DEV Community

Cover image for TryHackMe: Summit
Sean Lee
Sean Lee

Posted on

TryHackMe: Summit

Flag 1

Once entering the room, we are greeted with an email as follows.

Image description

Objective:
- Scan the file
- Block it

So with that said, just submit it for analysis by clicking on the file, then "Submit for Analysis".

Image description

Once the scanning is complete, a report will be generated. We then just copy one of the hashes and proceed to scan it, by navigating to the burger on the left and go to Manage Hashes.

Image description

From here we just paste any of the hashes we copied, make sure to choose the correct hash type too.

Image description

After that, we will recieve an email, which contains flag 1.

Image description


Flag 2

Now we repeat the previous steps to scan sample2.exe. This time it is different as suggested in the email, as we can detect network activity.

Image description

Network activity listening on port 4444 is always suspicious, as it is the default port for Metasploit framework. It is also running a request using HTTP instead of HTTPS, which is another valueable observation.

Image description

We set type to "Egress" as the HTTP request of http://154.35.10.113:4444/uvLk8YI32 redirects us to access the external resource from that specific IP.

As we want to deny all traffic to that malicious IP, we set so that Any IP having contact with that malicious IP as Denied.

And with that we got our second flag.

Image description


Flag 3

After the report is generated upon scanning sample3.exe, we can see that the domain HTTP request to emudyn.bresonicz.info is trying to let us access a resource called backdoor.exe.

Image description

So with that we just create a DNS rule to block it to prevent any interactions with that domain again.

Image description

Image description

And flag 3.

Image description


Flag 4

Image description

Looking into the report generated, we can see that the attacker managed to disable firewall real time monitoring on our system with its malware.

With this event, we can go to Sigma Rule Builder, select Sysmon Event Logs, and Registry Modifications.

We then just key in all the details regarding the registry modified. As this is an Defense Evasion technique, we select that to complete our sigma rule.

Image description

And there is flag 4.

Image description


Flag 5

In the email, he mentioned on the file attached as the logs of the outgoing network connections from the last 12 hours on the victim machine.

We see that frequent request has been made towards various IPs.

Image description

The red flag is the size of information sent. Some are consistently the same size, specifically 97 bytes.

Image description

After knowing this, we just navigate to Sigma Rules -> Sysmon Event Logs -> Network Connections

Image description

The reason why blocking the sole IP may not work is because attacker can change their IP easily, so stopping it that way may not be effective.

And flag 5 is attched to the email.

Image description


Flag 6

The new email has commands.log attached, which shows a file with the following contents.

Image description

We can see that the attacker is exflitrating data from the victim machine, appending them onto a file disguised as a log file.

Following the path of the log file, we just block the file creation and modification to prevent further compromise.

Image description

And flag 6 will be here.

Image description

Top comments (0)