forensicsProeasy
Stockpile Breach
0xl4ugh
Task: Analyze a Windows triage image to reconstruct a malware attack timeline and answer 11 incident response questions. Solution: Parse Sysmon EVTX logs to identify the malware download source (Zone.Identifier ADS), execution timeline, C2 communication (Sliver framework at 3.121.219.28:8888), persistence via registry Run key, and file artifacts.
$ ls tags/ techniques/
sysmon_log_analysisregistry_persistencec2_detectiontimeline_analysis
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [forensics][free]TrueSecrets— hackthebox
- [forensics][free]Dream Job-2 Sherlock Scenario— hackthebox
- [forensics][free]Reminiscent— hackthebox
- [misc][Pro]Who4reu— TaipanByte
- [forensics][Pro]:( (sad_face)— scarlet