TryHackMe – Secret Recipe writeup

Table of Contents

Scenario

Jasmine owns a famous New York coffee shop Coffely which is famous city-wide for its unique taste. Only Jasmine keeps the original copy of the recipe, and she only keeps it on her work laptop. Last week, James from the IT department was consulted to fix Jasmine’s laptop. But it is suspected he may have copied the secret recipes from Jasmine’s machine and is keeping them on his machine.

His machine has been confiscated and examined, but no traces could be found. The security department has pulled some important registry artifacts from his device and has tasked you to examine these artifacts and determine the presence of secret files on his machine.

Investigation

One of the first things I did was to export in .txt files all the hives I had, using RegRipper. This would facilitate an easier search and copying of the results of interest. For the investigation, I utilized a mix of these files and RegistryExplorer, so you will see screenshots from RegistryExplorer or extracts from the RegRipper outputs.
  • What is the Computer Name of the Machine found in the registry?
    ----------------------------------------
    compname v.20090727
    (System) Gets ComputerName and Hostname values from System hive
    
    ComputerName    = JAMES
    TCP/IP Hostname = James
    ----------------------------------------

     

  • When was the Administrator account created on this machine? (Format: yyyy-mm-dd hh:mm:ss)
User Information
-------------------------
Username        : Administrator [500]
Full Name       : 
User Comment    : Built-in account for administering the computer/domain
Account Type    : 
Account Created : 2021-03-17 14:58:48Z
Name            :  
Last Login Date : 2022-10-12 19:26:09Z
Pwd Reset Date  : 2022-10-04 16:22:22Z
Pwd Fail Date   : 2022-10-04 17:15:21Z
Login Count     : 72
Embedded RID    : 500
  --> Normal user account
  • What is the RID associated with the Administrator account?
500, as shown above
  • How many User accounts were observed on this machine?

7 users, the below users + the Administrator (the following result only shows 5 of them though)

Group Name    : Users [5]
LastWrite     : 2022-10-04 17:03:12Z
Group Comment : Users are prevented from making accidental or intentional system-wide changes and can run most applications
Users :
  S-1-5-4
  S-1-5-21-1966530601-3185510712-10604624-1012
  S-1-5-11
  S-1-5-21-1966530601-3185510712-10604624-1013
  S-1-5-21-1966530601-3185510712-10604624-1011
  • There seems to be a suspicious account created as a backdoor with RID 1013. What is the Account Name?
It was “bdoor” (I don’t have a screenshot)
  • What is the VPN connection this host connected to?
    ProtonVPN:

    networksetup2 v.20191004
    (System) Get NetworkSetup2 subkey info
    
    Ethernet 3 - Amazon Elastic Network Adapter (wired)
      CurrentAddress   : 2:12:32:4a:cf:7f
      PermanentAddress : 2:12:32:4a:cf:7f
    Ethernet - AWS PV Network Device (wired)
      CurrentAddress   : 2:71:56:2:c0:e3
      PermanentAddress : 2:71:56:2:c0:e3
    Teredo Tunneling Pseudo-Interface - Microsoft Teredo Tunneling Adapter (0x83)
      CurrentAddress   : 0:0:0:0:0:0
      PermanentAddress : 0:0:0:0:0:0
    Local Area Connection - TAP-ProtonVPN Windows Adapter V9 (0x35)
      CurrentAddress   : 0:ff:99:37:7e:62
      PermanentAddress : 0:ff:99:37:7e:62
    Ethernet 2 - Intel(R) 82599 Virtual Function (wired)
      CurrentAddress   : a:7a:75:48:eb:fb
      PermanentAddress : a:7a:75:48:eb:fb

     

  • When was the first VPN connection observed? (Format: YYYY-MM-DD HH:MM:SS)
    2022-10-12 19:52:36, as shown here:
Launching networklist v.20200518
(Software) Collects network info from NetworkList key

Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles
Network 2
  Key LastWrite    : 2022-10-04 16:32:23Z
  DateLastConnected: 2022-10-04 16:32:23
  DateCreated      : 2021-03-17 15:08:34
  DefaultGatewayMac: 02-C8-85-B5-5A-AA
  Type             : wired

ProtonVPN
  Key LastWrite    : 2022-10-12 19:52:36Z
  DateLastConnected: 2022-10-12 19:52:36
  DateCreated      : 2022-10-12 19:52:36
  DefaultGatewayMac: -----
  Type             : 53

 

  • There were three shared folders observed on his machine. What is the path of the third share?
  • What is the Last DHCP IP assigned to this host?
    172.31.2.197

    ControlSet001\Services\Tcpip\Parameters\Interfaces has no subkeys.
    Adapter: {ea458d05-f4ab-48d2-9a67-97fb05ce3a76}
    LastWrite Time: 2021-03-17 14:58:47Z
      EnableDHCP                   1                   
      Domain                                           
      NameServer                                       
      DhcpIPAddress                172.31.2.197        
      DhcpSubnetMask               255.255.240.0       
      DhcpServer                   172.31.0.1          
      Lease                        3600                
      LeaseObtainedTime            2021-03-17 14:58:47Z
      T1                           2021-03-17 15:28:47Z
      T2                           2021-03-17 15:51:17Z
      LeaseTerminatesTime          2021-03-17 15:58:47Z

     

  • The suspect seems to have accessed a file containing the secret coffee recipe. What is the name of the file?
  • The suspect ran multiple commands in the run windows. What command was run to enumerate the network interfaces?
  • In the file explorer, the user searched for a network utility to transfer files. What is the name of that tool?
  • What is the recent text file opened by the suspect?
  • How many times was Powershell executed on this host?
  • The suspect also executed a network monitoring tool. What is the name of the tool?
  • Registry Hives also notes the amount of time a process is in focus. Examine the Hives. For how many seconds was ProtonVPN executed?
    343 seconds (5 minutes * 60, + 43 seconds from the screenshot)
  • Everything.exe is a utility used to search for files in a Windows machine. What is the full path from which everything.exe was executed?

Conclusions

Looks like James has been naughty! I enjoyed doing this room, I could practice a lot my windows forensics skills, which is something I’m trying to get good at lately. I also liked the narrative behind this room, definitely recommended.