SCENARIO:
A security analyst has been assigned a ticket from the help desk stating that users are experiencing errors when attempting to open files on a specific network share. These errors state that the file format cannot be opened. IT has verified that the file server is online and functioning, but that all files have unusual extensions attached to them.
The security analyst reviews alerts within Cortex XSIAM and identifies malicious activity related to a possible ransomware attack on the file server. This incident is then escalated to the incident response team for further investigation.
Upon reviewing the incident, the responders confirm that ransomware was successfully executed on the file server. Other details of the attack are noted below:
* An unpatched vulnerability on an externally facing web server was exploited for initial access
* The attackers successfully used Mimikatz to dump sensitive credentials that were used for privilege escalation
* PowerShell was used on a Windows server for additional discovery, as well as lateral movement to other systems
* The attackers executed SystemBC RAT on multiple systems to maintain remote access
* Ransomware payload was downloaded on the file server via an external site "file io"
QUESTION STATEMENT:
Which forensics artifact collected by Cortex XSIAM will help the responders identify what the attackers were looking for during the discovery phase of the attack?
The correct answer is D -- Shell history.
The Shell history artifact provides a detailed record of commands executed during interactive shell sessions (such as via PowerShell or command prompt) on Windows and Linux systems. Reviewing this artifact enables responders to reconstruct the attacker's activity during the discovery phase, showing exactly what directories, files, and commands were accessed or run, and what the attackers were searching for.
'The Shell history artifact allows responders to see what commands were executed during the attack, providing insight into attacker intent and discovery activities.'
Document Reference: XSIAM Analyst ILT Lab Guide.pdf
Page: Page 46 (Incident Handling section, Causality and Forensics)
Linn
1 day agoLettie
6 days agoAvery
12 days agoMelissa
17 days agoPura
22 days agoFabiola
27 days agoIluminada
1 month agoTamesha
1 month agoHoward
1 month agoJerry
2 months agoVirgina
2 months agoCheryl
2 months agoTayna
2 months agoTitus
2 months agoBeth
2 months agoAudra
3 months agoJoesph
3 months agoTora
3 months agoAlyce
3 months ago