Question 8:
Using reg query, Volt Typhoon hunts for opportunities to find useful credentials. What three pieces of software do they investigate? Answer Format: Alphabetical order separated by a comma and space.
We know that the unauthorized user is using
reg (T1012) to query for software. We can start our search by looking for the reg command in the CommandLine Field.
.
host=volthunter source="/home/volthunter/logfiles/pshell.log" CommandLine=reg
Lucky for us this returns only 8 events in total, all of which are software that could be user to connect with a host and, if present, likely contain hashed credentials the unauthorized user may be able to abuse. (T1555)
Question 9:
What is the full decoded command the attacker uses to download and run mimikatz?
The question already hint at this, but it is unlikely they used the filename mimikatz in their request as this should have been instantly flagged. This means we're looking for a command that is encoded, most likely Base64.
Always check for low hanging fruit first, if we check the rare commands ran in PowerShell we find a suspicious -exec command that was only ran once. If we check this specific event we can see that the command was used with a long Base64 encoded string. Decoding this string with something like
CyberChef will give us the answer.
Base64 string found