Skip to main content
Cobalt Strike: Beacon Detection operation cover
IntermediateSIEMXDR

Cobalt Strike: Beacon Detection

Analyze a sophisticated intrusion involving the exploitation of an Atlassian Confluence server, leading to Cobalt Strike beacon deployment and LockBit ransomware. This scenario focuses on identifying malleable C2 profiles, process injection into legitimate Windows processes, and the use of SOCKS proxies for lateral movement. You will navigate through SIEM logs and XDR process trees to reconstruct the attack timeline from initial access to final impact.

45m
8 tasks
315 points
Free

Start this operation

Create your free account and begin immediately.

Get Early Access — Free

Free forever — no credit card required

Investigation Tasks

Complete each task by investigating alerts and submitting your findings.

1

Identifying Malicious Scripting Behavior

50

An alert was triggered on wkstn-05 involving the user jdoe, suggesting the execution of an encoded command-line script. You must investigate the telemetry to determine how the attacker leveraged native scripting interpreters to gain further access.

SOC{...}Hint available
2

Identifying the Compromised Service Account

15

An unusual execution chain was detected on the confluence-srv host around 2025-04-10T14:25:29.697Z. You need to determine which service account was utilized to run these commands to assess the scope of the account compromise.

SOC{...}Hint available
3

Identifying the Malicious Scripting Engine

50

An alert was triggered indicating a suspicious process spawned from a browser on wkstn-05. You need to investigate the SIEM logs to determine which process was used to execute the obfuscated script that initiated the connection to the external C2 server.

SOC{...}Hint available
4

Identify Suspicious Command and Control Infrastructure

15

An alert was triggered indicating a possible data exfiltration attempt from our internal network. Analyze the XDR timeline to determine which internal endpoint or domain was being targeted during the peak of the suspicious activity.

SOC{...}Hint available
5

Identifying the Incident Log Origin

35

An unusual outbound connection was flagged coming from the confluence-srv host during a potential data exfiltration attempt. You need to determine which architectural component or log source was responsible for reporting this specific activity to our central monitoring system.

SOC{...}Hint available
6

Investigate Post-Exploitation Discovery Commands

50

After gaining initial access to wkstn-05, the threat actor began performing local reconnaissance to identify the current user context. Analyze the SIEM logs for this workstation to determine which native Windows binary was invoked to verify their privileges.

SOC{...}Hint available
7

Identifying Successful Authentication Patterns

50

At 2025-04-10T08:15:00.958Z, an unusual volume of authentication activity was observed originating from wkstn-05. You need to determine the exact event identifier that confirms a successful session was established on the domain controller to map out the attacker's lateral movement.

SOC{...}Hint available
8

Identifying the Initial Vector on confluence-srv

50

An alert was triggered on the confluence-srv host involving the service account confluence_svc. You need to determine how the attacker first gained a foothold by reviewing the automated mapping of the detected activity to the MITRE ATT&CK framework within the XDR telemetry.

SOC{...}Hint available

8 tasks · 315 points total

Start investigation

Training Tools

Skills You'll Build

Investigate realistic security alerts
SIEM log analysis
XDR log analysis
MITRE ATT&CK technique identification
Triage decisions: escalate, investigate, or close
Evidence collection and documentation
Job-ready incident response methodology
Intermediate

Requires foundational alert triage skills. Multiple data sources to correlate.

Prerequisites

  • Basic understanding of security alerts
  • Familiarity with SIEM concepts
  • Familiarity with XDR concepts

Ready to investigate?

Create your free account and begin immediately.

Get Early Access — Free

Free forever — no credit card required

More Operations

View all

We use cookies to improve your experience and measure usage. Learn more