【Sherlocks】Blizzard-Breakdown

24k words

OPTinselTrace24-3: Blizzard Breakdown

Sherlock Scenario

Furious after discovering he’s been left off the Nice List this holiday season, one particular elf - heavily influenced by Krampus - goes rogue, determined to take revenge. Consumed by anger, he hatches a sinister plan to sabotage Christmas by targeting Santa Claus’ most critical asset - its S3 data archive! This repository holds sensitive information, including blueprints for new toys, holiday logistics, toy production schedules, and most importantly, the coveted gift list! With Christmas preparations in full swing, any disruption to this storage could cause chaos across the entire operation, threatening to derail everyone’s holiday season. Will the holiday magic prevail, or will Christmas fall into dismay?

task 1

The Victim Elf shared credentials that allowed the Rogue Elf to access the workstation. What was the Client ID that was shared?

95192516

1
2
3
4
5
6
task 2

-$cat './C/Users/lannyl/AppData/Local/IceChat Networks/IceChat/Logs/irc.quakenet.org/Query/W4yne-2024-11-13.log'

[04:20.59] <Lanny> 95 192 516
[04:21.05] <Lanny> password: 48480

task 2

What is the IP address of the Rogue Elf used during the attack?

146.70.202.35

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
└─$ cat './C/Users/lannyl/AppData/Local/IceChat Networks/IceChat/Logs/irc.quakenet.org/Query/W4yne-2024-11-13.log'     
Session Start: Wed Nov 13 03:37:28 2024
[03:37.28] <W4yne> Hey there, Lanny! Getting used to the workshop systems yet?
[03:37.29] ->> W4yne is ~IceChat95@146.70.202.35 (The Chat Cool People Use)
[03:37.29] ->> W4yne is on: #SnowHub
[03:37.29] ->> W4yne using *.quakenet.org (QuakeNet IRC Server)
[03:37.29] ->> W4yne 0 secs seconds idle, signon time 3:46 AM 11/13/2024
[03:37.29] ->> W4yne :End of /WHOIS list.
[03:45.14] <Lanny> Thanks! It’s a lot to learn, but I’m getting there!
[03:53.34] <W4yne> That’s awesome! I actually used to have your role, so I know my way around the setup. I was transferred recently, but I’d be happy to help you get sorted with everything!
[03:55.09] <Lanny> Oh, that would be amazing – it’s a bit overwhelming!
[03:56.16] <W4yne> Haha, I get it! So, there’s this tool called TeamViewer we use sometimes for remote setup. Since I’m far away, I insist we use it so I can guide you through everything directly. Here’s the link: +www.teamviewer.com.,
[04:01.47] <Lanny> Hmm but I don’t think I have the privileges to install software.
[04:03.06] <W4yne> Ah, understood. You know what? Let’s use Ammyy Admin instead – it doesn’t require installation at all. Just download it from +www.ammyy.com, and select "Run".
[04:07.46] <Lanny> Okay, trying that now.
[04:09.49] <W4yne> Great! Once it’s running, send me your ID so I can connect and set things up for you.
[04:20.46] <Lanny> Sorry for the delay, I was just on a call.
[04:20.59] <Lanny> 95 192 516
[04:21.05] <Lanny> password: 48480
[04:23.54] <Lanny> Oh no, I just remembered I have to run an errand! Could we pick this up later?
[04:25.25] <W4yne> No problem! Just leave your workstation unlocked, and I’ll handle the setup while you’re out. Everything will be ready when you’re back!
[04:26.19] <Lanny> That's really kind of you, thanks a lot!!
[04:26.39] <W4yne> Anytime! You’re in good hands. Catch you later! :D
[05:43.36] *** Server disconnected on atw.hu.quakenet.org
[05:44.46] Lanny resolved to 37.19.205.149
[07:26.22] *** Server disconnected on tngnet.nl.quakenet.org
[07:31.04] Lanny resolved to 37.19.205.149
[08:17.52] *** Server disconnected on adrift.sg.quakenet.org
[08:19.02] Lanny resolved to 37.19.205.149
[08:40.10] <Lanny> Hey! Just got back. I had a quick meeting with Santa and GandElf too. Busy day!
[08:42.53] <W4yne> That sounds great! I wasn’t able to finish setting up your PC earlier since it got disconnected. We can pick up where we left off next time.
[08:44.28] <Lanny> No worries at all! Thanks for putting in the effort. I really appreciate it! :)

task 3

What is the name of the executable the victim ran to enable remote access to their system?

AA_V3.EXE

1
2
3
4
5
6
7
8
9
10
└─$ strings './C/Users/lannyl/AppData/Local/Microsoft/Edge/User Data/Default/Cache/Cache_Data/data_3' |grep AA_v3 -A4 -B4
Date: Wed, 13 Nov 2024 12:06:15 GMT
Server: Apache/2.4.6 (CentOS)
X-Powered-By: PHP/5.4.16
Content-Description: File Transfer
Content-Disposition: attachment; filename=AA_v3.exe
Content-Transfer-Encoding: binary
Expires: 0
Cache-Control: must-revalidate
Pragma: public
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
└─$ strings './C/Users/lannyl/AppData/Local/Microsoft/Edge/User Data/Default/History' |grep AA_ -A3 -B3
9G=C377be162-c025-4eb9-a464-13e9db13561eC:\Users\lannyl\Downloads\WinSCP-6.3.5-Setup.exeC:\Users\lannyl\Downloads\WinSCP-6.3.5-Setup.exe
https://winscp.net/
https://winscp.net/download/WinSCP-6.3.5-Setup.exe/downloadhttps://winscp.net/eng/download.php"b12dc8-621c0bfc414c0"Tue, 10 Sep 2024 09:46:35 GMTapplication/x-msdownloadapplication/x-msdos-program
==397e31c5-e704-451b-a478-a556e2c7db3eC:\Users\lannyl\Downloads\AA_v3.exeC:\Users\lannyl\Downloads\AA_v3.exe
https://www.ammyy.com/en/
https://www.ammyy.com/en/application/x-msdownloadapplication/octet-stream
3G==304d1e94-df53-4df9-b058-cff016d22f8aC:\Users\lannyl\Downloads\TeamViewer_Setup_x64.exeC:\Users\lannyl\Downloads\TeamViewer_Setup_x64.exe
--
https://www.teamviewer.com/apac/download/windows/?msockid=311da22d274e6433063fb71926d36559https://www.bing.com/"0x8DD02FD0FEA51BC"Tue, 12 Nov 2024 09:33:27 GMTapplication/x-msdownloadapplication/octet-stream
https://awscli.amazonaws.com/AWSCLIV2.msid
https://cdn.winscp.net/files/WinSCP-6.3.5-Setup.exe?secure=KQcuyC2LUNMUTyiuFxyh6w==,17315057420
https://www.ammyy.com/AA_v3.php?v=402517235
https://dl.teamviewer.com/download/version_15x/TeamViewer_Setup_x64.exe?ref=https%3A%2F%2Fwww.teamviewer.com%2Fapac%2Fdownload%2Fwindows%2F%3Fmsockid%3D311da22d274e6433063fb71926d36559
https://dl.teamviewer.com/download/TeamViewer_Setup_x64.exe?ref=https%3A%2F%2Fwww.teamviewer.com%2Fapac%2Fdownload%2Fwindows%2F%3Fmsockid%3D311da22d274e6433063fb71926d36559G
https://download.teamviewer.com/download/TeamViewer_Setup_x64.exe

task 4

What time (UTC) did the Rogue Elf connect to the victim’s workstation?

2024-11-13 12:23:34

1
2
3
4
5
└─$ cat Ammyy/access.log 
20241113-04:23:34.386000 0000273C - [0] PASSED authorization remoteId=95192584; TCP by router 136.243.104.242:443
20241113-04:51:54.357000 0000273C - [0] ENDED authorized session, bytes recv/send = 19800 / 9826861

+8 = utf-0

task 5

The Rogue Elf compromised an AWS Access Key. What is the AWS Access Key ID obtained from the victim’s workstation?

AKIA52GPOBQCBFYGAYHI

1
2
3
4
5
6
└─$ ls ./AppData/Local/Packages/Microsoft.MicrosoftStickyNotes_8wekyb3d8bbwe/LocalState/               
plum.sqlite plum.sqlite-shm plum.sqlite-wal

./AppData/Local/Packages/Microsoft.MicrosoftStickyNotes_8wekyb3d8bbwe/LocalState/plum.sqlite-wal:\id=8bf500ec-b98a-4101-bb85-718b7e0ed050 AKIA52GPOBQCBFYGAYHI,am+9GTskhPr9gg1h9gfmaUjHKjqk3vkSvNxKYxBhManagedPosition=DeviceId:\\?\DISPLAY#Default_Monitor#4&
427137e&0&UID0#{e6f07b5f-ee97-4a90-b076-33f57bf4eaa7};Position=1449,300;Size=320,320Blue29846647-2897-447c-9044-073ce5cca1539e9c1da0-0b08-43d4-9da4-49752fca3aew
((U?# UU\id=d7a6696c-cfe6-40ab-84e9-c08d645e7c91 Access key ID,Secret access key

task 6

Within the targeted S3 bucket, what is the name of the main directory where the files were stored?

arctic-archive-freezer

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
└─$ cat log|grep 13/|awk -F '_CloudTrail' '{print $1}'|uniq -c|sort -u
1 ./me-south-1/2024/11/13/949622803460
2 ./me-central-1/2024/11/13/949622803460
52 ./eu-west-3/2024/11/13/949622803460
53 ./ca-central-1/2024/11/13/949622803460
58 ./ap-southeast-1/2024/11/13/949622803460
64 ./ap-northeast-1/2024/11/13/949622803460
66 ./us-west-1/2024/11/13/949622803460
71 ./ap-northeast-2/2024/11/13/949622803460
79 ./ap-south-1/2024/11/13/949622803460
79 ./ap-southeast-2/2024/11/13/949622803460
87 ./eu-west-1/2024/11/13/949622803460
90 ./eu-north-1/2024/11/13/949622803460
95 ./sa-east-1/2024/11/13/949622803460
97 ./us-west-2/2024/11/13/949622803460
368 ./eu-west-2/2024/11/13/949622803460
464 ./us-east-2/2024/11/13/949622803460
572 ./us-east-1/2024/11/13/949622803460
574 ./eu-central-1/2024/11/13/949622803460

└─$ find . -name *json.gz|xargs zcat {} |jq|grep bucketName|sort -u|grep -E '[^-]{6}-' -m1
gzip: {}.gz: No such file or directory
gzip: {}.gz: No such file or directory
gzip: {}.gz: No such file or directory
gzip: {}.gz: No such file or directory
gzip: {}.gz: No such file or directory
gzip: {}.gz: No such file or directory
"bucketName": "arctic-archive-freezer",

task 7

Within the targeted S3 bucket, what is the name of the main directory where the files were stored?

Claus_Operation_Data

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
└─$ zcat ./*/*/*/*/*|grep 'arctic-archive-freezer'  |jq|grep prefix
"prefix": "",
"prefix": "Claus_Operation_Data/blueprints/",
"prefix": "Claus_Operation_Data/",
"prefix": "Claus_Operation_Data/blueprints/",
"prefix": "",
"prefix": "Claus_Operation_Data/",
"prefix": "Claus_Operation_Data/blueprints/",
"prefix": "Claus_Operation_Data/gift_lists/",
"prefix": "Claus_Operation_Data/operational_files/",
"prefix": "Claus_Operation_Data/security_protocols/",
"prefix": "Claus_Operation_Data"
"prefix": "Claus_Operation_Data/"
"prefix": "Claus_Operation_Data/"
"prefix": "Claus_Operation_Data/"
"prefix": "Claus_Operation_Data"
"prefix": "Claus_Operation_Data/"
"prefix": "Claus_Operation_Data/blueprints/",
"prefix": "",
"prefix": "Claus_Operation_Data/",

task 8

What time (UTC) did the Rogue Elf disable versioning for the S3 bucket?

2024-11-13 15:31:15

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
2020年9月10日 — Versioning cannot be turned off, it can only be Suspended. So, yes, you would use Status=Suspended to deactivate the Versioning process.

└─$ zcat ./*/*/*/*/*|grep 's3' |jq|grep Suspended -B15
"accountId": "949622803460",
"accessKeyId": "AKIA52GPOBQCBFYGAYHI",
"userName": "arctic-archive-user"
},
"eventTime": "2024-11-13T15:31:15Z",
"eventSource": "s3.amazonaws.com",
"eventName": "PutBucketVersioning",
"awsRegion": "us-east-1",
"sourceIPAddress": "146.70.202.35",
"userAgent": "[aws-cli/2.20.0 md/awscrt#0.22.0 ua/2.0 os/windows#10 md/arch#amd64 lang/python#3.12.6 md/pyimpl#CPython cfg/retry-mode#standard md/installer#exe md/prompt#off md/command#s3api.put-bucket-versioning]",
"requestParameters": {
"bucketName": "arctic-archive-freezer",
"Host": "arctic-archive-freezer.s3.us-east-1.amazonaws.com",
"versioning": "",
"VersioningConfiguration": {
"Status": "Suspended",

task 9

What is the MITRE ATT&CK Technique ID associated with the method used in Question 8?

T1490

1
2
3
4
5
6
7
8
9
10

google "disable versioning for the S3 bucket e MITRE ATT&CK"

---
Inhibit System Recovery, Technique T1490 - Enterprise

MITRE ATT&CK®
https://attack.mitre.org › techniques
2019年4月2日 — In cloud environments, adversaries may disable versioning and backup policies and delete snapshots, database backups, machine images, and prior ...

task 10

What time (UTC) was the first restore operation successfully initiated for the S3 objects?

2024-11-13 15:43:49

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
└─$ zcat ./*/*/*/*/*|grep 's3'  |grep RestoreObject|jq -c '.Records.[]|select(.eventName == "RestoreObject" and .errorCode == null)|{eventTime,eventName}'
{"eventTime":"2024-11-13T15:43:49Z","eventName":"RestoreObject"}
{"eventTime":"2024-11-13T15:43:58Z","eventName":"RestoreObject"}
{"eventTime":"2024-11-13T15:44:09Z","eventName":"RestoreObject"}
{"eventTime":"2024-11-13T15:44:17Z","eventName":"RestoreObject"}
{"eventTime":"2024-11-13T15:44:40Z","eventName":"RestoreObject"}
{"eventTime":"2024-11-13T15:44:42Z","eventName":"RestoreObject"}
{"eventTime":"2024-11-13T15:44:45Z","eventName":"RestoreObject"}
{"eventTime":"2024-11-13T15:44:50Z","eventName":"RestoreObject"}
{"eventTime":"2024-11-13T15:44:47Z","eventName":"RestoreObject"}
{"eventTime":"2024-11-13T15:44:52Z","eventName":"RestoreObject"}
{"eventTime":"2024-11-13T15:44:54Z","eventName":"RestoreObject"}
{"eventTime":"2024-11-13T15:44:57Z","eventName":"RestoreObject"}
{"eventTime":"2024-11-13T15:44:59Z","eventName":"RestoreObject"}
{"eventTime":"2024-11-13T15:45:03Z","eventName":"RestoreObject"}
{"eventTime":"2024-11-13T15:45:06Z","eventName":"RestoreObject"}
{"eventTime":"2024-11-13T15:45:09Z","eventName":"RestoreObject"}
{"eventTime":"2024-11-13T15:45:12Z","eventName":"RestoreObject"}
{"eventTime":"2024-11-13T15:45:15Z","eventName":"RestoreObject"}
{"eventTime":"2024-11-13T15:45:20Z","eventName":"RestoreObject"}
{"eventTime":"2024-11-13T15:45:17Z","eventName":"RestoreObject"}

task 11

Which retrieval option did the Rogue Elf use to restore the S3 objects?

Expedited

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
└─$ zcat ./*/*/*/*/*|grep 's3'  |grep RestoreObject|jq  '.Records.[]|select(.eventName == "RestoreObject" and .errorCode == null)'                                                                                                                            
{
"eventVersion": "1.10",
"userIdentity": {
"type": "IAMUser",
"principalId": "AIDA52GPOBQCHOIPNIEEH",
"arn": "arn:aws:iam::949622803460:user/arctic-archive-user",
"accountId": "949622803460",
"accessKeyId": "AKIA52GPOBQCBFYGAYHI",
"userName": "arctic-archive-user"
},
"eventTime": "2024-11-13T15:43:49Z",
"eventSource": "s3.amazonaws.com",
"eventName": "RestoreObject",
"awsRegion": "us-east-1",
"sourceIPAddress": "146.70.202.35",
"userAgent": "[aws-cli/2.20.0 md/awscrt#0.22.0 ua/2.0 os/windows#10 md/arch#amd64 lang/python#3.12.6 md/pyimpl#CPython cfg/retry-mode#standard md/installer#exe md/prompt#off md/command#s3api.restore-object]",
"requestParameters": {
"bucketName": "arctic-archive-freezer",
"Host": "arctic-archive-freezer.s3.us-east-1.amazonaws.com",
"RestoreRequest": {
"xmlns": "http://s3.amazonaws.com/doc/2006-03-01/",
"Days": 1,
"GlacierJobParameters": {
"Tier": "Expedited"
}
},
"restore": "",
"key": "Claus_Operation_Data/AI_HoHoHoliday_Helper_Link.txt"
},
...

task 12

What is the filename of the S3 object that the Rogue Elf attempted to delete?

GiftList_Worldwide.csv

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
└─$ zcat ./*/*/*/*/*|grep 's3'  |grep '146.70.202.35'|grep -i 'deleteObject'|jq                                                                                                                                                                               
{
"Records": [
{
"eventVersion": "1.10",
"userIdentity": {
"type": "IAMUser",
"principalId": "AIDA52GPOBQCHOIPNIEEH",
"arn": "arn:aws:iam::949622803460:user/arctic-archive-user",
"accountId": "949622803460",
"accessKeyId": "AKIA52GPOBQCBFYGAYHI",
"userName": "arctic-archive-user"
},
"eventTime": "2024-11-13T16:04:09Z",
"eventSource": "s3.amazonaws.com",
"eventName": "DeleteObject",
"awsRegion": "us-east-1",
"sourceIPAddress": "146.70.202.35",
"userAgent": "[aws-cli/2.20.0 md/awscrt#0.22.0 ua/2.0 os/windows#10 md/arch#amd64 lang/python#3.12.6 md/pyimpl#CPython cfg/retry-mode#standard md/installer#exe md/prompt#off md/command#s3.rm]",
"errorCode": "AccessDenied",
"errorMessage": "User: arn:aws:iam::949622803460:user/arctic-archive-user is not authorized to perform: s3:DeleteObject on resource: \"arn:aws:s3:::arctic-archive-freezer/Claus_Operation_Data/gift_lists/GiftList_Worldwide.csv\" because no identity-
based policy allows the s3:DeleteObject action",
"requestParameters": {
"bucketName": "arctic-archive-freezer",
"Host": "arctic-archive-freezer.s3.us-east-1.amazonaws.com",
"key": "Claus_Operation_Data/gift_lists/GiftList_Worldwide.csv"
},
"responseElements": null,
"additionalEventData": {
"SignatureVersion": "SigV4",
"CipherSuite": "TLS_AES_128_GCM_SHA256",
"bytesTransferredIn": 0,
"AuthenticationMethod": "AuthHeader",
"x-amz-id-2": "BA8zisWwtuss2Bsy7AVVeeS7HHyit1qbn9ZKlzwOmZg0mgT4FWH98Ysny9KKuDV3wAecsaY1Ddo=",
"bytesTransferredOut": 505

task 13

What is the size (MB) of the S3 object that the Rogue Elf targeted in Question 12?

152

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
└─$ zcat ./*/*/*/*/*|grep 'GiftList_Worldwide.csv' |jq '.Records.[]|select(.requestParameters.key=="Claus_Operation_Data/gift_lists/GiftList_Worldwide.csv")|{b: .requestParameters.key, a:.additionalEventData.bytesTransferredOut}'|grep 83
"a": 8388608
"a": 8388608
"a": 8388608
"a": 8388608
"a": 8388608
"a": 8388608
"a": 8388608
"a": 8388608
"a": 8388608
"a": 8388608
"a": 8388608
"a": 8388608
"a": 8388608
"a": 8388608
"a": 8388608
"a": 8388608
"a": 8388608
"a": 8388608
"a": 8388608

─$ zcat ./*/*/*/*/*|grep 'GiftList_Worldwide.csv' |jq '.Records.[]|select(.requestParameters.key=="Claus_Operation_Data/gift_lists/GiftList_Worldwide.csv")|{b: .requestParameters.key, a:.additionalEventData.bytesTransferredOut}'|grep 83|wc
19 38 285

19 * 8 = 152

task 14

The Rogue Elf uploaded corrupted files to the S3 bucket. What time (UTC) was the first object replaced during the attack?

2024-11-13 16:10:03

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
└─$ zcat ./*/*/*/*/*|grep 's3'  |grep '146.70.202.35'|jq '.Records.[]|select( .eventName=="PutObject" and .errorCode==null)|{eventTime,eventName}' -c 
{"eventTime":"2024-11-13T16:10:03Z","eventName":"PutObject"}
{"eventTime":"2024-11-13T16:10:06Z","eventName":"PutObject"}
{"eventTime":"2024-11-13T16:11:06Z","eventName":"PutObject"}
{"eventTime":"2024-11-13T16:11:08Z","eventName":"PutObject"}
{"eventTime":"2024-11-13T16:11:13Z","eventName":"PutObject"}
{"eventTime":"2024-11-13T16:11:15Z","eventName":"PutObject"}
{"eventTime":"2024-11-13T16:11:17Z","eventName":"PutObject"}
{"eventTime":"2024-11-13T16:11:20Z","eventName":"PutObject"}
{"eventTime":"2024-11-13T16:11:24Z","eventName":"PutObject"}
{"eventTime":"2024-11-13T16:11:22Z","eventName":"PutObject"}
{"eventTime":"2024-11-13T16:11:27Z","eventName":"PutObject"}
{"eventTime":"2024-11-13T16:11:29Z","eventName":"PutObject"}
{"eventTime":"2024-11-13T16:11:32Z","eventName":"PutObject"}
{"eventTime":"2024-11-13T16:11:34Z","eventName":"PutObject"}
{"eventTime":"2024-11-13T16:11:37Z","eventName":"PutObject"}
{"eventTime":"2024-11-13T16:11:39Z","eventName":"PutObject"}
{"eventTime":"2024-11-13T16:11:41Z","eventName":"PutObject"}
{"eventTime":"2024-11-13T16:11:44Z","eventName":"PutObject"}
{"eventTime":"2024-11-13T16:11:46Z","eventName":"PutObject"}
{"eventTime":"2024-11-13T16:11:11Z","eventName":"PutObject"}

task 15

What storage class was used for the S3 objects to mimic the original settings and avoid suspicion?

GLACIER

1
2
3
4
└─$ zcat ./*/*/*/*/*|grep 's3'  |grep '146.70.202.35'|jq '.Records.[]|select( .eventName=="PutObject" and .errorCode==null)' -c                                                                                                                               {"eventVersion":"1.10","userIdentity":{"type":"IAMUser","principalId":"AIDA52GPOBQCHOIPNIEEH","arn":"arn:aws:iam::949622803460:user/arctic-archive-user","accountId":"949622803460","accessKeyId":"AKIA52GPOBQCBFYGAYHI","userName":"arctic-archive-user"},"eventTime":"2024-11-13T16:10:03Z","eventSource":"s3.amazonaws.com","eventName":"PutObject","awsRegion":"us-east-1","sourceIPAddress":"146.70.202.35","userAgent":"[aws-cli/2.20.0 md/awscrt#0.22.0 ua/2.0 os/windows#10 md/arch#amd64 lang/python#3.12.6 md/pyim
pl#CPython cfg/retry-mode#standard md/installer#exe md/prompt#off md/command#s3.cp]","requestParameters":{"bucketName":"arctic-archive-freezer","Host":"arctic-archive-freezer.s3.us-east-1.amazonaws.com","key":"Claus_Operation_Data/AI_HoHoHoliday_Helper_Link.txt","x-amz-storage-class":"GLACIER"},"responseElements":{"x-amz-server-side-encryption":"AES256","x-amz-storage-class":"GLACIER"},"additionalEventData":{"SignatureVersion":"SigV4","CipherSuite":"TLS_AES_128_GCM_SHA256","bytesTransferredIn":0,"SSEApplied":"Default_SSE_S3","AuthenticationMethod":"AuthHeader","x-amz-id-2":"MZmT13mUM+4sjnQw+u1bj6z0vUbe5JxMCpMV3fSD/n9CtgHReLtyw4mhDqm8zJ7UIMNgYAh3QNM=","bytesTransferredOut":0},"requestID":"MEDR3K2C6TBC1E55","eventID":"d00a00ee-c459-4c50-9d80-c2e4d352e6e5","readOnly":false,"resources":[{"type":"AWS::S3::Object","ARN":"arn:aws:s3:::arctic-archive-freezer/Claus_Operation_Data/AI_HoHoHoliday_Helper_Link.txt"},{"accountId":"949622803460","type":"AWS::S3::Bucket","ARN":"arn:aws:s3:::arctic-archive-freezer"}],"eventType":"AwsApiCall","managementEvent":false,"recipientAccountId":"949622803460","eventCategory":"Data","tlsDetails":{"tlsVersion":"TLSv1.3","cipherSuite":"TLS_AES_128_GCM_SHA256","clientProvidedHostHeader":"arctic-archive-freezer.s3.us-east-1.amazonaws.com"}}

"x-amz-storage-class":"GLACIER"