Unattended TryHackMe
Use your Windows forensics knowledge to investigate an incident.
Last updated
Use your Windows forensics knowledge to investigate an incident.
Last updated
Our client has a newly hired employee who saw a suspicious-looking janitor exiting his office as he was about to return from lunch.
I want you to investigate if there was user activity while the user was away between 12:05 PM to 12:45 PM on the 19th of November 2022. If there are, figure out what files were accessed and exfiltrated externally.
Initial investigations reveal that someone accessed the user's computer during the previously specified timeframe.
Whoever this someone is, it is evident they already know what to search for. Hmm. Curious.
Use the RegistryExplorer tool to check the "Windows Explorer Address/Search Bars" task in Windows Forensics 1 room.
المهم افتح registry explorer سيبها تاخد وقتها
بعد كدا file < load hive
C:\Users\THM-RFedora\Desktop\kape-results\C\Users\THM-RFedora\NTUSER.DAT
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\TypedPaths
it's empty فاضي
نروح للتاني
go to
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\WordWheelQuery
Ans : .pdf
Ans : Continental
Task 4
Note: When using the Autopsy Tool, you can speed up the load times by only selecting "Recent Activity" when configuring the Ingest settings.
open Autopsy tool the create new case
press next then press finish
finish and lets answer the questions
Ans : 7z2201-x64.exe
Ans : 2022-11-19 12:09:19UTC
let's back to reg explorer and searching for png files
Ans : 2022-11-19 12:10:21
Task 5 Sending it outside
Uh oh. They've hit the jackpot and are now preparing to exfiltrate data outside the network.
There is no way to do it via USB. So what's their other option?
Check out the machine's Jump Lists using the JLECmd.exe tool.
let's open CMD
GO TO TOOLS AND RUN THIS
JLECmd -d c:\Users\THM-RFedora\Desktop\kape-results\C\Users\THM-RFedora
ANS : 2
Ans : 11/19/2022 12:12
let's back to Autopsy
Go to web history filtering the result by searching for pastebin.com
Ans : https://pastebin.com/1FQASAva'
Ans : ne7AIRhi3PdESy9RnOrN
At this point, we already have a good idea of what happened. The malicious threat actor was able to successfully find and exfiltrate data. While we could not determine who this person is, it is clear that they knew what they wanted and how to get it.
I wonder what's so important that they risked accessing the machine in-person... I guess we'll never know.
but it was to easy , Thanks for reading 🔰 , I appreciate 🥰
Use the Autopsy tool to check the "IE/Edge History" of the target machine.