romcom

Released2025-09-11
Retired2025-09-11
AuthorCyberJunkie

Scenario

Susan works at the Research Lab in Forela International Hospital. A Microsoft Defender alert was received from her computer, and she also mentioned that while extracting a document from the received file, she received tons of errors, but the document opened just fine. According to the latest threat intel feeds, WinRAR is being exploited in the wild to gain initial access into networks, and WinRAR is one of the Software programs the staff uses. You are a threat intelligence analyst with some background in DFIR. You have been provided a lightweight triage image to kick off the investigation while the SOC team sweeps the environment to find other attack indicators.


Task 01

Question: What is the CVE assigned to the WinRAR vulnerability exploited by the RomCom threat group in 2025?

In 2025, a threat actor sometimes tracked as RomCom (also known as Storm-0978 (Microsoft), Tropical Scorpius (Palo Alto), or UNC2596 (Google)) abused a zero-day vulnerability in WinRAR. On July 18th, 2025, ESET observed the exploitation of this vulnerability in WinRAR version 7.12. This vulnerability was later assigned the identifier CVE-2025-8088.

Answer: CVE-2025-8088


Task 02

Question: What is the nature of this vulnerability?

According to the description in the NIST database:

A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.

Answer: Path Traversal


Task 03

Question: What is the name of the archive file under Susan’s documents folder that exploits the vulnerability upon opening the archive file?

For the following tasks, you will need the provided artifacts. The packaged archive contains a .vhdx disk image. This image includes both the $MFT and $J of the affected system for analysis. For easier evaluation, an overview can be generated using MFTECmd (in CSV or JSON format) and then reviewed in the analysis tool of your choice. To get a general overview and understanding of MACB timestamps on a NTFS filesystem, I recommend this video by 13Cubed and the mentioned slides I´m your MAC(b) Daddy.

And 
    Contains([Extension], '.rar') 
    Contains([Parent Path], 'Documents')

By applying a filter for the .rar file extension in combination with Documents in the file path, only a single file can be found.

Timeline Explorer View with filters

Answer: Pathology-Department-Research-Records.rar


Task 04

Question: When was the archive file created on the disk?

By checking the remaining columns (or keys in JSON format), the Created0x10 field reveals the timestamp of when the file was created on the disk.

{
    "EntryNumber": 117119,
    "ParentPath": ".\\Users\\susan\\Documents",
    "FileName": "Pathology-Department-Research-Records.rar",
    "FileSize": 8746363,
    "Created0x10": "2025-09-02T08:13:50.5190826+00:00",
    "LastModified0x10": "2025-09-02T14:54:54.0000000+00:00",
    "LastModified0x30": "2025-09-02T08:13:50.5190826+00:00",
    "LastRecordChange0x10": "2025-09-02T08:14:04.9807437+00:00",
    "LastRecordChange0x30": "2025-09-02T08:13:50.5190826+00:00",
    "LastAccess0x10": "2025-09-02T08:14:18.8730290+00:00",
    "LastAccess0x30": "2025-09-02T08:13:50.5190826+00:00",
}

Answer: 2025-09-02 08:13:50


Task 05

Question: When was the archive file opened?

This question can also be answered using the dataset from Task 04. The LastRecordChange0x10 field, an indicator that the MFT entry itself was modified, is likely triggered in WinRAR when the structure of the archive is examined upon opening the file to display its contents. Cross-checking the NTFS journal entries from the $J file shows entries for ObjectIdChange at the same timestamp.

$J entries for .rar file

For further verification, applying a filter for the suspected timestamp shows additional entries that were modified or created at the same time. At the known timestamp, the creation of the Pathology-Department-Research-Records.lnk shortcut in the \Recents folder can be found which is another indication that this archive was opened at that time.

$J entries potential timestamp

Answer: 2025-09-02 08:14:04


Task 06

Question: What is the name of the decoy document extracted from the archive file, meant to appear legitimate and distract the user?

To identify the decoy document extracted from the archive, the query from the previous task can be adjusted to search for files in the already known Documents folder created around the suspected time the archive was opened. Only one document meets these conditions, which was created at 08:14:18.

$J entries to find decoy

This can also be verified by viewing the MFT reconstruction in MFT Explorer

MFT Explorer Documents folder

Answer: Genotyping_Results_B57_Positive.pdf


Task 07

Question: What is the name and path of the actual backdoor executable dropped by the archive file?

Using the timestamp of the extraction identified in Task 06, this timestamp can again be used as a filter to identify files created on the system. At the same time, only two additional files were created, one of which is an executable based on its file extension.

$J entries to find executable

Answer: C:\Users\Susan\Appdata\Local\ApbxHelper.exe


Task 08

Question: The exploit also drops a file to facilitate the persistence and execution of the backdoor. What is the path and name of this file?

This file was previously identified in Task 07. It is a .lnk file, a shortcut, created in the Startup folder for the user Susan, meaning it will be executed every time the user logs in.

Answer: C:\Users\Susan\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Display Settings.lnk


Task 09

Question: What is the associated MITRE Technique ID discussed in the previous question?

When assigning the MITRE Technique ID, based on the previously mentioned file, there are several possibilities under the technique Boot or Logon Autostart Execution:

Based on the file type, the answer for this Sherlock task corresponds to the second option.

Answer: T1547.009


Task 10

Question: When was the decoy document opened by the end user, thinking it to be a legitimate document?

This question can also be answered with a simple query of the extracted $J dataset for the file in question, there is another timestamp marked with ObjectIdChange.

$J entries for the decoy document

Answer: 2025-09-02 08:15:05