Skip to main content
Akira Ransomware: Full Kill Chain IR operation cover
AdvancedSIEMXDRFirewall

Akira Ransomware: Full Kill Chain IR

The intrusion began with a search engine advertisement and ended with the deployment of Akira ransomware. This scenario covers the full 2025 threat landscape, emphasizing identity-based compromise, MFA bypass via AiTM kits, and rapid lateral movement toward Active Directory. Analysts must navigate a complex environment of Windows workstations, Domain Controllers, and Cisco VPN infrastructure to reconstruct the timeline from initial access to data exfiltration and final encryption.

2h
10 tasks
900 points
Free

Start this operation

Create your free account and begin immediately.

Get Early Access — Free

Free forever — no credit card required

Investigation Tasks

Complete each task by investigating alerts and submitting your findings.

1

Investigating Domain Controller Exposure

100

After gaining access to the svc_backup account, the adversary executed a series of commands on the domain controller. Analyze the XDR behaviors and file events to determine which critical Active Directory database was accessed or copied during the intrusion.

SOC{...}Hint available
2

Identifying Unusual Execution and Archival Logic

100

During the investigation of corp-wks-110, an analyst noted a series of suspicious command executions involving akira.exe and powershell.exe. You must determine which legitimate-looking third-party utility was leveraged by the threat actor to prepare files for exfiltration during the final stages of the breach.

SOC{...}Hint available
3

Identify the Final Stage Ransomware Payload

100

After gaining initial access and pivoting through the network, the adversary executed a series of commands at 2025-05-13T01:30:03.812Z to deploy the final stage of the attack. Investigate the child processes spawned during this window to determine the specific filename of the ransomware artifact used to encrypt the system.

SOC{...}Hint available
4

Investigating Lateral Movement and Malicious Payload Execution

100

After gaining initial access, the threat actor moved laterally to the file server corp-fs-01. At 2025-05-10T20:13:34.686Z, a suspicious process tree was observed involving msiexec.exe and akira.exe. You must analyze the process tree children to find the SHA256 hash of the binary used during the final stage of this execution chain.

SOC{...}Hint available
5

Investigating LSASS Memory Dumping via Native Binaries

100

After gaining initial access, the adversary attempted to harvest credentials from memory. Review the process execution chain on corp-wks-110 to determine which specific DLL was leveraged alongside rundll32.exe to facilitate this credential access attempt.

SOC{...}Hint available
6

Identify the External Command and Control Infrastructure

50

After the execution of a suspicious binary on corp-wks-110, the system initiated an outbound connection to an unauthorized external server. Review the XDR Timeline around 2025-05-06T09:15:07.345Z to pinpoint the destination IP used for data exfiltration and command reception.

SOC{...}Hint available
7

Identify the Compromised Administrative Account

50

During the lateral movement phase on 2025-05-09T14:29:55.983Z, the adversary successfully escalated privileges. Investigate the process execution flow to determine which high-privilege account was used to spawn the suspicious net.exe and akira.exe processes.

SOC{...}Hint available
8

Identifying the Initial Infection Vector

100

An alert triggered on corp-wks-110 indicating a suspicious download that bypassed standard filtering. You need to analyze the telemetry for user alicia.garcia to determine exactly which document was opened before the execution of subsequent discovery commands.

SOC{...}Hint available
9

Identifying Anomalous Execution Patterns

100

The attacker appears to have bypassed standard PowerShell restrictions by leveraging a secondary interpreter. Investigate the timeline events following the initial msiexec.exe activity to determine which process was used to run the malicious logic.

SOC{...}Hint available
10

Lateral Movement Forensics: Uncovering Remote Execution Services

100

After gaining access to the environment, the adversary attempted to pivot from corp-wks-110 to the Domain Controller. Review the XDR Timeline to pinpoint the exact binary responsible for the service-based lateral movement used during this phase of the attack.

SOC{...}Hint available

10 tasks · 900 points total

Start investigation

Training Tools

Skills You'll Build

Investigate realistic security alerts
SIEM log analysis
XDR log analysis
Firewall log analysis
MITRE ATT&CK technique identification
Triage decisions: escalate, investigate, or close
Evidence collection and documentation
Job-ready incident response methodology
Advanced

Complex multi-stage investigations. Realistic noise, ambiguous indicators, lateral movement.

Prerequisites

  • Basic understanding of security alerts
  • Experience with log analysis tools
  • Familiarity with SIEM concepts
  • Familiarity with XDR concepts
  • Familiarity with Firewall concepts

Ready to investigate?

Create your free account and begin immediately.

Get Early Access — Free

Free forever — no credit card required

More Operations

View all
AdvancedSIEMXDR

Scattered Spider: Identity-First Attack Chain

Investigate a high-sophistication intrusion by UNC3944 (Scattered Spider). This scenario simulates a multi-stage attack starting from social engineering and MFA fatigue, progressing through the exploitation of unmanaged edge devices, and culminating in a 'Bring Your Own Vulnerable Driver' (BYOVD) technique to blind kernel-level security agents. Analysts must correlate identity providers, cloud sign-ins, and deep endpoint forensics to reconstruct the timeline and identify the breakout speed of this financially motivated threat actor.

1h 30m40 pts
AdvancedSIEMXDR

Fake Zoom to Ransomware: The Social Engineering Pipeline

In this advanced SOC simulation, you will investigate a multi-stage intrusion that began with a drive-by download of a trojanized Zoom installer. The attack progressed through several stages of loader execution, including d3f@ckloader and IDAT loader, eventually leading to the deployment of high-end C2 frameworks like Cobalt Strike and Brute Ratel. You must trace the attacker's path from the initial web-based compromise, through lateral movement via RDP tunneling and proxy tools, to the final mass-deployment of BlackSuit ransomware via enterprise management software. This scenario is based on real-world 2025 threat intelligence and requires deep analysis of SIEM, XDR, and Firewall telemetry to reconstruct the full kill chain.

2h40 pts
AdvancedSIEMXDR

Black Basta: Email Bomb to Encryption

Investigate a sophisticated Ransomware-as-a-Service (RaaS) campaign involving Black Basta and Cactus TTPs. This scenario tracks a multi-stage attack from initial social engineering via Microsoft Teams and Quick Assist to advanced persistence using DLL side-loading in OneDrive. You will analyze how attackers move from identity-based initial access to full domain compromise and ESXi virtualization host encryption. The investigation requires correlating evidence across SIEM logs, XDR process trees, and firewall traffic to uncover hidden C2 channels and data exfiltration patterns occurring during off-hours.

1h 30m40 pts

We use cookies to improve your experience and measure usage. Learn more