Introduction

This investigation addresses a sophisticated ransomware attack targeting multiple endpoints within an enterprise environment. As the forensic analyst assigned to this case, my primary objective was to determine the delivery method of the ransomware, trace the attacker’s activities, and establish a timeline of events. The analysis involved inspecting logs, examining system artifacts, and identifying tools leveraged during the attack. Tools such as Event Log Explorer , KAPE , EZ Tools , and Registry Explorer were utilized to conduct this investigation. The analysis focused on uncovering tactics associated with initial access, execution, privilege escalation, defense evasion, and data exfiltration. This report provides insights into the attacker’s methodology and highlights actionable recommendations for mitigating similar incidents in the future.


Analysis

Q1 Knowing the IP address of the machine that initiated the attack helps trace the attack's origin. What is the IP address of the attacker's machine?

Upon analyzing the event logs with Event Log Explorer , I filtered entries based on Event ID 4624 , which corresponds to successful logons. My investigation specifically focused on logon type 10 , indicative of a remote interactive logon, often associated with Remote Desktop Protocol (RDP) access. The l

Unlock Your Full Learning Experience with BlueYard Labs

Sign up to track your progress, unlock exclusive labs, and showcase
your achievements—begin your journey now!
Join for Free