Skip to main content
Credential Harvesting: The Lookalike Login operation cover
BeginnerSIEM

Credential Harvesting: The Lookalike Login

An investigation into a modern phishing campaign targeting critical infrastructure. You will analyze email headers for domain spoofing, identify 'Paste and Run' execution chains, and track the delivery of the LummaC2 information stealer through SIEM logs.

30m
6 tasks
90 points
Free

Start this operation

Create your free account and begin immediately.

Get Early Access — Free

Free forever — no credit card required

Investigation Tasks

Complete each task by investigating alerts and submitting your findings.

1

Identifying the Origin of the Authentication Event

15

Our monitoring system flagged an unusual login attempt for the user admin.bill. To determine the scope of the potential compromise, you must examine the SIEM logs to identify which specific telemetry provider captured this activity.

SOC{...}Hint available
2

Identifying Suspicious Initial Execution

15

An alert triggered on corp-wks-105 indicating a potential data exfiltration attempt. You need to investigate the process execution logs in the SIEM panel to determine which legitimate-looking application was used to spawn the malicious outbound request.

SOC{...}Hint available
3

Identifying Suspicious Network Connections

15

An alert was triggered at 2026-03-25T10:15:06.837Z indicating a potential breach on a corporate workstation. Investigate the log entries for corp-wks-105 to determine the remote source address involved in the data transfer.

SOC{...}Hint available
4

Identify the Compromised Workstation

15

An automated alert indicates that a workstation within the corporate network began communicating with a known malicious IP address. Review the SIEM logs to determine which specific host was involved in this suspicious outbound connection during the initial phase of the attack.

SOC{...}Hint available
5

Identifying Malicious Script Execution

15

At 2026-03-25T17:06:38.613Z, a suspicious behavior alert was triggered on host corp-wks-105 involving user jdoe. You must investigate the telemetry to determine the exact name of the Visual Basic script that was dropped and executed during this session.

SOC{...}Hint available
6

Investigating Suspicious Script Execution

15

An automated alert triggered on 2026-03-25T08:14:55.979Z indicating a suspicious process launch on a workstation. You need to analyze the logs for the user jdoe to determine the name of the script file that was executed during this event.

SOC{...}Hint available

6 tasks · 90 points total

Start investigation

Training Tools

Skills You'll Build

Investigate realistic security alerts
SIEM log analysis
MITRE ATT&CK technique identification
Triage decisions: escalate, investigate, or close
Evidence collection and documentation
Job-ready incident response methodology
Beginner

Ideal for newcomers to SOC operations. Guided investigation with clear indicators.

Prerequisites

  • No prior experience required
  • Familiarity with SIEM concepts

Ready to investigate?

Create your free account and begin immediately.

Get Early Access — Free

Free forever — no credit card required

More Operations

View all

We use cookies to improve your experience and measure usage. Learn more