Constellation
CHALLENGE DESCRIPTION
The SOC team has recently been alerted to the potential existence of an insider threat. The suspect employee’s workstation has been secured and examined. During the memory analysis, the Senior DFIR Analyst succeeded in extracting several intriguing URLs from the memory. These are now provided to you for further analysis to uncover any evidence, such as indications of data exfiltration or contact with malicious entities. Should you discover any information regarding the attacking group or individuals involved, you will collaborate closely with the threat intelligence team. Additionally, you will assist the Forensics team in creating a timeline. Warning : This Sherlock will require an element of OSINT and some answers can be found outside of the provided artifacts to complete fully.
SOLUTION
When did the suspect first start Direct Message (DM) conversations with the external entity (A possible threat actor group which targets organizations by paying employees to leak sensitive data)? (UTC)
Let try exiftool
on both files, try to input the date we have. But nothing happed.
So I serach on Google and find out that there is a URL forensic
called Unfurl
So we have 2 links in IOC.txt
, let analyze them. Copy and paste first link
Answer
2023-09-16 16:03:37What was the name of the file sent to the suspected insider threat?
Answer
NDA_Instructions.pdfWhen was the file sent to the suspected insider threat? (UTC)
Answer
2023-09-27 05:27:02The suspect utilised Google to search something after receiving the file. What was the search query?
Answer
how to zip a folder using tar in linuxThe suspect originally typed something else in search tab, but found a Google search result suggestion which they clicked on. Can you confirm which words were written in search bar by the suspect originally?
Answer
When was this Google search made? (UTC)
Copy and paste second link
Answer
2023-09-27 05:31:45What is the name of the Hacker group responsible for bribing the insider threat?
Open pdf
file
Answer
AntiCorp Gr04pWhat is the name of the person suspected of being an Insider Threat?
Answer
Karen RileyWhat is the anomalous stated creation date of the file sent to the insider threat? (UTC)
Using exiftool
1
exiftool NDA_Instructions.pdf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
ExifTool Version Number : 13.10
File Name : NDA_Instructions.pdf
Directory : .
File Size : 26 kB
File Modification Date/Time : 2024:03:05 05:02:19-05:00
File Access Date/Time : 2025:05:23 11:46:39-04:00
File Inode Change Date/Time : 2025:05:23 11:44:16-04:00
File Permissions : -rw-rw-r--
File Type : PDF
File Type Extension : pdf
MIME Type : application/pdf
PDF Version : 1.7
Linearized : No
Page Count : 1
Producer : AntiCorp PDF FW
Create Date : 2054:01:17 22:45:22+01:00
Title : KarenForela_Instructions
Author : CyberJunkie@AntiCorp.Gr04p
Creator : AntiCorp
Modify Date : 2054:01:17 22:45:22+01:00
Subject : Forela_Mining stats and data campaign (Stop destroying env)
We will see Create Date
field, but it is +01:00, so minus to get flag.
Answer
2054-01-17 21:45:22The Forela threat intel team are working on uncovering this incident. Any OpSec mistakes made by the attackers are crucial for Forela’s security team. Try to help the TI team and confirm the real name of the agent/handler from Anticorp.
Search AntiCorp Gr04p
on Google and we will get the flag for 2 last questions.
Answer
Abdullah Al SajjadWhich City does the threat actor belong to?