Date: 2025-07-22
Difficulty:Unknown|Easy| Medium |Hard
Reference: https://tryhackme.com/room/itsybitsy
During normal SOC monitoring, Analyst John observed an alert on an IDS solution indicating a potential C2 communication from a user Browne from the HR department. A suspicious file was accessed containing a malicious pattern THM:{ ________ }. A week-long HTTP connection logs have been pulled to investigate. Due to limited resources, only the connection logs could be pulled out and are ingested into the connection_logs index in Kibana.
Our task in this room will be to examine the network connection logs of this user, find the link and the content of the file, and answer the questions.
I just set the time filter to March 1st - March 31st:

1482
There were two possible IPs. I assumed that the IP with more traffic would be the suspicious one, the one communicating with the C2 server, but I was wrong. The IP with just two log entries was associated with the suspected user. However, if you look more closely at the connections of host 192.166.65.52, you will see only regular, common user agents (Mozilla/5.0). In contrast, host 192.166.65.54 has a suspicious user agent (bitsadmin), which indicates that it is not a regular HTTP connection from a user via browser.


192.166.65.52

192.166.65.54
192.166.65.54
The user agent referenced in question 2 was used to download a file from the C2 server.

bitsadmin
According to the log, the host is pastebin.com, as shown in the following screenshot:

The full URL consists of the host and the URI, as shown in the log:

I opened the URL mentioned in question 5 (pastebin.com/yTg0Ah6a), where a text file had been uploaded:

secret.txt
THM{_____}.The content of the file is THM{SECRET__CODE}, as shown in the following screenshot:

THM{SECRET__CODE}