An alert from the Intrusion Detection System (IDS) flagged suspicious lateral movement activity involving PsExec. This indicates potential unauthorized access and movement across the network. As a SOC Analyst, your task is to investigate the provided PCAP file to trace the attacker’s activities. Identify their entry point, the machines targeted, the extent of the breach, and any critical indicators that reveal their tactics and objectives within the compromised environment.

Question 1

To effectively trace the attacker’s activities within our network, can you identify the IP address of the machine from which the attacker initially gained access?

![iograph-psexec-cyberdef.png](/assets/psexec/iograph-psexec-cyberdef.png =x500)

![convergraph-psexec-cyberdef.png](/assets/psexec/convergraph-psexec-cyberdef.png =x500)

Answer: 10.0.0.130

Question 2

To fully understand the extent of the breach, can you determine the machine’s hostname to which the attacker first pivoted?

smbreqcyberdef.png

Answer: SALES_PC

Question 3

Knowing the username of the account the attacker used for authentication will give us insights into the extent of the breach. What is the username utilized by the attacker for authentication?

Answer: ssales

Question 4

After figuring out how the attacker moved within our network, we need to know what they did on the target machine. What’s the name of the service executable the attacker set up on the target?

executable.png

Answer: PSEXESVC

Question 5

We need to know how the attacker installed the service on the compromised machine to understand the attacker’s lateral movement tactics. This can help identify other affected systems. Which network share was used by PsExec to install the service on the target machine?

adminthing.png

Answer: ADMIN$

Question 6

We must identify the network share used to communicate between the two machines. Which network share did PsExec use for communication?

smbipccyberdev.png

The IPC$ share is also known as a null session connection. By using this session, Windows lets anonymous users perform certain activities, such as enumerating the names of domain accounts and network shares.

Answer: IPC$

Question 7

Now that we have a clearer picture of the attacker’s activities on the compromised machine, it’s important to identify any further lateral movement. What is the hostname of the second machine the attacker targeted to pivot within our network?

marketting1.png

hostnamemarketting.png

Answer: MARKETING-PC

Copyright Notice

Author: Devobass

Link: http://localhost:1313/posts/misc/cyberdefenders/psexec-hunt/

License: CC BY-NC-SA 4.0

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. Please attribute the source, use non-commercially, and maintain the same license.

Start searching

Enter keywords to search articles

↑↓
ESC
⌘K Shortcut