TryHackMe New Hire Old Artifacts Old walkthrough

Nihir Zala
4 min readJan 18, 2023

--

Hi, Welcome to my first THM walk-through where I will show you how to complete the box New Hire Old Artifacts! I hope that you will enjoy!!!

Here is the link to the box: https://tryhackme.com/room/newhireoldartifacts

We start by looking at the commands that were used on the cmd to try and find the password file that was on the server

search parameters used : source="WinEventLog:Microsoft-Windows-Sysmon/Operational"

Question #1: A Web Browser Password Viewer executed on the infected machine. What is the name of the binary? Enter the full path.

Usually hackers like to use the Temp folder to download there files and I found a bunch of executables that were found in the \Temp folder and decided to add the \Temp parameter to my search:

source="WinEventLog:Microsoft-Windows-Sysmon/Operational" \Temp

With that we found the answer to question number one

answer: C:\Users\FINANC~1\AppData\Local\Temp\11111.exe

Question #2: What is listed as the company name?

The way we answer this is we add another field to the search called Company.

answer: NirSoft

Question #3: Another suspicious binary running from the same folder was executed on the workstation. What was the name of the binary? What is listed as its original filename? (format: file.xyz,file.xyz):

We do some digging and decide to go with the command output listed below:

source="WinEventLog:Microsoft-Windows-Sysmon/Operational" C:\\Users\\FINANCE01\\AppData\\Local\\Temp\\ NOT 11111.exe NOT nw12576_540906275 NOT Rkd6YzHKNCjHb NOT build.exe   NOT *.tmp NOT Procmon64 NOT splunk DestinationIp="2.56.59.42"

We revert back from question 4 and find that the program that is trying to connect to the server is IonicLarger.exe. To find the original name I decided to take a step back and enter IonicLarger.exe as the only search parameter and added the OriginalFilename field to the the selected fields.

By doing this I was able to find out the original filename.

answer: PalitExplorer.exe

Search Parameters:

source="WinEventLog:Microsoft-Windows-Sysmon/Operational" IonicLarge.exe OriginalFileName="PalitExplorer.exe"

Question 4: The binary from the previous question made two outbound connections to a malicious IP address. What was the IP address? Enter the answer in a defang format.

We did question 4 before we did question 3 and used the field DestinationIp to answer the question.

answer: 2.56.59.42

Question 5: The same binary made some change to a registry key. What was the key path?

The way we found this question was we used the search params IonicLarge.exe HKLM and found the answer in the first event.

answer: HKLM\SOFTWARE\Policies\Microsoft\Windows Defender

Question 6: Some processes were killed and the associated binaries were deleted. What were the names of the two binaries? (format: file.xyz,file.xyz)

We used the hint from question 6 and used taskkill /im as the search parameter and that is how we found the answer.

answer: phcIAmLJMAIMSa9j9MpgJo1m.exe, WvmIOrcfsuILdX6SNwIRmGOJ.exe

Question 7: For question 7 I ran powershell as the only search parameter and found the answer in the Commandline field at the very bottom.

answer: powershell WMIC /NAMESPACE:\\root\Microsoft\Windows\Defender PATH MSFT_MpPreference call Add ThreatIDDefaultAction_Ids=2147735503 ThreatIDDefaultAction_Actions=6 Force=True

Question 8: Based on the previous answer, what were the four IDs set by the attacker? Enter the answer in order of execution. (format: 1st,2nd,3rd,4th)

From the same search as question 7 we once again went to the commandline field and found the answers there.

answer: 2147735503, 2147737007, 2147737010, 2147737394

Question 9: Another malicious binary was executed on the infected workstation from another AppData location. What was the full path to the binary? For this one we just used AppData as the search parameter and found it as one of the first results.

answer: C:\Users\Finance01\AppData\Roaming\EasyCalc\EasyCalc.exe

Question 10: What were the DLLs that were loaded from the binary from the previous question? Enter the answers in alphabetical order. (format: file1.dll,file2.dll,file3.dll)

For this we use EasyCalc as the search parameter and then use the OriginalFileName field to answer the question.

answer: ffmpeg.dll, nw.dll, nw_elf.dll

Congratulations for Completing this room!!! The last answer is autocompleted for you and I hope that you enjoyed my walkthrough!

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

Nihir Zala
Nihir Zala

Written by Nihir Zala

Hi there, I'm Nihir Zala—a Laravel developer from Gujrat, India, with over 2.5 years of professional experience. I also learning Penetesting from THM and HTB.

No responses yet

Write a response