chainsaw hunt -s /opt/sigma --skip-errors -r /opt/chainsaw/rules -m /opt/chainsaw/mappings/sigma-event-logs-all.yml -o chainsaw.hunt.log /home/nakul/Desktop/ctf/htb-sherlocks/ticktock/Collection/C/Windows/System32/winevt/logs/
for log in $(ls /home/nakul/Desktop/ctf/htb-sherlocks/ticktock/Collection/C/Windows/System32/winevt/logs); do
chainsaw dump --skip-errors -o $log.json --json "/home/nakul/Desktop/ctf/htb-sherlocks/ticktock/Collection/C/Windows/System32/winevt/logs/$log"
done
cat Microsoft-Windows-Sysmon%4Operational.evtx.json | grep EventID | sort -n | uniq -c | sort -n
1 "EventID": 16,
1 "EventID": 4,
1 "EventID": 8,
6 "EventID": 15,
44 "EventID": 2,
76 "EventID": 5,
198 "EventID": 12,
296 "EventID": 1,
432 "EventID": 22,
448 "EventID": 3,
881 "EventID": 13,
1376 "EventID": 11,
jq -c '.[]' Microsoft-Windows-Sysmon%4Operational.evtx.json| grep 'EventID":16'|jq .
Event ID 16 is for ServiceConfigurationChange
Installed sysmon
Event ID 22 is for DNS
jq -c '.[]' Microsoft-Windows-Sysmon%4Operational.evtx.json| grep 'EventID":16'|jq . | grep QueryName
jq -c '.[]' Microsoft-Windows-Sysmon%4Operational.evtx.json| grep powershell | jq .
"Event": {
"EventData": {
"CommandLine": "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe -e JABTAGUAYwB1AHIAZQBTAHQ
AcgBpAG4AZwAgAD0AIABDAG8AbgB2AGUAcgB0AFQAbwAtAFMAZQBjAHUAcgBlAFMAdAByAGkAbgBnACAAIgByAGUAYQBsAGwAeQBsAG8AbgBnAH
AAYQBzAHMAdwBvAHIAZAAiACAALQBBAHMAUABsAGEAaQBuAFQAZQB4AHQAIAAtAEYAbwByAGMAZQAKAEUAbgBhAGIAbABlAC0AQgBpAHQATABvA
GMAawBlAHIAIAAtAE0AbwB1AG4AdABQAG8AaQBuAHQAIAAiAEMAOgAiACAALQBFAG4AYwByAHkAcAB0AGkAbwBuAE0AZQB0AGgAbwBkACAAQQBl
AHMAMgA1ADYAIAAtAFUAcwBlAGQAUwBwAGEAYwBlAE8AbgBsAHkAIAAtAFAAaQBuACAAJABTAGUAYwB1AHIAZQBTAHQAcgBpAG4AZwA=",
"Company": "Microsoft Corporation",
"CurrentDirectory": "C:\\Users\\gladys\\Desktop\\",
"Description": "Windows PowerShell",
decoded command ->
$SecureString = ConvertTo-SecureString "reallylongpassword" -AsPlainText -Force
Enable-BitLocker -MountPoint "C:" -EncryptionMethod Aes256 -UsedSpaceOnly -Pin $SecureString%
Answer 3 -> reallylongpassword