Skip to main contentSkip to main content
Room Banner
Room Icon

Shadow Trace

Premium room

Analyse a suspicious file, uncover hidden clues, and trace the source of the infection.

easy

45 min

10,727

User profile photo.

To access material, start machines and answer questions login.

It’s the middle of the night shift. You’re the only analyst in the when a manager calls in urgently: a suspicious file was found on a user's machine and needs immediate review.

You open the file and start digging. Something doesn’t look normal for a company updater, and at the same time, the throws a couple of alerts.

Your task: analyse the file, collect anything to identify it, gather any potential IOCs, correlate and analyse the alerts for potential malicious behaviour. It’s up to you to piece together what’s happening before it spreads further.

Learning Objectives

  • Extract IOCs from suspicious binaries
  • Correlate alerts with malicious activity
  • Perform basic triage actions

Prerequisites

Follow the instructions for the next tasks to start.

Answer the questions below

Click here to start the challenge

Ready to learn Cyber Security?

The Shadow Trace room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.