This room was released on 1/7/2021 and it is rated Medium in difficulty. Shou-out to the room creator, @heavenraiza who also recognized Bohan Zhang for the challenge. You can access the room at https://tryhackme.com/room/contiransomwarehgh.
This is a blueteam challenge. The skills/tools to be tested and needed to complete this challenge are Splunk and Googling. I liked this room because my Splunking skills need brushing up.
I intentionally masked parts of the answers so you will have to perform some hands-on work to find the entirety of the answers. This was a great room to practice SIEM skills using Splunk.
- Can you identify the location of the ransomware?
- C:\*****\*************\*********\***.**e

- What is the Sysmon event ID for the related file creation event?
- **

- Can you find the MD5 hash of the ransomware?
- 2********************C

- What file was saved to multiple folder locations?
- r*****.**t

- What was the command the attacker used to add a ner user to the compromised system?
- n** **** /*** ************* *************$

- The attacker migrated the process for better persistence. What is the migrated process image (executable), and what is the original process image (executable) when the attacker got on the system?
- C:\*******\********\*****************\**.*\**********.***,*:\*******\********\****\********.**e

- The attacker also retreieved the system hashes. What is the process image used for getting the system hashes?
- C:\*******\********\*****.**e

- What is the web shell the exploit deployed to the system?
- i***********.***x

- What is the command line that executed this web shell?

- What three CVEs did this exploit leverage?
- CVE-****-****,CVE-****-*****,CVE-****-*****
I spent way more time researching for the answer to the last question than answering the first 9 questions. So, to help you with the last question. I found the answers in an article published by https://www.cyfirma.com. Don’t waste your time trying to enter the CVEs from the three latest Microsoft Exchange ProxyShell: CVE-2021-34473, CVE-2021-34523, CVE-2021-31207 that were all discovered by Orange Tsai during the Pwn2Own 2021 hacking contest.
I always look forward to your posts and write-ups. How long did it take you? I thought it humorous you were like “don’t waste your time”. ha
LikeLiked by 1 person
Haha, thanks bro. The first 9 questions were less than an hour, and the last question I had to give up and went to bed. lol it was really a waste of my time.
LikeLike