Youssef Moukadem

Cybersecurity Enthusiast | Computer Science Graduate | Cloud Enthusiast | Lifelong Learner

View on GitHub

πŸ“ Case Study: Investigating with Splunk

πŸ”Ή Overview

In this case study, I analyzed Windows + Sysmon logs in Splunk to uncover adversary techniques such as backdoor account creation, registry persistence, process execution, and obfuscated PowerShell activity.

Skills demonstrated:


πŸ” Key Activities & Findings

1. Total Events in Index

Total Events Screenshot


2. Backdoor User Creation

Backdoor User Screenshot


3. Registry Key Modification

Registry Key Screenshot


4. Impersonated User

Impersonated User Screenshot


5. Remote Command Execution

Backdoor Command Screenshot


6. Backdoor Logons

Backdoor Logins Screenshot


7. Infected Host with PowerShell

Infected Host Screenshot


8. Malicious PowerShell Execution

Malicious PowerShell Screenshot


9. Web Request from Encoded Script

Encoded PowerShell Screenshot
Decoded C2 URL Screenshot


βœ… Conclusion

This case study simulated a real-world intrusion chain, including:

By correlating Splunk searches, Event IDs, and log fields, I was able to reconstruct the adversary’s actions step by step.

This strengthened my skills in:


πŸ”— Navigation