Scenario

A Windows workstation was recently compromised, and evidence suggests it was an attack against internet-facing RDP, then Meterpreter was deployed to conduct 'Actions on Objectives'. Can you verify these findings?You have been provided with the Security.evtx and System.evtx log exports from the compromised system - you should analyze these, NOT the Windows logs generated by the lab machine (when using DeepBlueCLI ensure you're providing the path to these files, stored inside \Desktop\Investigation\.

Reading Material:https://github.com/sans-blue-team/DeepBlueCLI

https://blueteamlabs.online/home/investigation/deep-blue-a4c18ce507


1- Using DeepBlueCLI, investigate the recovered Security log (Security.evtx). Which user account ran GoogleUpdate.exe?

Mike Smith

Screenshot 2025-08-14 151902.png

Screenshot 2025-08-14 155555.png

we can see GoogleUpdate execution with base64 encoded under the user mike smith

2- Using DeepBlueCLI investigate the recovered Security.evtx log. At what time is there likely evidence of Meterpreter activity?

4/10/2021 10:48:14

Screenshot 2025-08-14 152145.png

An event shows the attacker attempting getsystem via a Meterpreter shell to escalate privileges. This outdated method, easily detected by modern AV/EDR, uses named pipes to impersonate higher-privileged processes (similar to Linux’s suid). Metasploit typically creates a named pipe, attaches it to cmd.exe, and leverages default impersonation privileges to gain admin access.

and here the attacker is trying to creates a service

3- Using DeepBlueCLI investigate the recovered System.evtx log. What is the name of the suspicious service created?

rztbzn