You are a SOC Analyst for an MSSP (managed Security Service Provider) company called TryNotHackMe.
A newly acquired customer (Widget LLC) was recently onboarded with the managed Splunk service. The sensor is live, and all the endpoint events are now visible on TryNotHackMe’s end. Widget LLC has some concerns with the endpoints in the Finance Dept, especially an endpoint for a recently hired Financial Analyst. The concern is that there was a period (December 2021) when the endpoint security product was turned off, but an official investigation was never conducted.
Your manager has tasked you to sift through the events of Widget LLC’s Splunk instance to see if there is anything that the customer needs to be alerted on.
Happy Hunting!
Unauthorized Use of Credential-Dumping and Evasion Tools on Finance Workstation
Threat Hunting, Endpoint Compromise, Windows Defender Tampering
Sysmon logs via Splunk
Multiple credential dumping tools executed, outbound connections to malicious IP, registry tampering to weaken defenses
Audit application execution policies
Block execution from user-writable directories like AppData\Temp and AppData\Roaming.
Harden Microsoft Defender settings
Prevent unauthorized registry changes and enforce tamper protection for Defender.
Implement PowerShell logging and alerts
Enable module and script block logging; alert on use of Set-MpPreference, WMIC, and taskkill.
Monitor for NirSoft and similar dual-use tools
Flag execution of known credential-dumping binaries (e.g., 11111.exe, mimikatz.exe variants).
Review network traffic for rare destinations
Investigate outbound traffic to rare or uncategorized IPs like 2.56.59.42.
Perform periodic threat hunts
Include DLL loading from non-standard directories and unauthorized use of scheduled tasks or registry changes.
User or attacker executed malicious binaries from AppData\Local\Temp
Multiple binaries executed (11111.exe, IonicLarge.exe, EasyCalc.exe)
Binary dropped in AppData\Roaming\EasyCalc to survive reboots
Not observed
Modified Windows Defender registry keys and threat responses via PowerShell
Not observed
Web browser credential dumper (NirSoft) and registry key manipulation
Not observed
Outbound connections to known-malicious IP
Defender was suppressed, suspicious payloads and DLLs deployed
T1059.001
Powershell
Executed Defender tampering and commands via encoded PS script
T1105
Ingress Tool Transfer
Binaries downloaded into Temp and Roaming folders
T1562.001
Disable or Modify System Protection
Modified Defender settings via registry and commands
T1218.005
Signed Binary Proxy Execution: WMIC
WMIC used via PS to set ThreatID actions
T1555.003
Credentials from Web Browsers
NirSoft password viewer (11111.exe)
T1071.001
Application Layer Protocol: Web
Outbound connection to 2[.]56[.]59[.]42
Reference: [MITRE ATT&CK Navigator] ( https://attack.mitre.org/ )
To kick things off, I looked at Sysmon Event ID 1 for process creation events. This helps surface suspicious binaries that ran on the system.
I ran a simple Splunk query to list unique process images:
Splunk Query:
index=main sourcetype="WinEventLog:Microsoft-Windows-Sysmon/Operational" EventCode=1 | table Image | dedup Image
Among the results, one entry stood out: 11111.exe
Viewing the full event revealed it was associated with a **web browser password recovery tool** — a red flag, especially on a corporate endpoint.
C:\Users\FINANC~1\AppData\Local\Temp\11111.exe
I opened the same process event from Q1 in Splunk and reviewed the metadata fields that are typically embedded in executables. The **CompanyName** field revealed the binary’s origin.
Not surprisingly, the tool came from **NirSoft**, a well-known provider of password recovery utilities — useful for red teamers, but a clear threat in this case.
NirSoft
Since the previous suspicious binary was in the Temp folder, I pivoted by filtering for other .exe files executed from the same path.
note: FINANC~1 is the tilde substitution convention for FINANCE01
Using the Image and OriginalFileName fields, I found another executable of interest:
– Binary name: IonicLarge.exe
– Original filename: PalitExplorer.exe
The naming is clearly designed to look non-threatening, but combined with its origin and behavior, it’s suspicious.
IonicLarge.exe,PalitExplorer.exe
Since we already knew IonicLarge.exe was suspicious, I searched for any events associated with it and focused on the DestinationIp field to find network activity.
Splunk Query:
Image=C:\\Users\\Finance01\\AppData\\Local\\Temp\\IonicLarge.exe | table DestinationIp | dedup DestinationIp
One of the IPs appeared multiple times and clearly didn’t belong to a known safe domain. Since the question mentions _two_ outbound connections, this confirmed the behavior.
After running it through CyberChef to defang, the malicious IP was:
2[.]56[.]59[.]42
Registry modifications are logged in Sysmon using Event IDs 12, 13, and 14. These can indicate persistence mechanisms or tampering with security settings.
Since we were already tracking IonicLarge.exe, I checked its related registry activity and focused on the TargetObject field.
The modified key turned out to be a familiar one — often abused to disable Microsoft Defender:
HKLM\SOFTWARE\Policies\Microsoft\Windows Defender
the hint says to look at taskkill /im
To track this activity, I looked at PowerShell command lines containing taskkill /im, which often indicates manual process termination.
Then I pivoted into Sysmon Event ID 1 and filtered for any PowerShell commands that referenced file deletion or process killing.
Splunk Query:
index=* sourcetype="WinEventLog:Microsoft-Windows-Sysmon/Operational" EventCode=1 | table CommandLine | dedup CommandLine
The attacker used taskkill to terminate two processes and immediately followed it with a command to delete the associated files:
– WvmIOrcfsuILdX6SNwIRmGOJ.exe
– phcIAmLJMAIMSa9j9MpgJo1m.exe
WvmIOrcfsuILdX6SNwIRmGOJ.exe,phcIAmLJMAIMSa9j9MpgJo1m.exe
To investigate Defender tampering, I filtered PowerShell-related events in Sysmon and focused on CommandLine values for Defender-related keywords and WMIC calls.
Splunk Query:
index=* sourcetype="WinEventLog:Microsoft-Windows-Sysmon/Operational" powershell | table _time CommandLine | dedup CommandLine
The attacker repeatedly set custom ThreatIDDefaultAction entries using PowerShell and WMIC. The last command in that sequence was:
powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True
This effectively tells Defender how to handle a specific threat ID — in this case, likely setting it to ignore or allow.
powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147737394 ThreatIDDefaultAction_Actions=6 Force=True
Looking back at the PowerShell commands from the previous search, I extracted the **ThreatIDDefaultAction_Ids** values in the order they were executed.
These IDs represent threat signatures Defender was instructed to allow or ignore — effectively neutering its detection capabilities.
From top to bottom in the timeline:
1. 2147737007
2. 2147737010
3. 2147735503
4. 2147737394
2147737007,2147737010,2147735503,2147737394
We already checked suspicious binaries in AppData\Local\Temp, so next I searched for executables launched from anywhere inside the broader AppData structure, focusing on Sysmon Event ID 1.
Splunk Query:
index=* sourcetype="WinEventLog:Microsoft-Windows-Sysmon/Operational" Image="C:\\Users\\FINANCE01\\AppData\\*.exe" | table Image | dedup Image
One unfamiliar binary stood out.
This location and filename combination is a common tactic for persistence or hiding in plain sight.
C:\Users\Finance01\AppData\Roaming\EasyCalc\EasyCalc.exe
To determine which libraries the binary loaded, I filtered for Sysmon Event ID 7, which logs DLL loads, and scoped it to the EasyCalc binary.
Splunk Query:
To determine which libraries the binary loaded, I filtered for **Sysmon Event ID 7**, which logs DLL loads, and scoped it to the EasyCalc binary.
The results showed the following suspicious DLLs, likely used to support or disguise malicious behavior:
– ffmpeg.dll
– nw.dll
– nw_elf.dll
Sorted alphabetically as requested:
ffmpeg.dll,nw.dll,nw_elf.dll
Turns out letting random executables party in Temp and Roaming folders isn’t great for endpoint hygiene.
Who knew?
Between killing processes, disabling Defender like it’s a feature, and casually sideloading DLLs with something called EasyCalc.exe (which, spoiler: does not help with math), this attacker went full “make yourself at home.”
We might not know exactly what they stole, but it’s safe to say Finance won’t be trusting EasyCalc again anytime soon.
Apparently we have to tell you this: yes, cookies are used. They're not edible, and no, you can't escape them — but you can pick what gets tracked. Yay for EU law!