Midnight is a theme for GitHub Pages.
Platform: TryHackMe
Room: Hunt Me II: Typo Squatter (typosquatters)
Tooling: Elasticsearch / Kibana (ELK)
Focus: Intrusion investigation, execution chain tracking, persistence, credential access, ransomware impact assessment
This lab demonstrates an end-to-end investigation workflow using Kibana to:
All analysis is performed in a controlled lab environment using simulated data.
High-level workflow used throughout the lab:
All screenshots are stored under:
Lab-04-Intrusion-investigation-in-ELK/Images/
Use the placeholders below and rename files to match your actual screenshots.
Used the typosquatting keyword from the scenario (7zipp) to pivot to web/network events related to the download. Then validated the URL by correlating the download event with surrounding records (same host, close timestamps).

Starting from the malicious download event (Q1), inspected correlated fields (destination host/IP) and used “View surrounding documents” to confirm the same remote endpoint is consistently associated with the download.

Pivoted from the download to the execution event by filtering by the name of a payload and narrowing to process start telemetry (process creation). Extracted the PID from the execution event for the malware process.

Followed the parent→child chain from Q3 and filtered for subsequent downloads/executions by the same process tree. Captured the suspicious full command line from the process creation event that performs remote retrieval + execution.

Used that name of the script to find the path to download 7zlegit.exe which is a legitimate version of 7zip downloaded along with malware.

Filtered Windows service installation telemetry using Event ID 4697 (service-based persistence). Extracted the service name from the installation record.

Correlated the installed service (Q6) with outbound network connections shortly after service start. Filtered for network connection telemetry to the malicious endpoint and extracted the executing user from the associated service/process context.

Searched for LSASS-related activity (lsass) and then pivoted to subsequent parsing actions by reviewing process creation events around the dump timeframe. Identified the parsing tool by its process name/command line.

Confirmed new authentication activity using Event ID 4624 after the credential dump timeframe. Then searched for artifacts indicating credential material usage (hash references, password indicators, or tool output references) and extracted the username:hash pair.

Pivoted from the newly used account (Q9) to account-management events (password reset/change). Extracted the password value from the recorded activity (as captured in the lab dataset).

WKSTN-02 confirmed as a result of research

Used winlog.event_id 1 to filter out process

Filtered process creation for PowerShell execution (including script names in command line). Identified the script used for credential dumping (excluding mimikatz) based on the script filename referenced during execution.

Using the credential dumping context from Q13, located the output event containing the domain admin credential material and extracted the AES256 hash value from the recorded output.

Identified the ransomware executable name from the dataset (e.g., bomb.exe), then filtered for file-modification/creation telemetry associated with encryption activity and counted the total impacted files across all hosts.


All work is performed in non-production, isolated environments using simulated datasets.