What is the computer SID? 50 153

5 What is the Operating System(OS) version? 50 162

6 What was the computer timezone? 50 144

7 How many times did this user log on to the computer? 50 161

8 When was the last login time for the discovered account? 50 134

9 There was a “Network Scanner” running on this computer, what was it? And when was the last time the suspect used it? 75 121

10 When did the port scan start and end? 75 122

11 How many ports were scanned? 75 143

12 What ports were found "open"? 75 140

13 What was the version of the network scanner running on this computer? 100 149

14 The employee engaged in a Skype conversation with someone. What is the skype username of the other party? 75 141

15 What is the name of the application both parties agreed to use to exfiltrate data and provide remote access for the external attacker in their Skype conversation? And when did the suspect run it? 100 108

16 What is the Gmail email address of the suspect employee? 100 149

17 It looks like the suspect user deleted an important diagram after his conversation with the external attacker. What is the file name of the deleted diagram? 100 129

18 The user Documents' directory contained a PDF file discussing data exfiltration techniques. What is the name of the file? 100 138

19 What was the name of the crypto payment application possibly used by the suspect employee to transfer funds for the external attacker? 150 81

20 What are the serial numbers of the two identified USB storage? 150 133

21 One of the installed applications is a file shredder. What is the name of the application? 150 122

22 How many prefetch files were discovered on the system? 150 123

23 How many times was the file shredder application executed? 150 128

24 Using prefetch, determine when was the last time was executed? 150 117

25 LNK file analysis shows that a JAR file for an offensive traffic manipulation tool was executed. What is the absolute path of the file? 150 123

26 The suspect employee tried to exfiltrate data by sending it as an email attachment. What is the name of the suspected attachment? 150 132

27 Shellbags shows that the employee created a folder to include all the data he will exfiltrate. What is the full path of that folder? 150 124

28 The user deleted two JPG files from the system and moved them to $Recycle-Bin. What is the file name that has the resolution of 1920x1200? 200 114

29 Provide the name of the directory where information about jump lists items (created automatically by the system) is stored? 200 122

30 Using JUMP LIST analysis, provide the full path of the application with the AppID of "aa28770954eaeaaa" used to bypass network security monitoring controls. 200 121