Initial CompromiseJanuary 25th, 2024, 21:41:50
: Unauthorized entity starts a port scan and find several ports open. The unauthorized entity initially attempts attacks on a web application and several other ports. Until at
21:43:52
the unauthorized entity manages to compromise an account through Kerberos.
First lateral moveJanuary 25th, 2024, 21:45:17
: Unauthorized entity authorizes and connects with the host using the WS-Management protocol and requests the hostname.
Second lateral moveJanuary 25th, 2024, 21:45:50
: Unauthorized entity disconnects from the earlier session, and reconnects to the host using the WinRM protocol after which the unauthorized entity starts sending multiple commands.
Data Access & ExfiltrationJanuary 25th, 2024, 09:46:05PM
: Unauthorized entity begin collection and exfiltration of data using Base64-encoded chunks. By
January 25th, 2024, 09:47:12PM
the unauthorized entity has finished their activities, writes a note on the desktop of the host and disconnects after which no more activity is detected.
Containment and RecoveryJanuary 26th, 2024, 08:12:00AM
: The note is discovered and Acme Security Crop. is contacted and recommends removing the host from the network to prevent the potential spread of ransomware while team is en route.
January 26th, 2024, 08:56:10AM
: Incident responders arrive on location and start their investigation.
January 26th, 2024, 09:35:36AM
: System is determined to be free from any malware and no persistence mechanisms are found. Kerberos account settings were updated, passwords changed and ports closed. Temporarily disabled WinRM and WS-Management as client indicated these protocols were not actively used.