Conti - THM

Conti, is a medium rated room. Use splunk to investigate the conti ransonmware

Conti - THM
Conti, is a medium rated room. Use splunk to investigate the conti ransonmware

Can you identify the location of the ransomware?

Using the search query we find cmd.exe located in the documents folder. This is suspicious since cmd is usually in the system32 folder

sourcetype="WinEventLog:Microsoft-Windows-Sysmon/Operational" image: Image="C:\*.exe"
binary-location.png

We browse the sysmon documentation and find event id 11 is for file create

Can you find the MD5 hash of the ransomware?

Now that we know which binary is malicious, we can filter for the hash

sourcetype="WinEventLog:Microsoft-Windows-Sysmon/Operational" "c:\\Users\\Administrator\\Documents\\cmd.exe" 
| top Hashes
cmd-hash.png

What file was saved to multiple folder locations?

Filtering for EventCode="11" we can find which files were created by this binary. We see readme.txt is saved in multiple locations.

sourcetype="WinEventLog:Microsoft-Windows-Sysmon/Operational" "c:\\Users\\Administrator\\Documents\\cmd.exe" EventCode="11"
multiple-files.png

What was the command the attacker used to add a new user to the compromised system?

To find which user was added, we can search for /add to find which user was added

sourcetype="WinEventLog:Microsoft-Windows-Sysmon/Operational" "/add" 
|  top ParentCommandLine
user-add.png

The attacker migrated the process for better persistence. What is the migrated process image (executable), and what is the original process image (executable) when the attacker got on the system?

Searching for EventCode=8 we find which process was used to create a RemoteThread. There are two events, however we use the first event

sourcetype="WinEventLog:Microsoft-Windows-Sysmon/Operational" EventCode="8"
process-migration.png

The attacker also retrieved the system hashes. What is the process image used for getting the system hashes?

Using the second event from the previous answer, we see that the unsecapp.exe injected itself to lsass.exe. lsass.exe is responsible for authentication on windows domain

lsass.png

What is the web shell the exploit deployed to the system?

After getting nowhere, a quick search on how to detect webshell using splunk, lead me here. Some of the vulnerable paths are\HttpProxy\owa\auth\, \inetpub\wwwroot\aspnet_client\, and \HttpProxy\OAB\. We start searching splunk for these path and we find a suspicious aspx file

sourcetype="iis" cs_method=POST "/owa/auth" cs_uri_stem!="/OWA/auth.owa"
iis-webshell.png

What is the command line that executed this web shell?

Now that we know the webshell name, we can search for i3gfPctK1c2x.aspx and the first hit shows us the command line used

cmd-webshell.png

What three CVEs did this exploit leverage?

The three CVE's this malware used are CVE-2020-0796,CVE-2018-13374, CVE-2018-13379