exam questions

Exam CS0-003 All Questions

View all questions & answers for the CS0-003 exam

Exam CS0-003 topic 1 question 221 discussion

Actual exam question from CompTIA's CS0-003
Question #: 221
Topic #: 1
[All CS0-003 Questions]

An incident response analyst is investigating the root cause of a recent malware outbreak. Initial binary analysis indicates that this malware disables host security services and performs cleanup routines on its infected hosts, including deletion of initial dropper and removal of event log entries and prefetch files from the host. Which of the following data sources would most likely reveal evidence of the root cause? (Choose two.)

  • A. Creation time of dropper
  • B. Registry artifacts
  • C. EDR data
  • D. Prefetch files
  • E. File system metadata
  • F. Sysmon event log
Show Suggested Answer Hide Answer
Suggested Answer: BE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Kmelaun
Highly Voted 1 year ago
Selected Answer: BE
The question says that the Malware would disables any host security services (which is C. EDR) and performs clean-up routines on it's affected host in eluding deletion of initial dropper (A.Creation time of dropper) and removal of event log entries (F.Sysmon event log) and prefetch files from the host (D.Prefetch files). So wouldn't the only left be B.Registry artifacts and E. File System metadata?
upvoted 21 times
kinny4000
7 months ago
Sysmon event logs are a separate service to windows event logs, they weren't deleted.
upvoted 1 times
...
...
fuzzyguzzy
Most Recent 5 months ago
Selected Answer: BE
B. Registry artifacts E. File system metadata I was stuck between E and F, but the question says event logs were deleted and file system metadata can be extracted from file recovery or inspecting timestamps of modified files.
upvoted 1 times
...
cy_analyst
7 months ago
Selected Answer: BF
Sysmon logs provide detailed monitoring of system activity, including process creation, file modifications, and network activity. It operates independently from the normal Windows event logs, which the malware is likely trying to erase or manipulate. Even if the malware is trying to erase traditional event logs, Sysmon may still capture events like process execution (when the dropper first ran), file modifications, or network connections. Sysmon is typically harder for malware to disable or clean up fully, as it logs more granular details about system activity. Since the malware is tampering with logs, using an alternative logging source like Sysmon can provide more robust evidence of what happened.
upvoted 2 times
cy_analyst
6 months, 3 weeks ago
I change the answer of F for B because of the facts in this context:While EDR data can technically be tampered with or deleted if the malware has sufficiently high privileges, its architecture often makes it more difficult to fully wipe out, especially if data is sent remotely or tamper-resistant mechanisms are in place. This is why EDR data can sometimes still provide useful artifacts, even in scenarios where the attacker has high-level access.
upvoted 1 times
...
...
kinny4000
7 months ago
Selected Answer: BF
Everything has been tampered with other than the registry, file system metadata and sysmon entries. So obviously the registry should be checked, it's between sysmon and metadata. Sysmon will store more info than metadata so sysmon is the clear winner. (Sysmon is a separate logging system than windows event logs, if setup properly they can contain more data than windows event logs.
upvoted 1 times
...
SH_
7 months, 2 weeks ago
Selected Answer: BE
BE during forensic analysis
upvoted 1 times
...
section8santa
1 year, 1 month ago
Selected Answer: CF
C. EDR data: Endpoint Detection and Response (EDR) tools are designed to continuously monitor endpoint and network events and store this information in a centralized database. EDR data can provide detailed information about the processes that have been executed on the infected hosts, network connections that were established, and possibly the actions taken by the malware before event logs and prefetch files were deleted. F. Sysmon event log: System Monitor (Sysmon) is a Windows system service and device driver that remain resident across system reboots to monitor and log system activity to the Windows event log. It provides detailed information about process creations, network connections, and changes to file creation time, which malware often modifies. Sysmon logs can be very comprehensive and, if configured properly before an incident, could provide information that regular event logs do not capture, especially since malware often targets and deletes standard Windows event logs to cover its tracks.
upvoted 2 times
...
RottenBarracuda
1 year, 1 month ago
Selected Answer: BF
EDR wont work if the malware disabling it.
upvoted 2 times
...
Bogus1488
1 year, 1 month ago
Selected Answer: BE
B and E?
upvoted 4 times
...
Franky30
1 year, 1 month ago
Selected Answer: CE
B. Registry artifacts: Malware often leaves traces in the Windows Registry, and analyzing registry entries can provide insights into the activities of the malware, including changes made to the system settings. E. File system metadata: File system metadata, such as file creation times, modification times, and access times, can reveal information about the malware's actions, including the creation time of the initial dropper and other files manipulated during cleanup routines.
upvoted 4 times
...
Tdarling77
1 year, 1 month ago
C, E. Here are the two data sources most likely to reveal evidence of the root cause of the malware outbreak, considering the malware's cleanup routines: C. EDR data: Endpoint Detection and Response (EDR) solutions offer extensive visibility into endpoint activity. Even though the malware attempts to remove evidence by deleting prefetch files and event logs, EDR solutions might have already captured these details before they were erased. EDR can provide valuable information about the initial infection vector, suspicious processes, and network connections that could lead to the root cause. E. File system metadata: File system metadata includes information about files beyond their content, such as creation time, modification time, and access time. While the malware deletes the dropper file itself, the file system metadata associated with the deleted dropper file might still be present. This metadata, particularly the creation time (A.), could be crucial in pinpointing when the initial infection occurred and potentially identifying the entry point.
upvoted 1 times
...
Jhonattan0032
1 year, 2 months ago
Selected Answer: BF
Registry artifacts and Sysmon event log
upvoted 2 times
jspecht
1 year, 2 months ago
It says the malware removed event log entries so it's unclear exactly which ones. If Sysmon was not cleared, it would be very helpful in determining the root cause.
upvoted 2 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago