Investigating Windows 2 - mattit4o/TryHackMeWriteUps GitHub Wiki

THM Investigating Windows 2.0

https://tryhackme.com/room/investigatingwindows2

Writeup in progress...

The room is the 2nd out of the Investigating windows series, and I found it more challenging than the 1st room and learned more about Windows and SysInternals tools. I also had to learn about Yara and Loki. Had to ask for some help from the forum/discord.

Tasks

#1 What registry key contains the same command that is executed within a scheduled task?

#2 What analysis tool will immediately close if/when you attempt to launch it?

#3 What is the full WQL Query associated with this script?

#4 What is the script language?

#5 What is the name of the other script?

#6 What is the name of the software company visible within the script?

#7 What 2 websites are associated with this software company? (answer, answer)

#8 Search online for the name of the script from Q5 and one of the websites from the previous answer. What attack script comes up in your search?

#9 What is the location of this file within the local machine?

#10 Which 2 processes open and close very quickly every few minutes? (answer, answer)

#11 What is the parent process for these 2 processes?

#12 What is the first operation for the first of the 2 processes?

#13 Inspect the properties for the 1st occurrence of this process. In the Event tab what are the 4 pieces of information displayed? (answer, answer, answer, answer)

#14 Inspect the disk operations, what is the name of the unusual process?

#15 Run Loki. Inspect the output. What is the name of the module after Init?

#16 Regarding the 2nd warning, what is the name of the eventFilter?

#17 For the 4th warning, what is the class name?

#18 What binary alert has the following 4d5a90000300000004000000ffff0000b8000000 as FIRST_BYTES?

#19 According to the results, what is the description listed for reason 1?

#20 Which binary alert is marked as APT Cloaked?

#21 What are the matches? (str1, str2)

#22 Which binary alert is associated with somethingwindows.dmp found in C:\TMP?

#23 Which binary is encrypted that is similar to a trojan?

#24 There is a binary that can masquerade itself as a legitimate core Windows process/image. What is the full path of this binary?

#25 What is the full path location for the legitimate version?

#26 What is the description listed for reason 1?

#27 There is a file in the same folder location that is labeled as a hacktool. What is the name of the file?

#28 What is the name of the Yara Rule MATCH?

#29 Which binary didn't show in the Loki results?

#30 Complete the yar rule file located within the Tools folder on the Desktop. What are 3 strings to complete the rule in order to detect the binary Loki didn't hit on? (answer, answer, answer)