Sitemap

Member-only story

THM - Supplemental Memory

4 min readJun 23, 2025

--

A writeup for the room “Supplemental Memory” on TryHackMe

Investigate lateral movement, credential theft, and additional adversary actions in a memory dump.

https://tryhackme.com/room/supplementalmemory

Task 3 - Lateral Movement and Discovery

The memory file can be found in the folder ~/memory/WIN-015.

There is also a folder called ‘precooked’ in the same location that contains some pre-generated volatility results.

The IR team suspects that the threat actor may have performed lateral movement to this host. Which executed process provides evidence of this activity?

As suggested in the task description, we should look for any unusual processes running under service.exe and svchost.exe.

cat precooked/pstree.txt | awk '{ print $1, $2, $3, $4 }'

What is the MITRE technique ID associated with the lateral movement method used by the threat actor?

We can simply search online for the name of the process found before looking at the results in the MITRE database.

We are looking for a lateral movement technique based on this process rather than the execution tactic.

--

--

Francesco Pastore
Francesco Pastore

Written by Francesco Pastore

An engineering student in Milan and a web developer for an IT company. Write about programming and cybersecurity topics.

No responses yet