Another Security Blog

A place to show my mad skills

TidBits Walkthroughs Resources Projects View on GitHub
2 June 2025

Sherlock Logjammer: Easy

by C. Casquatch

From HTB: “You have been presented with the opportunity to work as a junior DFIR consultant for a big consultancy. However, they have provided a technical assessment for you to complete. The consultancy Forela-Security would like to gauge your Windows Event Log Analysis knowledge. We believe the Cyberjunkie user logged in to his computer and may have taken malicious actions. Please analyze the given event logs and report back.”

Environments Used

Make sure to download the Logjammer.zip to a safe place to analyse.

The original write-up for this used Splunk - I didn’t use that to analyse these files, I just used the windows event viewer and filtered on event IDs.


🔧 Tools Used


📘 Questions & Investigation

Q1: When did the cyberjunkie user first successfully log into his computer? (UTC)

Task 1


Q2: The user tampered with firewall settings. What was the name of the firewall rule added?

Task 2


Q3: Whats the direction of the firewall rule?


Q4: The user changed audit policy of the computer. Whats the Subcategory of this changed policy?

Task 4


Q5: The user “cyberjunkie” created a scheduled task. Whats the name of this task?


Q6: What was the full path of the file scheduled by the task?

Task 6


Q7: What are the arguments of the command?


Q8: The antivirus running on the system identified a threat and performed actions on it. Which tool was identified as malware by antivirus?

Task 8


Q9: Whats the full path of the malware which raised the alert?


Q10: What action was taken by the antivirus?

Task 10


Q11: The user used Powershell to execute commands. What command was executed by the user?

Task 11


Q12: We suspect the user deleted some event logs. Which Event log file was cleared?

Task 12



📎 Tips:

tags: Logjammer - sherlock - HTB - DFIR