This blog documents my hands-on investigations using Splunk. I walk through real-world challenges step by step, explaining my thought process, search strategies, SPL queries, and how I uncover meaningful insights from logs and data.

Case #1

About the Network Information

The network is divided into three logical segments. It will help in the investigation.

IT Department

  • James
  • Moin
  • Katrina

HR department

  • Haroon
  • Chris
  • Diana

Marketing department

  • Bell
  • Amelia
  • Deepak

1) How many logs are ingested from the month of March, 2022?

Website initial view

2) Imposter Alert: There seems to be an imposter account observed in the logs, what is the name of that user?

Website initial view

3) Which user from the HR department was observed to be running scheduled tasks

Website initial view

4) Which user from the HR department executed a system process (LOLBIN) to download a payload from a file-sharing host.

Website initial view

5) To bypass the security controls, which system process (lolbin) was used to download a payload from the internet?

Website initial view

6) What was the date that this binary was executed by the infected host? format (YYYY-MM-DD)

7) Which third-party site was accessed to download the malicious payload?

8) What is the name of the file that was saved on the host machine from the C2 server during the post-exploitation phase?

Website initial view

Case #2

1) On one of the infected hosts, the adversary was successful in creating a backdoor user. What is the new username?

Website initial view

Website initial view

2) On the same host, a registry key was also updated regarding the new backdoor user. What is the full path of that registry key?

Website initial view

Website initial view

3) What is the command used to add a backdoor user from a remote computer?

Website initial view

Website initial view

4) PowerShell logging is enabled on this device. How many events were logged for the malicious PowerShell execution?

Website initial view

Website initial view

5) An encoded Powershell script from the infected host initiated a web request. What is the full URL?

Website initial view

Website initial view