Jess Ciedo, a member of the accounting department, was terminated by their manager. Management discovered the account jciedo had access to the department’s file server containing sensitive files. The last successful logon was from workstation 10.10.20.8. Three artifacts are provided: a memory image of 10.10.20.8, file server security logs, and JCIEDO_USRCLASS.DAT from the same host.
The security logs are a plain text export — EVTXtract cannot process them. Opened in Notepad++ and searched for jciedo with Backward Direction enabled to find the most recent session first.
The last jciedo logon event (4624, Logon Type 3) originating from 10.10.20.8:

Logon timestamp: 2023-02-15T16:59:10.261
Workstation name AASTORGA confirms the machine identity. Authentication via NTLM V2.
Immediately following the logon, Event ID 5140 (network share access) and 5145 (detailed file share) fire in sequence, both logged on BSLAB-DC.eyehatemalwares.com:

Share accessed: \\*\Shared_FileServer — path C:\Users\rbandrada\Documents\Shared_FileServer. Source address 10.10.20.8 confirms jciedo’s workstation. The file server IP is not directly visible in the logs — confirmed via Volatility netscan showing multiple ESTABLISHED connections from 10.10.20.8 to 10.10.20.13:5985.
File server: 10.10.20.13, Shared_FileServer Access timestamp: 2023-02-15T16:59:12.368
Continuing through jciedo events, Event 5145 surfaces the specific file accessed within the share:

File accessed: accounting_creds.txt Timestamp: 2023-02-15T16:59:13.327
The logoff event (4634) for jciedo’s session:

Logoff timestamp: 2023-02-15T17:00:09.424
The session lasted under 2 minutes — consistent with targeted exfiltration.
Profile: Win7SP1x86. All commands run from the Volatility standalone directory.
volatility_standalone.exe -f ..\..\memdump.mem --profile=Win7SP1x86 netscan

Key findings:
10.10.20.8 → 10.10.20.13:5985 — confirms file server IP84.17.38.170:443 — AnyDesk external C2AnyDesk.exe and TeamViewer.exe both present — two remote access tools on the insider’s workstationvolatility_standalone.exe -f ..\..\memdump.mem --profile=Win7SP1x86 hivelist

Hives of interest:
\REGISTRY\MACHINE\SYSTEM at offset 0x8d818270 — needed for USB device identification\??\C:\Users\aastorga\ntuser.dat at offset 0xab5259c8 — workstation user hiveSYSTEM hive dumped for registry analysis:
volatility_standalone.exe -f ..\..\memdump.mem --profile=Win7SP1x86 dumpregistry -o 0x8d818270 --dump-dir .
EVTXtract was run against the memory image to recover carved EVTX records not available in the provided log file:
C:\Python27\Scripts\evtxtract.exe ..\..\memdump.mem > evtx_carved.txt
Searching the 108MB output for WinRAR activity:
findstr /i "WinRAR" evtx_carved.txt
Recovered command line event:
"C:\Program Files\WinRAR\WinRAR.exe" "F:\Confidential.zip"
C:\Program Files\WinRAR\WinRAR.exe
F:\Confidential.zip — drive letter F: confirms exfiltration directly to the mounted USB device.

The dumped SYSTEM hive loaded into MiTec Windows Registry Recovery. Navigated to:
ControlSet001\Enum\USBSTOR
Multiple USB storage devices enumerated. The SanDisk entry:

SanDisk Cruzer Orbit
The Kingston DataTraveler G3 was also present but the SanDisk Cruzer Orbit is the device used for exfiltration — confirmed by the F:\Confidential.zip output path correlating with a removable drive letter.
| Phase | Action |
|---|---|
| Account Access | jciedo authenticates to domain from workstation AASTORGA (10.10.20.8) |
| File Server Access | Network share Shared_FileServer on 10.10.20.13 accessed via SMB |
| Data Theft | accounting_creds.txt read from file server share |
| Compression | WinRAR used to compress stolen file — output to F:\Confidential.zip |
| Exfiltration | Compressed archive written directly to SanDisk Cruzer Orbit USB (drive F:) |
| Remote Access | AnyDesk and TeamViewer both active — external connection to 84.17.38.170:443 |
| Type | Value |
|---|---|
| Account | jciedo |
| Workstation | AASTORGA (10.10.20.8) |
| File Server | 10.10.20.13 (Shared_FileServer) |
| File | accounting_creds.txt |
| Archive | F:\Confidential.zip |
| USB Device | SanDisk Cruzer Orbit |
| External IP | 84[.]17[.]38[.]170 |
| Software | AnyDesk, TeamViewer |
| Technique | ID | Description |
|---|---|---|
| Valid Accounts | T1078 | jciedo used legitimate domain credentials to access file server |
| Data from Network Shared Drive | T1039 | accounting_creds.txt accessed from SMB share Shared_FileServer |
| Exfiltration over Physical Medium: USB | T1052.001 | Compressed archive written directly to SanDisk Cruzer Orbit |
| Archive Collected Data | T1560.001 | WinRAR used to compress stolen file before exfiltration |
| Account Manipulation | T1098 | Terminated employee account retained active file server access post-termination |
Immediate access revocation on termination — jciedo’s account remained active and retained file server permissions after termination. A formal offboarding process with immediate account disablement and permission audit at separation would have prevented this entirely. AD accounts should be disabled — not merely have passwords changed — the moment termination is confirmed.
USB device restrictions — the exfiltration path was a consumer USB drive (F:\Confidential.zip). Group Policy USB restrictions (USBSTOR service disabled, removable media write-blocked) or DLP solutions that block unencrypted writes to removable media would have stopped the final exfiltration step even if the file access occurred.
Dual remote access tools as an indicator — both AnyDesk and TeamViewer were active on the workstation with an established external connection to 84.17.38.170:443. Legitimate enterprise environments rarely need two concurrent remote access tools. Monitoring for unauthorised remote access software installation and outbound connections on port 443 to known remote access infrastructure should be standard SOC detection coverage.
File server audit logging — Event IDs 5140 and 5145 captured the exact share, file, timestamp, and source IP of the access. This investigation was only possible because detailed file share auditing was enabled. Without Audit Detailed File Share enabled on the file server, the specific filename would not have been logged — only that a share was accessed. Ensuring this policy is enabled is a fundamental requirement for any environment handling sensitive data.
Session duration as a hunting signal — jciedo’s entire session from logon to logoff was under 2 minutes, accessing exactly one file. This pattern — short session, targeted single file access, immediate logoff — is a high-fidelity insider threat hunting signal. Baselining normal session duration and flagging statistical outliers is an effective detection approach for this class of threat.