Lets Defend - SOC Event ID 234
🚨 SOC Incident Report – Brute Force Attack (Event ID 234)
⚡ Hands-on SOC investigation involving brute force detection, threat intelligence correlation, and MITRE ATT&CK mapping.
Note: Some techniques may overlap across tactics depending on attacker intent and environment context.
Why This Lab Matters
This lab demonstrates how weak credentials and exposed RDP services can lead to full system compromise. It highlights the importance of monitoring authentication logs and implementing strong access controls in enterprise environments.
Incident Summary
A brute force attack was detected targeting a Windows host over RDP (port 3389). The attacker attempted multiple failed logins using different usernames and successfully compromised a valid account (Matthew). Post-compromise, the attacker executed enumeration commands to assess privileges.
Timeline of Events
- Mar 07, 2024 – 11:44 AM
- Multiple failed login attempts detected (Event ID 4625)
- Source IP:
218.92.0.56 - Target Host:
Matthew (172.16.17.148) - Protocol: RDP (3389)
- Brute Force Activity
- 30 login attempts observed
- Usernames attempted:
- Guest
- Admin
- Sysadmin
- Matthew
- Successful Compromise
- Event ID 4624 (Successful login)
- Username:
Matthew - Logon Type: 10 (Remote Interactive – RDP)
- Mar 07, 2024 – 11:45:18
- Attacker accessed command prompt
- Executed privilege enumeration commands
Attack Details
Indicators of Compromise (IOCs)
- Source IP:
218.92.0.56 - Destination IP:
172.16.17.148 - Protocol: RDP (3389)
- Event IDs:
- 4625 – Failed logins
- 4624 – Successful login
Threat Intelligence
The attacker IP (218.92.0.56) was analyzed using multiple threat intelligence platforms:
Sources Checked
Results
| Attribute | Value |
|---|---|
| IP Address | 218.92.0.56 |
| Country | China 🇨🇳 |
| ISP | CHINANET Jiangsu Province Network |
| ASN | AS4134 |
| Malicious Reports | 453,000+ (AbuseIPDB) |
| Detection Ratio | 10/94 (VirusTotal) |
| Verdict | Malicious |
Conclusion:
The attacker IP is highly malicious and associated with repeated malicious activity
Traffic Analysis
- Repeated RDP login attempts observed from attacker IP
- No SSH activity detected
- Attack focused solely on RDP service (port 3389)
Attack Outcome —
Brute force attack was successful
Evidence:
- Multiple failed login attempts followed by a successful login from the same IP
- Immediate post-login command execution
Post-Exploitation Activity
The attacker performed local enumeration:
whoami→ Displays the currently logged-in user.
net user letsdefend→ Displays detailed information about the specified user account (e.g., account status, group membership, password info).
net localgroup administrators→ Lists all users and groups with administrative privileges on the system.
Assessment:
The attacker performed account and privilege enumeration, likely preparing for privilege escalation or persistence
Root Cause
- Weak or easily guessable password for user
Matthew - No account lockout policy enforced
- RDP exposed to external network
Response Actions Taken
- Identified malicious external IP
- Confirmed successful compromise
- Analyzed logs (Event IDs 4624 & 4625)
- Contained the affected endpoint via EDR
- Investigated attacker activity
Containment & Remediation
Immediate Actions:
- Isolated compromised host
- Disabled/secured affected account
- Blocked attacker IP at firewall
Recommended Actions:
- Enforce strong password policies
- Implement account lockout mechanism
- Restrict RDP access (VPN / allowlist)
- Enable Multi-Factor Authentication (MFA)
- Monitor login anomalies
Lessons Learned
What Happened?
The attacker gained access via brute force due to weak credentials.
What Went Well?
- Attack was detected via log monitoring
- Quick containment limited further damage
What Needs Improvement?
- Password security policies
- Exposure of RDP to internet
- Lack of account lockout controls
Future Detection Recommendations
Monitor for:
- Multiple failed login attempts (Event ID 4625)
- Successful login after failures (Event ID 4624)
- Logon Type 10 (RDP access)
- Suspicious command execution (
net localgroup) - Unusual external IP connections
Final Verdict
This incident is classified as a successful brute force attack with post-compromise enumeration activity. Immediate remediation and stronger access controls are required to prevent recurrence, particularly securing RDP access and enforcing strong authentication policies.
MITRE ATT&CK MAPPED TABLE
| Tactic | Technique ID | Technique Name | Description | | ————– | ———— | ————————— | ———————————- | | Initial Access | T1110.001 | Brute Force | Multiple login attempts over RDP | | Initial Access | T1078 | Valid Accounts | Compromise using valid credentials | | Initial Access | T1021.001 | Remote Services (RDP) | RDP used to access system | | Execution | T1059 | Command-Line Interface | Commands executed post-login | | Discovery | T1087 | Account Discovery | net user letsdefend | | Discovery | T1069.001 | Permission Groups Discovery | net localgroup administrators |
This incident covers multiple stages of the attack lifecycle, including:
- Initial Access
- Execution
- Discovery
- Persistence
- Lateral Movement (Potential)
This demonstrates how a single weak point (RDP exposure + weak password) can lead to full attack chain execution.
Skills Demonstrated
- Log Analysis (Windows Event Logs)
- Brute Force Detection
- Threat Intelligence Analysis
- Incident Response & Containment
- MITRE ATT&CK Mapping
- RDP Attack Investigation








