Date: 2025-08-10
Difficulty:Unknown|Easy| Medium |Hard
Reference: https://tryhackme.com/room/boogeyman2
The Boogeyman is back!
Maxine, a Human Resource Specialist working for Quick Logistics LLC, received an application from one of the open positions in the company. Unbeknownst to her, the attached resume was malicious and compromised her workstation.

The security team was able to flag some suspicious commands executed on the workstation of Maxine, which prompted the investigation. Given this, you are tasked to analyse and assess the impact of the compromise.



Resume_WesleyTaylor.doc
I saved the attachment and used md5sum to get the hash:

52c4384a0b9e248b95804352ebec6c5b
I used strings to analyze the document:

https://files.boogeymanisback.lol/aa2a9c53cbb80416d3b47d85538d9971/update.png
Using strings again, I saw that shortly after the URL from the previous question, wscript.exe was being executed:

wscript.exe
wscript.exe executed C:\ProgramData\update.js:

C:\ProgramData\update.js
Using the memory dump "WKSTN-2961.raw" and Volatility, I ran the following command to get the running processes:
vol -f WKSTN-2961.raw windows.pstree | grep -B 10 -A 10 "wscript.exe"

4260
Using the pstree module of Volatility (like in the previous question), you can see the hierarchy of the processes:

1124
I used strings on the memory dump and grepped for the domain boogeymanisback.lol from question 5:

https://files.boogeymanisback.lol/aa2a9c53cbb80416d3b47d85538d9971/update.exe
Using pstree again, you can see that wscript.exe spawned a child process updater.exe:

6216
Using the modules pslist or pstree only provides the name but not the full path. I used the windows.dlllist module to get the needed information:

C:\Windows\Tasks\updater.exe
Knowing the PID and binary of the process that initiated the C2 connection, I used netscan to get the needed information:

128.199.95.189:8080
Using the filescan module and grepping for "doc" provided the answer:

C:\Users\maxine.beck\AppData\Local\Microsoft\Windows\INetCache\Content.Outlook\WQHGZCFI\Resume_WesleyTaylor (002).doc
Using strings and grep, I filtered for schtasks, the Windows tool for creating a scheduled task:

schtasks /Create /F /SC DAILY /ST 09:00 /TN Updater /TR 'C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -NonI -W hidden -c \"IEX ([Text.Encoding]::UNICODE.GetString([Convert]::FromBase64String((gp HKCU:\Software\Microsoft\Windows\CurrentVersion debug).debug)))\"';