Database

Eviction Room – TryHackMe

The Eviction Room is a beginner friendly room on TryHackMe that delves into the world of Advanced Persistent Threat (APT) groups and their tactics, techniques, and procedures. By exploring real-world scenarios and case studies, you’ve gained valuable insights into the cyber threat landscape.

Eviction Room - TryHackMe

Eviction Room

APT28(G0007)

Eviction Room - TryHackMe

Answers for this room

1).What is a technique used by the APT to both perform recon and gain initial access?

Ans: Spearphishing Link

2).Sunny identified that the APT might have moved forward from the recon phase. Which accounts might the APT compromise while developing resources?

Ans: Email Accounts

3).E-corp has found that the APT might have gained initial access using social engineering to make the user execute code for the threat actor. Sunny wants to identify if the APT was also successful in execution. What two techniques of user execution should Sunny look out for? (Answer format: <technique 1> and <technique 2>)

Ans: Malicious File and Malicious Link

4.)If the above technique was successful, which scripting interpreters should Sunny search for to identify successful execution? (Answer format: <technique 1> and <technique 2>)

Ans: PowerShell and Windows Command Shell

5).While looking at the scripting interpreters identified in Q4, Sunny found some obfuscated scripts that changed the registry. Assuming these changes are for maintaining persistence, which registry keys should Sunny observe to track these changes?

Ans: Registry Run Keys

6).Sunny identified that the APT executes system binaries to evade defences. Which system binary’s execution should Sunny scrutinize for proxy execution?

Ans: Rundll32

7).Sunny identified tcpdump on one of the compromised hosts. Assuming this was placed there by the threat actor, which technique might the APT be using here for discovery?

Ans: Network Sniffing

8).It looks like the APT achieved lateral movement by exploiting remote services. Which remote services should Sunny observe to identify APT activity traces?

Ans: SMB/windows admin shares

7).It looked like the primary goal of the APT was to steal intellectual property from E-corp’s information repositories. Which information repository can be the likely target of the APT?

Ans: Sharepoint

9).Although the APT had collected the data, it could not connect to the C2 for data exfiltration. To thwart any attempts to do that, what types of proxy might the APT use? (Answer format: <technique 1> and <technique 2>)

Ans: External proxy and Multi-hop proxy

I hope you found this information helpful.Audit Mania

About author

Articles

Maruf Sheikh is a writer for Audit Mania, offering insightful perspectives on data science and technology. With a thoughtful approach, he blends technical knowledge with an understanding of human behavior.
Related posts
Database

Mastering SQL Injection Attacks Real-Life Case Studies & Future Trends

In an era where data is invaluable, the security of your databases and web applications is…
Read more
Database

SQL Injection Attacks: Famous Incidents, Prevention, and Educational Insights

Introduction SQL Injection Attacks are one of the most common and dangerous cybersecurity threats…
Read more
Database

Efficient Database Management Software for Your Needs

In today’s fast-paced business world, handling large-scale data effectively is crucial. Modern…
Read more
Newsletter
Become a Trendsetter
Sign up for Davenport’s Daily Digest and get the best of Davenport, tailored for you.

Leave a Reply

Your email address will not be published. Required fields are marked *