holiday-hack-challenge-2023

SANS Holiday Hack Challenge

View on GitHub

kql-kraken-hunt drawingdrawingdrawingdrawingdrawing

< Back Home

Objective

Use Azure Data Explorer to uncover misdeeds in Santa’s IT enterprise. Go to Film Noir Island and talk to Tangle Coalbox for more information/

Conversations

Tangle Colabox

Initial conversation:

Hints

Useful AI Prompts

Approach

Straight forward just brush up on KQL skills first:

Case 1:

Email
| where link == 'http://madelvesnorthpole.org/published/search/MonthlyInvoiceForReindeerFood.docx'
| project recipient, sender, subject

"recipient": alabaster_snowball@santaworkshopgeeseislands.org,
"sender": cwombley@gmail.com,
"subject": [EXTERNAL] Invoice foir reindeer food past due

Case 2:

Email
| where link == 'http://madelvesnorthpole.org/published/search/MonthlyInvoiceForReindeerFood.docx'
| join kind = inner Employees on $left.recipient == $right.email_addr
| project role, hostname, ip_addr

"role": Head Elf,
"hostname": Y1US-DESKTOP,
"ip_addr": 10.10.0.4

Case 3:

OutboundNetworkEvents
| join kind = inner Employees on $left.src_ip == $right.ip_addr
| where url == 'http://madelvesnorthpole.org/published/search/MonthlyInvoiceForReindeerFood.docx'
| project timestamp

"timestamp": 2023-12-02T10:12:42Z
FileCreationEvents
| where hostname == "Y1US-DESKTOP"
| where timestamp >= todatetime("2023-12-02T09:37:40Z")
| order by timestamp asc
| project path

"path": C:\ProgramData\Windows\Jolly\giftwrap.exe

Case 4:

ProcessEvents
| where hostname == "Y1US-DESKTOP"
| where timestamp >= todatetime("2023-12-02T10:12:42Z")
| order by timestamp asc

This one takes a little detective work, but here is what I found:

113.37.9.17
2023-12-02T16:51:44Z
NorthPolefileshare

Case 5:

ProcessEvents
| where hostname == "Y1US-DESKTOP"
| where timestamp >= todatetime("2023-12-02T10:12:42Z")
| order by timestamp asc

This one takes a little detective work, but here is what I found:

2023-12-24T16:07:47Z
NaughtyNiceList.txt
giftbox.com

Case 6:

ProcessEvents
| where hostname == "Y1US-DESKTOP"
| where timestamp >= todatetime("2023-12-02T10:12:42Z")
| order by timestamp asc

This one takes a little detective work and pulling data out and examining it, but here is what I found:

downwithsanta.exe
--wipeall

Once Complete:

Once complete with all the cases, to get credit I need to enter the secret phrase:

print base64_decode_tostring('QmV3YXJlIHRoZSBDdWJlIHRoYXQgV29tYmxlcw==')

Which decodes to:

Beware the Cube that Wombles

Resources

Kusto SANS 2023