Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124

Disk Analysis
A medium-sized corporation has experienced a ransomware attack, first identified when a user reported a ransom note on their screen alongside a Windows Defender alert indicating malicious activity. Your task is to analyze logs provided from the compromised machines and identify the ransomware’s entry point.

I first transformed the logs to csv using EXTECmd.exe and the following command:
.\EvtxECmd.exe -d "C:\Users\Administrator\Desktop\Start here\Artifacts\DC01\Windows\System32\winevt\logs" --csv C:\Users\Administrator\Desktop
I then opened the csv file using TimeLineExplorer and searched for Defender and found:
file:_\\DC01\ADMIN$\8fe9c39.exe

While searching for Defender in the csv file, we find the registry exclusion for C:\:
New Value: HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths\C:\ = 0x0
Filtering on Sysmon Event ID 3 (Network Connection), we find:
192.168.170.142
Searching for Defender in the csv file for SQLServer logs, we find an event generated for:
cmd.exe
Filtering on Sysmon Event ID 1 (Process Create), we find the parent process is:
sqlservr.exe
In file \MSSQL15.MSSQLSERVER\MSSQL\Log\ERRORLOG (not in logs), we can find a brute force attempts against :
sa
In \MSSQL15.MSSQLSERVER\MSSQL\Log\ERRORLOG also, we find modification to:
xp_cmdshell
Can be found by filtering on Sysmon Event ID 1:
Set-MpPreference -DisableRealtimeMonitoring 1
As question 2, filtering on Sysmon Event ID 1, we find the command line that contains the malicious script:
fJSYAso.ps1
Filtering on Sysmon Event ID 8 (CreateRemoteThread), we find:
596
Can be found also by filtering on Sysmon Event ID 1:
UpdateCheck
Filtering on Sysmon Event ID 10 (ProcessAccess), we find:
5456
Filtering on Sysmon Event ID 1 (Process Create), we find an encoded PowerShell command. Once encoded using cyberchef, the command is:
Invoke-Command -ComputerName FileServer -ScriptBlock { reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows Defender" /v DisableAntiSpyware /t REG_DWORD /d 1 /f }
Filtering on Defender in this csv file, we find:
ceabe99.exe
Filtering on Symon Event ID 11 (File Create), we find the following process creating files and launched from temp:
vmware.exe
The first log for this process is:
C:\Users\dmiller\Downloads\HHuYRxB06.README.txt