SOC Analyst Technical Assessment
SOC Analyst Technical Assessment
Assignment Components
Part 1: SIEM Alert Analysis
Alert 1 :
1. True Positive
2. Brute Force Attack
3. Block the source IP (203.0.113.42) . Investigate if any login attempt was successful.
4. Priority : Critical
Alert 2 :
1. False Positive
2. User reported IT was helping him troubleshoot an application issue today
3. Host: WORKSTATION-FINANCE42
4. User: james.wilson
5. Priority : Low
Alert 3 :
1. False Positive
2. Priority : Low
3. still need to investigate
Alert 4 :
Malware Detection
1. True Positive
2. Phishing Email Attack
3. Check for any other files downloaded from the same sender. Alert the email
security team to block emails from supplierxyz-invoices.com
4. Priority : High
Alert 5 :
Account lockout
1. False positive
2. Priority : Low
3. Device: Recognized device
4. User: admin.helpdesk
The attacker is checking if they can access the /c admin share on 10.10.15.5.
Summary:
Potential Impact:
Disconnect compromised servers and workstations from the network. Disable file
transferring protocols like SMB.
Determine how many systems are affected.
Determine how it can affect the business.
File-Based Indicators
Extension : .locked.
Malicious file : invoice_payment.pdf.exe.
Payment : 5 Bitcoin
Network-Based Indicators
URL : .onion
Unusual SMB activity
Email-Based Indicators
The phishing email sent to multiple accounting department employees.
Remediation Recommendations
1. Executive Summary
At 4:30 AM this morning, several employees reported that they could not access files.
Investigation verified a ransomware attack on several Windows servers and
workstations. Attackers requested payment in Bitcoin and encrypted files with the
".locked" extension. The ransomware is believed to have entered through a phishing
email sent to accounting department staff and laterally spread using the SMB
protocol. Containment measures have been taken immediately, and a recovery plan is
being implemented.
Short-Term Actions:
Conclusion
The ransomware attack points to better email security, employee education, and
network protections. Containment steps are implemented immediately, and recovery
is ongoing. Enhancing cybersecurity controls will be critical in reducing future risks.
Next Steps
By mohammed k
mohammedbilal.k313@gmail.com
+91 7736762947