Scenario

You are provided with Sysmon logs from a compromised endpoint. Analyse the logs to find out the steps and techniques used by the attacker.

https://blueteamlabs.online/home/challenge/log-analysis-sysmon-fabcb83517


1- What is the file that gave access to the attacker?

updater.hta

Screenshot 2025-08-06 015641.png

We can see mshta.exe a know lolbas executed a local HTA file (updater.hta), which spawned a heavily obfuscated PowerShell script. The script hid its window, bypassed execution policy, and created a WebClient to send system information (hostname, username, domain, etc.) to the attacker's server. It then downloaded and executed a second-stage payload from a remote URL(http://65.21.255.53:6969/index.php), allowing the attacker to run additional code on the system.

Screenshot 2025-08-06 015234.png

Screenshot 2025-08-06 014947.png

2- What is the powershell cmdlet used to download the malware file and what is the port?

Invoke-WebRequest, 6969

Screenshot 2025-08-06 015838.png

the attacker uses Invoke-WebRequest cmdlet to download the malware with port 6969 likely to avoid detection or bypass firewall rules

3- What is the name of the environment variable set by the attacker?

comspec=c:\Windows\temp\supply.exe