459 words
2 minutes
Grindle: Windows forensic challenge NexZero 2025
2025-11-24

Description#


You have a folder containing some windows artifacts:

  • Users Dir that has one user folder (person).
  • $Extend Dir that has only $UsnJrnl file ($J).
  • system hives inside windows/System32/config

Let’s start with the user folder, you can see multiple random files in every folder, maybe one of the files was stolen from here, but which one? and how was it stolen?
Usually in these scenario you’ll find some exfil methods, but there isn’t any suspicious executables or scripts in the user folder, investigating the SYSTEM hive can lead to identifying two usb entries, maybe the attacker used a usb to exfil the file, loading the SYSTEM hive into RegistryExplorer we can see the two usbs at HKLM\ControlSet001\Enum\USBSTOR:

  • ADATA USB Flash last connected at 2025-11-13 19:48:11
  • VendorCo USB last connected at 2025-11-13 19:16:15
usbstore key from registryExplorer

Now to find out exactly what files got stolen you need correlate the timeline with the $J file from the $Extend dir,parse the file with MFTECmd.exe and open the csv with timeline explorer.
Filter for DeleteFile and timestamp should after VendorCo last connection 2025-11-13 19:16:15 and before last Removed 2025-11-13 19:18:52

delete files from when VendorCo usb was plugged in
doing the same with the other usb:

delete files from when ADATA usb was plugged in

one file stands out here is notes (15).pdf and it’s the correct one.

Osint Part: Identifying the attacker#

now that we have the stolen file, we need something to identify the attacker, let’s investigate the AppData Dir:

Terminal window
ls AppData/Roaming/
$I30 Adobe discord Microsoft Mozilla Thunderbird

Thunderbird is a mail client from mozilla, this should be your first target since it’s easy to investigate.

Terminal window
Profiles ls
8k8hw17u.default-release xulck67c.default
Profiles

you can open that folder using this tool to view emails from thunderbird client:

emails from thunderbird client

from this suspicious email we can see that the attacker uses the username mhunter0x3 and the email mhunter3756@gmail.com.
Searching for that username on X, we can find this account which has reposted cascroot’s tweet about an htb ctf.
searching for that same username on reddit, you’ll get this profile, you gotta inspect display names to find the exact profile. you’ll the find the attacker replied to a post on r/algeria under the flare jijel

reddit profile of the attacker

now we know that the attacker is from jijel, algeria, and he’s most likely a member in the cascroot team, going to cascroot’s linkedIn page, under the people section, we can identify the member from jijel as Abderrahman Daidou.

Flag: nexus{Abderrahman_Daidou_notes_(15).pdf}