Question Analysis

A Linux system shows a 'find' command used to search within .aws directories. Which specific AWS credential filename was the attacker attempting to locate?

37807632-d3da-442e-8c2e-00f44928ff8f
Question ID
6/16
Models Correct
1
Valid Answer
38%
Success Rate
Reference Answer

Human-validated correct answer for this question

credentials
Model Performance Comparison

See how different AI models performed on this question

ModelAnswerKQL QueryStatusAttemptsTimeCost
gemini-2.5-flash-preview-04-17
credentials
DeviceProcessEvents | where ActionType == "ProcessCreated" | where FileName =~ "find" | where ProcessCommandLine contains ".aws" | where ProcessCommandLine contains "-name" or ProcessCommandLine contains "-iname" | extend searchedFilename = extract(@'-i?name\s+(".*?"|\S+)', 1, ProcessCommandLine) | project Timestamp, DeviceName, InitiatingProcessAccountName, ProcessCommandLine, searchedFilename
Correct
1
11.46s
0.0048
gpt-35-turbo
No answer provided
No query generated
Incorrect
5
0.00s
0.0109
gpt-4-turbo-2024-04-09
No answer provided
No query generated
Incorrect
5
0.00s
0.2321
gpt-4.1
No answer provided
No query generated
Incorrect
5
0.00s
0.0467
gpt-4.1-finetuned
No answer provided
No query generated
Incorrect
5
0.00s
0.0685
gpt-4.1-mini
No answer provided
No query generated
Incorrect
5
0.00s
0.0080
gpt-4.1-nano
credentials
DeviceProcessEvents | where ProcessCommandLine contains "find" and ProcessCommandLine contains ".aws" | where ProcessCommandLine contains "credentials" or ProcessCommandLine contains "credential" | project TimeGenerated, DeviceName, ProcessId, InitiatingProcessFileName, ProcessCommandLine, InitiatingProcessParentFileName, InitiatingProcessParentId
Correct
1
2.04s
0.0005
gpt-4o
credentials
DeviceProcessEvents | where InitiatingProcessCommandLine contains 'find' and InitiatingProcessCommandLine has '.aws' | where InitiatingProcessCommandLine matches regex @'(?i)(credentials|config|keys)' | project TimeGenerated, DeviceName, InitiatingProcessCommandLine, FolderPath
Correct
3
23.69s
0.0344
grok-3-beta
No answer provided
No query generated
Incorrect
5
0.00s
0.0848
grok-3-mini-beta
credentials
DeviceInfo | where OSPlatform == "Linux" | join kind=inner ( DeviceProcessEvents | where ProcessCommandLine contains "find" and ProcessCommandLine contains ".aws" | extend filename = extract(@"-name\s+([^\s]+)", 1, ProcessCommandLine) | project DeviceId, ProcessCommandLine, filename ) on DeviceId | project DeviceName, ProcessCommandLine, filename | summarize UniqueFilenames = make_set(filename) by DeviceName | project DeviceName, UniqueFilenames
Correct
1
13.97s
0.0016
o1-high
No answer provided
No query generated
Incorrect
5
0.00s
0.9261
o1-low
credentials
let LinuxDevices = DeviceInfo | where OSPlatform startswith "Linux" | distinct DeviceId; DeviceProcessEvents | where DeviceId in (LinuxDevices) | where ActionType == "ProcessCreated" | where ProcessCommandLine has "find" and ProcessCommandLine has ".aws" | project TimeGenerated, DeviceName, InitiatingProcessAccountName, ProcessCommandLine, AWSFilename = extract("-name\\s+['\"]([^'\"]+)", 1, ProcessCommandLine) | where isnotempty(AWSFilename)
Correct
3
77.32s
0.4870
o3-mini-high
No answer provided
No query generated
Incorrect
5
0.00s
0.0453
o3-mini-low
credentials
DeviceProcessEvents | where InitiatingProcessCommandLine has "find" and InitiatingProcessCommandLine has ".aws" | extend credential_filename = extract("-name\\s+['\\\"]?([^'\\\"\\s]+)", 1, InitiatingProcessCommandLine) | where isnotempty(credential_filename) | project TimeGenerated, DeviceName, InitiatingProcessCommandLine, credential_filename | sort by TimeGenerated desc
Correct
3
28.92s
0.0221
o4-mini-high
No answer provided
No query generated
Incorrect
5
0.00s
0.0342
o4-mini-low
No answer provided
No query generated
Incorrect
5
0.00s
0.0297