Writing THM excersise solvings here and my thoughts on how to solve them
https://tryhackme.com/room/autopsy2ze0
Info from the excersice page
Username: administrator
Password: letmein123!
Starting the machine I got put into a virtual machine where I had the case files and autpsy ready.
I opened the case file in autopsy and found the MD5 hash in the E01 images metadata
MD5:
3f08c518adb3b5c1359849657a9b2079
I looked at the different files in the results page on autopsy until I found Operating System Information
Computer account name
DESKTOP-0R59DJ3
Looking for last questions answer I also saw Operating System User Account. When I opened it I found the different usernames. I filtered off the default accounts.
User accounts
H4S4N,joshwa,keshav,sandhya,shreya,sivapriya,srini,suba
On the same file there was Date Accessed on the users and I thought that would be the last log in, which in the end was correct.
Last user to log in
sivapriya
I started this by looking around a bit of the files and getting stuck, then I saw keyword list search and did a IP search. That resulted in over 2000 results so it didn’t help me too much.
After being stuck for a while I figured I’d look at installed programs, since there is a question later about network monitoring tool. I found a program Look@LAN and tried to search it in program files.
In the LookAtLAN program files I found a .ini file that had the LANIP inside. This was a tougher one.
IP:
192.168.130.216
This answer was right under the Lan IP, just withoud the dashes.
MAC:
08-00-27-2c-c4-b9
I was stuck for a bit here since I knew to look at windows registry but I couldn’t look at the registry files. Then I found out that the case files had already regripper files outputted so I searched for SOFTWARE file there to view drivers.
There I searched for Networkcards and found my result.
Network Adapter
Intel(R) PRO/1000 MT Desktop Adapter
This I already had found out while looking for the IP.
Monitoring tool
Look@LAN
I looked at the Web Bookmarks to try and find it, I saw many unnecessary bookmarks so I sorted by title since coordinates have numbers so they should be at the top and found the location.
Coordinates
12°52'23.0"N 80°13'25.0"E
To start I opened the Images/Videos on autopsy since I didn’t have anything else on mind. After looking at the users I saw Joshwa’s wallpaper and a name on the top left.
Name
Anto Joshwa
For this I thought of searching for the powershell history but I needed to figure whose history to look at.
Viewing the different users desktop we can find shreya.txt which says flag{i_changed_it}
. Knowing this we can go to the powershell history of shreya and find the flag.
Flag
flag{HarleyQuinnForQueen}
This we can see in the desktop of shreya again, there is an exploit.ps1 file. Reading the content we can find the flag.
Flag
flag{I-hacked-you}
One of these I recognized before when going through the files which was mimikatz
For the other one I looked through user downloads where mimikatz was but no luck. Didn’t see any suspicous programs either. I did some googling on where to look for hack tools and saw talk about windows defender, so I googled where to find WD data and found scan history at C:/ProgramData/Microsoft/Windows Defender/Scans/History
.
There I found the mimikatz in detection history so I knew I was close. After going through the folders I found lazagne
which I googled and was infact what I was looking for.
I did a file search by attributes with .yara files but didn’t find anything so I found out that YARA has another extension .yar so I did that. With that I found what I was looking for.
Author
Benjamin DELPY gentilkiwi
I began by googling about MS-NRPC exploits and found much articles about zerologon, so I decided to search that with keyword search.
With that search I found the encrypted zip file I was supposed to find.
Answer
2.2.0 20200918 Zerologon encrypted.zip
This challenge definitely taught me more about autopsy since I hadn’t used it that much before. It also taught alot about where to at for files in windows in general.
Definitely was on the harder side for me and took a bit of googling to get forward with certain parts.