# Evaluation Challenge Write Up
## What is the name of the computer?

Computer Name : **DESKTOP-SUMKS54**
Path : SYSTEM\ControlSet001\Control\ComputerName\ComputerName
Location of the artifact :
* Evidence.E01\Basic data partition (3) [40630MB]\NONAME [NTFS]\[root]\Windows\System32\config\SYSTEM
Tools Used :
* FTK imager
* Registry Explorer
## Who dropped the suspicious binary to disk?

**Craig Johnson** dropped the binary to disk
Path : Software\Microsoft\Windows\CurrentVersion\Run

Event Log : Security.evtx
From the above figure we can come to know that **Craig Johnson** executed the malicious scipt and dropped the binary into the disk
Location of the artifacts :
* Evidence.E01\Basic data partition (3) [40630MB]\NONAME [NTFS]\[root]\Users\Craig Johnson\NTUSER.DAT
* Evidence.E01\Basic data partition (3) [40630MB]\NONAME [NTFS]\[root]\Windows\System32\winevt\Logs\Security.evtx
Tools Used :
* FTK imager
* Registry Explorer
* Event viewer
## Where was the suspicious binary acquired from?
The suspicious binary was acquired from Downloads folder of **Craig Johnson**

Path :
* Evidence.E01\Basic data partition (3) [40630MB]\NONAME [NTFS]\[root]\Users\Craig Johnson\Downloads\malicious.exe
Tool Used :
* FTK imager
* Registry Explorer
## When were the user account Alissa Miller & Ravi created?

Alissa Miller profile was created on **2022-04-09 09:07:27**
Ravi profile was created on **2022-04-09 09:07:59**
Location of the artifact :
* Evidence.E01\Basic data partition (3) [40630MB]\NONAME [NTFS]\[root]\Windows\System32\config\SAM
Path : SAM\Domains\Account\Users
Tool Used :
* FTK imager
* Registry Explorer
## How many times the user Alissa Miller enter wrong password during login?

**5** times Alissa miller entered wrong password
Using event ID(4625) we can filter no.of times the login was failed and then search for Account Name : Alissa Miller
Location of the Artifact :
* Evidence.E01\Basic data partition (3) [40630MB]\NONAME [NTFS]\[root]\Windows\System32\winevt\Logs\Security.evtx
Tools Used :
* FTK imager
* Event viewer
## There is another suspicious binary present on disk. What is the IP from which it was downloaded?
The suspicious binary present on the disk is downloded with the ip address **192.168.56.1**

The above snippet was taken from **_Microsoft-Windows-PowerShell%4Operational_** event log we can see that malware2.exe is being downloded from the website with the ip address 192.168.56.1
Location of the Artifact :
* Evidence.E01\Basic data partition (3) [40630MB]\NONAME [NTFS]\[root]\Windows\System32\winevt\Logs\Microsoft-Windows-PowerShell%4Operational.evtx
Tools Used :
* Event viewer
* FTK imager
## Does any of the suspicious binary have persistence in the system. Please provide all the details you can.
Yes the suspicious binary have persistence in the system it is accessing many important parts of the OS like powershell,cmd


Once accessing the powershell,cmd prompt can give whole access to the system. So,the suspicious binary have persistance in the system.
Location of the Artifact :
* Evidence.E01\Basic data partition (3) [40630MB]\NONAME [NTFS]\[root]\Windows\System32\winevt\Logs\Security.evtx
Tools Used :
* FTK imager
* Event viewer
## How many times was the original suspicious binary run & what are the timestamps of both the executions?
malicious.exe was executed **2** times

In secuirty.evtx log we can filter the ran executable files with the help of event ID 4688 and then using the option _save all events in custom view as csv_ using any csv opener open and then searching for _malcious.exe_ gives us the count of no.of times the `malicious.exe` was executed.
**Timestamps of both the execution**
```TimeCreated
[ SystemTime] 2022-04-09T09:31:50.8154385Z
EventRecordID 75238
```
```- TimeCreated
[ SystemTime] 2022-04-09T09:31:47.0587933Z
EventRecordID 75225
```
Location of the Artifact :
* Evidence.E01\Basic data partition (3) [40630MB]\NONAME [NTFS]\[root]\Windows\System32\winevt\Logs\Security.evtx
Tools Used :
* FTK imager
* Event viewer
## Did the other suspicious binary execute in the system?
Yes,it was executed **1** times.

In secuirty.evtx log we can filter the ran executable files with the help of event ID 4688 and then using the option _save all events in custom view as csv_ using any csv opener open and then searching for malware2.exe gives us the count of no.of times the malware2.exe was executed.
```TimeCreated
[ SystemTime] 2022-04-09T09:31:51.2263011Z
EventRecordID 75258
```
Location of the Artifact :
* Evidence.E01\Basic data partition (3) [40630MB]\NONAME [NTFS]\[root]\Windows\System32\winevt\Logs\Security.evtx
Tools Used :
* FTK imager
* Event viewer
## When was the file “World Hello.txt” renamed to its current name?

The above snippet was taken from NETUSER.dat of User Ravi in NETUSER.dat it stores all the information related to that particular user. In the recent documents key we can find there is only one text file which was last accessed at 2022-04-09 09:28:24.
Path : Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs\.txt

The above picture shows the Documents dir of user : ravi in which we can find the _.txt_ which was last modified on 09-04-2022 09:28:33
The above mentioned both are same files if they are different files then in NETUSER.dat of ravi under recent docs we could found two different keys but there is only one. So `Hello World.txt` was renamed to `World Hello.txt` at
**09-04-2022 09:28:33**
Location of the Artifact :
* Evidence.E01\Basic data partition (3) [40630MB]\NONAME [NTFS]\[root]\Users\Ravi\NTUSER.DAT
Tools Used :
* FTK imager
* Regsitry Explorer