Investigation Overview
The Elevating Movement room simulates a post-compromise forensic investigation at DeceptiTech following a network collapse. This scenario focuses on the second attack stage where an attacker, having gained initial access, performs privilege escalation and lateral movement on a Windows server (SRV-IT-QA) that was compromised through Emily's stolen credentials.
The investigation requires analyzing Windows forensic artifacts including Event Logs, file system artifacts, process memory analysis, and timeline reconstruction to determine the attacker's movements and techniques.
Task 1: Introduction & Scenario Context
Background
DeceptiTech operates a hybrid infrastructure with:
On-Premises: Traditional Active Directory domain (~50 users)
Cloud Platform: AWS-hosted product platform (isolated)
The attack unfolded in multiple stages. This room focuses on Stage #2, where the attacker leveraged stolen credentials from Emily Ross (compromised in Stage #1) to access SRV-IT-QA, a QA server where Emily holds local admin privileges.
Key Attack Details
Pre-Investigation Facts:
Emily's domain credentials were stolen
The server became "unstable" after motherboard replacement (suspicious timing)
Emily accessed the machine with local admin account
Other IT administrators frequently log in
The attacker had access on Monday, Day 4
Task 2: Windows Forensic Investigation
Question 1: RDP Login Detection
Question: When did the attacker perform RDP login on the server?
Answer: 2025-06-30 16:33:18

