Blue Team Labs Online - Insider Threat

1cc77464772b566ed4c85217feb9b897.png

Management inquired about the permissions granted to employee account "jciedo," and it was discovered that they had access to the department's file server.

Digital Forensics

Tags: Evtxtract Volatility2 MiTec Windows Registry Recovery Notepad++ T1098


Scenario Jess Ciedo, a member of the accounting department, was terminated by their manager. Management inquired about the permissions granted to employee account "jciedo," and it was discovered that they had access to the department's file server, which contains sensitive files. Additionally, checking the account's login activity indicates that the last successful logon was from workstation 10.10.20.8's IP address.

Now, you are given with these artifacts; • Memory Image of 10.10.20.8 (last logged in host) • File Server Security Logs • JCIEDO_USRCLASS.DAT registry hive found on 10.10.20.8 host

Perform an in depth investigation to understand and the activity conducted, and answer the associated questions for the Human Resources and Legal teams.

If you receive a UAC prompt when trying to run programs or CMD as Admin, click 'More Choices' and select the BTLO user account to proceed.


Environment Awareness

Evidence & Tool Discovery

8b7793d19df9f87da72de2810be188ca.png

There is an Investigation folder located on the Desktop which contains evidence files and tools for this investigation so lets get to know each one of them

Evidence - Jciedo_USRCLASS.dat - memdump.mem - SecurityLogs.txt

Tools - CyberChef : There is no need to explain how awesome the CyberChef is right? - notepad++ : Text editor. - volatility 2.5 standalone : Awesome memory analysis framework which various of plugins. - Windows Registry Recovery (WRR) : Tool for registry hives analysis which we can import registry hive and read it without bothering with Microsoft built-in registry editor.


Investigation

Q1) What time did the user jciedo log into their corporate workstation? (Format: YYYY-MM-DDTHH:MM:SS.XXX)

Let's utilize Security event log, Open log file with notepad++ and try to search for "jciedo" user, and since there are so many events then we need to confirm the suspicious activity first before determining the login and time of this user.

Why? because there are so many login event, by using this method then we can reduce our scope of finding to the relevant timeframe

38f1154f8c445d436cedad844c2ae68f.png

Which we can see that user gained access to sensitive files around 2023-02-15T16:59:21, now we just need to find Event ID 4624 (An account was successfully logged on.)

320b5a7f6a5224f3e28732842225541a.png

Then we will have the event 147504 is the last login the before the access to the sensitive files via file share.

Answer

2023-02-15T16:59:10.261

Q2) What is the IP address and file server name that was accessed by the jciedo account? (Format: X.X.X.X, FileServerName)

491e3d135d1651624fd4911ff21fdbdf.png

After successfully logged in, "jciedo" user tried to access \\\Shared_FileServer share and the Event ID 5145 (A network share object was checked to see whether client can be granted desired access.) also logged the IP address of "jciedo" user as Source Address as well.

Answer

10.10.20.8, Shared_FileServer

Q3) What is the timestamp of jciedo accessing the file server? (Format: YYYY-MM-DDTHH:MM:SS.XXX)

32730f5e3f4e50162e2e231ce2fddfd4.png

Answer

2023-02-15T16:59:12.368

Q4) What is the name of the sensitive file that was accessed by the account? (Format: filename.extension)

d9854be6716e9dde22a06914446b0e3f.png

As we already discovered from the first question that the sensitive file that was accessed is accounting_creds.txt at 2023-02-15T16:59:13.327

Answer

accounting_creds.txt

Q5) What is the timestamp of jciedo accessing this file? (Format: YYYY-MM-DDTHH:MM:SS.XXX)

a3013117e06fc11d748161de501af98c.png

Answer

2023-02-15T16:59:13.327

Q6) What software was used to compress the retrieved file from the file server? Provide the full path of the executable (Format: Drive:\path\to\software.exe)

d00b69a465695c8c8ca26aaf0ea74ea3.png

There are 2 candidates when it comes to compression software on Windows which are WinRAR and 7-Zip and with since we have memory dump from the suspect workstation then we can use volatility-2.5.standalone.exe -f memdump.exe --profile=Win7SP1x86 filescan > file.txt to list all the files that were cache in the memory into a text file.

3a989dbb98fb3b7839f32bc363114cc9.png

Then by simply search for "7-zip" or "WinRAR", we can see that WinRAR is the only one that has prefetch file indicating that it was used on this system.

Answer

C:\Program Files\WinRAR\WinRAR.exe

Q7) What is the full path of the outputted compressed file? (Format: Drive:\filename.extension)

144fde620dc7ff56d419593da6da3743.png

Lets use volatility-2.5.standalone.exe -f memdump.exe --profile=Win7SP1x86 mftparser > mft.txt for this time since the file might not exist on the workstation anymore.

064362940253aca20b3fc5ccb70030e8.png

After tried to search for ".zip" then we will discover .lnk file of Confidential.zip from Recent folder, indicates that this file was opened by user at some point and also luckily for us that Master File Table keep the path of this file as displayed right here.

As we can see that this file was opened from F drive and it could mean that the file was exfiltrated via External Storage such as USB Flash drive.

Answer

F:\Confidential.zip

Q8) What is the Mfg and DeviceDesc of the device mounted to the local machine? (Format: MfgValue DeviceDescValue)

243afc97d783c2a8850064b5ab04e83f.png

Follow our hypothesis about USB Flash Drive, we need to dump SYSTEM registry hive for USBSTOR registry key and we can do that with volatility-2.5.standalone.exe -f memdump.exe --profile=Win7SP1x86 dumpregistry -D . which will dump all detected registry from the memory dump to current location.

e84f21a24151daefe424b65ba63f0bec.png

Now using WRR to open SYSTEM registry hive and to confirm that F drive was mounted with USB flash drive, we can inspect MountedDevices key which confirmed our hypothesis that the file was exfiltrated via USB flash drive as shown in Hex dump of the Data View window.

867bc6e4597334ca3fead8a3e1d37080.png

The answer format for this question is quite confusing but the answer of this question is friendlyname of this USB which is "SanDisk Cruzer Orbit"

Answer

SanDisk Cruzer Orbit

Q9) What is the timestamp associated with the logoff event for the user account jciedo? (Format: YYYY-MM-DDTHH:MM:SS.XXX)

dee53cd51daca8afda325f43a49fd897.png

After exfiltrated file via USB flash drive, user finally logged off from the workstation at 2023-02-15T17:00:09.424 and the total time of these actions were conducted within 1 minute.

Answer

2023-02-15T17:00:09.424

https://blueteamlabs.online/achievement/share/52929/136


Summary

User account "jciedo" was logged in from 10.10.20.8 workstation then accessed accounting_creds.txt from SMB Share, Compress file to Confidential.zip then exfiltrated it via USB flash drive. the estimated operation time is around 1 minute