[ π™’π™žπ™£π™œπ™˜π™€π™™π™š π™₯π™–π™§π™©π™£π™šπ™§ ] α΅’αΆ αΆ β±αΆœβ±α΅ƒΛ‘ inc. COMPANY
10.2K subscribers
705 photos
429 videos
294 files
1.75K links
No.1 Security Learning Platform in Telugu states wingcodepartner inc. COMPANY
Download Telegram
On end off my birthday
I'm giving this last update
If your serious about you future and carrier it will help a lot result will make you a perfect

The course I have mentioned above is still have same price with discount 1499 only
And registration closes 25th June 2025

Interested people can join fast
After date it will closes
only time left 23hrs
For registration contact @arjun_vasudeva @oyee11
❀2
Task :

Your SOC team receives a report from an employee that their system is showing a ransom note demanding 2 BTC. The system is Windows 10 Pro. You are provided with the following forensic artifacts:

1. A memory dump of the affected system.


2. A copy of the AppData folder from the infected user’s profile.


3. The System.evtx and Security.evtx log files.


4. A suspicious binary named helperservice.exe found running at the time of infection.



Your task is to:

1. Identify how the ransomware initially entered the system (initial infection vector).


2. Reverse engineer helperservice.exe and determine:

Whether it is responsible for encryption.

The encryption method used.

Any weakness or hardcoded keys present.



3. Analyze the memory dump and logs to reconstruct a full timeline of the attack.


4. Extract the ransomware note from memory or disk and analyze if there is any clue to decrypt the files.


5. Identify if lateral movement occurred on the network.
❀3πŸ₯°2