Date: 2025-08-11
Difficulty:Unknown|Easy| Medium |Hard
Reference: https://tryhackme.com/room/boogeyman3
Lurking in the Dark
Without triggering any security defenses of Quick Logistics LLC, the Boogeyman managed to compromise one of the employees and remained undetected, waiting for the right moment to continue the attack. Using this initial email access, the threat actors attempted to escalate their impact by targeting the CEO, Evan Hutchinson.

The email appeared suspicious, but Evan still opened the attachment. After opening the document and noticing no immediate effect, he reported the phishing email to the security team.
Initial Investigation
Upon receiving the report, the security team investigated the CEO's workstation. They discovered the email attachment in the downloads folder:

Additionally, they observed a file inside the ISO payload:

It was presumed that the incident occurred between August 29 and August 30, 2023.
Given these initial findings, you are tasked with analysing and assessing the impact of the compromise.
I searched for "ProjectFinancialSummary_Q3.pdf" and displayed the PID and Parent PID to identify the process that executed the initial payload:

6392
I displayed the field process.command_line to see the executed commands:

"C:\Windows\System32\xcopy.exe" /s /i /e /h D:\review.dat C:\Users\EVAN~1.HUT\AppData\Local\Temp\review.dat
It was the command executed right after the event in the previous question:

"C:\Windows\System32\rundll32.exe" D:\review.dat,DllRegisterServer
This was identified from the subsequent command executed:

Review
I filtered for Sysmon Event Code 3 and the username evan.hutchinson to see newly established connections:

165.232.170.151:80
UAC bypass methods often hijack the execution flow of elevated applications. After reconnaissance commands like whoami and net, the attacker executed fodhelper.exe, which can bypass UAC prompts by modifying registry keys in HKCU:

fodhelper.exe
I searched for "github.com" and found that the attacker downloaded Mimikatz:

https://github.com/gentilkiwi/mimikatz/releases/download/2.2.0-20220919/mimikatz_trunk.zip
I searched for mimi and found the following:

itadmin:F84769D250EB95EB2D7D8B4A1C5613F2
Shortly after using Mimikatz, the attacker accessed the remote share:

IT_Automation.ps1

QUICKLOGISTICS\allan.smith:Tr!ckyP@ssw0rd987

WKSTN-1327
I searched for allan.smith and displayed process.parent.name:

wsmprovhost.exe

administrator:00f80f2538dcb54e7adc715c0e7091ec
I searched for mimi while filtering for host DC01.quicklogistics.org:

backupda
Event Code 1 (new process creation) on the DC showed an HTTP request:

http://ff.sillytechninja.io/ransomboogey.exe