👤 Author: Benjamin Taylor (@benjqminn)
🤝 Team: Sherlock’s Homies
🏆 Ranking: 634 / 7,085 teams
📝 Prompt: LeStrade passes a disk image artifacts to Watson. It’s one of the identified breach points, now showing abnormal CPU activity and anomalies in process logs.
📌 Summary: Actor “JM” breached Nicole Vale’s honeypot via web shell, stole credentials, set up persistence, and pivoted into the internal network. Evidence came from memory, bash history, configs, and process analysis.
🟩 Challenge Difficulty: EASY
systeminfoC:\Windows\system32\wbem\wmiprvse.exewmiexec.py10.129.242.110SysHelper UpdateC:\Users\Werni\AppData\Local\JM.ps1svc_netupdNapoleonsBlackPearl.htbWatson_20250824160509192.168.1.1019999HKLM\SYSTEM\CurrentControlSet\Services\PortProxy\v4tov4\tcpT1090.001reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\Audit" /v ProcessCreationIncludeCmdLine_Enabled /t REG_DWORD /d 1 /fQuestion: What was the first (non cd) command executed by the attacker on the host? (string)
Walkthrough:
.zip file named The_Enduring_Echo.zip.winevt logs, the first place I assumed to check for the “non cd” command executed by the attacker was Security.evtx.
4688, aka Process Creation events only.Computer(s) field to check only the logs containing this computer.
Find feature to search for only logs containing a CommandLine field.
8/24/2025 6:51:09 PM, there is a log with Event ID 4688 being the first CommandLine text of this session.
systeminfo.Answer: systeminfo
Question: Which parent process (full path) spawned the attacker’s commands? (C:\FOLDER\PATH\FILE.ext)
Walkthrough:
Security.evtx logs some more.Find keywords that would be more obvious indicators of the parent process spawning the commands of the attacker.
wmi proved successful: since WMIPrvSE.exe can run code on behalf of remote callers, and WMI can execute commands without dropping files, it was one of the queries I searched for.
8/20/2025 12:48:05 PM that the “Process Command Line” value is C:\Windows\system32\wbem\wmiprvse.exe.Answer: C:\Windows\system32\wbem\wmiprvse.exe
Question: Which remote-execution tool was most likely used for the attack? (filename.ext)
Walkthrough:
WmiPrvSE.exe as their parent process of suspicious commands.WmiPrvSE.exe is found within the wmiexec module, which is run or called from the wmiexec.py script.wmiexec.py.Answer: wmiexec.py
Question: What was the attacker’s IP address? (IPv4 address)
Walkthrough:
Security.evtx logs once again.Logon event left behind with the attacker’s machine information.4624, the indicator that “an account was successfully logged on”.
8/24/2025 6:51:09 PM.Logon event in which a “Source Network Address” can be found under the “Network Information” section.
Answer: 10.129.242.110
Question: What is the first element in the attacker’s sequence of persistence mechanisms? (string)
Walkthrough:
Tasks.The_Enduring_Echo\C\Windows\System32\Tasks.
SysHelper Update (the only task that wasn’t OneDrive-related or MicrosoftEdge-related).Security.evtx logs, I filtered the logs for Event ID 4688, aka Process Creation events only.
Process Creation events all listed again, I searched using the Find action for the string SysHelper Update to narrow down my search to logs containing this scheduled task.
SysHelper Update, (2) specifies the action the task runs, (3) runs as SYSTEM, and (4) schedules it to run every 4 minutes, and redirects the output to an administrative share.
8/24/2025 7:03:50 PM.SysHelper Update.Answer: SysHelper Update
Question: Identify the script executed by the persistence mechanism. (C:\FOLDER\PATH\FILE.ext)
Walkthrough:
SysHelper Update schedule task creation command, the script and path are also specified.
Answer: C:\Users\Werni\Appdata\Local\JM.ps1
Question: What local account did the attacker create? (string)
Walkthrough:
Security.evtx logs, we can filter by Event ID 4720.4720 returns “A user account was created” events.
4720.
svc_netupd.Answer: svc_netupd
Question: What domain name did the attacker use for credential exfiltration? (domain)
Walkthrough:

The_Enduring_Echo\C\Users\Werni\AppData\Local directory, there was a Windows PowerShell script named JM.ps1.
JM.ps1 file in Notepad, there is a domain name located in the parameters of an Invoke-WebRequest command.Answer: NapoleonsBlackPearl.htb
Question: What password did the attacker’s script generate for the newly created user? (string)
Walkthrough:
JM.ps1 contains a function in which a username and password are generated for the new user.
Watson_ and the timestamp of the date the script was run (in the format "yyyyMMddHHmmss").
Security.evtx logs, we can see an exact timestamp of when the new user from Flag 7 was created.svc_netupd user creation is 8/24/2025 7:05:09 PM.SYSTEM registry hive (using Zimmerman’s Registry Explorer v2.1.0).
8/24/2025 7:05:09 PM in EST to PST to follow the system guidelines.SYSTEM timezone is 8/24/2025 4:05:09 PM.8/24/2025 16:05:09 PM."yyyyMMddHHmmss" form, this is equivalent to 20250824160509.Watson_ to the front of this timestamp, the password for the new user is Watson_20250824160509.Answer: Watson_20250824160509
Question: What was the IP address of the internal system the attacker pivoted to? (IPv4 address)
Walkthrough:
.ssh.The_Enduring_Echo\C\Users\Administrator\.ssh, we can see there is one file called known_hosts.


Find action to see if there was any trace of it being used in the Security.evtx logs during the attack.8/24/2025 7:10:05 PM, there is a log containing a command in which the compromised host was forwarding incoming connections to 192.168.1.101:22, the internal pivot target.
Answer: 192.168.1.101
Question: Which TCP port on the victim was forwarded to enable the pivot? (port 0-65565)
Walkthrough:

netsh  interface portproxy add v4tov4 listenaddress=0.0.0.0 listenport=9999 connectaddress=192.168.1.101 connectport=22.listenport is specified in this command, giving us the answer to this question.Answer: 9999
Question: What is the full registry path that stores persistent IPv4→IPv4 TCP listener-to-target mappings? (HKLM......)
Walkthrough:
HKLM\SYSTEM\ControlSet001\Services\PortProxy\v4tov4\tcp.
CurrentControlSet rather than ControlSet00X.
HKLM\SYSTEM\Select key within the SYSTEM registry hive, under the “Current” Value Name’s Data field.HKLM\SYSTEM\CurrentControlSet\Services\PortProxy\v4tov4\tcp.Answer: HKLM\SYSTEM\CurrentControlSet\Services\PortProxy\v4tov4\tcp
Question: What is the MITRE ATT&CK ID associated with the previous technique used by the attacker to pivot to the internal system? (Txxxx.xxx)
Walkthrough:
PortProxy\v4tov4\tcp, we can use Google to find the MITRE ATT&CK ID.

Internal Proxy technique the attacker used.
Answer: T1090.001
Question: Before the attack, the administrator configured Windows to capture command line details in the event logs. What command did they run to achieve this? (command)
Walkthrough:
Security.evtx logs for a policy change where the administrator configured the event logs to capture command-line details.4719 (“System audit policy was changed”).

ConsoleHost_history.txt file in the Administrator user profile (The_Enduring_Echo\C\Users\Administrator\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadline), so this definitely could contain the information we need to find this command.
reg add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1 /f
Security.evtx logs, there is only one instance of system policies being changed, so this is the correct command.Answer: reg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\System\Audit" /v ProcessCreationIncludeCmdLine_Enabled /t REG_DWORD /d 1 /f
Next challenge writeup: Holmes — The Tunnel Without Walls 🌌