Welcome to the team, kid. I have something for you to get your feet wet.
Our client has a newly hired employee who saw a suspicious-looking janitor exiting his office as he was about to return from lunch.
I want you to investigate if there was user activity while the user was away between 12:05 PM to 12:45 PM on the 19th of November 2022. If there are, figure out what files were accessed and exfiltrated externally.
You’ll be accessing a live system, but use the disk image already exported to the C:UsersTHM-RFedoraDesktopkape-resultsC
directory for your investigation. The link to the tools that you’ll need is in C:UsersTHM-RFedoraDesktoptools
Finally, I want to remind you that you signed an NDA, so avoid viewing any files classified as top secret. I don’t want us to get into trouble.
Connecting to the machine
Start the virtual machine in split-screen view by clicking on the green “Start Machine” button on the upper right section of this task. If the VM is not visible, use the blue “Show Split View” button at the top-right of the page. Alternatively, you can connect to the VM using the credentials below via “Remote Desktop”.

Username | THM-RFedora |
Password | Passw0rd! |
IP | MACHINE_IP |
Note: Once the VM is fully running, please run Registry Explorer immediately, as this tool may take a few minutes to fully start up when executing the program for the first time.
Pre-requisites
This room is based on the Windows Forensics 1 and Windows Forensics 2 rooms. A cheat sheet is attached below, which you can also download by clicking on the blue Download Task Files
button on the right.
Initial investigations reveal that someone accessed the user’s computer during the previously specified timeframe.
Whoever this someone is, it is evident they already know what to search for. Hmm. Curious.
Using the info on the cheatsheet navigate to windows explorer search bars in the NTUSER file using registry explorer
What file type was searched for using the search bar in Windows Explorer?
ANSWER: .pdf
What top-secret keyword was searched for using the search bar in Windows Explorer?
ANSWER: continental
Not surprisingly, they quickly found what they are looking for in a matter of minutes.
Ha! They seem to have hit a snag! They needed something first before they could continue.
Note: When using the Autopsy Tool, you can speed up the load times by only selecting “Recent Activity” when configuring the Ingest settings.

Use Autopsy to observe the logical file Kape created. As mentioned above deselect all options except recent activity when configuring ingest. Browse the ‘Web Downloads’ for a suspicious file to find the below answers.
What is the name of the downloaded file to the Downloads folder?
ANSWER: 7z2201-x64.exe
When was the file from the previous question downloaded? (YYYY-MM-DD HH:MM:SS UTC)
ANSWER: 2022-11-19 12:09:19 UTC
Registry explorer can show us pngs that have been opened
Thanks to the previously downloaded file, a PNG file was opened. When was this file opened? (YYYY-MM-DD HH:MM:SS)
ANSWER: 2022-11-19 12:10:21
Uh oh. They’ve hit the jackpot and are now preparing to exfiltrate data outside the network.
There is no way to do it via USB. So what’s their other option?


A text file was created in the Desktop folder. How many times was this file opened?
ANSWER: 2
PAY ATTENTION TO FORMAT OF NEXT ANSWER
When was the text file from the previous question last modified? (MM/DD/YYYY HH:MM)
ANSWER: 11/19/2022 12:12
Back to Autopsy for next answers (Use date discoverred in above answer to find info in the web history)
The contents of the file were exfiltrated to pastebin.com. What is the generated URL of the exfiltrated data?
ANSWER: https://pastebin.com/1FQASAav
What is the string that was copied to the pastebin URL?
ANSWER: ne7AIRhi3pdesy9RnOrN
At this point, we already have a good idea of what happened. The malicious threat actor was able to successfully find and exfiltrate data. While we could not determine who this person is, it is clear that they knew what they wanted and how to get it.
I wonder what’s so important that they risked accessing the machine in-person… I guess we’ll never know.
Anyways, you did good, kid. I guess it was too easy for you, huh?
Lost a lot of time on finding the date of when the text file was modified…..turns out I just had the formatting wrong. Pay attention gang. Other than was good fun. Thanks for reading
Leave a Reply