From HTB:
“You have been presented with the opportunity to work as a junior DFIR consultant for a big consultancy. However, they have provided a technical assessment for you to complete. The consultancy Forela-Security would like to gauge your Windows Event Log Analysis knowledge. We believe the Cyberjunkie user logged in to his computer and may have taken malicious actions. Please analyze the given event logs and report back.”
Environments Used
Windows OS
Event Log Viewer
Make sure to download the Logjammer.zip to a safe place to analyse.
The original write-up for this used Splunk - I didn’t use that to analyse these files, I just used the windows event viewer and filtered on event IDs.
🔧 Tools Used
Event Viewer or a log parser (like EventLog Explorer, Chainsaw, Log-MD, or wevtx with PowerShell or Python)
.evtx files:
Security.evtx
System.evtx
Windows PowerShell - Operational.evtx
Windows Defender - Operational.evtx
Windows Firewall - Firewall.evtx
📘 Questions & Investigation
Q1: When did the cyberjunkie user first successfully log into his computer? (UTC)
Log: Security.evtx
Event ID: 4624 (Successful logon)
Steps:
Filter by Event ID 4624.
Search for logs where Account Name = cyberjunkie.
Note the Logon Type = 2 (interactive) or 10 (remote/remote desktop).
Identify the earliest timestamp.
Q2: The user tampered with firewall settings. What was the name of the firewall rule added?
Log: Windows Firewall - Firewall.evtx
Event ID: 2004 (Rule Added)
Steps:
Search for Event ID 2004.
Check the Rule Name field.
Q3: Whats the direction of the firewall rule?
From Q2 in the same event we found the firewall rule we can see if this rule was inbound or outbound.
Q4: The user changed audit policy of the computer. Whats the Subcategory of this changed policy?
Log: Security.evtx
Event ID: 4719 (Audit policy changed)
Steps:
Filter by Event ID 4719.
Check for cyberjunkie in the Subject Security ID or Account Name.
Note the Subcategory field.
Q5: The user “cyberjunkie” created a scheduled task. Whats the name of this task?
Log: Security.evtx
Event ID: 4698 (Scheduled task created)
Steps:
Filter by Event ID 4698.
Confirm the creator is cyberjunkie.
Check the Task Name field.
Q6: What was the full path of the file scheduled by the task?
Log: Security.evtx
Event ID: 4698
Steps:
Use the same event as in Q5.
Scroll through the Task Content to find the Command field.
Note the full path to the file (e.g., C:\Users\cyberjunkie\AppData\Roaming\svc.bat).
Q7: What are the arguments of the command?
scroll through the event that we found for the last two questions
Q8: The antivirus running on the system identified a threat and performed actions on it. Which tool was identified as malware by antivirus?