
Secret Recipe
Platform : TryHackMe
Type : Challenge (Forensic)
Difficulty : ⭐⭐⭐☆☆
Table of contents
Introduction
Jasmine owns a famous New York coffee shop Coffely which is famous city-wide for its unique taste. Only Jasmine keeps the original copy of the recipe, and she only keeps it on her work laptop. Last week, James from the IT department was consulted to fix Jasmine’s laptop. But it is suspected he may have copied the secret recipes from Jasmine’s machine and is keeping them on his machine.Image showing a Laptop with a magnifying glass.
His machine has been confiscated and examined, but no traces could be found. The security department has pulled some important registry artifacts from his device and has tasked you to examine these artifacts and determine the presence of secret files on his machine.
Questions
Question 1
How many files are available in the Artifacts folder on the Desktop ?

Answer : 6
Question 2
What is the Computer Name of the Machine found in the registry ?
We can find the answer in the SYSTEM\ControlSet001\Control\ComputerName\ComputerName registry key :

Answer : JAMES
Question 3
When was the Administrator account created on this machine ? (Format: yyyy-mm-dd hh:mm:ss)
We can find the answer in the SAM\SAM\Domains\Account\Users registry key :

Answer : 2021-03-17 14:58:48
Question 4
What is the RID associated with the Administrator account ?
The users RIDs can be found in the SAM\SAM\Domains\Account\Users registry key :

Answer : 500
Question 5
How many User accounts were observed on this machine ?
In the SAM\SAM\Domains\Account\Users\Names registry key, we can find users who logged in on the system :

Answer : 7
Question 6
There seems to be a suspicious account created as a backdoor with RID 1013. What is the Account Name ?
Like for question 4, we can find a list of users RIDs and their corresponding account name in the SAM\SAM\Domains\Account\Users

Answer : bdoor
Question 7
What is the VPN connection this host connected to ?
Answer in SYSTEM\ControlSet001\Services\bam\State\UserSettings\S-1-5-21-1966530601-318510712-10604624-500 :

Answer : ProtonVPN
Question 8
When was the first VPN connection observed ? (Format: YYYY-MM-DD HH:MM:SS)
We can find a list of networks in the SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList registry key :

Answer : 2022-10-12 19:52:36
Question 9
There were three shared folders observed on his machine. What is the path of the third share ?
In the SYSTEM\ControlSet001\Services\LanmanServer\Shares registry key, we can find a list of SMB shares :

Answer : C:\RESTRICTED FILES
Question 10
What is the last DHCP IP assigned to this host ?
Information regarding network interfaces can be found in SYSTEM\ControlSet002\Services\Tcpip\Interfaces registry key :

Answer : 172.31.2.197
Question 11
The suspect seems to have accessed a file containing the secret coffee recipe. What is the name of the file ?
On Windows, when you access a file, it is saved in a history of recent files in the explorer. We can find this history in NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs\pdf registry key :

Answer : secret-recipe.pdf
Question 12
The suspect ran multiple commands in the run window. What command was run to enumerate the network interfaces ?
On Windows, the run window can be opened by pressing WIN + R. In this window, you can directly run a Windows command. An history of those commands can be found in NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU :

Answer : pnputil /enum-interfaces
Question 13
In the file explorer, the user searched for a network utility to transfer files. What is the name of that tool ?
When searching for something in the file explorer on Windows, your query is stored in an history. It can be found in NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\WordWheelQuery registry key :

Answer : netcat
Question 14
What is the recent text file opened by the suspect ?
As for question 11, we can find recently accessed files in NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs registry key :

Answer : secret-code.txt
Question 15
How many times was Powershell executed on this host ?
On Windows, the number of times you run a program is stored in the registry. We can find this information in NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count registry key :

Answer : 3
Question 16
The suspect also executed a network monitoring tool. What is the name of the tool ?
Answer in SYSTEM\ControlSet001\Sercices\bam\State\UserSettings\S-1-5-21-1966530601-3185510712-10604624-500 :

Answer : wireshark
Question 17
Registry Hives also notes the amount of time a process is in focus. Examine the Hives. For how many seconds was ProtonVPN executed ?
Answer in NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count :

Answer : 343 (5 minutes x 60 + 43)
Question 18
Everything.exe is a utility used to search for files in a Windows machine. What is the full path from which everything.exe was executed ?
As for question 15, we can find the answer in NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count registry key :

Answer : C:\Users\Administrator\Downloads\tools\Everything\Everything.exe
