| date | 2026-03-12 | |||
|---|---|---|---|---|
| tags |
|
Challenge: Eviction
Platform: TryHackMe
Category: Threat Intel
Difficulty: Easy
Tools: MITRE ATT&CK
This lab focuses on investigating the tactics and techniques used by the threat group APT28 by tracing their activity through the MITRE ATT&CK framework. The investigation analyzes how the attackers progress through different stages of the attack lifecycle from initial access to command and control and persistence. By mapping observed behaviors and indicators to ATT&CK techniques, the lab demonstrates the methods used by APT28 during an intrusion.
Sunny is a SOC analyst at E-corp, which manufactures rare earth metals for government and non-government clients. She receives a classified intelligence report that informs her that an APT group (APT28) might be trying to attack organizations similar to E-corp. To act on this intelligence, she must use the MITRE ATT&CK Navigator to identify the TTPs used by the APT group, to ensure it has not already intruded into the network, and to stop it if it has.
Sunny identified that the APT might have moved forward from the recon phase. Which accounts might the APT compromise while developing resources?
E-corp has found that the APT might have gained initial access using social engineering to make the user execute code for the threat actor. Sunny wants to identify if the APT was also successful in execution. What two techniques of user execution should Sunny look out for? (Answer format: <technique 1> and <technique 2>)
If the above technique was successful, which scripting interpreters should Sunny search for to identify successful execution? (Answer format: <technique 1> and <technique 2>)
While looking at the scripting interpreters identified in Q4, Sunny found some obfuscated scripts that changed the registry. Assuming these changes are for maintaining persistence, which registry keys should Sunny observe to track these changes?
Sunny identified that the APT executes system binaries to evade defences. Which system binary's execution should Sunny scrutinize for proxy execution?
Under Defense Evasion tactic, scroll down to System Binary Proxy Execution.








