As Microsoft Office macros face tighter restrictions in enterprise environments, threat actors are shifting tactics, and weaponised MMC files are gaining ground.
In this new DFIR Sherlock, you’ll investigate a real-world scenario involving the emerging GrimResource technique and learn:
  • How to extract a malicious file from a memory dump
  • Techniques for conducting in-depth malware analysis
  • How to identify and document Indicators of Compromise (IOCs)
Don't have access to HTB Enterprise Platform?
Start a 14-day business trial FOR FREE →
Want to add new defensive skills to your utility kit?
Login to HTB Labs today →
HTB Sherlocks - Novitas_1200x675