[Workshop] Investigating Ransomware
This is a hands-on workshop designed to improve the skills of any cyber incident response professional.
Welcome
Download Cyber Triage
Download the Case File
Installing Cyber Triage & Loading the Case File
Issues / Problems
Which version of Windows is installed?
Are there any Windows settings that are misconfigured?
Are there any known RCE vulnerabilitiles in the OS or running applications?
How did the attacker most likely get in?
What is the name of the suspicious binary?
Approximately what date and time was the initial access?
In which directory did the attacker store their tools?
Bonus: Why do attackers frequently use that directory?
Which command and control malware was installed?
Which ransomware was installed?
What is the path and filename of the C2 malware?
What date and time was the C2 malware created on the victim host?
What is the call-back IP address for the C2 malware?
What is the path and filename of the ransomware?
What date and time was the ransomware created on the victim host?
What is the path and filename of the startup item created by Wannacry?
What is the Bitcoin address the ransomers are using?