Scenario

During the initial stages of the investigation, it was confirmed that the TryHatMe CEO's host WIN-001 was compromised. The attacker successfully obtained credentials belonging to Cain Omoore, a Domain IT Administrators group member who remotely helped the CEO with the endpoint configuration and cached his credentials on the host.Given the privileges associated with Cain's account, the internal security team suspects that the attacker laterally moved to other systems within the environment or even to Cain's host - WIN-015.Since Cain stores access keys to the TryHatMe factory control system on his WIN-015, your first priority is to investigate his host for any lateral movement or data exfiltration traces. For this, you have been provided with a memory dump of WIN-015. Good luck!

Network Map

Network Map

https://tryhackme.com/room/supplementalmemory


Below are a few tips on how different lateral movement techniques can be identified using memory analysis.

Detecting Lateral Movement via PsExec Execution

analyst@tryhackme$ vol -f ransomhub.dmp windows.pstree                                   PID   PPID    ImageFileName
4       0       System
* 272   4       smss.exe
* 384     376     csrss.exe
* 460     376       wininit.exe
* 600     460         services.exe
** 3772   600           psexesvc.exe
*** 3916  3772            512370d.exe

Detecting Lateral Movement via WMI Execution

analyst@tryhackme$ vol -f conti.dmp windows.pstree                                       PID     PPID    ImageFileName
4       0       System
* 272   4       smss.exe
* 384     376     csrss.exe
* 460     376       wininit.exe
* 600     460         services.exe
** 1244   600           svchost.exe
*** 2416  1244            wmiprvse.exe
**** 5156 2416             cobaltrs.exe

Detecting Lateral Movement via PowerShell Remote

analyst@tryhackme$ vol -f FIN12.dmp windows.pstree                                       PID     PPID    ImageFileName
4       0       System
* 272   4       smss.exe
* 384     376     csrss.exe
* 460     376       wininit.exe
* 600     460         services.exe
** 1280   600           svchost.exe
*** 2532  1280            wsmprovhost.exe
**** 4896 2532              cmd.exe
***** 5012 4896               conhost.exe
***** 5144 4896               trickbot.exe

Answer the questions below

1- The IR team suspects that the threat actor may have performed lateral movement to this host. Which executed process provides evidence of this activity?

wmiprvse.exe

Screenshot 2025-08-03 151525.png

WmiPrvSE.exe normally hosts WMI providers (e.g., handling WMI queries internally) and does not usually launch user-facing applications; seeing it spawn TeamsView.exe is anomalous. Also note that TeamsView.exe immediately issues reconnaissance commands (systeminfo, ipconfig, whoami), further flagging its malicious role.