Windows Forensics

A targeted phishing campaign is carried out against our organization, and so far the phishing mail has been opened by 3 systems in our network. A quick triage image was collected from one of the infected systems and Provided to you for identification of TTP being used by attackers. Identify the Techniques and tactics used by the attacker so our incident response team can respond and mitigate any further compromises across the network.

Note: This challenge is focused on doing manual artifact analysis. You can use Eric Zimmerman's tools suite for most of the artifacts. Additional research will be required for some questions



Artifacts: C:\Users\LetsDefend\Desktop\Files\Relevent_Artifacts.zip
Password: infected

This challenge prepared by 0xCyberJunkie.sh


Writeups:

  • Windows Forensics Analysis: Analyzing Forensics Artifacts to Uncover System compromise and RDP lateral movement
  • DFIR - Windows Forensics - Part 1
  • DFIR — Windows Forensics
  • Windows Forensics Challenge Walkthrough (LETSDEFEND)
  • DFIR Challenge — Windows Forensics)