INTRODUCTION
In this guide, I demonstrate a complete end-to-end attack simulation in my SOC lab.
This is not theory.
It shows how a real attack works and how I detect it using:
- Windows Event Logs
- Splunk queries
- MITRE ATT&CK mapping
- Dashboard visualization
- Executive reporting
The goal is to simulate a real-world scenario and analyze it like a SOC L3 analyst.
ATTACK SCENARIO
Attack type:
👉 Phishing → PowerShell Execution
Steps of the attack:
- User opens a malicious document
- Document launches PowerShell
- PowerShell executes encoded command
- Payload is downloaded or executed
This is one of the most common real-world attack chains.
STEP 1 — ATTACK EXECUTION
In a real environment, the attacker uses:
- Word or Excel document
- Embedded macro
- Hidden PowerShell execution
Example behavior:
Word → PowerShell → encoded command
STEP 2 — LOG GENERATION
This activity generates logs in:
👉 Windows EventCode 4688 (Process Creation)
Important fields captured:
- Parent process → winword.exe
- Child process → powershell.exe
- Command line → encoded command
- User → victim account
- Host → affected system
STEP 3 — DETECTION IN SPLUNK
Detection logic:
index=botsv3 EventCode=4688
| search powershell
| where like(Command_Line,”%enc%”)
What this does:
- Finds PowerShell execution
- Filters encoded commands
- Highlights suspicious activity
STEP 4 — ANALYSIS (SOC L3 THINKING)
Now we investigate:
Command Line
Encoded command → HIGH RISK
Parent Process
Word launching PowerShell → NOT normal
User
Non-technical user → suspicious
Behavior
Matches phishing pattern
STEP 5 — MITRE MAPPING
This attack maps to:
- T1566 — Phishing
- T1059.001 — PowerShell Execution
This helps classify the attack using industry standards.
STEP 6 — DASHBOARD CREATION
Panel Title:
PowerShell Abuse — MITRE T1059.001
Dashboard:
SOC L3 – Windows Attack Technique Detections
Visualization:
Table showing:
- Time
- User
- Host
- Command
- Suspicious flag
This converts raw logs into readable insights.
STEP 7 — EXECUTIVE REPORT (PDF)
The dashboard is exported to PDF.
The report includes:
- Detection summary
- MITRE mapping
- Affected systems
- Suspicious activity
This allows sharing with management.
FINAL ANALYSIS
This attack demonstrates:
- Initial access via phishing
- Execution via PowerShell
- Possible payload delivery
Risk level:
👉 High
Recommended action:
- Investigate host
- Isolate system
- Check lateral movement
WHAT THIS PROVES
This lab demonstrates that I can:
- Simulate real attacks
- Detect using logs
- Analyze behavior
- Map to MITRE
- Present findings
This is the core responsibility of a SOC L3 analyst.
COMMON LESSONS
- Most attacks start with user interaction
- PowerShell is heavily abused
- Command line analysis is critical
- Parent-child relationships reveal attacks
FINAL THOUGHT
Detection alone is not enough.
The real skill is:
👉 Understanding the full attack chain
This is what separates beginner analysts from SOC L3 professionals.

Comments are closed