Skip to main content
SocGholish: The Fake Browser Update operation cover
BeginnerSIEMXDR

SocGholish: The Fake Browser Update

Investigate a drive-by download attack where a compromised WordPress site delivered a highly obfuscated JavaScript loader using UTF-8 homoglyphs to evade detection. Trace the execution from the browser to system reconnaissance and the deployment of a Python-based backdoor used by RansomHub affiliates.

45m
6 tasks
90 points
Free

Start this operation

Create your free account and begin immediately.

Get Early Access — Free

Free forever — no credit card required

Investigation Tasks

Complete each task by investigating alerts and submitting your findings.

1

Identifying the Script Execution Engine

15

An alert was triggered on corp-wks-105 involving user t.smith. Several events recorded between 10:26:26.754Z and 10:26:32.357Z indicate that a script-based execution occurred; you need to find the specific system binary that handled the script execution.

SOC{...}Hint available
2

Identifying Malicious File Artifacts

15

An alert was triggered on workstation corp-wks-105 involving a suspicious process executed by user t.smith. You need to investigate the XDR data to determine the specific file packaging format used by the attacker to bundle their malicious payload.

SOC{...}Hint available
3

Investigating Suspicious Script Execution

15

An alert was triggered indicating a suspicious script execution on a corporate workstation. You need to review the behavioral logs for corp-wks-105 to determine which file was launched during the reported event at 2025-05-01T16:54:11.590Z.

SOC{...}Hint available
4

Identify Suspicious Process Execution

15

An alert triggered for workstation corp-wks-105 involving the user t.smith. You need to examine the SIEM logs to determine which process was being used to execute commands during the initial discovery phase of the incident.

SOC{...}Hint available
5

Identifying the Target Host

15

After gaining initial access, the adversary attempted to move laterally within the corporate environment to escalate privileges. Review the centralized log data to determine the hostname of the domain controller that recorded the suspicious authentication attempt.

SOC{...}Hint available
6

Identifying the Compromised Endpoint

15

An automated alert triggered at 2025-05-01T08:30:05.705Z indicating a potential unauthorized login attempt. You need to access the SIEM logs to determine which specific machine in the corporate network was the target of this activity.

SOC{...}Hint available

6 tasks · 90 points total

Start investigation

Training Tools

Skills You'll Build

Investigate realistic security alerts
SIEM log analysis
XDR log analysis
MITRE ATT&CK technique identification
Triage decisions: escalate, investigate, or close
Evidence collection and documentation
Job-ready incident response methodology
Beginner

Ideal for newcomers to SOC operations. Guided investigation with clear indicators.

Prerequisites

  • No prior experience required
  • Familiarity with SIEM concepts
  • Familiarity with XDR concepts

Ready to investigate?

Create your free account and begin immediately.

Get Early Access — Free

Free forever — no credit card required

More Operations

View all

We use cookies to improve your experience and measure usage. Learn more