Note


While checking the filesystem after conducting basic enumeartion, I found an interesting file located at the system root

*evil-winrm* ps c:\> ls
 
 
    directory: C:\
 
 
Mode                LastWriteTime         Length Name
----                -------------         ------ ----
d-----        5/26/2020   5:38 PM                PerfLogs
d-----         6/3/2020   9:47 AM                profiles
d-r---        3/19/2020  11:08 AM                Program Files
d-----         2/1/2020  11:05 AM                Program Files (x86)
d-r---        2/23/2020   9:16 AM                Users
d-----       12/22/2023  11:31 AM                Windows
-a----        2/28/2020   4:36 PM            447 notes.txt

that’s the file; c:\notes.txt

*evil-winrm* ps c:\> cat notes.txt
Mates,
 
after the domain compromise and computer forensic last week, auditors advised us to:
- change every passwords -- Done.
- change krbtgt password twice -- Done.
- disable auditor's account (audit2020) -- KO.
- use nominative domain admin accounts instead of this one -- KO.
 
We will probably have to backup & restore things later.
- Mike.
 
ps: Because the audit report is sensitive, I have encrypted it on the desktop (root.txt)

The notes.txt file confirms the earlier theory that the target system had been previously compromised by the malicious actor; Ipwn3dYourCompany

Interestingly, the author claims to have changed every passwords, which clearly wasn’t the case for the audit2020 account that is supposed to be disabled apparently