The second stage of the compromise shifted from stealth to destruction. After initial access, the attacker dropped and executed ransomware, leaving behind encrypted files and a trail of renamed binaries. Using the .ad1 image, I dug through the MFT and journal logs to trace the ransomware’s origin, behavior, and identity — and it didn’t take long to uncover the full picture.
For this part, we were provided with an .ad1 forensic image. Using FTK Imager, I extracted key artifacts — specifically $MFT and $J (the journal file). These two track file creation and changes on the NTFS file system, even if files have been deleted.

I loaded both files into MFTExplorer and exported them as .csv, then analyzed them using TimeExplorer. By filtering for .exe entries in the journal, one executable stood out: pb.exe. It wasn’t signed, wasn’t a system binary, and was only briefly present. That short lifespan is typical for malware droppers.

Answer: pb.exe
Using the MFT, I located pb.exe inside:
C:\Users\matthew.collins\Downloads\HiddenFile\\
A Zone.Identifier file (used by Windows to track files downloaded from the internet) existed alongside it.

The referrer path confirmed the local download origin:
[ZoneTransfer]
ZoneId=3
ReferrerUrl=C:\Users\matthew.collins\Downloads\HiddenFile
Tracing this back further, I filtered .zip entries in the MFT. One of them, HiddenFile.zip, contained the original executable. It also had a Zone.Identifier revealing the full download URL:
[ZoneTransfer]
ZoneId=3
ReferrerUrl=https://gofile.io/
HostUrl=https://store5.gofile.io/download/web/e23cb33f-0e4d-4a5f-8c55-ea2d78057d40/HiddenFile.zip

Answer: https://store5.gofile.io/download/web/e23cb33f-0e4d-4a5f-8c55-ea2d78057d40/HiddenFile.zip
After identifying pb.exe, I reviewed subsequent file operations in $J. Shortly after its execution, a new binary named HpAgent.exe appears. File system events indicate that pb.exe was renamed to HpAgent.exe, which is a typical evasion method to blend in with legitimate-looking binaries.

This renamed file then initiated the encryption routines seen shortly after.
Answer: HpAgent.exe
This was straightforward. A quick scan through the $MFT revealed many files with a .EeUfy extension, including ransom notes like README.EeUfy. Since this extension isn’t tied to any known app or system function, and it appeared post-encryption, it clearly belongs to the ransomware.

Answer: EeUfy
This part wasn’t purely forensic. The ransom note itself was the key. The text in the note matched a known sample indexed on tria.ge, a malware sandbox site.


Following the link (https://tria.ge/250610-cs7dvaxtdy), I found an onion site:
http://zdkexsh2e7yihw5uhg5hpsgq3dois2m5je7lzfagij2y6iw5ptl35gyd.onion/.
Browsing it via Tor confirmed the ransomware group behind the note — BlackLock.

Answer: BlackLock
Lastly, I searched through matthew.collins’ directories for unusual text files. Multiple copies of a file named IMPORTANT NOTICE showed up, with different extensions. Given the task hint — “filename without extension” — and the fact that the file clearly contained follow-up instructions from the attacker, this was our answer.

Answer: IMPORTANT NOTICE