Room Link:
https://tryhackme.com/room/webattackforensics-aoc2025-b4t7c1d5f8
Official walkthrough for quick onboarding:
🔗 YouTube Link:
https://youtu.be/Gf68YnVjy7k?si=x1xKWxwN-3sB_tAz

Query:
index=windows_apache_access (cmd.exe OR powershell OR "powershell.exe" OR "Invoke-Expression")
| table _time host clientip uri_path uri_query status

Query:
index=windows_apache_error ("cmd.exe" OR "powershell" OR "Internal Server Error")

Query:
index=windows_sysmon ParentImage="*httpd.exe"

Normally, Apache should only spawn worker threads — not system binaries.
Example of malicious behavior:
ParentImage = C:\Apache24\bin\httpd.exe Image = C:\Windows\System32\cmd.exe
This confirms successful command injection.
Query:
index=windows_sysmon *cmd.exe* *whoami*

Query:
index=windows_sysmon Image="*powershell.exe"
(CommandLine="*enc*" OR CommandLine="*-EncodedCommand*" OR CommandLine="*Base64*")

This detects obfuscated PowerShell payloads using Base64 encoding.
If defenses are working properly, no results should appear, meaning the payload (e.g., “Muahahaha”) never executed.

whoami.exe

powershell.exe