Simulate a workstation compromise by malware; practice detection, containment, forensic evidence collection, eradication, recovery, and reporting.
At 09:08 local time a user reports that their machine is slow and a browser window keeps redirecting to an unfamiliar site. EDR has generated an alert: “Suspicious child process spawned from Word” and the mail gateway logged delivery of an attachment Invoice_447.docx at 09:02. Network proxy logs show outbound HTTP connections to 198.51.100.70 starting at 09:05.
(These are handed out as files or log excerpts; instructors can paste in chat or load into the SIEM.)
2025-10-08T09:02:12Z msgid=abc123 from=spoof@vendor.com to=user@corp.local subj="Invoice 447" attachment=Invoice_447.docx action=DELIVER
2025-10-08T09:05:20Z Host=WIN-01 AlertID=EDR-9342 Description="Process spawn: winword.exe -> cmd.exe -> powershell.exe -EncodedCommand" Severity=High
2025-10-08T09:05:28 10.0.0.25 -> 198.51.100.70 :80 GET /update/check
2025-10-08T09:06:05 10.0.0.25 -> 198.51.100.70 :80 POST /upload Content-Length=2,560,000
PID Description
1000 System Idle
2480 explorer.exe
3156 winword.exe
3301 cmd.exe
3333 powershell.exe -EncodedCommand
4012 svchost.exe
C:\Users\user\Downloads\Invoice_447.docx
C:\Windows\Temp\payload.exe
C:\Users\user\AppData\Roaming\config.tmp (recent write)
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaabbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbWork through these and document each action in the incident log.
C:\> procdump -ma 3333 C:\evidence\powershell_3333.dmpC:\> mimikatz.exe "privilege::debug" "sekurlsa::logonpasswords" exit > C:\evidence\creds.txt (in controlled lab only)scp win-memory.raw analyst@10.0.0.50:/evidence/tasklist / Get-Process).HKCU\Software\Microsoft\Windows\CurrentVersion\Run).Get-Content (Get-PSReadlineOption).HistorySavePath.Get-FileHash C:\Windows\Temp\payload.exe -Algorithm SHA256Copy-Item C:\Windows\Temp\payload.exe \\evidence\host-win01\198.51.100.70.Invoice_447.docx delivered; Word spawned cmd.exe -> powershell.exe; unknown payload.exe in C:\Windows\Temp; outbound POST with large content to 198.51.100.70.payload.exe → payload staged config (config.tmp) → data staged and exfiltrated via HTTP POST.Windows (run as admin; lab only):
tasklist /v > C:\evidence\tasklist.txtnetstat -ano > C:\evidence\netstat.txtGet-FileHash C:\Windows\Temp\payload.exe -Algorithm SHA256 | Out-File C:\evidence\hash_payload.txtreg export "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" C:\evidence\run_hkcu.regCopy-Item C:\Windows\Temp\payload.exe -Destination \\evidence\host-win01\payload.exeLinux analyst workstation (examples):
tcpdump -w capture.pcap host 10.0.0.25 and not port 22sha256sum payload.exevolatility -f win-memory.raw --profile=Win10x64_19041 pslistSafety note: Only collect memory and run intrusive tools inside controlled lab environments. Don’t run suspicious binaries on analyst machines.
Pass = ≥ 75 / 100
198.51.100.70 (malicious C2 / exfil domain)spoof@vendor.com and vendor.com (sending domain)payload.exe SHA256: aaaaaaaa...config.tmp SHA256: bbbbbbbb.../update/check and /upload(These are lab values — replace with real IOCs in production.)