← Back to Index

HackTheBox Sherlocks - Constellation

Created: 30/05/2024 20:11 Last Updated: 30/05/2024 20:55


c510d9420b86a3e824d54eefd04de864.png Scenario: The SOC team has recently been alerted to the potential existence of an insider threat. The suspect employee's workstation has been secured and examined. During the memory analysis, the Senior DFIR Analyst succeeded in extracting several intriguing URLs from the memory. These are now provided to you for further analysis to uncover any evidence, such as indications of data exfiltration or contact with malicious entities. Should you discover any information regarding the attacking group or individuals involved, you will collaborate closely with the threat intelligence team. Additionally, you will assist the Forensics team in creating a timeline. Warning : This Sherlock will require an element of OSINT and some answers can be found outside of the provided artifacts to complete fully.


Task 1: When did the suspect first start Direct Message (DM) conversations with the external entity (A possible threat actor group which targets organizations by paying employees to leak sensitive data)? (UTC)

e8d53eb9918580e801ebb9086a063b92.png We got 2 urls and 1 unharmed pdf file to work with d1655d8a4182f1ef3dda92218bf0cf11.png To solve this we need to use unfurl and let it extract timestamp for us, an answer is first timestamp that was extracted

2023-09-16 16:03:37

Task 2: What was the name of the file sent to the suspected insider threat?

7b3faec8e43cab3261f81c08fec14618.png Its the same file we have 6bba4ddaa0ffe52e4f533407564503f3.png

NDA_Instructions.pdf

Task 3: When was the file sent to the suspected insider threat? (UTC)

8a4f7edb41cfe552a38643efa2316511.png The answer is second timestamp from unfurl

2023-09-27 05:27:02

Task 4: The suspect utilised Google to search something after receiving the file. What was the search query?

67201e85cf9500b48ae4c772408904eb.png put it on browser directly to solve this a69f16c50e173666b81d74a7c3e1c15f.png But another way to solve this is to use unfurl

how to zip a folder using tar in linux

Task 5: The suspect originally typed something else in search tab, but found a Google search result suggestion which they clicked on. Can you confirm which words were written in search bar by the suspect originally?

ff2114346a429f18348b90e085768364.png

How to archive a folder using tar i

Task 6: When was this Google search made? (UTC)

2c41773f1729e9c59ef3b0aab9b1c08b.png

2023-09-27 05:31:45

Task 7: What is the name of the Hacker group responsible for bribing the insider threat?

476487ef0a5a4cea64bf140a4e3dc433.png Open a pdf file then we can read the content inside which starts with an introduction before telling karen riley (insider) to exfiltrate data of a company to AWS S3 bucket

AntiCorp Gr04p

Task 8: What is the name of the person suspected of being an Insider Threat?

9c5988117a4d21772db72bfb2994186f.png

karen riley

Task 9: What is the anomalous stated creation date of the file sent to the insider threat? (UTC)

28676b2fcc954cd41ff35ff0b5bae639.png used exif tool to get a create date of this file

2054-01-17 22:45:22

Task 10: The Forela threat intel team are working on uncovering this incident. Any OpSec mistakes made by the attackers are crucial for Forela's security team. Try to help the TI team and confirm the real name of the agent/handler from Anticorp.

eee16ecc5f49e7929f4bfb607dfae789.png We can see that an email was presented on metadata 66f2354f46e515a7d7541fd694b45f72.png Which lead to LinkedIn profile 8604c6e5a3fcf24e3c2c312915b840fc.png This should be the one

Abdullah Al Sajjad

Task 11: Which City does the threat actor belong to?

8bafce6ddb1c9da3a6f8c5af969b249a.png

Bahawalpur

1d9cdb406039663b55aa4ca056691ccf.png