Hey everyone! I have been stuck in this question for hours.
Navigate to http://[Target IP]:8000, open the “Search & Reporting” application, and find through an SPL search against all data any suspicious loads of clr.dll that could indicate a C# injection/execute-assembly attack. Then, again through SPL searches, find if any of the suspicious processes that were returned in the first place were used to temporarily execute code. Enter its name as your answer. Answer format: _.exe
I am confused because I have applied clr.dll as my filter and could not find any C# code. Please give me a baseline on how to get the exe file involved. Any leads would be greatly appreciated. Thanks!
We just have to follow the step to find if some C# code was used, after this we could easilly find a program which call to other subprocess to perform it’s injection.
To find this, focus on the “first” program with a specific name view all events related, find the Target Image and you will find it ! =)
Did you try them all? Not trying to be condescending but I didn’t try one in particular… but it turned out this one was the correct one - sorry I cant just say the answer
HI, someone can help me with this question below?
I figure out all other questions, but this I’am stuck.
Module: Intrusion Detection With Splunk (Real-world Scenario)
Question:
Navigate to http://[Target IP]:8000, open the “Search & Reporting” application, and find through SPL searches against all data the two IP addresses of the C2 callback server. Answer format: 10.0.0.1XX and 10.0.0.XX
The answer is in this format? 10.0.0.186 and 10.0.0.229
If Yes, can someone give a hint? I follow rundll32.exe and connections to internet with http://* I found this IP above but don’t working.
thanks in advanced.
Ive been stuck here for a while now. Ive tried this, but out of the 26 or so entries none of them were the answer. Ive also tried these :
CallTrace=clr.dll | stats count by TargetImage
clr.dll EventCode=10 | stats count by TargetImage
clr.dll | stats count by ProcessName ParentProcessName
Spent another few hours searching for processes that could load code.
A lot of promising results came from variations of this command, but none of them were the correct answer: kernel32.dll EventCode=10 | stats count by TargetImage
Digging back through the results from these and looking for parent processes also didnt help. Tried googling regarding code execution, but not yet found anything to guide me towards specific .exe
are you tryng anwser this question?
“Navigate to http://[Target IP]:8000, open the “Search & Reporting” application, and find through an SPL search against all data the other process that dumped lsass. Enter its name as your answer. Answer format: _.exe”
check the comom process that dumped lsass