Completed simulated digital forensics investigation analyzing repeated outbound HTTPS activity occurring during defined non-business hours. This case demonstrates structured evidence handling, baseline comparison, packet-level analysis, persistence identification, timeline reconstruction, and defensible reporting methodology.
Routine monitoring identified repeated outbound HTTPS connections originating from a Windows workstation between approximately 01:30 and 04:00 local time. The system was assigned to a non-technical user and expected to remain idle during overnight hours.
Baseline traffic analysis was conducted to establish expected behavior during normal business operations. After-hours captures were then compared against this baseline to determine whether the activity represented benign system behavior or automated execution.
Investigation scope included packet capture analysis, session timing review, and host-based artifact validation within a controlled lab environment.
Selected screenshots from the controlled lab environment used during investigation. All artifacts are purpose-built for academic simulation.
During the after-hours capture window, the workstation (10.0.2.15) initiated repeated outbound HTTPS connections to a limited set of external IP addresses. Traffic exhibited consistent timing intervals, suggesting automated rather than interactive behavior.
Baseline traffic included normal HTTPS activity to diverse destinations; however, those connections were irregular, short-lived, and user-driven. The after-hours traffic demonstrated repetitive patterns not present in baseline data.
Endpoint analysis identified a scheduled task named UpdaterService configured to execute a PowerShell script at user logon. The script performed recurring outbound web requests at fixed intervals.
Correlation of network and endpoint artifacts supports the conclusion that the observed after-hours activity was automated and enabled by a persistent scheduled execution mechanism.
Mapping is evidence-driven: each technique is tied to an observed artifact in the evidence locker and findings.
The investigation identified automated outbound network activity inconsistent with baseline user behavior. A scheduled task persistence mechanism was validated as the execution vector responsible for the observed traffic. Conclusions are limited to evidence available within the lab environment, with no attribution or external threat classification made beyond supported artifacts.