All PostsWriteups & Video Tutorials

Advent of Cyber 2025 Day 6 Walkthrough Malware Analysis Egg xecutable

Advent of Cyber 2025 Day 6 Walkthrough Malware Analysis Egg xecutable

Task 1 Introduction

Click here to access the Advent of Cyber 2025 Day 6 Walkthrough Malware Analysis Egg xecutable Room Lab

The Story Advent of Cyber 2025 Day 6 Walkthrough Malware Analysis Egg xecutable

Advent of Cyber 2025 Day 6 Walkthrough Malware Analysis Egg xecutable

The town of Wareville remains quiet in the middle of the night. While the residents of Wareville are nicely tucked up in bed, blissfully unaware, the SOC team at The Best Festival Company (TBFC) remain alert, poised and ready for whatever may face them.

Monitoring their screens, armed with a freshly poured mug of hot cocoa, the elves of the SOC watch their dashboards diligently. 

Suddenly, the elves receive an email in unison from Elf McClause, Head of Elf Affairs, in their inboxes. It reads:

Advent of Cyber 2025 Day 6 Walkthrough Malware Analysis Egg xecutable

“Why is Elf McClause working at 3AM?” Screams a member of the SOC team in the background. They’re right, something is amiss.

Elf McBlue is immediately suspicious. Their years of experience in the SOC have given them the wisdom not to download “out of the blue” executables. Without McSkidy’s wisdom, Elf McBlue takes charge, loading up their malware investigation toolkik – the investigation begins.

Learning Objectives

Today’s room will have you taking the place of Elf McBlue, a highly talented member of The Best Festival Company’s malware investigation squad. You have been tasked with investigating a highly suspicious executable that is being shared within the company. In today’s room, we will be covering the following:

  • The principles of malware analysis in Advent of Cyber 2025 Day 6 Walkthrough
  • An introduction to sandboxes
  • Static vs. dynamic analysis
  • Tools of the trade: PeStudio, ProcMon, Regshot

Connecting to the Machine

Before moving forward, review the questions in the connection card shown below:

Advent of Cyber 2025 Day 6 Walkthrough Malware Analysis Egg xecutable

Start your target machine by clicking the Start Machine button below. The machine will open in split view and need about 2 minutes to fully boot. In case you can not see it, click the Show Split View button at the top of the page.

Set up your virtual environment

To successfully complete this room, you’ll need to set up your virtual environment. This involves starting the Target Machine, ensuring you’re equipped with the necessary tools and access to tackle the challenges ahead.

Advent of Cyber 2025 Day 6 Walkthrough

Credentials

Only needed if you are using your own THM VPN connected machine.

Advent of Cyber 2025 Day 6 Walkthrough

Please note, it is imperative that you do not execute the HopHelper.exe executable yet. The room will instruct you when to do so.

Answer the questions below

I have access to my sandbox environment!

No answer needed

Task 2 Malware Analysis Using Sandboxes

Principles of Malware Analysis

Malware analysis is the process of examining a malicious file to understand its functionality, operation, and methods for defence against it. By analysing a malicious file or application, we can see exactly how it operates, and therefore, know how to prevent it. For example, could the malicious file communicate with an attacker’s server? We can block that server.

Malware wrecking havoc over TBFC

Could the malicious file leave traces on the machine? We can use these to determine if the malware has ever infected another device. Instead of fearing malware, we can take a proactive approach by translating technical findings into practical defensive measures and understanding how the malware fits into an attacker’s techniques.

There are two main branches of malware analysis: static and dynamic. Static analysis focuses on inspecting a file without executing it, whereas dynamic analysis involves execution. We will come to these shortly.

Sandboxes

In cyber security, sandboxes are used to execute potentially dangerous code. Think of this as disposable digital play-pens. These sandboxes are safe, isolated environments where potentially malicious applications can perform their actions without risking sensitive data or impacting other systems.

The use of sandboxes is part of the golden rule in Advent of Cyber 2025 Day 6 Walkthrough malware analysisnever run dangerous applications on devices you care about.

Malware sandboxing

Most of the time, sandboxes present themselves as virtual machines. Virtual machines are a popular choice for sandboxing because you can control how the system operates and benefit from features such as snapshotting, which allows you to create and restore the machine to various stages of its status. 

To reiterate, it is imperative to understand that potentially malicious code and applications should only be run in a safe, isolated environment. From now on, this room will refer to malicious code and applications as samples.

With these fundamentals covered, let’s move on to the practical section of today’s room. The following will demonstrate a sample; you must apply these techniques to the HopHelper.exe file presented to you within the “HopHelper” folder on the Desktop of the practical VM.

Interactive: Static Analysis

As we alluded to previously in this room, we use static analysis to gather information about a sample without executing it and digging deep.  

Static analysis can be a quick and effective way to understand how the sample may operate, as well as how it can be identified. Some of the information that can be gathered from static analysis has been included in the table below:

InformationExplanationExample
ChecksumsThese checksums are used within cyber security to track and catalogue files and executables. For example, you can Google the checksum to see if this has been identified before.a93f7e8c4d21b19f2e12f09a5c33e48a
Strings“Strings” are sequences of readable characters within an executable. This could be, for example, IP addresses, URLs, commands, or even passwords!138.62.51.186
Imports“Imports” are a list of libraries and functions that the application depends upon. For example, rather than building everything from scratch, applications will use operating system functions and libraries to interact with the OS.These are useful, especially in Windows, as they allow you to see how the application interacts with the system.CreateFileWThis library is used to create a file on a Windows system.
Resources“Resources” contain data such as the icon that is displayed to the user. This is useful to examine, especially since malware might use a Word document icon to trick the user.

Additionally, malware itself has been known to hide in this section!
N/A

However, it’s important to note that regardless of how a sample may appear or function, we don’t truly know until it’s executed. Attackers use techniques such as obfuscation to obscure how the sample appears, primarily to evade anti-viruses but also to evade a curious analyst.

Demonstrating PeStudio

This section of the room will demonstrate using PeStudio on an example called downloader.exePlease note that the information you see will be from this demonstration sample. The sample you will be analysing will be different, but the techniques will still apply.

Please note, it is imperative that you do not launch the HopHelper.exe executable yet.

blank

First, we will launch PeStudio and load the executable into it. The shortcut for this has been placed on the Desktop of your analyst machine. You can drag and drop the executable into the PeStudio window, or load it by selecting File -> Open File from the toolbar. PeStudio will display some information about the executable.

blank

For us, at this stage, the file > sha256 property within the table is of interest. This value is a checksum, which is a unique identifier for the executable. We can keep a note of this SHA256 as threat intelligence.

blank

Next, we will proceed with reviewing the “Strings” of the executable. You can do this by clicking on the “strings” indicator on the left pane of PeStudio.

Viewing the "strings" within an executable

In the context of malware analysis, strings are sequences of readable characters present within an executable. This could be, for example, IP addresses, URLs, commands, or even passwords! As a malware analyst, it’s great to have a look at these, as these could reveal the attacker’s command infrastructure, which we can use for our defences.

blank

Great! This concludes the static analysis portion of the practical. There’s so much more to uncover using static analysis. Feel free to explore if you’d like. Let’s proceed to the dynamic analysis below.

Interactive: Dynamic Analysis

This section of the room provides a brief introduction to dynamic analysis. As you recall, dynamic analysis involves executing the malicious sample to identify its behaviours and how it interacts with the operating system.

Regshot

Regshot is a widely used utility, especially when analysing malware on Windows. It works by creating two “snapshots” of the registry one before the malware is run and another afterwards. The results are then compared to identify any changes.

Malware aims to establish persistence, meaning it seeks to run as soon as the device is switched on. A common technique for malware is to add a Run key into the registry, which is frequently used to specify which applications are automatically executed when the device is powered on.

blank

Let’s load up Regshot and create a capture of the registry as it currently exists. The shortcut to this has also been placed on the Desktop of the analyst machine.

First, change the output directory of the capture to the user’s Desktop using the box with three dots in the “Output path” section.

Then, once set, let’s create our first snapshot. Press 1st shot and then Shot on the dropdown. Please note that this may take a few minutes to complete.

Configuring the output path and then creating our first registry snapshot

Now that we have taken a snapshot of the registry, you should proceed with executing the HopHelper.exe sample and take another snapshot. We will then compare the difference.

For you, this is the HopHelper.exe executable located in the “HopHelper” folder on your Desktop.

Psst…now that you have executed the sample, you might see that some strange things have happened.

Once we have executed our sample, let’s return to Regshot and capture our second snapshot, using the same procedure as above. Click on the 2nd shot button and press Shot in the dropdown. Regshot is now capturing the registry again, and outputting the differences to a file.

Using Regshot to create the 2nd snapshot

And now, after a few seconds, let’s press the Compare button that appears.

Comparing the results of the difference between the two registry snapshots. The text editor will open after a minute or so.

We can search for the executable within the log that opens up. 

ProcMon

Next, we will explore using ProcMon (Process Monitor) from the Sysinternals suite to investigate today’s sample. Proccess Monitor is used to monitor and investigate how processes are interacting with the Windows operating system. It is a powerful tool that allows us to see exactly what a process is doing. For example, reading and writing registry keys, searching for files, or creating network connections.

Open Process Monitor (ProcMon), the shortcut for this has been placed on the Desktop of the analyst machine. Process Monitor will automatically start capturing events of various processes on the system.

blank

Now, execute the sample HopHelper.exe again and return to Process Monitor to see how it interacts with the operating system.

You will see a lot of information here. Do not worry, we will come onto how to filter this shortly.

After allowing a minute to pass, ensuring the sample has fully executed, we will now stop capturing. To stop capturing more events, click on the Play button in the toolbar of Process Monitor.

blank

As you can see, there is a lot of information to scroll through here, with the most recent events at the bottom. Here we can see how various system processes are interacting with Windows. Nearly all of it, we don’t care about. 

Remember, the task content is demonstrating using Process Monitor for the demonstration sample downloader.exe.

You will need to follow along, but doing so for the HopHelper.exe.

Let’s apply some filters. Afterall, for this demonstration, we only care about the downloader.exe sample. To do so, click on the Filter button, and then Filter within the dropdown.

blank

A new window will open.

blank

Here we can create some filters to remove some of the noise that we don’t care about. Because we want to only look at this downloader.exe sample for this demonstration, we can apply a filter like so:

  1. Apply the Process Name filter
  2. Set the condition to is
  3. Put in the name of the process we wish to see within the text area
  4. Press the Add button to apply this filter
  5. And finally click OK to save.
blank

Once done, returning to the main Process Monitor window, we can already see the filter has worked.

blank

Now it is much easier to investigate how the process is interacting with the operating system. Here are some Operations that may be of interest to us:

  • RegOpenKey
  • CreateFile
  • TCP Connect
  • TCP Recieve

However, as you can see, there is still a lot of information. We can further apply filters to look for specific things that we want to investigate, such as these aforementioned Operations.

To do so, return to the Filter heading and create the filter we want to apply. For example, we can filter by Operations. Let’s do so below, filtering for any TCP Operation:

blank

We will now see all Operations that include TCP. Remember, you can remove the filters you’ve previously applied by pressing the filter in the Filter list, and pressing Remove:

blank

Or, alternatively, if you wish to start over, you can simply press the Reset Filter option when clicking on the Filter heading.

blank

Phew! Well done. That concludes the demonstration for today’s room. Remember, you will need to apply what you have learnt here on the **HopHelper.exe** executable that has been placed in the HopHelper folder on the analyst Desktop, to answer the questions below.

Answer the questions below

Static analysis: What is the SHA256Sum of the HopHelper.exe?

F29C270068F865EF4A747E2683BFA07667BF64E768B38FBB9A2750A3D879CA33

Static analysis: Within the strings of HopHelper.exe, a flag with the format THM{XXXXX} exists. What is that flag value?

Note, this can be found towards the bottom of the strings output.

THM{STRINGS_FOUND}

Dynamic analysis: What registry value has the HopHelper.exe modified for persistence?

Note: Provide the full path of the key that has been modified

HKU\S-1-5-21-1966530601-3185510712-10604624-1008\Software\Microsoft\Windows\CurrentVersion\Run\HopHelper

Dynamic analysis: Filter the output of ProcMon for “TCP” operations. What network protocol is HopHelper.exe using to communicate?

Make sure to have executed HopHelper.exe while ProcMon was open and capturing events.

http

Bonus:Can you find the web panel that HopHelper.exe is communicating with?

No answer needed

If you enjoyed today’s room, feel free to explore both the Basic Static Analysis and Basic Dynamic Analysis rooms, where you can delve deeper into the techniques and tools discussed today.

No answer needed

Completion Message

Finally, Advent of Cyber 2025 Day 6 Malware Analysis Egg xecutable is completed!
You successfully performed both static and dynamic malware analysis using professional tools.

Happy Hacking! 🔥🛡️🎄

Related Resources

Mehmood Ali

I am a Cybersecurity Consultant with over 8+ years of experience in SOC analyst, digital forensics, cloud security, network security, and incident response. With 20+ international certifications, I have successfully designed secure systems, led vulnerability assessments, and delivered key security projects. I am skilled at improving incident response times, mitigating threats, and ensuring compliance with ISO 27001 standards.

Related Articles

One Comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button