关联漏洞
描述
Hands-on SOC investigation of CVE-2024-49138 using LetsDefend, VirusTotal, Hybrid Analysis, TrueFort, and ChatGPT.
介绍
# LetsDefend Investigation: CVE-2024-49138
## 🔍 Overview
Hands-on SOC investigation and incident response simulation using [LetsDefend](https://letsdefend.io/), focused on a real-world exploitation of **CVE-2024-49138** — a privilege escalation vulnerability in Windows CLFS driver.
## 📅 Event Details
- **Event ID**: 313
- **Incident Type**: Privilege Escalation
- **Event Time**: Jan 22, 2025
- **Hostname**: Victor
- **IP Address**: 172.16.17.207
- **Malicious Binary**: `svohost.exe`
- **Parent Process**: `powershell.exe`
- **Suspicious Command**: `\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1`
## 🛠️ Tools Used
- [VirusTotal](https://virustotal.com)
- [Hybrid Analysis](https://www.hybrid-analysis.com)
- [TrueFort](https://www.truefort.com)
- [ChatGPT](https://chat.openai.com) — For decoding PowerShell commands and analyzing behavior
- LetsDefend Lab Environment
## 🧠 Indicators of Compromise
- **Hash**: `b432dcf4a0f0b601b1d79848467137a5e25cab5a0b7b1224be9d3b6540122db9`
- **Malicious URL**: `https://files-ld.s3.us-east-2.amazonaws.com/service-installer.zip`
- **Malicious IP**: `185.107.56.141`
## 🧩 Key Takeaways
- Identified fake system binary (`svohost.exe`) used for privilege escalation.
- Mapped activity to MITRE ATT&CK techniques.
- Used a layered toolset for full visibility (EDR, sandboxing, static/dynamic analysis, AI).
- Gained insight into PowerShell-based malware delivery methods.
## 🏁 Outcome
Successfully triaged, investigated, and documented the attack chain leveraging CVE-2024-49138. This lab helped reinforce my skills in incident response, behavioral analysis, and threat detection.
## 🔎 Investigation Screenshots
### Alert Triggered in LetsDefend

### VirusTotal Result for Malicious Hash

### 🔬 Process Tree Analysis

### 🧪 PowerShell & AbuseIPDB Usage

### 📋 Incident Notes

### 🪟 Windows Artifacts

### ✅ Final Wrap-up / Task Marked

---
> “Getting 1% better every day.”
文件快照
[4.0K] /data/pocs/acd3d5016c8d5b8a75c2a7ed85f582486cf10ca6
├── [123K] AbuseIPDB.png
├── [ 33K] Alert-Panel.png
├── [129K] Mark.png
├── [ 80K] Microsoft.png
├── [200K] Note.png
├── [105K] Process.png
├── [2.1K] README.md
└── [134K] VirusTotal.png
0 directories, 8 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。