# Events Ripper

## Download and unzip Events Ripper

<https://github.com/keydet89/Events-Ripper>

<div align="left"><figure><img src="https://3710248095-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MAcqFKR60dGwoJxmUG5%2Fuploads%2FgDrTQvVLx2U5eg7fLbBq%2Fimage.png?alt=media&#x26;token=d8815ab9-605a-461f-acf4-6d043b953cd0" alt=""><figcaption></figcaption></figure></div>

This took about 5 minutes to process all the events logs from our original image (mounted as G: using AIM). The result is a \~200MB text file.

<div align="left"><figure><img src="https://3710248095-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MAcqFKR60dGwoJxmUG5%2Fuploads%2FKMDQndvtKOinSpcLI81l%2Fimage.png?alt=media&#x26;token=93b0f6b1-43fc-4c75-9f9b-4a8f405bd3ff" alt=""><figcaption></figcaption></figure></div>

Trawling through 948,134 lines in a text file isn't the most efficient use of time. Events Ripper also includes erip.exe to parse/identify specific events and provide some kind of context to the data. From the GitHub repo;

```
Similar to RegRipper, you can run a single plugin against the events file:

erip -f c:\cases\events.txt -p failedlogins

Or, you can run all plugins (you're so very welcome, Dray) against the events file:

erip -f c:\cases\events.txt -a
```

<div align="left"><figure><img src="https://3710248095-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MAcqFKR60dGwoJxmUG5%2Fuploads%2FR1KKDmK1jZMqcuvB9ubQ%2Fimage.png?alt=media&#x26;token=1aecce70-d5cc-4c6f-85ec-d1853421474b" alt=""><figcaption></figcaption></figure></div>

After we run erip, the resultant refined file is \~560KB with 7,134 lines.

## Locating relevant entries

Given the nature of our incident, Events Ripper allows us to quickly identify relevant artefacts. Let's look at RDP activity and failed/successful account authentication.

<div align="left"><figure><img src="https://3710248095-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MAcqFKR60dGwoJxmUG5%2Fuploads%2FOe9F9oPbQsmY131fKdPK%2Fimage.png?alt=media&#x26;token=51297b8d-337e-4cce-98f4-5675d57ded77" alt=""><figcaption></figcaption></figure></div>

Add these to our accounts of interest, and IPs of interest.

<div align="left"><figure><img src="https://3710248095-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MAcqFKR60dGwoJxmUG5%2Fuploads%2FQ8oNDWOjrrYQw5qNnXq5%2Fimage.png?alt=media&#x26;token=f63a0955-4d56-437b-973e-4dae519d7776" alt=""><figcaption></figcaption></figure></div>

We can see that network type 3 (network based login) has a significant quantity of events. We can also see IP addresses associated with those logins. Further, 36.133.110.87 also appears in the list again. Update our running list of IPs.

<div align="left"><figure><img src="https://3710248095-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MAcqFKR60dGwoJxmUG5%2Fuploads%2FRG7jDyCw5KfXV9yd9ajn%2Fimage.png?alt=media&#x26;token=dcf394d6-ff16-4c9a-a368-ef2be02a1ea0" alt=""><figcaption></figcaption></figure></div>

Type 10 logins (remote interactive - RDP).

Source host machine (kali).

More logins from the same remote IP addresses.

<div align="left"><figure><img src="https://3710248095-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MAcqFKR60dGwoJxmUG5%2Fuploads%2FUXIusVShiLEdAOadkUgn%2Fimage.png?alt=media&#x26;token=b326e745-2c04-4f48-abcf-b9c0e1dade07" alt=""><figcaption></figcaption></figure></div>

Based on the following artefacts/entries, we should be able to refine our initial assessment to activity from the source IP addresses, focusing on the 4 user accounts (if they all exist), around 5th February 2024 \~23:02 Z/UTC.

## Running tally of indicators

Accounts:

* admin
* root
* user
* administrator

Hostnames:

* WIN-NI8FBK23SLO
* kali  :eyes:

IPs:

* 185.229.66.183 (failed login source, type 10 login source)
* 36.133.110.87 (failed login source, successful login source)
* 31.220.85.162 (successful login source)
* 195.21.1.97 (type 3 and 10 logins)

{% embed url="<https://windowsir.blogspot.com/2024/07/what-is-events-ripper.html>" %}
