Swiftspend Finance, a modern fintech company, is testing its new endpoint monitoring setup using Wazuh and Sysmon. Your job is to investigate simulated attack activity from April 29, 2024, between 12:00 PM and 8:00 PM. You’ll use the Wazuh dashboard and saved queries to detect suspicious process behavior, persistence techniques, credential dumping, and data exfiltration attempts.
– Malicious .xlsm downloaded via PowerShell (Invoke-WebRequest)
– Filename disguise: SwiftSpend_Financial_Expenses.xlsm → actual: PhishingAttachment.xlsm
– Technique: T1566.001 – Spearphishing Attachment
– PowerShell launched with -ExecutionPolicy Bypass, encoded commands
– Additional payloads downloaded and run
– Technique: T1059.001 – PowerShell
– Registry entry added with obfuscated payload
– Scheduled task set to run daily at 12:34
– Technique: T1053.005 – Scheduled Task
– Base64 encoding and renamed binaries (memotech.exe, frundll32.exe)
– Technique: T1027 – Obfuscated Files or Information
– Multiple dumpers: mimikatz, nanodump, xordump, cmdkey, rundll32 keymgr
– Guest account activated and added to Administrators
– Technique: T1003.001 – LSASS Dumping, T1555.003 – Credential Manager Access
– Guest account renamed to I_AM_MONITOR1NG and escalated
– Technique: T1136.001 – Create/Modify User Account
– Files and possible flags exfiltrated via rclone
– Additional data sent via Pastebin API
– Technique: T1567.002 – Exfiltration to Cloud Storage
T1566.001
Phishing: Spearphishing Attachment
Downloaded .xlsm file disguised as financial spreadsheet
T1059.001
Command and Scripting Interpreter: PowerShell
PowerShell executes commands and downloads additional payloads
T1053.005
Scheduled Task/Job: Scheduled Task
Task created to auto-execute obfuscated PowerShell at 12:34
T1027
Obfuscated Files or Information
Base64-encoded command hidden in registry
T1003.001
OS Credential Dumping: LSASS Memory
memotech.exe used to dump creds
T1567.002
Exfiltration to Cloud Storage
PowerShell used `rclone` and Pastebin to exfiltrate data
Reference: [MITRE ATT&CK Navigator] ( https://attack.mitre.org/ )
Let’s kick things off with the universal SIEM mood-lifter:
Wazuh Query:
powershell
Because if anything shady happens on Windows, chances are it involves PowerShell.
To make events easier to read, I pulled:
To track the chain of events and get a sense of what this chaos is about.
And what’s the source of this mischief?
Atomic Red Team playing red flag simulator:
Macro Mayhem & Fake Files
Somewhere in this noisy mess:
Credential Bonanza Continues
The chain from PID 2980 continues with more credential-hungry behavior:
Deep Dive – PID 2980’s Family Drama
Just because we’re nosy and already deep in the rabbit hole, we queried:
Wazuh Query:
data.win.eventdata.parentProcessId: 2980 OR data.win.eventdata.processId: 2980
We get:
Scheduled Persistence & Registry Magic
Roughly four minutes later, a macro triggers this: “Possible Office Macro Started: C:\Windows\System32\cmd.exe”
Which executes:
• A registry add for persistence
• A scheduled task using schtasks.exe /CREATE — runs daily at 12:34
The registry value contains this Base64: cGluZyB3d3cueW91YXJldnVsbmVyYWJsZS50aG0
Decoded with CyberChef: ping www.youarevulnerable.thm
Yes — the attacker literally trolled us with a passive-aggressive ICMP echo. Respect.
Credential Dumping: Still Not Sure Which One to Use
The attacker seems… undecided. So they try multiple LSASS dumpers again, because maybe the sixth time’s the charm.
Let’s Mess with the Guest Account
The attacker now enables and escalates the Guest account:
net user guest /active:yes
net user guest I_AM_MONITOR1NG
net localgroup Administrators guest /add
Guest gets renamed and promoted.
I_AM_MONITOR1NG — okay, hacker. We see you.
John Sterling Gets PTH’d
Finally, memotech.exe (aka off-brand Mimikatz) performs a Pass-the-Hash on john.sterling, using NTLM.
Notepad & Phishing Proof
After stealing credentials, our shiny new admin uses NOTEPAD.EXE to read:
• confidential.txt
• Possibly tied to T1566.001 – Spearphishing Attachment
Also, this chain includes event 4792 — which likely launched the exfiltration task.
The Attacker’s Plan, Recapped:
1. Initial Access – Macro-based Office execution
2. Credential Dumping– mimikatz, nanodump, memotech, all the usual suspects
3.Persistence– Registry key + Scheduled Task
4. Privilege Escalation – Activate + promote Guest
5. Credential Abuse – cmdkey, keymgr, Notepad for the win
6. Exfiltration – rclone and Pastebin API
7. Sarcasm Injection – ICMP pings + cheeky THM flag
SwiftSpend_Financial_Expenses.xlsm
“cmd.exe” /c “reg add HKCU\\SOFTWARE\\ATOMIC-T1053.005 /v test /t REG_SZ /d cGluZyB3d3cueW91YXJldnVsbmVyYWJsZS50aG0= /f & schtasks.exe /Create /F /TN “ATOMIC-T1053.005” /TR “cmd /c start /min \”\” powershell.exe -Command IEX([System.Text.Encoding]::ASCII.GetString([System.Convert]::FromBase64String((Get-ItemProperty -Path HKCU:\\SOFTWARE\\ATOMIC-T1053.005).test)))” /sc daily /st 12:34″
12:34
ping www.youarevulnerable.thm
I_AM_M0NIT0R1NG
memotech.exe
THM{M0N1T0R_1$_1N_3FF3CT}
So what did we learn?
– PowerShell is still everyone’s favorite blunt instrument
– Dumping LSASS is apparently a team sport
– Guest accounts should come with a “do not disturb” sign
– And if someone sends you a macro-laced Excel sheet named PhishingAttachment.xlsm… maybe don’t open it
In the end, the attacker left behind scheduled tasks, renamed LOLBins, multiple exfil routes, and an actual ping to youarevulnerable.thm — just in case we missed the message.
Mission accomplished: we chased down every log, connected every dot, and ruined the attacker’s quiet little Monday.
On to the next mess
Cybersecurity learner, log nerd, and TryHackMe badge hoarder. Let’s connect on LinkedIn before I get pulled into another packet capture.
Apparently we have to tell you this: yes, cookies are used. They're not edible, and no, you can't escape them — but you can pick what gets tracked. Yay for EU law!