DiskFiltration
Tech THM discovered a data leak and suspects Liam, a recently terminated system engineer. He had access to the leaked data, frequently stayed late without reason, and was seen near the critical server room taking photos. An investigation into his workstation suggests he had help from an external party .
What is the serial number of the USB device Liam used for exfiltration?
now we can look at the “USB Device Attached” to get the serial number of the USB that already parsed out from SYSTEM registry hive (USBSTOR key) right here.
the first setp is showing the USB Devices , the last one is in 2025-02-03 10:03:49 UTC can see the ID there 

What is the profile name of the personal hotspot Liam used to evade network-level detection?

What is the name of the zip file Liam copied from the USB to the machine for exfiltration instructions?

What is the password for this zip file?

Time to reveal the external entity helping Liam! Who is the author of the PDF file stored in the zip file?

What is the correct extension of the file that has no extension in the zip folder?

It looks like Liam searched for some files inside the file explorer. What are the names of these files? (alphabetical order)
Regarding “searching” there is a registry key that stores the search keywords:
To access this, we need to examine the Administrator user’s NTUSER.DAT registry hive. In this key, we found two stored keywords its the answer

What are the names of the folders that were present on the USB device? (alphabetical order)

The external entity didn't fully trust Liam for the exfiltration so they asked him to execute file_uploader.exe, through the instructions in PDF. When was this file last executed and how many times was it executed? (YYYY-MM-DD HH:MM:SS, number of execution times)

Liam received a hidden flag inside a file (in the zip folder) from the external entity helping him. What was that?

It seems like Liam caused one last damage before leaving. When did Liam delete "Tax Records.docx"? (YYYY-MM-DD HH:MM:SS)
Actual path (not visible in Windows Explorer), and its not in deleted files


Which social media site did Liam search for using his web browser? Likely to avoid suspicion, thinking somebody was watching him. (Full URL)

What is the PowerShell command Liam executed as per the plan?

Happy investigation . . .
Alpha
Last updated

