{"id":2837,"date":"2026-04-17T20:17:00","date_gmt":"2026-04-17T20:17:00","guid":{"rendered":"https:\/\/zombierollz.blog\/?p=2837"},"modified":"2026-04-17T14:18:14","modified_gmt":"2026-04-17T14:18:14","slug":"boogeyman-3","status":"publish","type":"post","link":"https:\/\/zombierollz.blog\/?p=2837","title":{"rendered":"Boogeyman 3"},"content":{"rendered":"\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-5c990550cb54011f45497b8768ffe164\"><a href=\"https:\/\/tryhackme.com\/room\/boogeyman3\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/tryhackme.com\/room\/boogeyman3<\/a><br>Created by: tryhackme, ar33zy<\/p>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-26c64bd82df3bd8b4ac1990b47b2aeb6\">As of 4\/17\/2026, this is the last room of the SOCL1 Path! Congratulations if you have made it this far!<br><br>&#8220;Due to the previous attacks of Boogeyman, Quick Logistics LLC hired a managed security service provider to handle its Security Operations Center. Little did they know, the Boogeyman was still lurking and waiting for the right moment to return.&nbsp;<br><br>In this room, you will be tasked to analyse the new tactics, techniques, and procedures (TTPs) of the threat group named Boogeyman.&#8221;<\/p>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-7c01b2b1ef43faf65f6007ae161070a5\">At this point if you are doing the SOCL1 path, you should have already completed these rooms as prerequisites:<\/p>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-1c376db54960c8ff7dc698dbe06275b0\">&#8220;This room may require the combined knowledge gained from the&nbsp;<a href=\"https:\/\/tryhackme.com\/path-action\/soclevel1\/join\" target=\"_blank\" rel=\"noreferrer noopener\">SOC&nbsp;L1<\/a>&nbsp;Path. We recommend going&nbsp;through the following rooms before attempting this challenge.<br><br><a href=\"https:\/\/tryhackme.com\/room\/sysmon\" target=\"_blank\" rel=\"noreferrer noopener\">Sysmon<\/a><br><a href=\"https:\/\/tryhackme.com\/room\/itsybitsy\" target=\"_blank\" rel=\"noreferrer noopener\">ItsyBitsy<\/a><br><a href=\"https:\/\/tryhackme.com\/room\/investigatingwithelk101\" target=\"_blank\" rel=\"noreferrer noopener\">Investigating with&nbsp;ELK<\/a><br><a href=\"https:\/\/tryhackme.com\/room\/boogeyman1\" target=\"_blank\" rel=\"noreferrer noopener\">Boogeyman 1<\/a><br><a href=\"https:\/\/tryhackme.com\/room\/boogeyman2\" target=\"_blank\" rel=\"noreferrer noopener\">Boogeyman 2<\/a><br><br>The scenario:<\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"741\" height=\"576\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-14-065240.png\" alt=\"\" class=\"wp-image-2838\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-14-065240.png 741w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-14-065240-300x233.png 300w\" sizes=\"auto, (max-width: 741px) 100vw, 741px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"609\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-14-065408.png\" alt=\"\" class=\"wp-image-2839\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-14-065408.png 750w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-14-065408-300x244.png 300w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image alignwide size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"737\" height=\"123\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-14-065443.png\" alt=\"\" class=\"wp-image-2840\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-14-065443.png 737w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-14-065443-300x50.png 300w\" sizes=\"auto, (max-width: 737px) 100vw, 737px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-49ee0bc03b706757aa96ca555b7f470b\">&#8220;What is the PID of the process that executed the initial stage 1 payload?&#8221;<br><br>I added the filters user.domain: QUICKLOGISTICS and user.name:evan.hutchinson, as well as confirmed the date of Aug 29, 2023-Aug 30, 2023. Once I applied these, I selected filters of @timestamp, process.command_line, process.name and process.pid. We see the pdf that was in the THM summary of ProjectFinancialSummary_Q3.pdf with our PID of 6392<\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"658\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-14-093611-1024x658.png\" alt=\"\" class=\"wp-image-2841\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-14-093611-1024x658.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-14-093611-300x193.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-14-093611-768x494.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-14-093611.png 1190w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-ac7d0b43bddfafeea23e4ea081e6cfea\">&#8220;The stage 1 payload attempted to implant a file to another location. What is the full command-line value of this execution?&#8221;<br><br>Staying on this filter, we get the answer to our next question one row down.<\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"720\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-14-100653-1024x720.png\" alt=\"\" class=\"wp-image-2842\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-14-100653-1024x720.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-14-100653-300x211.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-14-100653-768x540.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-14-100653.png 1176w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-91985a49c7de179f7a32310284cdbfd9\">&#8220;The implanted file was eventually used and executed by the stage 1 payload. What is the full command-line value of this execution?&#8221;<br><br>This will be on the next row. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"860\" height=\"74\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-14-103443.png\" alt=\"\" class=\"wp-image-2843\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-14-103443.png 860w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-14-103443-300x26.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-14-103443-768x66.png 768w\" sizes=\"auto, (max-width: 860px) 100vw, 860px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-39b7d880136164ff7f7b478b94c55f86\">&#8220;The stage 1 payload established a persistence mechanism. What is the name of the scheduled task created by the malicious script?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"864\" height=\"234\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-14-112045.png\" alt=\"\" class=\"wp-image-2845\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-14-112045.png 864w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-14-112045-300x81.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-14-112045-768x208.png 768w\" sizes=\"auto, (max-width: 864px) 100vw, 864px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-fc7cdf2c49117e9a2519528e55bd7077\">&#8220;The execution of the implanted file inside the machine has initiated a potential C2 connection. What is the IP and port used by this connection? (format: IP:port)&#8221;<br><br>Looking up an IP filter > related.ip, I see two IP. I check out the 165.232.170.151.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"571\" height=\"506\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-15-063140.png\" alt=\"\" class=\"wp-image-2846\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-15-063140.png 571w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-15-063140-300x266.png 300w\" sizes=\"auto, (max-width: 571px) 100vw, 571px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-2f14aa5f5887a844c044d7d2ec93deeb\">Once this is applied, use the port filter to see the port(80).<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"728\" height=\"482\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-15-063444.png\" alt=\"\" class=\"wp-image-2847\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-15-063444.png 728w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-15-063444-300x199.png 300w\" sizes=\"auto, (max-width: 728px) 100vw, 728px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-c4466ba48e8e048519b66a78dc90385e\">&#8220;The attacker has discovered that the current access is a local administrator. What is the name of the process used by the attacker to execute a UAC bypass?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"573\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-055500-1024x573.png\" alt=\"\" class=\"wp-image-2848\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-055500-1024x573.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-055500-300x168.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-055500-768x430.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-055500.png 1186w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-a64d95f4ca5fc0bc5b4e0cca5e7a945f\">While I was here, I also looked at this section and, using base64 decoding from CyberChef, was able to obtain the CDN that made the C2 Connection. Not an answer, but a cool find!<\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"575\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-062544-1024x575.png\" alt=\"\" class=\"wp-image-2849\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-062544-1024x575.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-062544-300x168.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-062544-768x431.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-062544.png 1176w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"502\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-062731-1024x502.png\" alt=\"\" class=\"wp-image-2850\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-062731-1024x502.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-062731-300x147.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-062731-768x376.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-062731.png 1531w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"417\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-062646-1024x417.png\" alt=\"\" class=\"wp-image-2851\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-062646-1024x417.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-062646-300x122.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-062646-768x313.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-062646.png 1509w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-b4feea7d19fbde99f8d907afc890a2a8\">&#8220;Having a high privilege machine access, the attacker attempted to dump the credentials inside the machine. What is the GitHub link used by the attacker to download a tool for credential dumping?&#8221;<br><br>I applied this filter to make this search easier. <\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"854\" height=\"344\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-090252.png\" alt=\"\" class=\"wp-image-2852\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-090252.png 854w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-090252-300x121.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-090252-768x309.png 768w\" sizes=\"auto, (max-width: 854px) 100vw, 854px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-4d657b261197c526984ab7fc92d134f3\">I am not seeing anything under our ethan user. I know there is another user from earlier: allan.smith. Changing that and I get a successful hit!<\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"498\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-093847-1024x498.png\" alt=\"\" class=\"wp-image-2853\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-093847-1024x498.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-093847-300x146.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-093847-768x373.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-093847.png 1237w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-a64df508a2bf1b916a6d4fab80628f04\">&#8220;After successfully dumping the credentials inside the machine, the attacker used the credentials to gain access to another machine. What is the username and hash of the new credential pair?<br><br>I had to come back to this because I did not have that much luck, but later I found that Mimikatz was used. I applied this as the process.name filter, and I obtained what I needed!<\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"504\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-130123-1024x504.png\" alt=\"\" class=\"wp-image-2854\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-130123-1024x504.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-130123-300x148.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-130123-768x378.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-130123.png 1177w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-454374cbcf00636c81dd1a91a8eddda7\">&#8220;Using the new credentials, the attacker attempted to enumerate accessible file shares. What is the name of the file accessed by the attacker from a remote share?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"492\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-120529-1024x492.png\" alt=\"\" class=\"wp-image-2855\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-120529-1024x492.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-120529-300x144.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-120529-768x369.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-120529.png 1231w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-1c2409cc791d8ec03779ce2083dce465\">&#8220;After getting the contents of the remote file, the attacker used the new credentials to move laterally. What is the new set of credentials discovered by the attacker? (format: username:password)&#8221;<br><br>I came across this earlier. <\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"431\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-071540-1024x431.png\" alt=\"\" class=\"wp-image-2856\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-071540-1024x431.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-071540-300x126.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-071540-768x324.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-071540.png 1163w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-a4d4e8bce10c9e5a7272eaedb882df78\">&#8220;What is the hostname of the attacker&#8217;s target machine for its lateral movement attempt?&#8221;<br><br>Applying process.parent.name:rundll32.exe, expand the first log shown with the ascending filter applied for timestamp.<\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"520\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-055453-1024x520.png\" alt=\"\" class=\"wp-image-2858\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-055453-1024x520.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-055453-300x152.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-055453-768x390.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-055453.png 1185w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-829d571de4e1ac43a1829f7454323cde\">&#8220;Using the malicious command executed by the attacker from the first machine to move laterally, what is the parent process name of the malicious command executed on the second compromised machine?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"499\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-104245-1024x499.png\" alt=\"\" class=\"wp-image-2859\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-104245-1024x499.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-104245-300x146.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-104245-768x374.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-104245.png 1241w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-9db38eb9e75c0f33d5ee61f9ec4e2cb0\">Apply this filter and look into the details.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"511\" height=\"313\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-111347.png\" alt=\"\" class=\"wp-image-2860\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-111347.png 511w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-111347-300x184.png 300w\" sizes=\"auto, (max-width: 511px) 100vw, 511px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-ecf3433d9af195767cafdc4cf4254a93\">&#8220;The attacker then dumped the hashes in this second machine. What is the username and hash of the newly dumped credentials? (format: username:hash)<br><br>administrator:hash below<\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"510\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-124007-1024x510.png\" alt=\"\" class=\"wp-image-2861\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-124007-1024x510.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-124007-300x149.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-124007-768x382.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-124007.png 1215w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-c04bc2f05e0fc8547df26eac81b4c13e\">&#8220;After gaining access to the domain controller, the attacker attempted to dump the hashes via a DCSync attack. Aside from the administrator account, what account did the attacker dump?&#8221;<\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"500\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-124606-1024x500.png\" alt=\"\" class=\"wp-image-2862\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-124606-1024x500.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-124606-300x147.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-124606-768x375.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-124606.png 1232w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p class=\"has-palette-color-7-color has-palette-color-4-background-color has-text-color has-background has-link-color wp-elements-ea781f3dcbd2c9bdb04610241a2e66df\">&#8220;After dumping the hashes, the attacker attempted to download another remote file to execute ransomware. What is the link used by the attacker to download the ransomware binary?&#8221;<br><br>I found this earlier when manually looking through.<\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"504\" src=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-095245-1024x504.png\" alt=\"\" class=\"wp-image-2864\" srcset=\"https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-095245-1024x504.png 1024w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-095245-300x148.png 300w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-095245-768x378.png 768w, https:\/\/zombierollz.blog\/wp-content\/uploads\/2026\/04\/Screenshot-2026-04-16-095245.png 1224w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>https:\/\/tryhackme.com\/room\/boogeyman3Created by: tryhackme, ar33zy As of 4\/17\/2026, this is the last room of the SOCL1 Path! Congratulations if you have made it this far! &#8220;Due to the previous attacks of Boogeyman, Quick Logistics LLC hired a managed security service provider to handle its Security Operations Center. Little did they know, the Boogeyman was still lurking [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2837","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"blocksy_meta":[],"_links":{"self":[{"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/posts\/2837","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2837"}],"version-history":[{"count":2,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/posts\/2837\/revisions"}],"predecessor-version":[{"id":2865,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=\/wp\/v2\/posts\/2837\/revisions\/2865"}],"wp:attachment":[{"href":"https:\/\/zombierollz.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2837"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2837"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zombierollz.blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}