System/Kernel


*evil-winrm* ps c:\Users\support\Documents> systeminfo ; Get-ComputerInfo
program 'systeminfo.exe' failed to run: Access is deniedAt line:1 char:1
+ systeminfo ; Get-ComputerInfo
+ ~~~~~~~~~~.
at line:1 char:1
+ systeminfo ; Get-ComputerInfo
+ ~~~~~~~~~~
    + categoryinfo          : ResourceUnavailable: (:) [], ApplicationFailedException
    + fullyqualifiederrorid : NativeCommandFailed
 
 
windowsbuildlabex                                       : 20348.859.amd64fre.fe_release_svc_prod2.220707-1832
windowscurrentversion                                   : 6.3
windowseditionid                                        : ServerStandard
windowsinstallationtype                                 : Server Core
windowsinstalldatefromregistry                          : 5/19/2022 9:01:26 AM
windowsproductid                                        : 00454-20165-01481-AA235
windowsproductname                                      : Windows Server 2022 Standard
windowsregisteredowner                                  : Windows User
windowssystemroot                                       : C:\Windows
windowsversion                                          : 2009
osdisplayversion                                        : 21H2
osserverlevel                                           : ServerCore
timezone                                                : (UTC-08:00) Pacific Time (US & Canada)
powerplatformrole                                       : Desktop
deviceguardsmartstatus                                  : Off

Networks


*Evil-WinRM* PS C:\Users\support\Documents> ipconfig /all ; arp -a
 
Windows IP Configuration
 
   Host Name . . . . . . . . . . . . : dc
   Primary Dns Suffix  . . . . . . . : support.htb
   Node Type . . . . . . . . . . . . : Hybrid
   IP Routing Enabled. . . . . . . . : No
   WINS Proxy Enabled. . . . . . . . : No
   DNS Suffix Search List. . . . . . : support.htb
 
Ethernet adapter Ethernet0:
 
   Connection-specific DNS Suffix  . :
   Description . . . . . . . . . . . : vmxnet3 Ethernet Adapter
   Physical Address. . . . . . . . . : 00-50-56-B9-36-33
   DHCP Enabled. . . . . . . . . . . : No
   Autoconfiguration Enabled . . . . : Yes
   IPv4 Address. . . . . . . . . . . : 10.10.11.174(Preferred)
   Subnet Mask . . . . . . . . . . . : 255.255.254.0
   Default Gateway . . . . . . . . . : 10.10.10.2
   DNS Servers . . . . . . . . . . . : 127.0.0.1
   NetBIOS over Tcpip. . . . . . . . : Enabled
 
Interface: 10.10.11.174 --- 0x6
  Internet Address      Physical Address      Type
  10.10.10.2            00-50-56-b9-d7-84     dynamic
  10.10.11.255          ff-ff-ff-ff-ff-ff     static
  224.0.0.22            01-00-5e-00-00-16     static
  224.0.0.251           01-00-5e-00-00-fb     static
  224.0.0.252           01-00-5e-00-00-fc     static
 
*Evil-WinRM* PS C:\Users\support\Documents> netstat -ano | Select-String LIST
 
  TCP    0.0.0.0:88             0.0.0.0:0              LISTENING       652
  TCP    0.0.0.0:135            0.0.0.0:0              LISTENING       964
  TCP    0.0.0.0:389            0.0.0.0:0              LISTENING       652
  TCP    0.0.0.0:445            0.0.0.0:0              LISTENING       4
  TCP    0.0.0.0:464            0.0.0.0:0              LISTENING       652
  TCP    0.0.0.0:593            0.0.0.0:0              LISTENING       964
  TCP    0.0.0.0:636            0.0.0.0:0              LISTENING       652
  TCP    0.0.0.0:3268           0.0.0.0:0              LISTENING       652
  TCP    0.0.0.0:3269           0.0.0.0:0              LISTENING       652
  TCP    0.0.0.0:5985           0.0.0.0:0              LISTENING       4
  TCP    0.0.0.0:9389           0.0.0.0:0              LISTENING       820
  TCP    0.0.0.0:47001          0.0.0.0:0              LISTENING       4
  TCP    0.0.0.0:49664          0.0.0.0:0              LISTENING       652
  TCP    0.0.0.0:49665          0.0.0.0:0              LISTENING       516
  TCP    0.0.0.0:49666          0.0.0.0:0              LISTENING       848
  TCP    0.0.0.0:49667          0.0.0.0:0              LISTENING       1284
  TCP    0.0.0.0:49668          0.0.0.0:0              LISTENING       652
  TCP    0.0.0.0:49674          0.0.0.0:0              LISTENING       652
  TCP    0.0.0.0:49679          0.0.0.0:0              LISTENING       636
  TCP    0.0.0.0:49686          0.0.0.0:0              LISTENING       652
  TCP    0.0.0.0:49700          0.0.0.0:0              LISTENING       2080
  TCP    0.0.0.0:53270          0.0.0.0:0              LISTENING       2060
  TCP    10.10.11.174:53        0.0.0.0:0              LISTENING       2080
  TCP    10.10.11.174:139       0.0.0.0:0              LISTENING       4
  TCP    127.0.0.1:53           0.0.0.0:0              LISTENING       2080
  TCP    [::]:88                [::]:0                 LISTENING       652
  TCP    [::]:135               [::]:0                 LISTENING       964
  TCP    [::]:445               [::]:0                 LISTENING       4
  TCP    [::]:464               [::]:0                 LISTENING       652
  TCP    [::]:593               [::]:0                 LISTENING       964
  TCP    [::]:5985              [::]:0                 LISTENING       4
  TCP    [::]:9389              [::]:0                 LISTENING       820
  TCP    [::]:47001             [::]:0                 LISTENING       4
  TCP    [::]:49664             [::]:0                 LISTENING       652
  TCP    [::]:49665             [::]:0                 LISTENING       516
  TCP    [::]:49666             [::]:0                 LISTENING       848
  TCP    [::]:49667             [::]:0                 LISTENING       1284
  TCP    [::]:49668             [::]:0                 LISTENING       652
  TCP    [::]:49674             [::]:0                 LISTENING       652
  TCP    [::]:49679             [::]:0                 LISTENING       636
  TCP    [::]:49686             [::]:0                 LISTENING       652
  TCP    [::]:49700             [::]:0                 LISTENING       2080
  TCP    [::]:53270             [::]:0                 LISTENING       2060
  TCP    [::1]:53               [::]:0                 LISTENING       2080

10.10.10.2

Users & Groups


*evil-winrm* ps c:\Users\support\Documents> net user ; ls C:\Users
 
User accounts for \\
 
-------------------------------------------------------------------------------
Administrator            anderson.damian          bardot.mary
cromwell.gerard          daughtler.mabel          ford.victoria
Guest                    hernandez.stanley        krbtgt
langley.lucy             ldap                     levine.leopoldo
monroe.david             raven.clifton            smith.rosario
stoll.rachelle           support                  thomas.raphael
west.laura               wilson.shelby
The command completed with one or more errors.
 
 
 
    directory: C:\Users
 
 
Mode                 LastWriteTime         Length Name
----                 -------------         ------ ----
d-----         5/28/2022   4:11 AM                Administrator
d-----         7/26/2022   6:21 AM                ldap
d-r---         5/19/2022   2:13 AM                Public
d-----         10/4/2023   2:21 AM                support
*evil-winrm* ps c:\Users\support\Documents> net localgroup ; net group /domain
 
Aliases for \\DC
 
-------------------------------------------------------------------------------
*Access Control Assistance Operators
*Account Operators
*Administrators
*Allowed RODC Password Replication Group
*Backup Operators
*Cert Publishers
*Certificate Service DCOM Access
*Cryptographic Operators
*Denied RODC Password Replication Group
*Distributed COM Users
*DnsAdmins
*Event Log Readers
*Guests
*Hyper-V Administrators
*IIS_IUSRS
*Incoming Forest Trust Builders
*Network Configuration Operators
*Performance Log Users
*Performance Monitor Users
*Pre-Windows 2000 Compatible Access
*Print Operators
*RAS and IAS Servers
*RDS Endpoint Servers
*RDS Management Servers
*RDS Remote Access Servers
*Remote Desktop Users
*Remote Management Users
*Replicator
*Server Operators
*Storage Replica Administrators
*Terminal Server License Servers
*Users
*Windows Authorization Access Group
The command completed successfully.
 
 
Group Accounts for \\
 
-------------------------------------------------------------------------------
*Cloneable Domain Controllers
*DnsUpdateProxy
*Domain Admins
*Domain Computers
*Domain Controllers
*Domain Guests
*Domain Users
*Enterprise Admins
*Enterprise Key Admins
*Enterprise Read-only Domain Controllers
*Group Policy Creator Owners
*Key Admins
*Protected Users
*Read-only Domain Controllers
*Schema Admins
*Shared Support Accounts
The command completed with one or more errors.

Processes


*Evil-WinRM* PS C:\Users\support\Documents> ps
 
Handles  NPM(K)    PM(K)      WS(K)     CPU(s)     Id  SI ProcessName
-------  ------    -----      -----     ------     --  -- -----------
    153      11     6752      16568              2864   1 conhost
    392      17     1860       6088               384   0 csrss
    198      11     1828       6168               496   1 csrss
    414      34    17048      25420              2060   0 dfsrs
    194      12     2264       8388              2300   0 dfssvc
    275      14     3864      14508              2916   0 dllhost
   5384    3716    68656      70180              2080   0 dns
     39       6     1196       3648               876   0 fontdrvhost
     39       6     1312       4064               884   1 fontdrvhost
      0       0       60          8                 0   0 Idle
    148      13     1916       6364              2152   0 ismserv
    300      16     3116      15444              2768   1 LogonUI
   1630     195   106072      91548               652   0 lsass
    431      30    36224      46972               820   0 Microsoft.ActiveDirectory.WebServices
    236      13     2992      11004              1308   0 msdtc
      0      10      296       3628               100   0 Registry
    455      13     4028      11056               636   0 services
     57       3     1044       1244               284   0 smss
    119      13     2396       6800               320   0 svchost
    193      12     1520       7272               688   0 svchost
    192      22     2576      10480               696   0 svchost
    235      14     2848      12792               716   0 svchost
    285      13     9480      14576               848   0 svchost
    305      12     2684      10456               856   0 svchost
    541      19     3372      10172               964   0 svchost
    230      11     1828       7404              1016   0 svchost
    272      16     2896      13204              1052   0 svchost
    210      11     2244      11780              1064   0 svchost
    422       9     2744       9180              1080   0 svchost
    294      15     2904       9664              1088   0 svchost
    210       9     1884       7112              1140   0 svchost
    121       8     1216       5672              1244   0 svchost
    308      16     3456      13508              1284   0 svchost
    390      30     7064      15472              1320   0 svchost
    202      12     2088       9380              1380   0 svchost
    110       7     1144       5900              1428   0 svchost
    116       7     1200       6024              1444   0 svchost
    292      20     8948      16324              1536   0 svchost
    359      15     2608      10952              1580   0 svchost
    138       9     1480       7740              1640   0 svchost
    374      15     3728      12248              1752   0 svchost
    343      13     2432      10548              1824   0 svchost
    197      11     2212       8900              1848   0 svchost
    266      14     2492       8308              2116   0 svchost
    129       9     3068       9940              2132   0 svchost
    132       8     1464       6792              2180   0 svchost
    367      15     8296      18092              2268   0 svchost
    289      35     3352      13916              2320   0 svchost
    169       9     1752       7304              2652   0 svchost
    310      23     8000      15864              3200   0 svchost
    232      14     9056      11924              3676   0 svchost
    111       7     1216       5624              3760   0 svchost
   1134       0       40        144                 4   0 System
    200      15     2272      10928              2676   0 vds
    174      11     3136      12260              2236   0 VGAuthService
    120       8     1436       6420              2228   0 vm3dservice
    121       9     2020       7552              2432   1 vm3dservice
    114       8     1408       6644              3240   1 vm3dservice
    383      23    10016      23792              2260   0 vmtoolsd
    151      11     1324       7020               516   0 wininit
    211      11     2284      11012               568   1 winlogon
    319      16     7252      16904              3028   0 WmiPrvSE
    627      27    53480      69932       0.59   3580   0 wsmprovhost

Tasks


*evil-winrm* ps c:\Users\support\Documents> Get-ScheduledTask | where {$_.TaskPath -notlike "\Microsoft*" } | ft TaskName,TaskPath,State 
Cannot connect to CIM server. Access denied 
at line:1 char:1
+ Get-ScheduledTask | where {$_.TaskPath -notlike "\Microsoft*" } | ft  ...
+ ~~~~~~~~~~~~~~~~~
    + categoryinfo          : ResourceUnavailable: (MSFT_ScheduledTask:String) [Get-ScheduledTask], CimJobException
    + fullyqualifiederrorid : CimJob_BrokenCimSession,Get-ScheduledTask
 
 
*evil-winrm* ps c:\Users\support\Documents> cmd /c schtasks /QUERY /FO TABLE | findstr /v /i "\Microsoft" | findstr /v /i "access level" | findstr /v /i "system32"
cmd.exe : Access is denied.
    + categoryinfo          : NotSpecified: (Access is denied.:String) [], RemoteException
    + fullyqualifiederrorid : NativeCommandError

Firewall & AV


*Evil-WinRM* PS C:\Users\support\Documents> cmd /c netsh firewall show config
 
Domain profile configuration (current):
-------------------------------------------------------------------
Operational mode                  = Enable
Exception mode                    = Enable
Multicast/broadcast response mode = Enable
Notification mode                 = Disable
 
Service configuration for Domain profile:
Mode     Customized  Name
-------------------------------------------------------------------
Enable   No          File and Printer Sharing
 
Allowed programs configuration for Domain profile:
Mode     Traffic direction    Name / Program
-------------------------------------------------------------------
 
Port configuration for Domain profile:
Port   Protocol  Mode    Traffic direction     Name
-------------------------------------------------------------------
 
Standard profile configuration:
-------------------------------------------------------------------
Operational mode                  = Enable
Exception mode                    = Enable
Multicast/broadcast response mode = Enable
Notification mode                 = Disable
 
Service configuration for Standard profile:
Mode     Customized  Name
-------------------------------------------------------------------
Enable   No          File and Printer Sharing
 
Allowed programs configuration for Standard profile:
Mode     Traffic direction    Name / Program
-------------------------------------------------------------------
 
Port configuration for Standard profile:
Port   Protocol  Mode    Traffic direction     Name
-------------------------------------------------------------------
 
Log configuration:
-------------------------------------------------------------------
File location   = C:\Windows\system32\LogFiles\Firewall\pfirewall.log
Max file size   = 4096 KB
Dropped packets = Disable
Connections     = Disable
 
IMPORTANT: Command executed successfully.
However, "netsh firewall" is deprecated;
use "netsh advfirewall firewall" instead.
For more information on using "netsh advfirewall firewall" commands
instead of "netsh firewall", see KB article 947709
at https://go.microsoft.com/fwlink/?linkid=121488 .
*Evil-WinRM* PS C:\Users\support\Documents> Get-MpComputerStatus ; Get-MpPreference | Select-Object -Property ExclusionPath
Cannot connect to CIM server. Access denied 
At line:1 char:1
+ Get-MpComputerStatus ; Get-MpPreference | Select-Object -Property Exc ...
+ ~~~~~~~~~~~~~~~~~~~~
    + CategoryInfo          : ResourceUnavailable: (MSFT_MpComputerStatus:String) [Get-MpComputerStatus], CimJobException
    + FullyQualifiedErrorId : CimJob_BrokenCimSession,Get-MpComputerStatus
Cannot connect to CIM server. Access denied 
At line:1 char:24
+ Get-MpComputerStatus ; Get-MpPreference | Select-Object -Property Exc ...
+                        ~~~~~~~~~~~~~~~~
    + CategoryInfo          : ResourceUnavailable: (MSFT_MpPreference:String) [Get-MpPreference], CimJobException
    + FullyQualifiedErrorId : CimJob_BrokenCimSession,Get-MpPreference

Session Architecture


*evil-winrm* ps c:\Users\support\Documents> [Environment]::Is64BitProcess
True

Installed .NET Frameworks


*Evil-WinRM* PS C:\Users\support\Documents> cmd /c dir /A:D C:\Windows\Microsoft.NET\Framework
 Volume in drive C has no label.
 Volume Serial Number is 955A-5CBB
 
 Directory of C:\Windows\Microsoft.NET\Framework
 
05/08/2021  01:27 AM    <DIR>          .
10/03/2023  08:36 PM    <DIR>          ..
05/08/2021  01:27 AM    <DIR>          v1.0.3705
05/08/2021  01:27 AM    <DIR>          v1.1.4322
05/08/2021  01:15 AM    <DIR>          v2.0.50727
10/03/2023  08:36 PM    <DIR>          v4.0.30319
               0 File(s)              0 bytes
               6 Dir(s)   3,953,483,776 bytes free
*Evil-WinRM* PS C:\Users\support\Documents> cmd /c reg query "HKLM\SOFTWARE\Microsoft\Net Framework Setup\NDP" /s
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\CDF
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\CDF\v4.0
    HttpNamespaceReservationInstalled    REG_DWORD    0x1
    NetTcpPortSharingInstalled    REG_DWORD    0x1
    NonHttpActivationInstalled    REG_DWORD    0x1
    SMSvcHostPath    REG_SZ    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\
    WMIInstalled    REG_DWORD    0x1
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4\Client
    CBS    REG_DWORD    0x1
    Install    REG_DWORD    0x1
    InstallPath    REG_SZ    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\
    Release    REG_DWORD    0x81041
    Servicing    REG_DWORD    0x0
    TargetVersion    REG_SZ    4.0.0
    Version    REG_SZ    4.8.04161
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4\Client\1033
    CBS    REG_DWORD    0x1
    Install    REG_DWORD    0x1
    Release    REG_DWORD    0x81041
    Servicing    REG_DWORD    0x0
    TargetVersion    REG_SZ    4.0.0
    Version    REG_SZ    4.8.04161
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4\Full
    CBS    REG_DWORD    0x1
    Install    REG_DWORD    0x1
    InstallPath    REG_SZ    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\
    Release    REG_DWORD    0x81041
    Servicing    REG_DWORD    0x0
    TargetVersion    REG_SZ    4.0.0
    Version    REG_SZ    4.8.04161
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4\Full\1033
    CBS    REG_DWORD    0x1
    Install    REG_DWORD    0x1
    Release    REG_DWORD    0x81041
    Servicing    REG_DWORD    0x0
    TargetVersion    REG_SZ    4.0.0
    Version    REG_SZ    4.8.04161
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4.0
    (Default)    REG_SZ    deprecated
 
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Net Framework Setup\NDP\v4.0\Client
    Install    REG_DWORD    0x1
    Version    REG_SZ    4.0.0.0

.NET 4.8.04161