Catch me if you can

Overview

In this lab, I deployed and configured Microsoft Sysmon on a Windows Server 2022 virtual machine in Azure. The goal was to simulate attack behavior using PsPing and other network interaction tools and then analyze the logs generated by Sysmon. This simulates a workflow of monitoring system activity and investigating suspicious behavior.

This lab is part of a larger project to build a hands-on detection lab and document the process like a real-world SOC analyst.

Lab Setup

Cloud provider: Microsoft Azure
VM OS: Windows Server 2022
Tools:

  • Sysmon v15.15
  • Olaf Hartong’s modular Sysmon config
  • PsPing v2.12
  • PowerShell (Admin)

I provisioned the VM through the Azure portal and assigned it a public IP for RDP access.

Once the machine was up, I connected via Remote Desktop. A warning about the certificate not being trusted appeared, which is expected for self-signed certs.

Installing and Configuring Sysmon

First, I downloaded the Sysmon ZIP archive from Microsoft’s official source, extracted it, and launched PowerShell as administrator:

.\Sysmon64.exe -acceptEula -i

Since I had already installed it once before, I received a message saying it was already registered.

Next, I pulled down Olaf Hartong’s modular Sysmon configuration:

This loaded successfully and the configuration was validated.

Testing and Simulating Network Activity

After the configuration, I wanted to simulate network traffic. I download a few tools and extracted PsPing from Sysinternals.

I launched PsPing with:

.\psping.exe 127.0.0.1

This generated network activity on the host, which we later observed in the Sysmon logs.

Log Analysis with Event Viewer

I opened Event Viewer and there, I filtered on Event ID 1 (Process Creation) and Event ID 3 (Network Connection Detected)

Here we see that PowerShell made an outbound TCP connection to IP 185.199.111.133 on port 443. This was the simulated T1059.001 (PowerShell) technique.

Example: Paint Execution (Event ID 1)

Even the opening of MS Paint is logged and tied to the correct user and parent process (explorer.exe). This proves our configuration is working and logging non-network activity too.

Detection Findings

Event IDTechnique IDDescriptionComment
1T1204User Execution (mspaint)Normal user behavior
3T1059.001PowerShell network callSimulated threat
3T1571Non-Standard Port (Edge)Possibly benign browser traffic

Lessons Learned

  • Using a good Sysmon config is critical; Olaf Hartong’s rules are modular and effective.
  • Not all network activity is malicious, but patterns (like PowerShell outbound connections) are strong.
  • Logging and visualizing behavior makes investigation straightforward.

Stay tuned for Lab 2!

Kommentarer

Lämna ett svar

Din e-postadress kommer inte publiceras. Obligatoriska fält är märkta *