To access material, start machines and answer questions login.
It’s the middle of the night shift. You’re the only analyst in the when a manager calls in urgently: a suspicious file was found on a user's machine and needs immediate review.
You open the file and start digging. Something doesn’t look normal for a company updater, and at the same time, the throws a couple of alerts.
Your task: analyse the file, collect anything to identify it, gather any potential IOCs, correlate and analyse the alerts for potential malicious behaviour. It’s up to you to piece together what’s happening before it spreads further.
Learning Objectives
- Extract IOCs from suspicious binaries
- Correlate alerts with malicious activity
- Perform basic triage actions
Prerequisites
Follow the instructions for the next tasks to start.
Click here to start the challenge
Ready to learn Cyber Security?
The Shadow Trace room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in