← Back to Index

TryHackMe - Disk Analysis & Autopsy

b3bb941ed71782804f1f29e4d3b5edc2.png Ready for a challenge? Use Autopsy to investigate artifacts from a disk image.


Created: 14/09/2024 12:59 Last Updated: 14/09/2024 23:46


What is the MD5 hash of the E01 image?

adbe287f9cf36e8e55e2066f4f465203.png

Alright, lets get straight to the Case Files folder on the desktop which we can see that it contains autopsy case file and E01 disk image file along with log file from FTK Imager, FTK imager will also do hash checksum at the end of evidence collection so we can obtain MD5 hash from there without doing it with cmd or PowerShell.

3f08c518adb3b5c1359849657a9b2079

What is the computer account name?

d80016c79aeb28134fe40c19bb1110f2.png

Now lets open Autopsy case file and browse for OS information here, Autopsy already extracted some useful information for us and we need to find them according to the question which as you can see that Autopsy already extracted computer name from SYSTEM registry hive right here.

DESKTOP-0R59DJ3 

List all the user accounts. (alphabetical order)

f95c979acc0051984674f76226e12ed7.png

Go to "Operating System User Account" then sort by "User ID" first so we can distinguish which are user accounts and which are service accounts (user account will have RID start with 100x) and as you can see there are 8 user accounts on this system so we can copy them and sort it elsewhere (or you can sort it on Autopsy now by "Username") then answer the question.

H4S4N,joshwa,keshav,sandhya,shreya,sivapriya,srini,suba

Who was the last user to log into the computer?

60df1cd2354790c750da541d104ae6c2.png

We just need to sort by "Date Accessed" time to find out which user is the last one who logged into the computer.

sivapriya

What was the IP address of the computer?

da1a3abd3f9f745c6070e15ea04bf276.png

I tried to get the IP address from Network Interface registry keys but there is nothing there so we will have to find another way

*Notice case name changed? because I could not use "Application" function on the registry hive on provided case so I made a new one which solved this issue for me.

1817b35024670c252d96cada99f33ee8.png

Upon inspecting installed program, notice that there is one program that might has something to do with networking.

9c3cf77752b16bce013d6c122b5024d7.png

Sure enough, its network monitor tool so we will have to dig into install location of this program to find config file or initial (.ini) file that could store some useful information that might help us.

9ae6a758738f0e73988340b3211a880e.png

And there it is, irunin.ini under \Program Files (x86)\Look@LAN actually stores an IP address and MAC address of this computer.

192.168.130.216

What was the MAC address of the computer? (XX-XX-XX-XX-XX-XX)

f0e2ed137b9320b070d56d4d48c08718.png

I was so lazy to format it myself so I made ChatGPT reformat this MAC for me, it worked btw.

08-00-27-2C-C4-B9

What is the name of the network card on this computer?

93269b9b896de36e60c7b4e00c03bd39.png

For this one, we have to go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkCards to get an answer.

Intel(R) PRO/1000 MT Desktop Adapter

What is the name of the network monitoring tool?

Look@LAN

A user bookmarked a Google Maps location. What are the coordinates of the location?

407d9cfea316c87fa67ccfeb10f5cda1.png

Autopsy already parsed browser artefacts for us so we just have to dig into "Web Bookmarks" which we will see that there is 1 Google Maps Location that was bookmarked right here.

12°52'23.0"N 80°13'25.0"E

A user has his full name printed on his desktop wallpaper. What is the user's full name?

097f1563a7212b3992fc317b1a2ef787.png

Upon inspecting "Web History", I noticed that at least 2 users downloaded desktop wallpaper from the internet so we can reduce the scope of finding to only 2 users.

718593e46479ca65d083e8575a996db3.png

And by checking "Web Downloads", we got path that these wallpaper got downloaded

Notice that mimikatz was also downloaded, we will keep that in mind.

927bf0c33eceef5bea74d0fe4276f978.png

The answer of this question lies in user joshwa's download folder right here.

Anto Joshwa

A user had a file on her desktop. It had a flag but she changed the flag using PowerShell. What was the first flag?

19ebc742140fe364b0d386d2a706d4a2.png

I went to check for each user desktop first which I found this PowerShell exploit script on shreya desktop and we could see that this script also create a new file contains a flag on H4S4N desktop but this should be the latest flag (answer of the next question) so we have to get PowerShell History log to find out the old flag.

526559b86c10361c6a9112be98d33e0e.png

It is indeed different from the latest one we found earlier.

flag{HarleyQuinnForQueen}

The same user found an exploit to escalate privileges on the computer. What was the message to the device owner?

Flag{I-hacked-you}

2 hack tools focused on passwords were found in the system. What are the names of these tools? (alphabetical order)

edbc4547123f33bdf946de667125c15c.png

We already know that one of them is mimikatz but what is the other one?

4aea17b3cfdb5b627d3ec7174209a7ad.png

I did not find anything from PowerShell history log but since this is Windows so maybe that tool is also an executable file and when an executable file is executed on Windows, Prefetch file will be created and Autopsy already parased those prefetch files for us which we can see that LaZange is the other tool focused on passwords.

Lazagne,Mimikatz

There is a YARA file on the computer. Inspect the file. What is the name of the author?

44cd40bd518fab85cdb773e21178b555.png

We know that YARA file has .yar extension so I searched for this extension which we can see that kiwi_passwords.yar is the file we're looking for.

c3b4a7e6e432a648911e99bf7bfbe3b6.png

I could not find mimikatz folder, maybe it was deleted but we still have zip file that store this YARA file so we can read YARA rule from this file and answer the question.

Benjamin DELPY (gentilkiwi)

One of the users wanted to exploit a domain controller with an MS-NRPC based exploit. What is the filename of the archive that you found? (include the spaces in your answer)

df1e7338620e2ad67eddb63f3451b6ef.png

I started by searching on Google to find any clue about this exploit which give me a name of the vulnerability which is ZeroLogon.

1053e946ad8fef3a773dc44adab3e177.png

And I found the file name of this archive from "Recent Documents".

2.2.0 20200918 Zerologon encrypted.zip

083eb409a88975821e4ceab6ea84108c.png