AIFT Forensic Report | Flip Forensics
| Filename | 20240212-decrypted-Windows_Server_2022.E01 |
|---|---|
| SHA-256 | 4754c592d2835f24334d018aca07cf04d185c16cfc974a6d983e915f571a24d7 |
| MD5 | 6f912bbaa1500f4556bd6b4fa8466f02 |
| File Size | 1.46 GB (1572845047 bytes) |
| Hostname | WIN-NI9FBK23SLO |
| OS | Windows Server 2022 Standard (NT 10.0) 20348.1850 |
| Domain | branchoffice.example.com |
| IPs | 10.44.0.12 |
On 12th Feb 2024 we discovered the server was no longer responding with 'Red Petya' ransomware displayed on the screen. We suspect PsExec might have been used. We also found the binary redpetya.exe on a different server.
Look for any suspicious behaviour aside from these two IOC's.
This Domain Controller (WIN-NI9FBK23SLO) is confirmed compromised. A threat actor operating under a non-default "admin" account conducted a multi-day intrusion between approximately 2024-02-05 and 2024-02-09, involving credential harvesting from a file share, network reconnaissance (Nmap), data exfiltration to an external FTP server (185.239.106.67), disabling of Windows Defender, deployment of PsExec for lateral movement across at least six workstations, and staging of at least two suspicious binaries (rename.exe, dir.exe) — one of which is almost certainly the ransomware payload renamed from redpetya.exe. A Ryuk ransom note was also found on the Desktop, suggesting multiple ransomware variants were present or tested. The ransomware detonated on or before 2024-02-12, rendering the server non-functional. Confidence in the overall compromise assessment is HIGH; severity is CRITICAL given this is a Domain Controller with evidence of domain-wide lateral movement and data exfiltration.
---
| Timestamp (UTC) | Source Artifact(s) | Event | Confidence |
|---|---|---|---|
| 2023-11-04 15:25–15:33 | Browser Downloads, Shellbags, UserAssist | Administrator account downloads and extracts SysinternalsSuite.zip. PsExec64.exe present in profile. |
HIGH |
| 2023-11-16 12:03–12:13 | Shimcache | Multiple Windows binaries (regedit, notepad, splwow64, bfsvc) accessed via \\10.44.24.9\admin$ — earliest evidence of remote admin$ share interaction. |
MEDIUM |
| 2024-02-05 23:09 | Browser History | admin account accesses C:\share\Clark.Nicholson\Documents\account_password.xlsx and account_edit.docx — credential harvesting from file share. |
HIGH |
| 2024-02-05 23:13–23:14 | Browser Downloads, Browser History, Shellbags, Shimcache, Recycle Bin | admin downloads SysinternalsSuite.zip, extracts it to Downloads folder. ZIP deleted to Recycle Bin at 23:14:49. PsShutdown64.exe executed directly from temp-extracted ZIP. |
HIGH |
| 2024-02-05 23:25 | Shimcache | \\10.44.24.9\admin$\PSEXESVC.exe appears in shimcache — PsExec service binary deployed to remote host, ~11 minutes after Sysinternals extraction. |
HIGH |
| 2024-02-05 23:36 | Browser History | admin accesses C:\Users\admin\Desktop\share.zip — likely compressed file share data staged for exfiltration. |
MEDIUM |
| 2024-02-05 23:40–23:43 | Browser History, Browser Downloads, BAM, Shimcache, Amcache | Nmap 7.93 downloaded from Softonic, installed (Npcap driver at 23:42:42), Zenmap shortcut created. | HIGH |
| 2024-02-06 ~20:09 | Browser History | admin accesses important.zip on Desktop. |
MEDIUM |
| 2024-02-06 20:53 | Browser History | admin opens C:\Users\admin\Desktop\RyukReadMe.txt — Ryuk ransomware ransom note. |
HIGH |
| 2024-02-06 21:09 | UserAssist, BAM | Zenmap (Nmap GUI) executed — 2 total runs. Network reconnaissance activity. | HIGH |
| 2024-02-06 21:31–21:32 | Services | Windows Defender components demoted: WinDefend Auto→Manual, WdBoot Boot→Manual, WdFilter Boot→Manual. Defense evasion. | HIGH |
| 2024-02-06 21:49 | Scheduled Tasks | Malicious scheduled task "Enterpries backup" created. Command: PsExec.exe pushing rename.exe to Desktop-001 through Desktop-006 with plaintext credentials (-u admin -p letmein), REALTIME priority, -c -d flags. |
HIGH |
| 2024-02-06 22:14 | BAM, UserAssist, Amcache, Shimcache | Both PsExec.exe and PsExec64.exe executed from C:\Users\admin\Downloads\SysinternalsSuite\. BAM, UserAssist, and Amcache all confirm execution within seconds. |
HIGH |
| 2024-02-06 22:14:44 | Recycle Bin | share.zip (0.65 GB) deleted from Desktop — post-exfiltration cleanup. |
MEDIUM |
| 2024-02-06 22:22–22:32 | BAM, UserAssist, Browser History | Rapid system enumeration: msinfo32, msconfig, Task Manager, Date/Time settings accessed. | MEDIUM |
| 2024-02-07 16:50 | Browser History | admin accesses C:\scripts\activeDirectory_user_import.csv (visit_count=2) — AD user enumeration. |
MEDIUM |
| 2024-02-07 16:57 | Browser History | FTP connection to ftp://185.239.106.67/branchoffice.example.com/ (9 visits) — data exfiltration to external attacker infrastructure. Directory named after internal domain. |
HIGH |
| 2024-02-07 ~21:00 | Amcache | PsExec64.exe recorded under Administrator profile; dir.exe and rename.exe on admin Desktop inventoried (both unsigned, no metadata). |
HIGH |
| 2024-02-08 08:16–08:39 | Shellbags | admin browses C$ administrative shares on five internal hosts (10.44.24.1, .6, .7, .8, .9) — systematic user profile enumeration within 22-minute window. Also browses admin$ on 10.44.24.9 and desktop-005. |
HIGH |
| 2024-02-08 19:02–19:06 | BAM, UserAssist, SRUM | Remote Desktop client (mstsc.exe) and Zenmap executed — lateral movement and continued reconnaissance. |
MEDIUM |
| 2024-02-09 20:59–22:56 | BAM, UserAssist, SRUM | Final burst of activity: rundll32.exe (5 instances), cmd.exe (7 executions), conhost.exe, mmc.exe, Task Scheduler (3 accesses), PsExec.exe at 22:55:44 (last BAM entry). rename.exe executes at 22:56 per SRUM with ~13.3 billion foreground CPU cycles. |
HIGH |
| 2024-02-09 22:56 → 2024-02-12 | All artifacts | Complete activity gap. No artifact records any activity after 22:56 on Feb 9. Ransomware discovered on screen Feb 12. System likely rendered non-functional by MBR/disk encryption shortly after last recorded activity. | HIGH |
---
redpetya.exe**Status: Not Directly Observed — but strongly correlated to rename.exe**
redpetya.exe does not appear by filename in any artifact (shimcache, amcache, BAM, UserAssist, scheduled tasks, browser history, SRUM, recycle bin, services, or run keys). However, the binary C:\Users\admin\Desktop\rename.exe is present across four independent artifacts:
| Artifact | Evidence |
|---|---|
| Scheduled Tasks | Task "Enterpries backup" pushes rename.exe via PsExec to 6 workstations at REALTIME priority |
| Shimcache | rename.exe on Desktop, last_modified 2016-03-24T00:00:00 (suspicious exact-midnight timestamp suggesting timestomping or custom compilation) |
| Amcache | rename.exe, 0.22 MB, no publisher/version/product metadata — unsigned and unattributed |
| SRUM | rename.exe executed 2024-02-09T22:56:00 with ~13.3 billion foreground CPU cycles — significant processing |
The combination of: (1) being pushed via PsExec to six workstations, (2) having no legitimate metadata, (3) having a suspicious old timestamp, (4) executing with HIGH CPU consumption days before ransomware detonation, and (5) being named after a common Windows internal command (defense evasion) makes rename.exe the overwhelmingly likely candidate for the ransomware payload — almost certainly redpetya.exe renamed. Confidence: HIGH. Hash comparison is required for definitive confirmation.
A second suspicious binary, C:\Users\admin\Desktop\dir.exe (0.77 MB, unsigned, no metadata, same suspicious 2016 timestamp pattern) is also present and warrants analysis.
PsExecStatus: Observed — Confirmed across 7 independent artifacts
| Artifact | Evidence |
|---|---|
| Scheduled Tasks | C:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe configured as command for "Enterpries backup" task |
| Shimcache | PsExec.exe, PsExec64.exe at 2024-02-05T23:14:39; PSEXESVC.exe at \\10.44.24.9\admin$ at 23:25:15 |
| Amcache | psexec.exe (admin, Feb 6), psexec64.exe (admin, Feb 6; administrator, Feb 7) — v2.43 |
| BAM | PsExec64.exe executed 2024-02-06T22:14:12; PsExec.exe executed 2024-02-09T22:55:44 |
| UserAssist | Both variants executed 2024-02-06T22:14:10–12 |
| Browser Downloads | SysinternalsSuite.zip downloaded 2024-02-05T23:13:32 |
| Recycle Bin | SysinternalsSuite.zip deleted 2024-02-05T23:14:49 |
PsExec was downloaded, extracted, executed multiple times over 4 days, and configured in a scheduled task to deploy the ransomware payload to six named workstations. Confidence: HIGH.
---
[INFERRED] The attacker gained access to the Domain Controller, likely through a compromised or newly created "admin" domain account (RID 2611). This account first appears in any artifact on 2024-02-05. The SAM hive shows only default local accounts (no local "admin" account with RID ≥ 1000), meaning "admin" is a domain account. Its creation date is not available in the provided data. The built-in Administrator account had Sysinternals downloaded in November 2023, which could indicate an earlier compromise phase or legitimate usage — this is unresolved.
[CONFIRMED — Browser History] The attacker's first recorded action under the admin account was accessing C:\share\Clark.Nicholson\Documents\account_password.xlsx — an explicitly named credential file on the local file share. This provided credentials to support subsequent lateral movement.
[CONFIRMED — Browser Downloads, Shimcache, Recycle Bin, Shellbags, BAM] Within 30 minutes:
share.zip created/accessed on Desktop (likely compressed file share contents)[CONFIRMED — Shimcache, BAM, UserAssist, SRUM, Shellbags]
\\10.44.24.9\admin$ within 11 minutes of PsExec extraction — initial remote access test[CONFIRMED — Services] Windows Defender's three core components (WinDefend, WdBoot, WdFilter) were all demoted from automatic/boot-start to manual within 4 seconds, precisely 18 minutes before the malicious scheduled task was created. This is a deliberate pre-deployment action to prevent real-time detection of the ransomware payload.
[CONFIRMED — Scheduled Tasks] A scheduled task named "Enterpries backup" (deliberately misspelled to blend in) was created to execute PsExec with the following parameters:
rename.exe (the ransomware) to six workstations (Desktop-001 through 006)admin / letmein)[CONFIRMED — Browser History, Shellbags, Recycle Bin]
share.zip (0.65 GB) on Feb 5, deleted after use on Feb 6important.zip accessed on Feb 6185.239.106.67 on Feb 7, with a directory matching the internal domain name (branchoffice.example.com) and 9 visits — confirmed double-extortion model (steal data, then encrypt)[CONFIRMED — Browser History, SRUM, BAM]
RyukReadMe.txt present on Desktop and opened on Feb 6 — indicates Ryuk variant was present or testedrename.exe executed on Feb 9 at 22:56 with significant CPU consumption (~13.3 billion cycles) — likely ransomware execution on the local host[INFERRED from activity gap] All artifacts cease recording after ~22:56 on Feb 9. Red Petya was displayed on screen when discovered on Feb 12. The ~2.5-day gap is consistent with Petya-family behavior: MBR overwrite triggers a forced reboot, after which the bootloader-level encryption runs (encrypting the MFT), and the ransom screen is displayed. The system never booted back into Windows, which explains the absence of any further artifact writes, including shimcache flush, SRUM updates, and BAM entries.
---
| Question | Why It Matters | Resolving Evidence |
|---|---|---|
**What is the SHA256 hash of rename.exe and dir.exe?** |
Definitively links these to redpetya.exe found on other server. |
File system extraction + hash comparison. This is the #1 priority. |
| When was the "admin" domain account (RID 2611) created, and by whom? | Determines if attacker created the account or compromised an existing one. | AD Security logs (Event ID 4720), domain controller NTDS.dit, SAM on DC. |
| What happened between Feb 9 22:56 and Feb 12? | Determines exact ransomware detonation time and whether additional hosts were compromised. | MBR/VBR disk-level analysis, MFT timestamps (if recoverable), event logs from other hosts. |
| What was exfiltrated to 185.239.106.67? | Determines breach scope for notification/legal obligations. | Firewall/proxy logs, FTP client artifacts, packet captures, threat intel on IP. |
| Were the six target workstations (Desktop-001 through 006) successfully compromised? | Determines blast radius of the ransomware deployment. | Triage imaging of all six workstations. |
| What is the role of 10.44.24.9? | This IP had PSEXESVC.exe deployed and extensive admin$ access. Possible earlier compromised host or attacker pivot point. | Image and triage 10.44.24.9. |
| Indicator | Evidence | Confidence |
|---|---|---|
| Windows Defender deliberately disabled | Three Defender services demoted to Manual on Feb 6 21:31 (Services artifact) + empty Defender Quarantine store | HIGH |
| Tool archive deleted post-extraction | SysinternalsSuite.zip deleted to Recycle Bin within 1 minute of extraction (Recycle Bin artifact) | HIGH |
| Staging archive deleted post-exfiltration | share.zip (0.65 GB) deleted ~23 hours after creation (Recycle Bin artifact) | MEDIUM |
| Payload renamed to blend in | rename.exe and dir.exe named after internal Windows commands, no publisher metadata (Amcache) |
HIGH |
| Possible timestomping | rename.exe last_modified 2016-03-24T00:00:00, dir.exe 2016-04-01T00:00:00 — exact midnight values from 8 years ago (Shimcache) |
MEDIUM |
| Empty SRUM network data | Expected to contain ~30-60 days of per-app network usage; completely empty | MEDIUM |
| Empty Activities Cache | Expected to contain user activity records; completely empty | MEDIUM |
| Empty WMI repository | Could indicate corruption from MBR/MFT overwrite by Petya, or deliberate clearing | MEDIUM |
| Date/time settings accessed during attack | ms-settings:dateandtime opened Feb 6 22:32 (Browser History) — possible timestamp manipulation |
LOW |
Administrator account downloaded Sysinternals in November 2023 (3 months prior). It is unclear whether this represents an earlier compromise phase or legitimate admin activity unrelated to the February attack. The November shimcache entries showing remote binaries accessed via \\10.44.24.9\admin$ (regedit, notepad, etc.) may link the earlier activity to the same threat actor.RyukReadMe.txt) was opened on Feb 6, but the incident report states Red Petya was on screen on Feb 12. This could indicate: (a) the attacker tested multiple ransomware variants, (b) Ryuk was deployed to other hosts while Red Petya hit this DC, or (c) the note was from a previous/separate incident. This is unresolved.sethc.exe running as SYSTEM**: 42 SRUM intervals of Sticky Keys execution under SYSTEM from December 2023 could indicate an accessibility-feature backdoor, but could also be benign. Requires hash verification.---
185.239.106.67** at the perimeter firewall immediately — confirmed exfiltration target.admin domain account** and disable it. Also reset letmein password (exposed in plaintext in the scheduled task arguments). Reset the Administrator account password as well.C:\Users\admin\Desktop\rename.exe and dir.exe** from the disk image. Compare SHA256 against the redpetya.exe sample found on the other server. Submit both to VirusTotal and a malware sandbox.rename.exe, dir.exe, redpetya.exe, nmap.exe, procdump.exe, and PsExec.exe — including run counts and timestamps.185.239.106.67, determine data volume transferred, and assess what was in share.zip (0.65 GB) and important.zip.admin account provenance**: Check AD/SAM for creation date, creator, and group memberships of the RID 2611 account. Review whether letmein was actually the password.sethc.exe integrity**: Hash C:\Windows\System32\sethc.exe against the known-good Microsoft binary and check Image File Execution Options (IFEO) registry keys for debugger redirects.HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon for DefaultUserName/DefaultPassword/AutoAdminLogon — Autologon64.exe was present in the Sysinternals Suite and may have been used.185.239.106.67**: Determine if this IP is associated with known ransomware groups, and whether the FTP directory structure suggests other victims.No suspicious entries are present in the Run/RunOnce registry keys. Both entries are legitimate Windows/VirtualBox components.
---
IOC Status
| IOC | Status | Detail |
|---|---|---|
redpetya.exe |
Not Observed | No Run/RunOnce entry references this binary. |
psexec (or PsExec-related persistence) |
Not Observed | No Run/RunOnce entry references PsExec or related tools. |
DFIR Default Checks (Run/RunOnce scope)
| Check | Status |
|---|---|
| Malicious program persistence | Not Observed — only two benign entries present. |
| Privilege escalation / credential access | Not Assessable from this artifact. |
| Lateral movement / evasion / exfiltration | Not Assessable from this artifact. |
---
Data Gaps
redpetya.exe or psexec.exe execution.Services key** — PsExec creates a PSEXESVC service; this is the primary persistence/execution artifact for PsExec.redpetya.exe on this host.C:\Windows\system32\tasks\Enterpries backup, created 2024-02-06T21:49:21.961830+00:00, user_id admin, run_level HighestAvailable. Command: C:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe. Arguments: -accept-eula \\Desktop-001,Desktop-002,Desktop-003,Desktop-004,Desktop-005,Desktop-006 -c -d -u admin -p letmein -realtime C:\Users\admin\Desktop\rename.exe.rename.exe) across six named workstations, constituting lateral movement and ransomware deployment via scheduled task persistence. The task was created 6 days before the ransomware was discovered on 12 Feb 2024.-u admin -p letmein). This confirms the attacker had (or set) the password letmein for the admin account.-accept-eula flag**: Auto-accepts the PsExec EULA, suppressing any interactive prompt — standard for automated/malicious use.-c flag**: Copies the executable (rename.exe) to the remote systems before execution, confirming the payload was staged from this server.-d flag**: Non-interactive mode; PsExec does not wait for the process to terminate, enabling rapid parallel deployment.-realtime flag**: Executes the payload at REALTIME process priority, which is consistent with ransomware wanting to encrypt as fast as possible before detection.rename.exe (at C:\Users\admin\Desktop\rename.exe), which is almost certainly the ransomware binary renamed from redpetya.exe to evade filename-based detection — another defense evasion indicator.Desktop-001 through Desktop-006), scoping the blast radius of the attack.rename.exe at REALTIME priority to six desktops.C:\Users\admin\Desktop\rename.exe — hash it and compare to redpetya.exe found on the other server. (2) Check all six Desktop machines for compromise. (3) Determine if the admin account password is/was actually letmein. (4) Check event logs for Task Scheduler event IDs 106/140/200/201 to determine if/when this task actually executed. (5) Examine PsExec binary at C:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe for version/hash.admin (not a well-known SID or domain admin format), with HighestAvailable run_level. PsExec path is C:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe, payload at C:\Users\admin\Desktop\rename.exe.admin user profile and was operating from the Downloads folder (typical of a web download or lateral-movement drop point) and Desktop (staging area). The use of a local admin account (not BRANCHOFFICE\Administrator) may indicate a compromised local account or a deliberately created one.admin account. Review browser history and download logs for how PsExec was obtained. Check if admin differs from BRANCHOFFICE\Administrator (row 1).npcapwatchdog, command C:\Program Files\Npcap\CheckStatus.bat, user_id S-1-5-18 (SYSTEM).---
| IOC | Status | Evidence |
|---|---|---|
| redpetya.exe | Not Directly Observed, but strongly correlated | The filename redpetya.exe does not appear in any task definition. However, the payload C:\Users\admin\Desktop\rename.exe (row 5) is almost certainly a renamed copy — the file is being pushed via PsExec at REALTIME priority to six workstations 6 days before the ransomware incident. Must verify by hash comparison. |
| PsExec | Observed | Row 5: C:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe is the explicit command for the "Enterpries backup" task. Confirmed as the delivery mechanism for lateral ransomware deployment. |
---
Microsoft-Windows-TaskScheduler/Operational) with Event IDs 106 (registered), 140 (updated), 200 (action started), 201 (action completed) are needed to determine execution times.rename.exe = redpetya.exe from this data alone. File system analysis (MFT, hash comparison) is required.rename.exe and redpetya.exe timestamps/hashes), Amcache/Shimcache, PowerShell logs, and network connection logs.WdBoot changed from Boot (0) at 2023-09-25T23:03:17 (row 1725) to Manual (3) at 2024-02-06T21:31:54 (row 557). WdFilter changed from Boot (0) at 2023-09-25T23:03:25 (row 1727) to Manual (3) at 2024-02-06T21:31:57 (row 559). WinDefend changed from Auto Start (2) at 2023-12-07T18:10:57 (row 1740) to Manual (3) at 2024-02-06T21:31:53 (row 572).2024-02-06T21:31 for Defender tamper events (Event IDs 5001, 5010, 5012) and identify what process/user made the registry changes.npcap service, imagepath \SystemRoot\system32\DRIVERS\npcap.sys, start type System (1), timestamp 2024-02-05T23:42:42 (row 305). This driver does not appear in the baseline OS service set from 2023-09-24.2024-02-05T23:42.RemoteRegistry service, start type Auto Start (2), timestamp 2023-09-24T14:57:31 (row 375).WinRM service, start type Auto Start (2), timestamp 2023-09-24T14:57:31 (row 579).| IOC | Status | Evidence |
|---|---|---|
| redpetya.exe | Not Observed | No service entry references redpetya.exe or any variant in imagepath or servicedll fields. |
| PsExec (PSEXESVC) | Not Observed | No service named PSEXESVC or any imagepath containing psexec is present in this dataset. PsExec creates and typically removes its service; absence does not rule out use. |
PSEXESVC) that is deleted after use. The services registry artifact would only capture it if the registry hive was imaged while the service existed or if cleanup failed. System event logs (Event ID 7045) are needed to detect service creation/deletion events.ObjectName/ServiceAccount field, so we cannot determine if any service runs under a suspicious or compromised account.redpetya.exe and psexec execution, and SAM/Security logs for account activity.No suspicious findings can be identified from this artifact — the dataset contains zero records.
---
IOC Status
| IOC | Status | Detail |
|---|---|---|
redpetya.exe |
Not Assessable | WMI repository data is empty; cannot determine if this binary was referenced in any WMI event consumer (e.g., CommandLineEventConsumer executing redpetya.exe). |
psexec |
Not Assessable | No WMI records to evaluate for PsExec-related persistence or execution triggers. |
---
Data Gaps
| Gap | Impact |
|---|---|
| Empty WMI repository extract (0 records) | This is the most significant gap. A completely empty CIM repository is itself noteworthy — either (1) the extraction/parsing tool failed to recover data, (2) the WMI repository was never used for persistence on this host, or (3) the repository was deliberately cleared or corrupted as an anti-forensic measure. Red Petya / NotPetya variants have been known to corrupt disk structures, which could destroy the WMI repository (C:\Windows\System32\wbem\Repository\OBJECTS.DATA, MAPPING*.MAP, INDEX.BTR). |
| No event filters, consumers, or bindings assessable | Cannot evaluate for fileless persistence, scheduled WMI backdoors, or ActiveScriptEventConsumer / CommandLineEventConsumer abuse — all standard DFIR checks for this artifact. |
| Cannot assess any default DFIR checks | Privilege escalation, credential access, lateral movement, and evasion via WMI are all Not Assessable. |
Recommended follow-up:
C:\Windows\System32\wbem\Repository\ files exist on the disk image and whether they are intact or corrupted (consistent with ransomware disk-level damage).python-cim or WMI_Forensics.py directly against the raw repository files to rule out a parsing failure.\10.44.24.9\admin$\PSEXESVC.exe, last_modified 2024-02-05T23:25:15.663250+00:00.\10.44.24.9\admin$\, spanning from 2019-12-06 to 2024-02-05. Recent entries include:\10.44.24.9\admin$\PSEXESVC.exe — 2024-02-05T23:25:15 (row 8)\10.44.24.9\admin$\explorer.exe — 2024-01-09T22:57:19 (row 11)\10.44.24.9\admin$\HelpPane.exe — 2024-01-09T22:58:00 (row 10)\10.44.24.9\admin$\notepad.exe — 2023-11-16T12:13:19 (row 7)\10.44.24.9\admin$\regedit.exe — 2023-11-16T12:11:09 (row 5)\10.44.24.9\admin$\splwow64.exe — 2023-11-16T12:03:42 (row 6)\10.44.24.9\admin$\bfsvc.exe — 2023-11-16T12:03:29 (row 12)explorer.exe, regedit.exe, and notepad.exe from a remote admin$ share is abnormal. These are typically local system binaries. This pattern may indicate the attacker had persistent access to 10.44.24.9 and was staging or executing tools remotely, or the compromised server was mapping the remote share. The cluster of activity on Nov 16, 2023 suggests a distinct earlier access event.C:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe, last_modified 2024-02-05T23:14:39.491949. Row 122 — C:\Users\admin\Downloads\SysinternalsSuite\PsExec64.exe, last_modified 2024-02-05T23:14:39.522984.admin user account was compromised.C:\Users\admin\AppData\Local\Temp\3\Temp1_SysinternalsSuite.zip\psshutdown64.exe, last_modified 2024-02-05T23:14:19.546619.admin user. The extraction timestamp (~23:14) is the earliest activity in the attack timeline on Feb 5, preceding the bulk Sysinternals file appearance and the PSEXESVC.exe deployment by ~11 minutes.C:\Program Files (x86)\Nmap\nmap.exe, last_modified 2022-09-01T22:36:02. Row 100 — C:\Program Files (x86)\Nmap\zenmap.exe, last_modified 2022-09-01T22:36:06. Row 115 — C:\Users\admin\Downloads\nmap-7.93-setup.exe, last_modified 2024-02-05T23:41:37.445576. Row 106 — C:\Program Files\Npcap\NPFInstall.exe, last_modified 2022-08-19T19:09:18.C:\Users\admin\Desktop\rename.exe, last_modified 2016-03-24T00:00:00. Row 88 — C:\Users\admin\Desktop\dir.exe, last_modified 2016-04-01T00:00:00.rename.exe and dir.exe are not standard standalone Windows executables (the built-in rename and dir are internal cmd.exe commands, not separate EXEs). Custom executables with these names on the Desktop may indicate renamed malicious tools or attacker utilities. The 2016 compile/modified timestamps with exact midnight values are also suspicious and may indicate timestomping or custom-compiled tools.2024-02-05T23:14:*:procdump.exe / procdump64.exe (rows 62, 70) — commonly used for LSASS memory dumpingPsLoggedon.exe / PsLoggedon64.exe (rows 46, 49) — enumerates logged-on userslogonsessions.exe / logonsessions64.exe (rows 20, 21) — lists active logon sessionsPsInfo.exe / PsInfo64.exe (rows 48, 53) — system enumerationADExplorer.exe / ADExplorer64.exe (rows 138, 139) — Active Directory browsingADInsight.exe / ADInsight64.exe (rows 125, 126) — AD traffic monitoringaccesschk.exe / accesschk64.exe (rows 141, 142) — permission enumerationC:\Windows\SysWOW64\certutil.exe, 2023-07-07T21:21:32. Row 108 — C:\Windows\SYSTEM32\certutil.exe, 2023-07-07T21:21:32.-urlcache or -decode flags.| IOC | Status | Evidence |
|---|---|---|
| redpetya.exe | Not Observed | No entry matching redpetya.exe exists anywhere in the 514 shimcache records. This does not mean it was never present — it may have been executed after the last shimcache write, or the cache may have been flushed by the reboot caused by the ransomware. |
| PsExec (tool usage) | Observed | PsExec.exe (row 120), PsExec64.exe (row 122) at C:\Users\admin\Downloads\SysinternalsSuite\ with timestamps 2024-02-05T23:14:39. PSEXESVC.exe (row 8) at \10.44.24.9\admin$\ with timestamp 2024-02-05T23:25:15. |
psexec \\target -c redpetya.exe). Process creation logs (Sysmon Event ID 1, Security Event ID 4688) are essential.2024-02-07T10:22:21 (Edge update, row 16). The ransomware was discovered Feb 12. Any activity between Feb 7–12 is not captured in this artifact, which is the most CRITICAL window. This gap likely means the system was not cleanly shut down between Feb 7 and the ransomware incident, or the ransomware prevented a proper cache flush.admin and Administrator user profiles are both active on this system. Authentication logs are needed to determine if the admin account was compromised or if a different account was used.c:\users\admin\downloads\sysinternalssuite\psexec.exe (row 71, mtime_regf 2024-02-06T22:14:12.373672), c:\users\admin\downloads\sysinternalssuite\psexec64.exe (row 73, mtime_regf 2024-02-06T22:14:14.995445), and c:\users\administrator\downloads\sysinternalssuite\psexec64.exe (row 72, mtime_regf 2024-02-07T21:00:11.248564). Product name: "sysinternals psexec", version 2.43.c:\users\admin\desktop\dir.exe (row 13, mtime_regf 2024-02-07T21:00:10.342958, size 0.77 MB, publisher/version/product all blank) and c:\users\admin\desktop\rename.exe (row 80, mtime_regf 2024-02-07T21:00:10.562542, size 0.22 MB, publisher/version/product all blank).dir, rename) but placed on a user's desktop as standalone executables with no publisher or metadata is a classic indicator of renamed/custom malicious tools or utilities used during an attack. These could be the ransomware payload itself, credential harvesters, or file enumeration/encryption tools used in preparation for or execution of the Red Petya attack.redpetya.exe binary found on the other server. Examine prefetch, $MFT, and USN journal for execution evidence and original filenames.c:\users\admin\downloads\nmap-7.93-setup.exe (row 62, mtime_regf 2024-02-07T21:00:11.233940); installed binaries: c:\program files (x86)\nmap\nmap.exe (row 63, 2024-02-06T21:01:08.501123), c:\program files (x86)\nmap\ncat.exe (row 59, 2024-02-06T21:01:08.309662), c:\program files (x86)\nmap\nping.exe (row 69, 2024-02-06T21:01:08.547724), c:\program files (x86)\nmap\zenmap.exe (row 129, 2024-02-06T20:14:15.370394), plus Npcap driver (npcap.sys, row 67).2023-09-24 (system build). The "admin" profile only appears starting 2024-02-06–2024-02-07 (rows 13, 62, 71, 73, 80, and multiple Start Menu .lnk entries like rows 544, 550, 554, 555, 563, 576, 577, 582, 590, 609, 610). All tool installations (PsExec, Nmap, dir.exe, rename.exe) are under this account.c:\users\administrator\downloads\sysinternalssuite\autologon64.exe (row 3, mtime_regf 2024-02-07T21:00:10.951519, publisher "sysinternals", product "sysinternals autologon").HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon for DefaultUserName/DefaultPassword/AutoAdminLogon values. Check Prefetch for evidence of autologon64.exe execution.---
| IOC | Status | Evidence |
|---|---|---|
| redpetya.exe | Not Observed | No file named redpetya.exe appears anywhere in the Amcache data. However, dir.exe and rename.exe (unsigned, no metadata, on admin's desktop) should be investigated as possible renamed copies. |
| PsExec | Observed | Three instances confirmed: psexec.exe (row 71, admin profile, 2024-02-06 22:14:12), psexec64.exe (row 73, admin profile, 2024-02-06 22:14:14), psexec64.exe (row 72, administrator profile, 2024-02-07 21:00:11). Product name "sysinternals psexec" v2.43. |
| Check | Assessment |
|---|---|
| Privilege Escalation | Not Assessable — Amcache does not record privilege context. The "admin" account operating on a DC implies HIGH privilege. |
| Credential Access / Mimikatz | Not Observed — No mimikatz, procdump, comsvcs.dll, or similar credential-dumping tools in the data. Autologon presence is noted. |
| Malicious Program Execution | Observed — dir.exe and rename.exe (unsigned, no metadata) and PsExec executed. Amcache entry confirms these binaries were at minimum inventoried by the system. |
| Persistence | Possible — Autologon64.exe present but execution not confirmed from this artifact alone. |
| Evasion | Possible — dir.exe and rename.exe naming convention suggests attempts to blend in with legitimate Windows commands. |
| Lateral Movement | Observed — PsExec (known lateral movement tool) present under both user profiles. |
| Exfiltration | Not Assessable — Ncat could facilitate exfiltration but no direct evidence from Amcache. |
---
dir.exe, rename.exe, or any other binary against the known redpetya.exe hash. This is the single most CRITICAL gap for this investigation.dir.exe/rename.exe). Not present in projected columns.redpetya.exe itself if executed then) would not appear. This is a significant gap that may explain why the ransomware binary is not observed.PSEXESVC.exe to the target. Its absence here may mean this server was the source of PsExec commands rather than the target — or it was cleaned up, or fell outside the Amcache time window.PsExec64.exe at 2024-02-06T22:14:12.975912 (row 13, path \Users\admin\Downloads\SysinternalsSuite\PsExec64.exe); PsExec.exe at 2024-02-09T22:55:44.556122 (row 23, path \Users\admin\Downloads\SysinternalsSuite\PsExec.exe). The 32-bit execution on Feb 9 at 22:55 is the last recorded BAM entry before the ransomware was discovered on Feb 12.admin account is consistent with an attacker staging tools. The Feb 9 execution is temporally the closest activity to the ransomware event.PSEXESVC) installation on this and remote hosts, and review network connections around these timestamps.nmap-7.93-setup.exe at 2024-02-05T23:43:02.682171 (row 15, path \Users\admin\Downloads\); NPFInstall.exe (Npcap packet capture driver) at 2024-02-05T23:42:44.420574 (row 16); zenmap.exe (Nmap GUI) at 2024-02-08T19:06:34.806301 (row 17).cmd.exe at 2024-02-09T22:53:10 (row 12); conhost.exe at 2024-02-09T22:54:36 (row 29); mmc.exe at 2024-02-09T22:54:29 (row 7); rundll32.exe at 2024-02-09T20:59:30 (row 18, deduplicated from 5 records indicating repeated execution); PsExec.exe at 2024-02-09T22:55:44 (row 23). All within the admin user context.rundll32.exe with 5 deduplicated entries may indicate DLL-based payload execution. conhost.exe supports cmd.exe/PsExec console sessions.rundll32.exe repeated execution is the most concerning element.mstsc.exe at 2024-02-08T19:03:33.683090 (row 28).NTUSER.DAT\Software\Microsoft\Terminal Server Client, and network logs for outbound RDP (3389) connections.msinfo32.exe at 2024-02-06T22:22:49 (row 24); msconfig.exe at 2024-02-06T22:23:04 (row 25); Taskmgr.exe at 2024-02-06T22:23:44 (row 26); notepad.exe at 2024-02-06T21:35:29 (row 20). All within ~1 hour, same session as the first PsExec64 execution (22:14).2024-02-09T22:55:44 (row 23, PsExec.exe). Ransomware discovered Feb 12.---
| IOC | Status | Evidence |
|---|---|---|
| redpetya.exe | Not Observed | No BAM entry for redpetya.exe. This does not mean it was not executed — it may have run under a different user context (BAM tracks per-SID), or the BAM entry may have been overwritten, or the binary was executed via a method that doesn't generate BAM entries (e.g., service execution via PsExec on a remote target). |
| PsExec | Observed | Both PsExec64.exe (row 13, 2024-02-06T22:14:12) and PsExec.exe (row 23, 2024-02-09T22:55:44) executed from \Users\admin\Downloads\SysinternalsSuite\. |
---
| Gap | Impact | Recommended Artifact |
|---|---|---|
| User SID not shown in projected data | Cannot confirm which user account executed each binary. The path \Users\admin\ suggests the admin account, but BAM keys are SID-based and this was projected out. |
Re-examine raw BAM registry keys to confirm SID-to-user mapping. |
| No redpetya.exe in BAM | Cannot confirm ransomware binary execution on this host from BAM alone. If deployed via PsExec to a remote host, BAM on the remote target would capture it, not this one. | Check Prefetch, Amcache, and ShimCache on this host and the remote server where redpetya.exe was found. |
| No command-line arguments | BAM records only binary paths, not arguments. Cannot determine what PsExec targeted (remote hostname, command pushed), what rundll32 loaded, or what Nmap scanned. | Security Event 4688 (Process Creation with command-line logging), Prefetch, and Sysmon if installed. |
| Activity gap Feb 10–12 | Cannot determine what happened between last BAM entry and ransomware discovery. System may have been non-bootable. | Analyze raw MFT $STANDARDINFORMATION and $FILENAME timestamps, $UsnJrnl, and disk-level MBR analysis. |
| No lateral movement targets visible | BAM shows PsExec ran locally but not which remote hosts were targeted. | PSEXESVC service install events on other hosts, Windows Security logs (logon events 4624 type 3), network flow data. |
| Credential access / privilege escalation | Not assessable from BAM alone. No Mimikatz-like tools observed, but absence is not evidence of absence. | Check for lsass.exe memory dumps, credential-harvesting tools in Amcache/Prefetch, and Security event 4672 (special privilege logon). |
| Persistence mechanisms | Not assessable. BAM does not reveal registry Run keys, scheduled tasks, or services. | Examine SYSTEM and NTUSER.DAT hives for persistence, Autoruns output, and scheduled task files. |
| Exfiltration | Not assessable from BAM. | Network logs, proxy logs, browser history, and any archive/compression tool execution in Prefetch. |
C:\Users\admin\Downloads\SysinternalsSuite\PsExec.exe, 1 execution, last run 2024-02-06T22:14:10.115000. Row 14 — C:\Users\admin\Downloads\SysinternalsSuite\PsExec64.exe, 1 execution, last run 2024-02-06T22:14:12.356998. Both under user admin.redpetya.exe to remote hosts. This is 6 days before the ransomware incident on 2024-02-12.PSEXEC.EXE/PSEXEC64.EXE, Windows Event Logs (Security 4648/4688, System 7045 for PSEXESVC), and network logs for SMB connections around 2024-02-06 22:14 UTC.C:\Users\admin\Downloads\nmap-7.93-setup.exe (installer present, ts null). Row 19 — zenmap.exe, 2 executions, last run 2024-02-06T21:09:13. Row 41 — Zenmap GUI shortcut, 1 execution, 2024-02-05T23:43:16. Row 44 — Desktop shortcut Nmap - Zenmap GUI.lnk, 1 execution, 2024-02-06T21:09:13.admin's profile, Prefetch for nmap.exe/zenmap.exe, and firewall logs for port scanning activity.C:\Users\admin\AppData\Local\Temp\3\Temp1_SysinternalsSuite.zip\psshutdown64.exe, 1 execution, 2024-02-05T23:14:20. This is the earliest Sysinternals tool execution by the admin user.Downloads\SysinternalsSuite\. This tool can facilitate ransomware deployment by forcing reboots post-infection (relevant to Petya which requires a reboot to activate its MBR payload).admin user account shows no activity before 2024-02-05T23:03:51 (row 2), then intense activity through 2024-02-09T22:53:05 (row 13/40). Timeline:admin account was created (SAM/AD logs). Determine if this is a known/authorized account vs. an attacker-created account.Task Scheduler.lnk, 3 executions, last run 2024-02-09T22:52:31. Row 26 — Microsoft.AutoGenerated.{C1C6F8AC-40A3-0F5C-146F-65A9DC70BBB4}, 3 executions, last run 2024-02-09T22:52:31 (same timestamp, likely the same application launch).C:\Windows\System32\Tasks\ for newly created tasks, and Event IDs 4698/4699/4702 in Security logs around this timestamp.Microsoft.Windows.RemoteDesktop, 1 execution, 2024-02-08T19:02:36. Row 50 — corresponding shortcut, same timestamp.Default.rdp file for target IPs, and network flow data.C:\Users\Administrator\Downloads\SysinternalsSuite\PsExec64.exe, 0 executions, timestamp 2023-11-04T21:56:50. Other Sysinternals tools in same profile: Autologon64 (row 79), Bginfo64 (row 80), RAMMap64 (row 82) — all timestamped 2023-11-04.Administrator account on Nov 4, 2023 — months before the attack. The run count of 0 with a non-null timestamp means it was tracked by UserAssist but the focus counter wasn't incremented (may indicate it was opened but not interactively "focused," or this is a UAC-related artifact). The presence on both accounts is notable.admin account may have been created later and re-downloaded/used them for the attack.Administrator and admin accounts. Check if the same Sysinternals ZIP was reused or separately downloaded.cmd.exe, 7 executions, 2024-02-09T22:53:05.400000, user admin.ConsoleHost_history.txt).---
| IOC | Status | Evidence |
|---|---|---|
| redpetya.exe | Not Observed | No entry for redpetya.exe in any UserAssist records for either user. This is expected if the binary was deployed and executed via PsExec remotely (which would not create a UserAssist entry), or executed non-interactively (e.g., via scheduled task or command line without Explorer GUI interaction). |
| PsExec | Observed | Two variants executed by admin on 2024-02-06: PsExec.exe (row 27, 22:14:10) and PsExec64.exe (row 14, 22:14:12). Also present in Administrator profile (row 81, 2023-11-04). |
---
| Gap | Impact | Recommended Artifact |
|---|---|---|
| No activity between 2024-02-09 22:53 and 2024-02-12 (incident discovery) | UserAssist records only GUI (Explorer-shell) executions. The ~2.5 day gap before ransomware detonation is not covered — the actual deployment and detonation likely occurred in this window. | Prefetch, $MFT timestamps, SRUM, Event Logs (Security/System). |
| UserAssist does not capture command-line arguments | We know PsExec was launched but cannot determine what payload was pushed, to which hosts, or with what credentials. | Process auditing (Event ID 4688 with command line), Prefetch, Shimcache/Amcache. |
**No redpetya.exe in UserAssist** |
Cannot confirm GUI-based execution of the ransomware binary on this host. If deployed via PsExec or scheduled task, it would bypass UserAssist entirely. | Prefetch (REDPETYA.EXE-*.pf), Amcache, $MFT, Shimcache. |
**admin account origin unknown** |
All attack activity is under admin (distinct from Administrator). We cannot determine from UserAssist when this account was created or if it is attacker-controlled. |
SAM registry hive, AD event logs (4720 - account creation), ProfileList registry key. |
| Run counts of 0 with valid timestamps (Administrator profile) | The Administrator entries all show number_of_executions: 0 despite having timestamps. This may indicate a UserAssist counter format discrepancy, or that focus tracking was reset. This limits confidence in how many times those tools were actually used interactively. |
Cross-reference with Prefetch run counts and Amcache. |
| No visibility into non-GUI executions | Services, scheduled tasks, command-line-only tools, and scripts do not appear in UserAssist. CRITICAL attack phases (payload deployment, encryption) likely occurred outside GUI context. | Windows Event Logs, Prefetch, SRUM, $MFT timeline, Scheduled Tasks folder. |
Findings
admin user ~6 days before the ransomware incident.C:\Users\admin\Downloads\SysinternalsSuite.zip (50.6 MB), deleted 2024-02-05T23:14:49 UTC (row 2), user admin.admin user's profile for an extracted SysinternalsSuite folder or any remaining PsExec*.exe binaries; examine Prefetch for PSEXEC.EXE-*.pf; review browser history for the download URL; check ShimCache/AmCache for PsExec execution evidence.share.zip (0.65 GB) created on the Desktop and then deleted, potentially indicating data staging/exfiltration or payload delivery.C:\Users\admin\Desktop\share.zip (0.65 GB), deleted 2024-02-06T22:14:44 UTC (row 1), user admin.share.zip; review SMB/network logs for outbound transfers of this file; check if "share" correlates with any mapped network share names; review $MFT for creation timestamp of the file.---
IOC Status
| IOC | Status | Evidence |
|---|---|---|
redpetya.exe |
Not Observed | No Recycle Bin entry for this filename. It may have been executed in-place without deletion, or deleted and the Recycle Bin record was overwritten/purged. |
PsExec / Sysinternals |
Observed (indirect) | SysinternalsSuite.zip (which contains PsExec) was downloaded to C:\Users\admin\Downloads\ and deleted on 2024-02-05T23:14:49 (row 2). This strongly corroborates the hypothesis that PsExec was obtained and used from this host. |
---
Data Gaps
$I files.share.zip contained exfiltrated data or SysinternalsSuite.zip was the legitimate Microsoft distribution vs. a trojanized version.redpetya.exe lifecycle.** Need $MFT, Prefetch, AmCache, and USN Journal to determine if it was present on this host.admin account context unknown.** Cannot determine from this artifact alone whether the admin account was used legitimately or was compromised. Authentication logs (Event ID 4624/4625) are needed.2024-02-07T16:57:31.964310 — ftp://185.239.106.67/branchoffice.example.com/ (visit_count=9, user=admin). Row 51 — 2024-02-07T16:57:05.940533 — ftp://185.239.106.67/ (visit_count=2, user=admin).branchoffice.example.com) with 9 visits is a strong indicator of data staging/exfiltration. This occurs on 2024-02-07, five days before ransomware detonation on 2024-02-12, consistent with a "steal-then-encrypt" double-extortion playbook.185.239.106.67. Image the admin user's profile for FTP client artifacts, cached credentials, and transferred file lists. Run threat intel lookup on this IP. Check for FTP command-line history or WinSCP/FileZilla artifacts.2024-02-06T20:53:29.889280 — file:///C:/Users/admin/Desktop/RyukReadMe.txt (visit_count=1, user=admin).RyukReadMe.txt is the canonical ransom note filename for Ryuk ransomware. Combined with the Red Petya ransomware noted in the investigation context, this suggests multiple ransomware families were present or tested on this server. This may indicate a multi-payload attack or an attacker testing different ransomware variants before final deployment on 2024-02-12.C:\Users\admin\Desktop\RyukReadMe.txt from the disk image. Check for Ryuk IOCs (executables, registry keys, scheduled tasks). Determine if Ryuk actually executed or if only the note was staged.2024-02-05T23:09:16.723713 — file:///C:/share/Clark.Nicholson/Documents/account_password.xlsx (user=admin). Row 47 — 2024-02-05T23:09:40.203115 — file:///C:/share/Clark.Nicholson/Documents/account_edit.docx (user=admin).admin account accessed another user's (Clark.Nicholson) file explicitly named account_password.xlsx at 23:09 on Feb 5, right at the start of the attack session. This is credential harvesting from a file share — a common lateral movement enabler. The account_edit.docx file accessed 24 seconds later may contain account modification instructions or additional credentials.account_password.xlsx and the timing (immediately before tool downloads) make this highly suspicious.2024-02-05T23:40:22 through 2024-02-05T23:41:31 — user admin searched "download nmap," navigated to Softonic, reached the post-download page (Download Nmap 7.93 - free - latest version), and the support/installation help page.nmap.exe or Nmap installation artifacts on disk. Review Windows Firewall logs or network captures for scanning activity originating from this server. Check C:\Users\admin\Downloads\ for the installer.2023-11-04T15:26:31.564228 — file:///C:/Users/Administrator/Downloads/SysinternalsSuite.zip (Administrator). Row 43 — 2024-02-05T23:13:45.314323 — file:///C:/Users/admin/Downloads/SysinternalsSuite.zip (admin), preceded by search and download at rows 8–11 starting 2024-02-05T23:13:17.admin account downloaded the suite on the evening of Feb 5 — the same session where credentials were harvested and Nmap was downloaded. This is the most likely vector by which PsExec was obtained, directly supporting the investigation hypothesis. The November download by Administrator may represent legitimate admin activity; the February download by admin is part of the attack chain.PSEXESVC, named pipes). Examine both extracted Sysinternals directories.share.zip staged on attacker's desktop.**2024-02-05T23:36:07.148302 — file:///C:/Users/admin/Desktop/share.zip (user=admin).share.zip strongly suggests the contents of C:\share\ (the file share containing user documents and credentials) were compressed for exfiltration. This aligns with the FTP exfiltration observed on Feb 7.C:\Users\admin\Desktop\share.zip or its remnants from the disk image. Compare file size to the share contents. Check if this file was transferred to 185.239.106.67.important.zip on attacker's desktop.**2024-02-06T20:09:32.974691 — file:///C:/Users/admin/Desktop/important.zip (user=admin).2024-02-07T16:50:47.014515 — file:///C:/scripts/activeDirectory_user_import.csv (visit_count=2, user=admin).2024-02-06T22:32:48.615803 — ms-settings:dateandtime (user=admin).admin account appeared suddenly with intense activity — possible attacker-created account.**Administrator account is active from 2023-11-04 through 2024-01-16. The admin account appears for the first time on 2024-02-05 and performs all suspicious activity (credential access, tool downloads, exfiltration, ransom note viewing).admin account may have been created by the attacker to avoid using the built-in Administrator account. Its sudden appearance coinciding with the start of the attack chain is notable.admin. Review Security Event Logs for Event ID 4720 (account creation).---
| Time | Activity | User |
|---|---|---|
| 2024-02-05 23:09 | Credential file harvested (account_password.xlsx) |
admin |
| 2024-02-05 23:13 | Edge first run → Sysinternals Suite searched & downloaded | admin |
| 2024-02-05 23:36 | share.zip accessed (likely data staging) |
admin |
| 2024-02-05 23:40 | Nmap searched & downloaded | admin |
| 2024-02-06 20:09 | important.zip accessed |
admin |
| 2024-02-06 20:53 | RyukReadMe.txt opened |
admin |
| 2024-02-06 21:23 | MMC console used | admin |
| 2024-02-06 22:32 | Date/time settings accessed | admin |
| 2024-02-07 16:50 | AD user import CSV accessed | admin |
| 2024-02-07 16:57 | FTP exfiltration to 185.239.106.67 |
admin |
| 2024-02-12 | Ransomware detonation (per investigation context) | — |
---
| IOC | Status | Evidence |
|---|---|---|
redpetya.exe |
Not Observed | No reference to this filename in any browser history URL, title, or file path. |
PsExec |
Not Directly Observed, but Strongly Supported | PsExec is not mentioned by name, but the Sysinternals Suite (which contains PsExec) was downloaded twice: by Administrator on 2023-11-04 (row 57) and by admin on 2024-02-05 (row 43). The Feb 5 download is within the attack session. |
| IOC | Type | Details |
|---|---|---|
185.239.106.67 |
External IP (C2/Exfil) | FTP exfiltration target, rows 50–51 |
RyukReadMe.txt |
Ransomware indicator | Second ransomware family, row 48 |
account_password.xlsx |
Credential file | Harvested from user share, row 46 |
share.zip |
Staging artifact | Probable compressed share data, row 44 |
---
admin user ~7 days before the ransomware incident, consistent with attacker staging PsExec for lateral movement.**2024-02-05T23:13:32 UTC, SysinternalsSuite.zip downloaded to C:\Users\admin\Downloads\, state complete. PsExec is included in the Sysinternals Suite.PsExec.exe or PsExec64.exe from the ZIP; check Prefetch, ShimCache, and AmCache for PsExec execution evidence; correlate with event logs for remote service creation (Event ID 7045).admin user ~28 minutes after the Sysinternals download, indicating active reconnaissance.**2024-02-05T23:41:28 UTC, nmap-7.93-setup.exe (27.8 MB) downloaded from gsf-fl.softonic.com (Softonic CDN) to C:\Users\admin\Downloads\, state complete.nmap.exe execution; review firewall/IDS logs for scanning activity originating from this host on or after 2024-02-05; verify the hash of nmap-7.93-setup.exe against the official Nmap release to rule out a trojanized binary.Administrator account ~3 months prior may indicate initial compromise or earlier access.**2023-11-04T15:25:24 UTC and 15:25:50 UTC, SysinternalsSuite.zip downloaded twice (one completed, one cancelled) under C:\Users\Administrator\Downloads\.Administrator account in November 2023, this could represent an earlier stage of compromise or persistent access. The duplicate/cancelled download may indicate an interrupted session.Administrator account (source IP, logon type); check whether the admin and Administrator accounts are used by the same person; examine timeline for November 2023 suspicious activity.admin and Administrator) used on what appears to be a server, suggesting possible unauthorized account usage.**admin; Rows 3–4 use Administrator. Both profiles have browser download histories on a server that experienced a ransomware attack.admin account alongside the built-in Administrator.admin account creation date and properties; review logon events for both accounts around 2024-02-05 for source IPs and logon types.---
| IOC | Status | Evidence |
|---|---|---|
redpetya.exe |
Not Observed | No browser download record for this filename or any .exe matching this name. The binary was likely delivered via another vector (e.g., PsExec push from another host, not browser download). |
PsExec (SuspiciousTool) |
Observed (Indirect) | SysinternalsSuite.zip (which contains PsExec) was downloaded twice — Row 1 (admin, 2024-02-05) and Row 3 (Administrator, 2023-11-04). PsExec itself was not downloaded as a standalone binary but is included in the suite. |
---
redpetya.exe.** The ransomware binary was likely delivered via a non-browser vector (PsExec remote copy, SMB share, or other tool). File system timeline, Prefetch, and MFT analysis are needed.The Activities Cache artifact contains zero records. The CSV attachment is empty with no columns or data present.
---
IOC Status
---
Data Gaps
redpetya.exe, psexec.exe, or other suspicious binaries.redpetya.exe, evidence of dropped tools.No findings — the artifact contains zero records and no columns. There is no data to analyze.
| IOC | Status | Detail |
|---|---|---|
redpetya.exe |
Not Assessable | SRUM network data is empty; cannot determine whether this binary generated any network traffic. |
psexec / PsExec |
Not Assessable | SRUM network data is empty; cannot determine whether PsExec-related network activity (e.g., connections over SMB/TCP 445, or the PSEXESVC service) occurred. |
SRUDB.dat) may not have been collected or was corrupted.redpetya.exe or psexec.exe / PSEXESVC.exe consumed network bandwidth.REDPETYA.EXE-*.pf and PSEXESVC.EXE-*.pf.2024-02-09T22:56:00, app \Device\HarddiskVolume2\Users\admin\Desktop\rename.exe, user S-1-5-21-...-2611, foregroundcycletime 13284139184 (~13.3 billion cycles, indicating substantial interactive/CPU use). No dedup comment — single record.redpetya.exe renamed to rename.exe to evade detection). The significant foreground cycle time suggests it was actively running with user interaction or heavy processing.rename.exe from the disk image and compare against redpetya.exe hash from the other server. Submit to malware sandbox. Check MFT for creation/modification timestamps and $FILENAME entries.\Users\admin\Downloads\nmap-7.93-setup.exe, foregroundcycletime 37987545588 (~38B cycles). Row 66926 — \Program Files (x86)\Nmap\zenmap.exe, foregroundcycletime 227183733421 (~227B cycles, deduplicated across 67 records). Row 66927 — \Program Files (x86)\Nmap\nmap.exe, foregroundcycletime 221269249429 (~221B cycles, deduplicated across 2 records). All first appear at 2024-02-06T00:06:00, user S-1-5-21-...-2611.nmap.exe and zenmap.exe indicate extensive network scanning. This occurred ~6 days before the ransomware incident, consistent with pre-attack reconnaissance to identify targets for lateral movement (potentially via PsExec).admin (SID -2611) account's authentication events.S-1-5-21-1057484085-1795310446-2370380301-2611 first appears at row 66899 (2024-02-06T00:06:00) with a full interactive session (explorer.exe, rdpclip.exe, sihost.exe, cmd.exe, mmc.exe, etc.). Prior to this date, all interactive activity was under SID -500 (built-in Administrator). SID -2611 accounts for 43 of 231 records, all from 2024-02-06 onward.rdpclip.exe, row 66907) confirms RDP-based remote access under this account.cmd.exe under SID -2611, foregroundcycletime 1486794981, deduplicated across 6 records (sustained command-line usage). Row 72016 — mstsc.exe under SID -2611 at 2024-02-08T20:00:00, foregroundcycletime 2907504339.redpetya.exe was later found).mstsc.exe destination hosts.\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, user S-1-5-18 (SYSTEM), foregroundcycletime 25120791860 (~25B cycles), deduplicated across 11 records.sethc.exe, user S-1-5-18, timestamp 2023-12-12T10:01:00, foregroundcycletime 320635024, deduplicated across 42 records.sethc.exe running as SYSTEM with persistence across 42 SRUM intervals is unusual. Sticky Keys binary replacement is a classic backdoor technique (Image File Execution Options hijack). However, this could also be normal accessibility feature activation.sethc.exe on disk against known-good Microsoft hash. Check IFEO registry keys for debugger redirects.| IOC | Status | Evidence |
|---|---|---|
redpetya.exe |
Not Observed (directly) | No SRUM entry for a binary named redpetya.exe. However, rename.exe on the Desktop (row 73965, 2024-02-09) is a strong candidate for the renamed payload. Requires hash comparison. |
PsExec / psexec |
Not Observed | No SRUM entry for psexec.exe, PSEXESVC.exe, or any PsExec-related binary. Note: SRUM may not capture short-lived service processes reliably, especially if PsExec was used to push to other servers from this host rather than being received here. |
| Check | Status |
|---|---|
| Privilege Escalation | Not Assessable — SRUM lacks process privilege/token data |
| Credential Access / Mimikatz | Not Observed — no mimikatz.exe, sekurlsa, procdump, or similar |
| Malicious Execution | Observed — rename.exe (Desktop), Nmap suite |
| Persistence | Not Assessable — SRUM cannot show registry/scheduled task changes; sethc.exe warrants investigation |
| Lateral Movement | Indicators present — mstsc.exe, Nmap scanning, cmd.exe usage under -2611 |
| Exfiltration | Not Assessable — no network byte data in provided columns |
PSEXESVC.exe service would appear on the target, not necessarily here. The cmd.exe usage under the -2611 account may have hosted PsExec invocations, but SRUM records the shell, not the child processes.powershell.exe, cmd.exe, rundll32.exe, or rename.exe were actually doing.rename.exe, psexec.exe, nmap.exe execution counts/timestamps), Windows Event Logs (Security 4720/4624/4688, PowerShell ScriptBlock), MFT timeline, Amcache/Shimcache, browser history for download sources, and the rename.exe binary itself for hash comparison with redpetya.exe.C$\Users on five distinct hosts via UNC paths: 10.44.24.8 (rows 3–14, mtime up to 2024-02-08T08:39:20), 10.44.24.1 (rows 16–19, mtime 2024-02-08T08:22:12), 10.44.24.6 (rows 21–24, mtime 2024-02-08T08:16:56), 10.44.24.7 (rows 26–29, mtime 2024-02-08T08:29:48), 10.44.24.9 (rows 31–34, mtime 2024-02-08T08:33:14). All five \Users folders were accessed on 2024-02-08 within a ~22-minute window (08:16–08:39 UTC), suggesting systematic enumeration.Network\<USERS_PROPERTY_VIEW {999534523}>\10.44.24.9\admin$ under the "admin" user (no timestamp preserved for the NETWORK entry itself).ADMIN$ share on the target. The investigation context specifically suspects PsExec usage. Browsing or interacting with admin$ via Explorer is highly atypical for normal operations.C:\Windows, look for Event ID 7045 (service install) in System logs on that host, and examine Prefetch for psexec execution on the source server.Network\<USERS_PROPERTY_VIEW {999534523}>\desktop-005\admin$ under the "admin" user.My Computer\{088e3905-0323-4b02-9826-5d99428e115f}\SysinternalsSuite.zip (mtime 2024-02-05T23:13:42); Row 61 — My Computer\{088e3905-0323-4b02-9826-5d99428e115f}\SysinternalsSuite (mtime 2024-02-05T23:14:42). Both under the "admin" user, accessed via the Downloads folder GUID.My Computer\{088e3905-0323-4b02-9826-5d99428e115f}\SysinternalsSuite (mtime 2023-11-04T15:33:16) under the "Administrator" user.Documents folders on remote hosts via C$: Alika.Solis\Documents on 10.44.24.8 (row 7), Emerson.Howe\Documents on 10.44.24.8 (row 9), Kyla.Dorsey\Documents on 10.44.24.8 (row 14), Drew.Giles\Documents on 10.44.24.1 (row 19), Charity.Hurst\Documents on 10.44.24.6 (row 24), Glenna.Jennings\Documents on 10.44.24.7 (row 29), Christian.Henry\Documents on 10.44.24.9 (row 34). Timestamps range from 2023-11-13 through 2024-01-25.My Computer\Desktop\important.zip (mtime 2024-02-07T04:04:00) under the "admin" user.My Computer\C:\Windows\System32 (mtime 2024-02-05T23:42:36) under the "admin" user.Control Panel\System and Security\Windows Firewall and associated property view under "Administrator."HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy) for rule changes; correlate with event log entries.C:\share\<username> and \Documents or \Downloads for approximately 30 individual users between 2023-09-24 and 2024-01-15.---
| IOC | Status | Evidence |
|---|---|---|
| redpetya.exe | Not Observed | No shellbag entry references redpetya.exe or any .exe file. Shellbags track folder navigation, not individual file access, so this is expected — the binary would not typically appear in shellbags unless browsed to in Explorer as a folder-like object. |
| PsExec | Observed (Indirect — HIGH confidence) | Sysinternals Suite (which contains PsExec) was downloaded and extracted by the "admin" account on 2024-02-05 (rows 60–61). Two ADMIN$ shares were browsed (rows 35, 66), which is the default share PsExec uses for remote service deployment. No direct shellbag entry for PsExec.exe itself, but the combination is strongly indicative. |
---
redpetya.exe, PsExec.exe, or any other specific file was opened, copied, or executed from this data alone. Required: Prefetch, Amcache, MFT, USN Journal, NTFS $LogFile.admin$ shares (rows 35, 66) have no mtime, so we cannot definitively place them in the attack timeline. Required: Correlate with Windows Security logs (Event ID 5140/5145) for share access times.No suspicious or non-standard executables were identified in this MUIcache dataset. All entries reference legitimate Windows system binaries, built-in administrative tools, or standard Windows Server role components. No third-party, unsigned, or anomalous binaries are present.
However, the following observations are contextually relevant to the investigation:
powershell_ise.exe under Administrator; Row 39 — powershell.exe under Administrator.Administrator and admin profiles.C:\Windows\regedit.exe, username Administrator.| IOC | Status | Detail |
|---|---|---|
redpetya.exe |
Not Observed | No MUIcache entry exists for redpetya.exe or any non-standard executable path. This is expected if the binary was executed non-interactively (e.g., via PsExec as a service), since MUIcache is populated by shell (Explorer) interaction, not service-based or command-line execution. |
PsExec |
Not Observed | No MUIcache entry for psexec.exe, PSEXESVC.exe, or any Sysinternals tool. Same caveat applies — PsExec typically runs from command line or remotely, which would not generate MUIcache entries. |
| Check | Result |
|---|---|
| Privilege escalation | Not assessable from MUIcache alone. |
| Credential access / Mimikatz | Not observed. No entries for mimikatz.exe, sekurlsa, procdump, or similar. |
| Malicious program execution | Not observed. All paths are standard Windows system locations. |
| Persistence / evasion | Not assessable. No unusual binaries or non-standard paths detected. |
| Lateral movement | Not observed directly, though this is a domain controller (AD DS, Kerberos KDC, DNS Server services all present), making it a HIGH-value lateral movement target. |
| Exfiltration | Not assessable from this artifact. |
redpetya.exe and PsExec are absent — their absence does not rule out execution.admin (237 records) and Administrator (318 records).** The admin account is non-default and should be investigated for legitimacy and whether it was created by the threat actor.redpetya.exe and PSEXESVC.exe execution evidence), Windows Event Logs (Security 4688 process creation, System 7045 service install for PsExec), NTFS $MFT/USN journal, and MBR/VBR for Petya bootloader modification.No suspicious findings were identified in the SAM user data. The four accounts present (Administrator RID 500, Guest RID 501, DefaultAccount RID 503, WDAGUtilityAccount RID 504) are all default Windows accounts with sequential, expected RIDs. No rogue or attacker-created local accounts are evident.
---
| IOC | Status | Detail |
|---|---|---|
redpetya.exe |
Not Assessable | SAM artifact contains no file or process execution data. |
psexec |
Not Assessable | SAM artifact contains no service or execution data. However, note that PsExec typically authenticates using existing credentials rather than creating new local accounts, so its absence here is expected regardless. |
---
lastlogin and lastpasswordset. Confidence: MEDIUM.SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Domain or SYSTEM\CurrentControlSet\Control\ComputerName). Cross-reference with Security Event Logs (Event IDs 4624/4625) for actual logon activity.---
| Check | Status |
|---|---|
| Unauthorized local account creation | Not detected – Only 4 default accounts; no RID ≥ 1000. |
| Privilege escalation (local accounts) | Not Assessable – Account flags (disabled/enabled, group membership) not available in this extract. |
| Credential access / Mimikatz-like | Not Assessable – Requires event logs, LSASS memory artifacts. |
| Malicious program execution | Not Assessable – Requires Prefetch, Amcache, ShimCache, event logs. |
| Persistence / Lateral movement / Exfiltration | Not Assessable – Requires registry Run keys, scheduled tasks, services, network artifacts. |
---
| Gap | Impact | Recommended Artifact |
|---|---|---|
| Account flags / group memberships not present | Cannot determine if Guest or DefaultAccount was enabled, or if any account was added to Administrators group. | Re-parse SAM with full flag extraction; examine SAM\Domains\Builtin\Aliases for group membership. |
| No logon history visible | All login timestamps are null; cannot confirm which account was used to deploy ransomware or run PsExec. | Windows Security Event Log (4624, 4625, 4648, 4672), or NTUSER.DAT LastLogon attributes. |
| SAM timestamps are from Sept 2023; incident is Feb 2024 | The SAM creation/modification timestamps (2023-09-24) likely reflect OS install date, not the incident window. No SAM changes occurred during the attack window, or changes are not captured here. | Correlate with $MFT timestamps for the SAM hive file to check last modification date. |
| Domain account activity invisible | If PsExec was used with domain credentials (common), this artifact would show nothing. | Domain controller Security logs, or this server's Security event log for logon type 3/2 events. |
No suspicious findings are present in this artifact because it contains zero records.
---
IOC Status
| IOC | Status | Detail |
|---|---|---|
redpetya.exe |
Not Assessable | The Defender Quarantine artifact is empty; no quarantine entries exist to confirm or deny detection of this binary. |
psexec (PsExec) |
Not Assessable | No quarantine entries exist to confirm or deny detection of PsExec or related tools. |
---
Data Gaps
Microsoft-Windows-Windows Defender/Operational log around 12 Feb 2024.HKLM\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware and Real-Time Protection keys for evidence of Defender being forcibly disabled.redpetya.exe and any PsExec-related artifacts (PSEXESVC.exe, named pipes).redpetya.exe, psexec.exe, or PSEXESVC.exe.PSEXESVC service, which is the hallmark of PsExec lateral movement.| Timestamp | Action | Details |
|---|---|---|
| 2026-02-18T20:02:13.342Z | case_created | {"case_id": "d136f13f-a881-4b51-b432-3fb1582dbf15","creation_time": "2026-02-18T20:02:13Z","name": "Case 2026-02-18 21:02:13"} |
| 2026-02-18T20:02:24.923Z | evidence_intake | {"dissect_path": "E:\\Foraic\\test_data\\20240212-decrypted-Windows_Server_2022.E01","file_size_bytes": 1572845047,"filename": "20240212-decrypted-Windows_Server_2022.E01","md5": "6f912bbaa1500f4556bd6b4fa8466f02","sha256": "4754c592d2835f24334d018aca07cf04d185c16cfc974a6d983e915f571a24d7","source_mode": "path","source_path": "E:\\Foraic\\test_data\\20240212-decrypted-Windows_Server_2022.E01","stored_path": "","uploaded_files": []} |
| 2026-02-18T20:02:24.924Z | image_opened | {"available_artifacts": ["runkeys","tasks","services","cim","shimcache","amcache","bam","userassist","evtx","defender.evtx","mft","usnjrnl","recyclebin","browser.history","browser.downloads","activitiescache","sru.network_data","sru.application","shellbags","muicache","sam","defender.quarantine"],"domain": "branchoffice.example.com","hostname": "WIN-NI9FBK23SLO","os_version": "Windows Server 2022 Standard (NT 10.0) 20348.1850"} |
| 2026-02-18T20:02:30.022Z | parsing_started | {"artifact_key": "runkeys","artifact_name": "Run/RunOnce Keys","function": "runkeys"} |
| 2026-02-18T20:02:30.130Z | parsing_completed | {"artifact_key": "runkeys","artifact_name": "Run/RunOnce Keys","csv_path": "E:\\Foraic\\cases\\d136f13f-a881-4b51-b432-3fb1582dbf15\\parsed\\runkeys.csv","duration_seconds": 0.108289,"function": "runkeys","record_count": 4} |
| 2026-02-18T20:02:30.130Z | parsing_started | {"artifact_key": "tasks","artifact_name": "Scheduled Tasks","function": "tasks"} |
| 2026-02-18T20:02:34.189Z | parsing_completed | {"artifact_key": "tasks","artifact_name": "Scheduled Tasks","csv_path": "E:\\Foraic\\cases\\d136f13f-a881-4b51-b432-3fb1582dbf15\\parsed\\tasks.csv","duration_seconds": 4.058574,"function": "tasks","record_count": 469} |
| 2026-02-18T20:02:34.189Z | parsing_started | {"artifact_key": "services","artifact_name": "Services","function": "services"} |
| 2026-02-18T20:02:37.416Z | parsing_completed | {"artifact_key": "services","artifact_name": "Services","csv_path": "E:\\Foraic\\cases\\d136f13f-a881-4b51-b432-3fb1582dbf15\\parsed\\services.csv","duration_seconds": 3.226758,"function": "services","record_count": 2332} |
| 2026-02-18T20:02:37.416Z | parsing_started | {"artifact_key": "cim","artifact_name": "WMI Persistence","function": "cim"} |
| 2026-02-18T20:02:37.471Z | parsing_completed | {"artifact_key": "cim","artifact_name": "WMI Persistence","csv_path": "E:\\Foraic\\cases\\d136f13f-a881-4b51-b432-3fb1582dbf15\\parsed\\cim.csv","duration_seconds": 0.054912,"function": "cim","record_count": 0} |
| 2026-02-18T20:02:37.471Z | parsing_started | {"artifact_key": "shimcache","artifact_name": "Shimcache","function": "shimcache"} |
| 2026-02-18T20:02:48.372Z | parsing_completed | {"artifact_key": "shimcache","artifact_name": "Shimcache","csv_path": "E:\\Foraic\\cases\\d136f13f-a881-4b51-b432-3fb1582dbf15\\parsed\\shimcache.csv","duration_seconds": 10.900251,"function": "shimcache","record_count": 1390} |
| 2026-02-18T20:02:48.372Z | parsing_started | {"artifact_key": "amcache","artifact_name": "Amcache","function": "amcache"} |
| 2026-02-18T20:02:48.903Z | parsing_completed | {"artifact_key": "amcache","artifact_name": "Amcache","csv_path": "E:\\Foraic\\cases\\d136f13f-a881-4b51-b432-3fb1582dbf15\\parsed\\amcache.csv","duration_seconds": 0.531342,"function": "amcache","record_count": 615} |
| 2026-02-18T20:02:48.903Z | parsing_started | {"artifact_key": "bam","artifact_name": "BAM/DAM","function": "bam"} |
| 2026-02-18T20:02:48.927Z | parsing_completed | {"artifact_key": "bam","artifact_name": "BAM/DAM","csv_path": "E:\\Foraic\\cases\\d136f13f-a881-4b51-b432-3fb1582dbf15\\parsed\\bam.csv","duration_seconds": 0.023353,"function": "bam","record_count": 101} |
| 2026-02-18T20:02:48.927Z | parsing_started | {"artifact_key": "userassist","artifact_name": "UserAssist","function": "userassist"} |
| 2026-02-18T20:02:48.959Z | parsing_completed | {"artifact_key": "userassist","artifact_name": "UserAssist","csv_path": "E:\\Foraic\\cases\\d136f13f-a881-4b51-b432-3fb1582dbf15\\parsed\\userassist.csv","duration_seconds": 0.032044,"function": "userassist","record_count": 101} |
| 2026-02-18T20:02:48.959Z | parsing_started | {"artifact_key": "recyclebin","artifact_name": "Recycle Bin","function": "recyclebin"} |
| 2026-02-18T20:02:48.972Z | parsing_completed | {"artifact_key": "recyclebin","artifact_name": "Recycle Bin","csv_path": "E:\\Foraic\\cases\\d136f13f-a881-4b51-b432-3fb1582dbf15\\parsed\\recyclebin.csv","duration_seconds": 0.012638,"function": "recyclebin","record_count": 2} |
| 2026-02-18T20:02:48.972Z | parsing_started | {"artifact_key": "browser.history","artifact_name": "Browser History","function": "browser.history"} |
| 2026-02-18T20:02:49.747Z | parsing_completed | {"artifact_key": "browser.history","artifact_name": "Browser History","csv_path": "E:\\Foraic\\cases\\d136f13f-a881-4b51-b432-3fb1582dbf15\\parsed\\browser.history.csv","duration_seconds": 0.774941,"function": "browser.history","record_count": 60} |
| 2026-02-18T20:02:49.748Z | parsing_started | {"artifact_key": "browser.downloads","artifact_name": "Browser Downloads","function": "browser.downloads"} |
| 2026-02-18T20:02:50.121Z | parsing_completed | {"artifact_key": "browser.downloads","artifact_name": "Browser Downloads","csv_path": "E:\\Foraic\\cases\\d136f13f-a881-4b51-b432-3fb1582dbf15\\parsed\\browser.downloads.csv","duration_seconds": 0.373891,"function": "browser.downloads","record_count": 4} |
| 2026-02-18T20:02:50.121Z | parsing_started | {"artifact_key": "activitiescache","artifact_name": "Activities Cache","function": "activitiescache"} |
| 2026-02-18T20:02:50.153Z | parsing_completed | {"artifact_key": "activitiescache","artifact_name": "Activities Cache","csv_path": "E:\\Foraic\\cases\\d136f13f-a881-4b51-b432-3fb1582dbf15\\parsed\\activitiescache.csv","duration_seconds": 0.0318,"function": "activitiescache","record_count": 0} |
| 2026-02-18T20:02:50.154Z | parsing_started | {"artifact_key": "sru.network_data","artifact_name": "SRUM Network Data","function": "sru.network_data"} |
| 2026-02-18T20:02:50.188Z | parsing_completed | {"artifact_key": "sru.network_data","artifact_name": "SRUM Network Data","csv_path": "E:\\Foraic\\cases\\d136f13f-a881-4b51-b432-3fb1582dbf15\\parsed\\sru.network_data.csv","duration_seconds": 0.034187,"function": "sru.network_data","record_count": 0} |
| 2026-02-18T20:02:50.188Z | parsing_started | {"artifact_key": "sru.application","artifact_name": "SRUM Application","function": "sru.application"} |
| 2026-02-18T20:03:17.611Z | parsing_completed | {"artifact_key": "sru.application","artifact_name": "SRUM Application","csv_path": "E:\\Foraic\\cases\\d136f13f-a881-4b51-b432-3fb1582dbf15\\parsed\\sru.application.csv","duration_seconds": 27.42267,"function": "sru.application","record_count": 73965} |
| 2026-02-18T20:03:17.611Z | parsing_started | {"artifact_key": "shellbags","artifact_name": "Shellbags","function": "shellbags"} |
| 2026-02-18T20:03:17.723Z | parsing_completed | {"artifact_key": "shellbags","artifact_name": "Shellbags","csv_path": "E:\\Foraic\\cases\\d136f13f-a881-4b51-b432-3fb1582dbf15\\parsed\\shellbags.csv","duration_seconds": 0.111992,"function": "shellbags","record_count": 203} |
| 2026-02-18T20:03:17.724Z | parsing_started | {"artifact_key": "muicache","artifact_name": "MUIcache","function": "muicache"} |
| 2026-02-18T20:03:17.826Z | parsing_completed | {"artifact_key": "muicache","artifact_name": "MUIcache","csv_path": "E:\\Foraic\\cases\\d136f13f-a881-4b51-b432-3fb1582dbf15\\parsed\\muicache.csv","duration_seconds": 0.102423,"function": "muicache","record_count": 596} |
| 2026-02-18T20:03:17.826Z | parsing_started | {"artifact_key": "sam","artifact_name": "SAM Users","function": "sam"} |
| 2026-02-18T20:03:17.831Z | parsing_completed | {"artifact_key": "sam","artifact_name": "SAM Users","csv_path": "E:\\Foraic\\cases\\d136f13f-a881-4b51-b432-3fb1582dbf15\\parsed\\sam.csv","duration_seconds": 0.004909,"function": "sam","record_count": 8} |
| 2026-02-18T20:03:17.831Z | parsing_started | {"artifact_key": "defender.quarantine","artifact_name": "Defender Quarantine","function": "defender.quarantine"} |
| 2026-02-18T20:03:17.839Z | parsing_completed | {"artifact_key": "defender.quarantine","artifact_name": "Defender Quarantine","csv_path": "E:\\Foraic\\cases\\d136f13f-a881-4b51-b432-3fb1582dbf15\\parsed\\defender.quarantine.csv","duration_seconds": 0.008298,"function": "defender.quarantine","record_count": 0} |
| 2026-02-18T20:04:54.845Z | prompt_submitted | {"prompt": "On 12th Feb 2024 we discovered the server was no longer responding with 'Red Petya' ransomware displayed on the screen. We suspect PsExec might have been used. We also found the binary redpetya.exe on a different server. Look for any suspicious behaviour aside from these two IOC's."} |
| 2026-02-18T20:04:55.319Z | analysis_started | {"artifact_key": "runkeys","artifact_name": "Run/RunOnce Keys","model": "claude-opus-4-6","provider": "claude"} |
| 2026-02-18T20:05:14.754Z | analysis_completed | {"artifact_key": "runkeys","artifact_name": "Run/RunOnce Keys","duration_seconds": 19.433992,"status": "success","token_count": 627} |
| 2026-02-18T20:05:14.755Z | analysis_started | {"artifact_key": "tasks","artifact_name": "Scheduled Tasks","model": "claude-opus-4-6","provider": "claude"} |
| 2026-02-18T20:06:06.332Z | analysis_completed | {"artifact_key": "tasks","artifact_name": "Scheduled Tasks","duration_seconds": 51.576806,"status": "success","token_count": 1876} |
| 2026-02-18T20:06:06.342Z | analysis_started | {"artifact_key": "services","artifact_name": "Services","model": "claude-opus-4-6","provider": "claude"} |
| 2026-02-18T20:06:42.102Z | analysis_completed | {"artifact_key": "services","artifact_name": "Services","duration_seconds": 35.758696,"status": "success","token_count": 1254} |
| 2026-02-18T20:06:42.120Z | analysis_started | {"artifact_key": "cim","artifact_name": "WMI Persistence","model": "claude-opus-4-6","provider": "claude"} |
| 2026-02-18T20:08:43.388Z | analysis_completed | {"artifact_key": "cim","artifact_name": "WMI Persistence","duration_seconds": 121.265565,"status": "success","token_count": 600} |
| 2026-02-18T20:08:43.388Z | analysis_started | {"artifact_key": "shimcache","artifact_name": "Shimcache","model": "claude-opus-4-6","provider": "claude"} |
| 2026-02-18T20:10:00.097Z | analysis_completed | {"artifact_key": "shimcache","artifact_name": "Shimcache","duration_seconds": 76.707852,"status": "success","token_count": 2963} |
| 2026-02-18T20:10:00.106Z | analysis_started | {"artifact_key": "amcache","artifact_name": "Amcache","model": "claude-opus-4-6","provider": "claude"} |
| 2026-02-18T20:12:10.909Z | analysis_completed | {"artifact_key": "amcache","artifact_name": "Amcache","duration_seconds": 130.800319,"status": "success","token_count": 2475} |
| 2026-02-18T20:12:10.918Z | analysis_started | {"artifact_key": "bam","artifact_name": "BAM/DAM","model": "claude-opus-4-6","provider": "claude"} |
| 2026-02-18T20:13:04.479Z | analysis_completed | {"artifact_key": "bam","artifact_name": "BAM/DAM","duration_seconds": 53.560782,"status": "success","token_count": 2095} |
| 2026-02-18T20:13:04.481Z | analysis_started | {"artifact_key": "userassist","artifact_name": "UserAssist","model": "claude-opus-4-6","provider": "claude"} |
| 2026-02-18T20:14:17.169Z | analysis_completed | {"artifact_key": "userassist","artifact_name": "UserAssist","duration_seconds": 72.685919,"status": "success","token_count": 2631} |
| 2026-02-18T20:14:17.171Z | analysis_started | {"artifact_key": "recyclebin","artifact_name": "Recycle Bin","model": "claude-opus-4-6","provider": "claude"} |
| 2026-02-18T20:14:48.892Z | analysis_completed | {"artifact_key": "recyclebin","artifact_name": "Recycle Bin","duration_seconds": 31.721189,"status": "success","token_count": 1156} |
| 2026-02-18T20:14:48.893Z | analysis_started | {"artifact_key": "browser.history","artifact_name": "Browser History","model": "claude-opus-4-6","provider": "claude"} |
| 2026-02-18T20:16:03.960Z | analysis_completed | {"artifact_key": "browser.history","artifact_name": "Browser History","duration_seconds": 75.064779,"status": "success","token_count": 3197} |
| 2026-02-18T20:16:03.961Z | analysis_started | {"artifact_key": "browser.downloads","artifact_name": "Browser Downloads","model": "claude-opus-4-6","provider": "claude"} |
| 2026-02-18T20:16:40.847Z | analysis_completed | {"artifact_key": "browser.downloads","artifact_name": "Browser Downloads","duration_seconds": 36.883918,"status": "success","token_count": 1517} |
| 2026-02-18T20:16:40.848Z | analysis_started | {"artifact_key": "activitiescache","artifact_name": "Activities Cache","model": "claude-opus-4-6","provider": "claude"} |
| 2026-02-18T20:16:58.886Z | analysis_completed | {"artifact_key": "activitiescache","artifact_name": "Activities Cache","duration_seconds": 18.037929,"status": "success","token_count": 608} |
| 2026-02-18T20:16:58.887Z | analysis_started | {"artifact_key": "sru.network_data","artifact_name": "SRUM Network Data","model": "claude-opus-4-6","provider": "claude"} |
| 2026-02-18T20:17:18.500Z | analysis_completed | {"artifact_key": "sru.network_data","artifact_name": "SRUM Network Data","duration_seconds": 19.612995,"status": "success","token_count": 688} |
| 2026-02-18T20:17:18.501Z | analysis_started | {"artifact_key": "sru.application","artifact_name": "SRUM Application","model": "claude-opus-4-6","provider": "claude"} |
| 2026-02-18T20:18:20.502Z | analysis_completed | {"artifact_key": "sru.application","artifact_name": "SRUM Application","duration_seconds": 62.000007,"status": "success","token_count": 2229} |
| 2026-02-18T20:18:21.112Z | analysis_started | {"artifact_key": "shellbags","artifact_name": "Shellbags","model": "claude-opus-4-6","provider": "claude"} |
| 2026-02-18T20:19:30.468Z | analysis_completed | {"artifact_key": "shellbags","artifact_name": "Shellbags","duration_seconds": 69.354947,"status": "success","token_count": 2785} |
| 2026-02-18T20:19:30.471Z | analysis_started | {"artifact_key": "muicache","artifact_name": "MUIcache","model": "claude-opus-4-6","provider": "claude"} |
| 2026-02-18T20:20:03.243Z | analysis_completed | {"artifact_key": "muicache","artifact_name": "MUIcache","duration_seconds": 32.770092,"status": "success","token_count": 1065} |
| 2026-02-18T20:20:03.248Z | analysis_started | {"artifact_key": "sam","artifact_name": "SAM Users","model": "claude-opus-4-6","provider": "claude"} |
| 2026-02-18T20:20:31.034Z | analysis_completed | {"artifact_key": "sam","artifact_name": "SAM Users","duration_seconds": 27.785881,"status": "success","token_count": 939} |
| 2026-02-18T20:20:31.035Z | analysis_started | {"artifact_key": "defender.quarantine","artifact_name": "Defender Quarantine","model": "claude-opus-4-6","provider": "claude"} |
| 2026-02-18T20:20:49.518Z | analysis_completed | {"artifact_key": "defender.quarantine","artifact_name": "Defender Quarantine","duration_seconds": 18.482375,"status": "success","token_count": 631} |
| 2026-02-18T20:20:49.519Z | analysis_started | {"artifact_key": "cross_artifact_summary","artifact_name": "Cross-Artifact Summary","model": "claude-opus-4-6","provider": "claude"} |
| 2026-02-18T20:23:03.354Z | analysis_completed | {"artifact_key": "cross_artifact_summary","artifact_name": "Cross-Artifact Summary","duration_seconds": 133.832804,"status": "success","token_count": 4892} |
| 2026-02-18T20:25:16.076Z | hash_verification | {"computed_sha256": "4754c592d2835f24334d018aca07cf04d185c16cfc974a6d983e915f571a24d7","expected_sha256": "4754c592d2835f24334d018aca07cf04d185c16cfc974a6d983e915f571a24d7","match": true,"verification_path": "E:\\Foraic\\test_data\\20240212-decrypted-Windows_Server_2022.E01"} |