Unit42

Reviewed event logs for malware distribution.

Link

Room Link


Process


It is time for something new. Work on Unit42!

The first action to take is to use EvtxECmd.exe to extract the logs from the .evtx file and export them to csv for easier analysis.

PowerShell

PS C:\Users\win\Downloads\EvtxECmd\EvtxeCmd> .\EvtxECmd.exe -f C:\Users\win\Desktop\unit42\Microsoft-Windows-Sysmon-Operational.evtx --csv C:\Users\win\Downloads\EvtxECmd\EvtxeCmd\
EvtxECmd version 1.5.2.0

Author: Eric Zimmerman (saericzimmerman@gmail.com)
https://github.com/EricZimmerman/evtx

Command line: -f C:\Users\win\Desktop\unit42\Microsoft-Windows-Sysmon-Operational.evtx --csv C:\Users\win\Downloads\EvtxECmd\EvtxeCmd\

Warning: Administrator privileges not found!

CSV output will be saved to C:\Users\win\Downloads\EvtxECmd\EvtxeCmd\20251224150130_EvtxECmd_Output.csv

Maps loaded: 453

Processing C:\Users\win\Desktop\unit42\Microsoft-Windows-Sysmon-Operational.evtx...
Chunk count: 3, Iterating records...
Record # 4 (Event Record Id: 118750): In map for event 26, Property /Event/EventData/Data[@Name="Archived"] not found! Replacing with empty string
Record # 27 (Event Record Id: 118773): In map for event 10, Property /Event/EventData/Data[@Name="SourceProcessGuid"] not found! Replacing with empty string
Record # 27 (Event Record Id: 118773): In map for event 10, Property /Event/EventData/Data[@Name="TargetProcessGuid"] not found! Replacing with empty string
Record # 46 (Event Record Id: 118792): In map for event 26, Property /Event/EventData/Data[@Name="Archived"] not found! Replacing with empty string

Event log details
Flags: None
Chunk count: 3
Stored/Calculated CRC: 9B75E006/9B75E006
Earliest timestamp: 2024-02-14 03:41:26.4441194
Latest timestamp:   2024-02-14 03:43:26.8870662
Total event log records found: 169

Records included: 169 Errors: 0 Events dropped: 0

Metrics (including dropped events)
Event ID        Count
1               6
2               16
3               1
5               1
7               15
10              1
11              56
12              14
13              19
15              2
17              7
22              3
23              26
26              2

Processed 1 file in 1.8900 seconds

  


The first step in this process is to identify the number of events with an Event ID 11 in the Event logs.


Check the logs for all events where a process is created in memory and search for a executable that stands out as potential malicious.


Start by finding the FileCreate event (Event ID 11) that creates the executable. Scroll up from that record and find the DNS record (Event ID 22). Check the EventData to get the domain.


Search for a event with the Event ID 2. Check the EventData for the PDF and not the CreationUtcTime.


Search for FileCreate and look ing EventData for the once.cmd file.


Check for the DNS requests (Event ID 22). Look for the malicious file in the Image column. Get the QueryName.


Filter for Network connection using Event ID 3 and check the EventData for the DestinationIP.


Filter for Process terminated using Event ID 5 and get the time stamp from EventData.


Well, well, what are you going to do? Finish investigating Unit42!