My First Real-World Threat Hunting Experience (Personal Home Network)
Summary
On March 19, 2025, I decided
to analyze my PC for unusual or
malicious traffic and applications as a way to practice my Incident Response and Threat Hunting skills.
After getting hooked on SOC analyst
work, I saw this as my first
real-world IR and Threat Hunting experience—not tied to an exam or CTF.
Even though
this was within my personal network,
the concepts remained the same:
a real environment, real malware, and real-world analysis and as you can see
the application was already on my device since May 11, 2022. During my
investigation, I discovered a malicious
application and decided to document my findings for future reference.
This initiative also allowed me to develop my own Threat Hunting methodology.
Investigation Summary
I started my investigation by examining network
connectivity using netstat -anob in the command prompt. Upon reviewing the output, I noticed an unusual
port—8080—standing out.
| Content that showing all of the ESTABLISHED connection using port 8080 |
I then began investigating the destination IP addresses associated with
port 8080. Upon checking them against VirusTotal, MXToolbox, and AbuseIPDB, I
discovered that some had alerts or records indicating potential threats such as
Remote Access Trojans (RATs) and botnets. This raised suspicion, prompting me
to focus on these IP addresses and dig deeper for more information.
Since I had
identified the application linked to the malicious IP addresses, I proceeded to
check the associated process IDs using the tasklist command.
| tasklist output |
| tasklist /FI “IMAGENAME eq AdvanceWindowsManager.exe” /M |
I also ran WMIC to retrieve process and application information.
Please don’t be confused by the different PIDs shown—it's the same
application, as multiple instances of AdvancedWindowsManager.exe are
currently running on my system.
wmic output
Since we already
got the parent process ID we can use it to further check to identify how the
process started and detect potential anomalies.
| wmic using the Parent PID |
To further investigate each instance of AdvancedWindowsManager.exe, I ran WMIC again, this time adding the
get CommandLine parameter. This allowed me to determine how each instance of the
application was executed.| How the AdvancedWindowsManager.exe executed |
Now that I have identified the application's location, I decided to
generate its hash and check for any records or malicious indicators on VirusTotal.
I was able to confirm that this application is indeed malicious.
| Hash Value and Virustotal output |
My next step is to identify the
persistence mechanism, as the application runs every time I start my system.
This will allow me to stop the process and remove it completely. And I was able
to find that under Task Scheduler.
Key
Findings
●
An ESTABLISHED connection to a public
IP Addresses using port 8080 which is unusual for secure protocols or legitimate traffic.
●
This application was installed
since year 2022 and confirmed that there is a record and tag as malicious application
from Virustotal.
Indicators of Compromise (IOCs)
●
IP Address: 212[.]83[.]158[.]215, 62[.]210[.]9[.]152,
195[.]154[.]62[.]146
●
File Hash (SHA-256): dd226aa0ee4d6a3439bf2cf3e9ecd2c22ad59451c8ce902258b1d34fd28ff922
Recommendations
●
After proper documentation of the
incident Eradicate the AdvancedWindowsManager.exe
●
Block any inbound or outbound
traffic to the IP addresses 212[.]83[.]158[.]215,
62[.]210[.]9[.]152, 195[.]154[.]62[.]146 at the firewall
and/or web-proxy level.
● Create an alert using the hash value.
Comments
Post a Comment