Windows Event Logs Expose the Messy Truth Behind “Sophisticated” Cyberattacks
A recent series of incidents analyzed by Huntress reveals attackers fumbling, experimenting, and learning through repeated failures far from the flawless execution often implied in post-incident narratives.
In a November case involving the Velociraptor DFIR platform, Huntress documented how an attacker repeatedly mistyped commands, failed to install a Cloudflare tunnel, and attempted to run OpenSSH even though the software was not present.
This pattern, trial and error rather than streamlined control, continued across three recent incidents involving the same threat actor, which used Microsoft IIS servers as its entry point.
Each attack began when the actor exploited vulnerabilities within web applications, issuing remote commands to download and execute a Golang-based Trojan named agent.exe on the endpoint.
Crucially, the analysis of Windows Event Logs and Sysmon telemetry revealed that the attacker often encountered and responded to roadblocks posed by built-in defenses, such as Microsoft Defender.
In Incident 1, the attacker attempted to download and run the malicious file using certutil.exe, a Living-off-the-Land Binary. The defender blocked the attempt, requiring multiple retries using renamed executables, such as 815.exe.
Even after the file was quarantined, the same attacker returned numerous times, eventually dropping a renamed GotoHTTP remote management tool in another attempt to regain access.
By Incident 2 on November 17, the same actor appeared to have learned from prior roadblocks. Before deploying the malware, they issued a series of PowerShell commands to modify Defender’s exclusion paths, thereby bypassing the antivirus protection that had previously blocked it.
They then deployed a new version of the Trojan, identified as SparkRAT (dllhost.exe), and attempted persistence using a Windows service named “WindowsUpdate.” However, service logs showed that the installation failed to start, once again blocking execution.
A nearly identical sequence unfolded in Incident 3 on November 25 at another organization, indicating the same actor had reused infrastructure and TTPs without meaningful improvement.
Attempts to add Defender exclusions, install the same executables, and create persistence via Windows services again failed.
Across these three cases, Huntress noted overlapping IP addresses 188.253.126.202, 103.36.25.171, and 188.253.121.101 and consistent tool usage, including agent.exe, test.exe, and dllhost.exe. Rather than continuous innovation, the incidents displayed iterative troubleshooting and improvisation.
For defenders, this messy picture is a reminder that security analysis shouldn’t focus solely on “sophisticated” tactics but also on repetitive attacker behaviors and how adversaries react when their tools fail.
Understanding those friction points can help organizations strengthen defenses before attackers get a second or third chance.
Follow us on Google News , LinkedIn and X to Get More Instant Updates, Set Cyberpress as a Preferred Source in Google.
The post Windows Event Logs Expose the Messy Truth Behind “Sophisticated” Cyberattacks appeared first on Cyber Security News.
HARRISBURG, Pa. (AP) — Building trades unions — long fashioned as the voice of the…
Reggie Fils-Aimé has opened up about the time an Amazon executive gave him a phone…
Reggie Fils-Aimé has opened up about the time an Amazon executive gave him a phone…
Star Wars Day is upon us, and that means there's a slew of Star Wars…
A new weekend has arrived, and today, you can save big on Dragon Quest VII…
The Devil Wears Prada 2 star Meryl Streep is ready for a break from the…
This website uses cookies.