Skip to main content
Phishing Investigation: ZipLine Supply Chain Campaign operation cover
BeginnerSIEMXDRFirewall

Phishing Investigation: ZipLine Supply Chain Campaign

Investigate a sophisticated social engineering campaign targeting manufacturing supply chains. You will analyze a 'reversed' phishing flow where attackers use 'Contact Us' forms to trick employees into initiating email conversations, leading to the deployment of the custom MixShell in-memory implant via DNS tunneling.

45m
8 tasks
85 points
Free

Start this operation

Create your free account and begin immediately.

Get Early Access — Free

Free forever — no credit card required

Investigation Tasks

Complete each task by investigating alerts and submitting your findings.

1

The First Contact

5
SOC{ip_address} - The IP address that submitted the contact formHint available
2

The Payload Delivery

10
SOC{domain_name} - The full Herokuapp subdomain used for the downloadHint available
3

Execution via LNK

5
SOC{process_name} - The binary executed by the malicious LNK fileHint available
4

Blinding the Defense

10
SOC{variable_name} - The PowerShell variable set to 'true' to bypass AMSIHint available
5

Brute Force Source Identification

25

Identify the external IP address that repeatedly attempted to brute force the 'admin' account using Remote Interactive logons as seen in the Windows Security logs.

SOC{...}Hint available
6

The Persistence Scriptlet

5
SOC{filename} - The .sct file dropped for persistenceHint available
7

DNS Tunneling Detection

15
SOC{domain_name} - The C2 domain used for DNS TXT tunnelingHint available
8

Resolution and Debrief

10
SOC{technique_id} - The MITRE technique ID for the DNS-based C2 communicationHint available

8 tasks · 85 points total

Start investigation

Training Tools

Skills You'll Build

Investigate realistic security alerts
SIEM log analysis
XDR log analysis
Firewall log analysis
MITRE ATT&CK technique identification
Triage decisions: escalate, investigate, or close
Evidence collection and documentation
Job-ready incident response methodology
Beginner

Ideal for newcomers to SOC operations. Guided investigation with clear indicators.

Prerequisites

  • No prior experience required
  • Familiarity with SIEM concepts
  • Familiarity with XDR concepts
  • Familiarity with Firewall concepts

Ready to investigate?

Create your free account and begin immediately.

Get Early Access — Free

Free forever — no credit card required

More Operations

View all

We use cookies to improve your experience and measure usage. Learn more