System/Kernel
*evil-winrm* ps c:\Users\melanie\Documents> systeminfo
program 'systeminfo.exe' failed to run: Access is deniedAt line:1 char:1
+ systeminfo
+ ~~~~~~~~~~.
at line:1 char:1
+ systeminfo
+ ~~~~~~~~~~
+ categoryinfo : ResourceUnavailable: (:) [], ApplicationFailedException
+ fullyqualifiederrorid : NativeCommandFailed
*evil-winrm* ps c:\Users\melanie\Documents> Get-ComputerInfo
windowsbuildlabex : 14393.3321.amd64fre.rs1_release.191016-1811
windowscurrentversion : 6.3
windowseditionid : ServerStandard
windowsinstallationtype : Server Core
windowsinstalldatefromregistry : 9/25/2019 5:17:51 PM
windowsproductid : 00376-30821-30176-AA312
windowsproductname : Windows Server 2016 Standard
windowsregisteredowner : Windows User
windowssystemroot : C:\Windows
osserverlevel : ServerCore
timezone : (UTC-08:00) Pacific Time (US & Canada)
powerplatformrole : Desktop
deviceguardsmartstatus : Off
Windows Server 2016 Standard
Server Core
14393.3321.amd64fre.rs1_release.191016-1811
Networks
*Evil-WinRM* PS C:\Users\melanie\Documents> netstat -ano | Select-String list
TCP 0.0.0.0:88 0.0.0.0:0 LISTENING 584
TCP 0.0.0.0:135 0.0.0.0:0 LISTENING 812
TCP 0.0.0.0:389 0.0.0.0:0 LISTENING 584
TCP 0.0.0.0:445 0.0.0.0:0 LISTENING 4
TCP 0.0.0.0:464 0.0.0.0:0 LISTENING 584
TCP 0.0.0.0:593 0.0.0.0:0 LISTENING 812
TCP 0.0.0.0:636 0.0.0.0:0 LISTENING 584
TCP 0.0.0.0:3268 0.0.0.0:0 LISTENING 584
TCP 0.0.0.0:3269 0.0.0.0:0 LISTENING 584
TCP 0.0.0.0:5985 0.0.0.0:0 LISTENING 4
TCP 0.0.0.0:9389 0.0.0.0:0 LISTENING 1992
TCP 0.0.0.0:47001 0.0.0.0:0 LISTENING 4
TCP 0.0.0.0:49664 0.0.0.0:0 LISTENING 452
TCP 0.0.0.0:49665 0.0.0.0:0 LISTENING 928
TCP 0.0.0.0:49666 0.0.0.0:0 LISTENING 980
TCP 0.0.0.0:49667 0.0.0.0:0 LISTENING 584
TCP 0.0.0.0:49671 0.0.0.0:0 LISTENING 1040
TCP 0.0.0.0:49678 0.0.0.0:0 LISTENING 584
TCP 0.0.0.0:49679 0.0.0.0:0 LISTENING 584
TCP 0.0.0.0:49684 0.0.0.0:0 LISTENING 576
TCP 0.0.0.0:49716 0.0.0.0:0 LISTENING 1288
TCP 0.0.0.0:61034 0.0.0.0:0 LISTENING 2324
TCP 10.10.10.169:53 0.0.0.0:0 LISTENING 2324
TCP 10.10.10.169:139 0.0.0.0:0 LISTENING 4
TCP 127.0.0.1:53 0.0.0.0:0 LISTENING 2324
TCP [::]:88 [::]:0 LISTENING 584
TCP [::]:135 [::]:0 LISTENING 812
TCP [::]:445 [::]:0 LISTENING 4
TCP [::]:464 [::]:0 LISTENING 584
TCP [::]:593 [::]:0 LISTENING 812
TCP [::]:5985 [::]:0 LISTENING 4
TCP [::]:9389 [::]:0 LISTENING 1992
TCP [::]:47001 [::]:0 LISTENING 4
TCP [::]:49664 [::]:0 LISTENING 452
TCP [::]:49665 [::]:0 LISTENING 928
TCP [::]:49666 [::]:0 LISTENING 980
TCP [::]:49667 [::]:0 LISTENING 584
TCP [::]:49671 [::]:0 LISTENING 1040
TCP [::]:49678 [::]:0 LISTENING 584
TCP [::]:49679 [::]:0 LISTENING 584
TCP [::]:49684 [::]:0 LISTENING 576
TCP [::]:49716 [::]:0 LISTENING 1288
TCP [::]:61034 [::]:0 LISTENING 2324
TCP [::1]:53 [::]:0 LISTENING 2324
*Evil-WinRM* PS C:\Users\melanie\Documents> ipconfig /all
Windows IP Configuration
Host Name . . . . . . . . . . . . : Resolute
Primary Dns Suffix . . . . . . . : megabank.local
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No
DNS Suffix Search List. . . . . . : megabank.local
Ethernet adapter Ethernet0:
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Intel(R) 82574L Gigabit Network Connection
Physical Address. . . . . . . . . : 00-50-56-B9-F0-62
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
IPv4 Address. . . . . . . . . . . : 10.10.10.169(Preferred)
Subnet Mask . . . . . . . . . . . : 255.255.255.0
Default Gateway . . . . . . . . . : 10.10.10.2
DNS Servers . . . . . . . . . . . : 8.8.8.8
NetBIOS over Tcpip. . . . . . . . : Enabled
Tunnel adapter isatap.{A20A4417-3DC7-47B7-8F00-87CC59D9F43F}:
Media State . . . . . . . . . . . : Media disconnected
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : Microsoft ISATAP Adapter
Physical Address. . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP Enabled. . . . . . . . . . . : No
Autoconfiguration Enabled . . . . : Yes
*Evil-WinRM* PS C:\Users\melanie\Documents> arp -a
Interface: 10.10.10.169 --- 0x2
Internet Address Physical Address Type
10.10.10.2 00-50-56-b9-f3-30 dynamic
10.10.10.172 00-50-56-b9-50-2f dynamic
10.10.10.255 ff-ff-ff-ff-ff-ff static
224.0.0.22 01-00-5e-00-00-16 static
224.0.0.252 01-00-5e-00-00-fc static
10.10.10.172
Users & Groups
*evil-winrm* ps c:\Users\melanie\Documents> net users ; ls C:\Users
User accounts for \\
-------------------------------------------------------------------------------
abigail Administrator angela
annette annika claire
claude DefaultAccount felicia
fred Guest gustavo
krbtgt marcus marko
melanie naoki paulo
per ryan sally
simon steve stevie
sunita ulf zach
The command completed with one or more errors.
directory: C:\Users
Mode LastWriteTime Length Name
---- ------------- ------ ----
d----- 9/25/2019 10:43 AM Administrator
d----- 12/4/2019 2:46 AM melanie
d-r--- 11/20/2016 6:39 PM Public
d----- 9/27/2019 7:05 AM ryan
ryan
*evil-winrm* ps c:\Users\melanie\Documents> net localgroup ; net group
Aliases for \\RESOLUTE
-------------------------------------------------------------------------------
*Access Control Assistance Operators
*Account Operators
*Administrators
*Allowed RODC Password Replication Group
*Backup Operators
*Cert Publishers
*Certificate Service DCOM Access
*Cryptographic Operators
*Denied RODC Password Replication Group
*Distributed COM Users
*DnsAdmins
*Event Log Readers
*Guests
*Hyper-V Administrators
*IIS_IUSRS
*Incoming Forest Trust Builders
*Network Configuration Operators
*Performance Log Users
*Performance Monitor Users
*Pre-Windows 2000 Compatible Access
*Print Operators
*RAS and IAS Servers
*RDS Endpoint Servers
*RDS Management Servers
*RDS Remote Access Servers
*Remote Desktop Users
*Remote Management Users
*Replicator
*Server Operators
*Storage Replica Administrators
*System Managed Accounts Group
*Terminal Server License Servers
*Users
*Windows Authorization Access Group
The command completed successfully.
Group Accounts for \\
-------------------------------------------------------------------------------
*Cloneable Domain Controllers
*Contractors
*DnsUpdateProxy
*Domain Admins
*Domain Computers
*Domain Controllers
*Domain Guests
*Domain Users
*Enterprise Admins
*Enterprise Key Admins
*Enterprise Read-only Domain Controllers
*Group Policy Creator Owners
*Key Admins
*Protected Users
*Read-only Domain Controllers
*Schema Admins
The command completed with one or more errors.
Contractors
Processes
*Evil-WinRM* PS C:\Users\melanie\Documents> ps
Handles NPM(K) PM(K) WS(K) CPU(s) Id SI ProcessName
------- ------ ----- ----- ------ -- -- -----------
39 4 1556 2444 3904 1 cmd
94 8 4956 9508 0.00 3112 0 conhost
110 9 5300 11204 3912 1 conhost
265 12 1824 4092 368 0 csrss
152 13 1520 6168 460 1 csrss
346 32 13572 22216 1288 0 dfsrs
153 12 2064 7236 1688 0 dfssvc
214 13 3624 12420 2312 0 dllhost
5309 3694 69088 68040 860 0 dns
0 0 0 4 0 0 Idle
118 12 1944 5628 1128 0 ismserv
3607 185 69748 84512 584 0 lsass
489 41 55364 72064 1992 0 Microsoft.ActiveDirectory.WebServices
190 13 2432 9484 2452 0 msdtc
477 60 151220 174128 2000 0 MsMpEng
276 11 3804 9272 576 0 services
51 2 368 1168 292 0 smss
256 16 5596 14916 572 0 svchost
391 33 7356 14240 648 0 svchost
362 14 2996 9852 756 0 svchost
421 19 3060 8708 812 0 svchost
706 24 6228 14460 920 0 svchost
376 15 9300 14556 928 0 svchost
1066 40 18360 37948 980 0 svchost
621 44 8688 23064 988 0 svchost
136 11 1392 6644 1040 0 svchost
199 13 2144 8164 1816 0 svchost
242 19 7488 13768 3712 0 svchost
98 7 1696 7416 4076 0 svchost
754 0 128 120 4 0 System
163 12 1772 9172 3784 1 taskhostw
194 16 2332 10656 2244 0 vds
146 11 3048 9948 1328 0 VGAuthService
326 21 9676 23064 2032 0 vmtoolsd
169 15 3388 12984 4044 1 vmtoolsd
92 8 956 4932 452 0 wininit
188 10 1956 9052 528 1 winlogon
280 15 6948 15652 2468 0 WmiPrvSE
1007 34 101904 128112 1.75 2564 0 wsmprovhost
*Evil-WinRM* PS C:\Users\melanie\Documents> tasklist /svc
tasklist.exe : ERROR: Access denied
+ CategoryInfo : NotSpecified: (ERROR: Access denied:String) [], RemoteException
+ FullyQualifiedErrorId : NativeCommandError
*Evil-WinRM* PS C:\Users\melanie\Documents> wmic product get name,version,vendor
WMIC.exe : ERROR:
+ CategoryInfo : NotSpecified: (ERROR::String) [], RemoteException
+ FullyQualifiedErrorId : NativeCommandError
Description = Access denied
*Evil-WinRM* PS C:\Users\melanie\Documents> query process
USERNAME SESSIONNAME ID PID IMAGE
>(unknown) id 0 0 0
*Evil-WinRM* PS C:\Users\melanie\Documents> query session
query.exe : No session exists for *
+ CategoryInfo : NotSpecified: (No session exists for *:String) [], RemoteException
+ FullyQualifiedErrorId : NativeCommandError
*Evil-WinRM* PS C:\Users\melanie\Documents> query user
query.exe : No User exists for *
+ CategoryInfo : NotSpecified: (No User exists for *:String) [], RemoteException
+ FullyQualifiedErrorId : NativeCommandError
Tasks
*evil-winrm* ps c:\Users\melanie\Documents> Get-ScheduledTask | where {$_.TaskPath -notlike "\Microsoft*" } | ft TaskName,TaskPath,State
Cannot connect to CIM server. Access denied
at line:1 char:1
+ Get-ScheduledTask | where {$_.TaskPath -notlike "\Microsoft*" } | ft ...
+ ~~~~~~~~~~~~~~~~~
+ categoryinfo : ResourceUnavailable: (MSFT_ScheduledTask:String) [Get-ScheduledTask], CimJobException
+ fullyqualifiederrorid : CimJob_BrokenCimSession,Get-ScheduledTask
*evil-winrm* ps c:\Users\melanie\Documents> schtasks /QUERY /FO TABLE | findstr /v /i "\Microsoft" | findstr /v /i "access level" | findstr /v /i "system32"
program 'schtasks.exe' failed to run: Access is deniedAt line:1 char:1
+ schtasks /QUERY /FO TABLE | findstr /v /i "\Microsoft" | findstr /v / ...
+ ~~~~~~~~~~~~~~~~~~~~~~~~~.
at line:1 char:1
+ schtasks /QUERY /FO TABLE | findstr /v /i "\Microsoft" | findstr /v / ...
+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
+ categoryinfo : ResourceUnavailable: (:) [], ApplicationFailedException
+ fullyqualifiederrorid : NativeCommandFailed
Firewall & AV
*Evil-WinRM* PS C:\Users\melanie\Documents> netsh firewall show config
Domain profile configuration (current):
-------------------------------------------------------------------
Operational mode = Disable
Exception mode = Enable
Multicast/broadcast response mode = Enable
Notification mode = Disable
Service configuration for Domain profile:
Mode Customized Name
-------------------------------------------------------------------
Enable No File and Printer Sharing
Allowed programs configuration for Domain profile:
Mode Traffic direction Name / Program
-------------------------------------------------------------------
Port configuration for Domain profile:
Port Protocol Mode Traffic direction Name
-------------------------------------------------------------------
ICMP configuration for Domain profile:
Mode Type Description
-------------------------------------------------------------------
Enable 2 Allow outbound packet too big
Enable 8 Allow inbound echo request
Standard profile configuration:
-------------------------------------------------------------------
Operational mode = Disable
Exception mode = Enable
Multicast/broadcast response mode = Enable
Notification mode = Disable
Service configuration for Standard profile:
Mode Customized Name
-------------------------------------------------------------------
Enable No File and Printer Sharing
Allowed programs configuration for Standard profile:
Mode Traffic direction Name / Program
-------------------------------------------------------------------
Port configuration for Standard profile:
Port Protocol Mode Traffic direction Name
-------------------------------------------------------------------
ICMP configuration for Standard profile:
Mode Type Description
-------------------------------------------------------------------
Enable 2 Allow outbound packet too big
Enable 8 Allow inbound echo request
Log configuration:
-------------------------------------------------------------------
File location = C:\Windows\system32\LogFiles\Firewall\pfirewall.log
Max file size = 4096 KB
Dropped packets = Disable
Connections = Disable
IMPORTANT: Command executed successfully.
However, "netsh firewall" is deprecated;
use "netsh advfirewall firewall" instead.
For more information on using "netsh advfirewall firewall" commands
instead of "netsh firewall", see KB article 947709
at http://go.microsoft.com/fwlink/?linkid=121488 .
Firewall is DISABLED
*Evil-WinRM* PS C:\Users\melanie\Documents> Get-MpComputerStatus
Cannot connect to CIM server. Access denied
At line:1 char:1
+ Get-MpComputerStatus
+ ~~~~~~~~~~~~~~~~~~~~
+ CategoryInfo : ResourceUnavailable: (MSFT_MpComputerStatus:String) [Get-MpComputerStatus], CimJobException
+ FullyQualifiedErrorId : CimJob_BrokenCimSession,Get-MpComputerStatus
Session Architecture
*evil-winrm* ps c:\Users\melanie\Documents> [Environment]::Is64BitProcess
True
Installed .NET Frameworks
*Evil-WinRM* PS C:\Users\melanie\Documents> cmd /c dir /A:D C:\Windows\Microsoft.NET\Framework
Volume in drive C has no label.
Volume Serial Number is D1AC-5AF6
Directory of C:\Windows\Microsoft.NET\Framework
07/16/2016 06:18 AM <DIR> .
07/16/2016 06:18 AM <DIR> ..
07/16/2016 06:18 AM <DIR> v1.0.3705
07/16/2016 06:18 AM <DIR> v1.1.4322
07/16/2016 06:18 AM <DIR> v2.0.50727
06/10/2023 06:53 AM <DIR> v4.0.30319
0 File(s) 0 bytes
6 Dir(s) 2,462,023,680 bytes free
*Evil-WinRM* PS C:\Users\melanie\Documents> cmd /c reg query "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\CDF
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\NET Framework Setup\NDP\v4.0
*Evil-WinRM* PS C:\Users\melanie\Documents> cmd /c reg query "HKLM\SOFTWARE\Microsoft\Net Framework Setup\NDP" /s
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\CDF
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\CDF\v4.0
HttpNamespaceReservationInstalled REG_DWORD 0x1
NetTcpPortSharingInstalled REG_DWORD 0x1
NonHttpActivationInstalled REG_DWORD 0x1
SMSvcHostPath REG_SZ C:\Windows\Microsoft.NET\Framework64\v4.0.30319\
WMIInstalled REG_DWORD 0x1
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4\Client
CBS REG_DWORD 0x1
Install REG_DWORD 0x1
InstallPath REG_SZ C:\Windows\Microsoft.NET\Framework64\v4.0.30319\
Release REG_DWORD 0x60632
Servicing REG_DWORD 0x0
TargetVersion REG_SZ 4.0.0
Version REG_SZ 4.6.01586
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4\Client\1033
CBS REG_DWORD 0x1
Install REG_DWORD 0x1
Release REG_DWORD 0x60632
Servicing REG_DWORD 0x0
TargetVersion REG_SZ 4.0.0
Version REG_SZ 4.6.01586
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4\Full
CBS REG_DWORD 0x1
Install REG_DWORD 0x1
InstallPath REG_SZ C:\Windows\Microsoft.NET\Framework64\v4.0.30319\
Release REG_DWORD 0x60632
Servicing REG_DWORD 0x0
TargetVersion REG_SZ 4.0.0
Version REG_SZ 4.6.01586
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4\Full\1033
CBS REG_DWORD 0x1
Install REG_DWORD 0x1
Release REG_DWORD 0x60632
Servicing REG_DWORD 0x0
TargetVersion REG_SZ 4.0.0
Version REG_SZ 4.6.01586
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4.0
(Default) REG_SZ deprecated
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4.0\Client
Install REG_DWORD 0x1
Version REG_SZ 4.0.0.0
.NET 4.6.01586