Since we are using Sysmon and Wireshark in this Challenge, we will recap first the Sysmon event ID and Some of the Wireshark common filter.

This Wireshark guide is my notes when investigating PCAP challenges on other platforms. And till now, this serves as my guide whenever I encounter PCAP investigation challenges.

Wireshark guide

Sysmon Event ID Table

Sysmon Event ID Description
1 Process Execution
2 File Creation Time Changed
3 Network Connection Detected
11 File Creation
7 Image loaded
5 Process Termination
15 Sysmon Event ID for file details
13/14 Registry Modification
19/20 Logs WMI (Windows Management Instrumentation) activity, often used in advanced attacks.
24 Clipboard changes. Tracks content copied to the clipboard (useful for spotting data exfiltration).
12 Registry Creation or Deletion
22 DNS Query

Scenario:

In this incident, you will act as an Incident Responder from an alert triaged by one of your Security Operations Center analysts. The analyst has confirmed that the alert has a CRITICAL severity that needs further investigation.

As reported by the SOC analyst, the intrusion started from a malicious document. In addition, the analyst compiled the essential information generated by the alert as listed below:

TASK 4: INITIAL ACCESS - MALICIOUS DOCUMENTS

TASK 5: INITIAL ACCESS - STAGE 2 EXECUTION

Based on the initial findings, we discovered that there is a stage 2 execution: