{"id":2682,"date":"2026-04-01T19:40:00","date_gmt":"2026-04-01T19:40:00","guid":{"rendered":"https:\/\/zombierollz.blog\/?p=2682"},"modified":"2026-04-01T14:40:44","modified_gmt":"2026-04-01T14:40:44","slug":"boogeyman-1","status":"publish","type":"post","link":"https:\/\/zombierollz.blog\/?p=2682","title":{"rendered":"Boogeyman 1"},"content":{"rendered":"\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-6fefd001b787bf5da436a2ed09bb80fb\"><a href=\"https:\/\/tryhackme.com\/room\/boogeyman1\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/tryhackme.com\/room\/boogeyman1<\/a><br>Created by: tryhackme, ar33zy<br><br>This room looks like it will bring a challenge! It&#8217;s rated Medium difficulty. We will be using various tools to anaylze the Tactics, Techniques, and Procedures (TTPs) of the Boogeyman!<br><br>Prerequisites:<br><a href=\"https:\/\/tryhackme.com\/r\/room\/tsharkthebasics\" target=\"_blank\" rel=\"noreferrer noopener\">Tshark: The Basics<\/a><br><a href=\"https:\/\/tryhackme.com\/room\/phishingemails1tryoe\" target=\"_blank\" rel=\"noreferrer noopener\">Phishing&nbsp;Analysis Fundamentals<\/a><br><a href=\"https:\/\/tryhackme.com\/room\/phishingemails3tryoe\" target=\"_blank\" rel=\"noreferrer noopener\">Phishing&nbsp;Analysis Tools<\/a><br><a href=\"https:\/\/tryhackme.com\/room\/windowseventlogs\" target=\"_blank\" rel=\"noreferrer noopener\">Windows Event Logs<\/a><br><a href=\"https:\/\/tryhackme.com\/room\/wiresharktrafficanalysis\" target=\"_blank\" rel=\"noreferrer noopener\">Wireshark: Traffic Analysis<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"879\" height=\"268\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-054839.png\" alt=\"\" class=\"wp-image-2683\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-054839.png 879w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-054839-300x91.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-054839-768x234.png 768w\" sizes=\"auto, (max-width: 879px) 100vw, 879px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-ece3933a94ebe30822143440ec78b6dd\">&nbsp;<a href=\"https:\/\/github.com\/Silv3rHorn\/evtx2json\" target=\"_blank\" rel=\"noreferrer noopener\">evtx2json(opens in new tab)<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"757\" height=\"386\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-054945.png\" alt=\"\" class=\"wp-image-2684\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-054945.png 757w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-054945-300x153.png 300w\" sizes=\"auto, (max-width: 757px) 100vw, 757px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-feb545f2a99c4b2d4c7ac5fb6d11f8b8\"><a href=\"https:\/\/github.com\/Matmaus\/LnkParse3\">https:\/\/github.com\/Matmaus\/LnkParse3<\/a><\/p>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-fe0835603594de8595068f96fefd3577\">Task 2 focuses on Email Analysis.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"497\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-055413-1024x497.png\" alt=\"\" class=\"wp-image-2685\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-055413-1024x497.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-055413-300x146.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-055413-768x372.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-055413.png 1268w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"410\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-061606-1024x410.png\" alt=\"\" class=\"wp-image-2686\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-061606-1024x410.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-061606-300x120.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-061606-768x307.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-061606.png 1264w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-8fafd562b59120ba4bac08ac959cd623\">We see that trying to use lnkparse is not going to work and opening the file itself demands a password. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"493\" height=\"82\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-064432.png\" alt=\"\" class=\"wp-image-2687\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-064432.png 493w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-064432-300x50.png 300w\" sizes=\"auto, (max-width: 493px) 100vw, 493px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"522\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-065044-1024x522.png\" alt=\"\" class=\"wp-image-2689\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-065044-1024x522.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-065044-300x153.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-065044-768x392.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-065044.png 1190w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"597\" height=\"492\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-065315.png\" alt=\"\" class=\"wp-image-2688\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-065315.png 597w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-065315-300x247.png 300w\" sizes=\"auto, (max-width: 597px) 100vw, 597px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-d6d978d5045ba176e5104fb18f157ceb\">We need to examine the contents through Thunderbird. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"520\" height=\"426\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-070002.png\" alt=\"\" class=\"wp-image-2690\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-070002.png 520w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-070002-300x246.png 300w\" sizes=\"auto, (max-width: 520px) 100vw, 520px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"542\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-070106-1024x542.png\" alt=\"\" class=\"wp-image-2691\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-070106-1024x542.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-070106-300x159.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-070106-768x407.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-070106.png 1199w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-0613d75159f1bf0f85bcc3a4da54a5cb\">&#8220;What is the email address used to send the phishing email?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"686\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-070257-1024x686.png\" alt=\"\" class=\"wp-image-2692\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-070257-1024x686.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-070257-300x201.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-070257-768x514.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-070257.png 1169w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-7b0be46f08f2c214688d046bf576cf84\">&#8220;What is the email address of the victim?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"613\" height=\"153\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-070440.png\" alt=\"\" class=\"wp-image-2693\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-070440.png 613w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-070440-300x75.png 300w\" sizes=\"auto, (max-width: 613px) 100vw, 613px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-db1ac7dd94f31be77903d5dcbd1b9ffa\">&#8220;What is the name of the third-party mail relay service used by the attacker based on the&nbsp;DKIM-Signature&nbsp;and&nbsp;List-Unsubscribe&nbsp;headers?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"605\" height=\"119\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-070907.png\" alt=\"\" class=\"wp-image-2694\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-070907.png 605w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-070907-300x59.png 300w\" sizes=\"auto, (max-width: 605px) 100vw, 605px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-1889ff8d48d450727c805b7ab0208af7\">&#8220;What is the name of the file inside the encrypted attachment?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1004\" height=\"729\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-071431.png\" alt=\"\" class=\"wp-image-2695\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-071431.png 1004w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-071431-300x218.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-071431-768x558.png 768w\" sizes=\"auto, (max-width: 1004px) 100vw, 1004px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-a4b2a641ab886bec0c9d7b24e652afbc\">&#8220;What is the password of the encrypted attachment?&#8221;<br><br>It shows this in the contents of the email itself, but here it is in View Source.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"626\" height=\"128\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-071019.png\" alt=\"\" class=\"wp-image-2696\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-071019.png 626w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-071019-300x61.png 300w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-2ddef7aefc81b06d44ed062f03782a27\">&#8220;Based on the result of the lnkparse tool, what is the encoded payload found in the Command Line Arguments field?&#8221;<br><br>Open the file with the obtained password &gt; Extract file to Desktop &gt; use &#8220;lnkparse Invoice_20230103.lnk&#8221; in cli.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"334\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-072422-1024x334.png\" alt=\"\" class=\"wp-image-2697\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-072422-1024x334.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-072422-300x98.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-072422-768x251.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-072422.png 1197w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-e453847147af031026db8840f959f4b7\">On to Task 3, Endpoint Security!<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"631\" height=\"394\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-072833.png\" alt=\"\" class=\"wp-image-2698\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-072833.png 631w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-072833-300x187.png 300w\" sizes=\"auto, (max-width: 631px) 100vw, 631px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"629\" height=\"792\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-072919.png\" alt=\"\" class=\"wp-image-2699\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-072919.png 629w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-072919-238x300.png 238w\" sizes=\"auto, (max-width: 629px) 100vw, 629px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-61d3ca32e71d9eb38b5cbc7a11549310\">&#8220;What are the domains used by the attacker for file hosting and C2? Provide the domains in alphabetical order. (e.g. a.domain.com,b.domain.com)&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"926\" height=\"316\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-081006.png\" alt=\"\" class=\"wp-image-2700\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-081006.png 926w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-081006-300x102.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-081006-768x262.png 768w\" sizes=\"auto, (max-width: 926px) 100vw, 926px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"422\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-081107-1024x422.png\" alt=\"\" class=\"wp-image-2701\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-081107-1024x422.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-081107-300x124.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-081107-768x317.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-081107.png 1191w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-002ff69d36002adb6dd2d4907e8b6245\">&#8220;What is the name of the enumeration tool downloaded by the attacker?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"81\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-090931-1024x81.png\" alt=\"\" class=\"wp-image-2702\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-090931-1024x81.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-090931-300x24.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-090931-768x60.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-090931.png 1194w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-388e3d4b5af7d2d3dd7e5ce1a9deb1bf\">&#8220;What is the file accessed by the attacker using the downloaded&nbsp;<strong>sq3.exe<\/strong>&nbsp;binary? Provide the full file path with escaped backslashes.&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"212\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-094702-1024x212.png\" alt=\"\" class=\"wp-image-2703\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-094702-1024x212.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-094702-300x62.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-094702-768x159.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-094702.png 1193w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-ba17c224e04e01021aa7be36b7f6a676\">Using grep for sq3.exe, you can locate this, but it&#8217;s not the full path. You will need to manually go back to see the user path. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"926\" height=\"232\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-094844.png\" alt=\"\" class=\"wp-image-2704\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-094844.png 926w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-094844-300x75.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-094844-768x192.png 768w\" sizes=\"auto, (max-width: 926px) 100vw, 926px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-f8a014056d0a9ea34b81037453da2b5a\">So the answer will be &#8220;C:\\Users\\j.westcott\\AppData\\Local\\Packages\\Microsoft.MicrosoftStickyNotes_8wekyb3d8bbwe\\LocalState\\plum.sqlite&#8221;<\/p>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-374d90ee4853a39749f67c905f3d671b\">&#8220;What is the software that uses the file in Q3?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"91\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-095753-1024x91.png\" alt=\"\" class=\"wp-image-2705\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-095753-1024x91.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-095753-300x27.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-095753-768x68.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-095753.png 1194w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-4a0b2a9c80c6a6fe048a4146b64eb692\">&#8220;What is the name of the exfiltrated file?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"902\" height=\"157\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-103254.png\" alt=\"\" class=\"wp-image-2706\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-103254.png 902w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-103254-300x52.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-103254-768x134.png 768w\" sizes=\"auto, (max-width: 902px) 100vw, 902px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-cf56ebf145f7435fc4285d3333d96ea1\">&#8220;What type of file uses the .kdbx file extension?&#8221;<br><br>keepass<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"818\" height=\"386\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-111508.png\" alt=\"\" class=\"wp-image-2707\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-111508.png 818w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-111508-300x142.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-111508-768x362.png 768w\" sizes=\"auto, (max-width: 818px) 100vw, 818px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-b2730a8652786c7d208f0c28afc43b17\">&#8220;What is the encoding used during the exfiltration attempt of the sensitive file?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"300\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-112659-1024x300.png\" alt=\"\" class=\"wp-image-2709\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-112659-1024x300.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-112659-300x88.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-112659-768x225.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-112659.png 1185w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-a964a6560ed64ad0d74bbbd52845da93\">&#8220;What is the tool used for exfiltration?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"173\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-111917-1-1024x173.png\" alt=\"\" class=\"wp-image-2710\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-111917-1-1024x173.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-111917-1-300x51.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-111917-1-768x130.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-26-111917-1.png 1207w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-777a75d7f5878e7da8b826cfadbad1f0\">On to our last task: Network Traffic Analysis!<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"883\" height=\"381\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-27-061915.png\" alt=\"\" class=\"wp-image-2711\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-27-061915.png 883w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-27-061915-300x129.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-27-061915-768x331.png 768w\" sizes=\"auto, (max-width: 883px) 100vw, 883px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-f1f708f1c1bfb59dfca95190b6a62b37\">Let&#8217;s move to Wireshark and utilize what we have learned!<\/p>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-d718f2bf50d1904c0fd628e531a2398b\">&#8220;What software is used by the attacker to host its presumed file\/payload server?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"719\" height=\"152\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-27-064137.png\" alt=\"\" class=\"wp-image-2712\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-27-064137.png 719w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-27-064137-300x63.png 300w\" sizes=\"auto, (max-width: 719px) 100vw, 719px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"949\" height=\"842\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-27-065405.png\" alt=\"\" class=\"wp-image-2713\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-27-065405.png 949w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-27-065405-300x266.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-27-065405-768x681.png 768w\" sizes=\"auto, (max-width: 949px) 100vw, 949px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"635\" height=\"746\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-27-065436.png\" alt=\"\" class=\"wp-image-2714\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-27-065436.png 635w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-27-065436-255x300.png 255w\" sizes=\"auto, (max-width: 635px) 100vw, 635px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-6d64ce751ae588e0f69dece5373c719a\">&#8220;What HTTP method is used by the C2 for the output of the commands executed by the attacker?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"620\" height=\"633\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-27-065502.png\" alt=\"\" class=\"wp-image-2715\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-27-065502.png 620w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-27-065502-294x300.png 294w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-8f340dc3811db407cadd7729c6400ea5\">&#8220;What is the protocol used during the exfiltration activity?&#8221;<br><br>Manually looking through the looks I see the DNS info.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"861\" height=\"124\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-27-072301.png\" alt=\"\" class=\"wp-image-2716\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-27-072301.png 861w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-27-072301-300x43.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-27-072301-768x111.png 768w\" sizes=\"auto, (max-width: 861px) 100vw, 861px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-128ebb89cf15d7a57194ac6119196bf9\">Applying the DNS filter and I see more activity.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"948\" height=\"294\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-27-072431.png\" alt=\"\" class=\"wp-image-2717\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-27-072431.png 948w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-27-072431-300x93.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/03\/Screenshot-2026-03-27-072431-768x238.png 768w\" sizes=\"auto, (max-width: 948px) 100vw, 948px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-fd7f3e9b4960aaaee1a7e53194d440b3\">&#8220;What is the password of the exfiltrated file?&#8221;<br><br>I used Claude AI to spit out a Python script to use, then used a command based on the info that I fed it.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"826\" height=\"298\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-03-28-083015.png\" alt=\"\" class=\"wp-image-2720\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-03-28-083015.png 826w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-03-28-083015-300x108.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-03-28-083015-768x277.png 768w\" sizes=\"auto, (max-width: 826px) 100vw, 826px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-9021f633b79c2d8853b3d964e6303f99\">tshark -r capture.pcapng -Y &#8216;ip.dst == 159.89.205.40 and http.request.method == &#8220;POST&#8221;&#8216; -T fields -e urlencoded-form.key | python3 decode.py > decoded.txt<br><br>Cat the .txt file and manually scroll; you will find the password.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"201\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-03-28-082710-1024x201.png\" alt=\"\" class=\"wp-image-2721\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-03-28-082710-1024x201.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-03-28-082710-300x59.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-03-28-082710-768x151.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-03-28-082710.png 1258w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-e32cc596275bab0f0acd7eb26994011d\">However, another way of doing this, and probably more practical, was going by this walkthrough: <a href=\"https:\/\/sibasec.com\/post\/thm-boogyman-1\/#q19\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/sibasec.com\/post\/thm-boogyman-1\/#q19<\/a> where he went by the time stamp and lined that time up with Wireshark(which is something I&#8217;ll keep in mind going forward!).<\/p>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-9eb7250ba4b56c0c34ec9bc1f817ac83\">&#8220;What is the credit card number stored inside the exfiltrated file?&#8221;<br><br>With the THM VM, the formatting requested through the CLI is very finicky with KeePass2. I tried a lot of different ways to format the output and finally landed on this line of code, thanks to various walkthroughs and ClaudeAI through DDG.<\/p>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-dbcaf9e8699383f86d69a303ea4d1f3a\">tshark -r capture.pcapng -Y &#8216;dns&#8217; -T fields -e dns.qry.name | grep &#8220;.bpakcaging.xyz&#8221; | cut -f1 -d &#8216;.&#8217; | grep -v -e &#8220;files&#8221; -e &#8220;cdn&#8221; | uniq | tr -d &#8216;\\n&#8217; &gt; extracted.txt<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"935\" height=\"246\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-01-072748.png\" alt=\"\" class=\"wp-image-2722\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-01-072748.png 935w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-01-072748-300x79.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-01-072748-768x202.png 768w\" sizes=\"auto, (max-width: 935px) 100vw, 935px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"945\" height=\"632\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-01-072855.png\" alt=\"\" class=\"wp-image-2723\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-01-072855.png 945w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-01-072855-300x201.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-01-072855-768x514.png 768w\" sizes=\"auto, (max-width: 945px) 100vw, 945px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>https:\/\/tryhackme.com\/room\/boogeyman1Created by: tryhackme, ar33zy This room looks like it will bring a challenge! It&#8217;s rated Medium difficulty. We will be using various tools to anaylze the Tactics, Techniques, and Procedures (TTPs) of the Boogeyman! Prerequisites:Tshark: The BasicsPhishing&nbsp;Analysis FundamentalsPhishing&nbsp;Analysis ToolsWindows Event LogsWireshark: Traffic Analysis &nbsp;evtx2json(opens in new tab) https:\/\/github.com\/Matmaus\/LnkParse3 Task 2 focuses on Email Analysis. We [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2682","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"blocksy_meta":[],"_links":{"self":[{"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/posts\/2682","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2682"}],"version-history":[{"count":2,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/posts\/2682\/revisions"}],"predecessor-version":[{"id":2724,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/posts\/2682\/revisions\/2724"}],"wp:attachment":[{"href":"https:\/\/zombierollz.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2682"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2682"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2682"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}