Skip to main content
Fake Zoom to Ransomware: The Social Engineering Pipeline operation cover
AdvancedSIEMXDRFirewall

Fake Zoom to Ransomware: The Social Engineering Pipeline

In this advanced SOC simulation, you will investigate a multi-stage intrusion that began with a drive-by download of a trojanized Zoom installer. The attack progressed through several stages of loader execution, including d3f@ckloader and IDAT loader, eventually leading to the deployment of high-end C2 frameworks like Cobalt Strike and Brute Ratel. You must trace the attacker's path from the initial web-based compromise, through lateral movement via RDP tunneling and proxy tools, to the final mass-deployment of BlackSuit ransomware via enterprise management software. This scenario is based on real-world 2025 threat intelligence and requires deep analysis of SIEM, XDR, and Firewall telemetry to reconstruct the full kill chain.

2h
10 tasks
835 points
Free

Start this operation

Create your free account and begin immediately.

Get Early Access — Free

Free forever — no credit card required

Investigation Tasks

Complete each task by investigating alerts and submitting your findings.

1

Identifying Persistent Service Execution

100

After the initial execution of Zoom_v_2.00.4.exe, the system logged a series of high-privilege events involving SYSTEM-level processes. Investigate the XDR Timeline to determine which service binary was recorded in the description of the ninth event in the sequence.

SOC{...}Hint available
2

Identifying the Compromised Internal Host

50

After the initial execution of a suspicious file by user robert.miller on 2024-05-02T14:49:43.240Z, lateral movement attempts were observed originating from a specific workstation. Analyze the network traffic logs to determine which internal host is now communicating with known malicious command-and-control infrastructure.

SOC{...}Hint available
3

Identifying the Compromised Administrative Account

35

An alert was triggered for an unsigned executable masquerading as a common application. Examine the XDR timeline and behavior logs to determine which local or service account was used to execute this file, as this may indicate credential harvesting or lateral movement.

SOC{...}Hint available
4

Tracing the Malicious Zoom Installer Execution

100

At 2024-05-09T01:22:18.608Z, an unusual process named Zoom_v_2.00.4.exe was observed running under the context of robert.miller. This activity appears to be a masquerading attempt to bypass security controls by mimicking legitimate software; you must locate the specific cryptographic hash associated with this process execution to strengthen our blocklist.

SOC{...}Hint available
5

Uncovering Post-Exploitation Scripting Artifacts

100

After the initial execution of Zoom_v_2.00.4.exe, the adversary pivoted to credential harvesting. Analyze the chronological events on the affected workstation around 2024-05-09T14:35:07.461Z to find the script used to target backup infrastructure credentials.

SOC{...}Hint available
6

Identifying the Initial Payload Artifact

100

An alert triggered at 2024-05-01T08:22:02.799Z regarding a suspicious execution chain initiated by robert.miller. You must determine the exact filename of the masqueraded artifact that was executed immediately after the user interacted with their web browser.

SOC{...}Hint available
7

Investigating Advanced Living-off-the-Land Execution

100

The adversary successfully bypassed initial defenses on corp-wks-001 by chaining scripts through mshta.exe and powershell.exe. Analyze the deep process hierarchy in the XDR panel to find the final executable used to compile or run an inline task that established the foothold.

SOC{...}Hint available
8

Investigating Fileless Execution on corp-wks-001

100

At 2024-05-01T08:22:02.799Z, user robert.miller executed a suspicious file named Zoom_v_2.00.4.exe which triggered a chain of child processes including mshta.exe and powershell.exe. Analyze the process tree to identify the SHA256 hash of the secondary binary that was dropped and executed during this sequence.

SOC{...}Hint available
9

Investigating Ransomware Artifacts on corp-wks-001

100

An alert triggered on corp-wks-001 involving a suspicious execution of Zoom_v_2.00.4.exe which subsequently spawned MSBuild.exe and other system binaries. You must analyze the file system modifications made during this incident to find the final artifact left by the attacker.

SOC{...}Hint available
10

Identifying the Compromised Internal Endpoint

50

After the initial execution of a suspicious binary by user robert.miller, the system initiated several outbound connections. Analyze the network traffic logs around 2024-05-07T16:10:04.104Z to determine which internal workstation was communicating with unauthorized external command-and-control infrastructure.

SOC{...}Hint available

10 tasks · 835 points total

Start investigation

Training Tools

Skills You'll Build

Investigate realistic security alerts
SIEM log analysis
XDR log analysis
Firewall log analysis
MITRE ATT&CK technique identification
Triage decisions: escalate, investigate, or close
Evidence collection and documentation
Job-ready incident response methodology
Advanced

Complex multi-stage investigations. Realistic noise, ambiguous indicators, lateral movement.

Prerequisites

  • Basic understanding of security alerts
  • Experience with log analysis tools
  • Familiarity with SIEM concepts
  • Familiarity with XDR concepts
  • Familiarity with Firewall concepts

Ready to investigate?

Create your free account and begin immediately.

Get Early Access — Free

Free forever — no credit card required

More Operations

View all
AdvancedSIEMXDR

Scattered Spider: Identity-First Attack Chain

Investigate a high-sophistication intrusion by UNC3944 (Scattered Spider). This scenario simulates a multi-stage attack starting from social engineering and MFA fatigue, progressing through the exploitation of unmanaged edge devices, and culminating in a 'Bring Your Own Vulnerable Driver' (BYOVD) technique to blind kernel-level security agents. Analysts must correlate identity providers, cloud sign-ins, and deep endpoint forensics to reconstruct the timeline and identify the breakout speed of this financially motivated threat actor.

1h 30m40 pts
AdvancedSIEMXDR

Black Basta: Email Bomb to Encryption

Investigate a sophisticated Ransomware-as-a-Service (RaaS) campaign involving Black Basta and Cactus TTPs. This scenario tracks a multi-stage attack from initial social engineering via Microsoft Teams and Quick Assist to advanced persistence using DLL side-loading in OneDrive. You will analyze how attackers move from identity-based initial access to full domain compromise and ESXi virtualization host encryption. The investigation requires correlating evidence across SIEM logs, XDR process trees, and firewall traffic to uncover hidden C2 channels and data exfiltration patterns occurring during off-hours.

1h 30m40 pts
AdvancedSIEMXDR

Akira Ransomware: Full Kill Chain IR

The intrusion began with a search engine advertisement and ended with the deployment of Akira ransomware. This scenario covers the full 2025 threat landscape, emphasizing identity-based compromise, MFA bypass via AiTM kits, and rapid lateral movement toward Active Directory. Analysts must navigate a complex environment of Windows workstations, Domain Controllers, and Cisco VPN infrastructure to reconstruct the timeline from initial access to data exfiltration and final encryption.

2h50 pts

We use cookies to improve your experience and measure usage. Learn more