TryHackMe Mac Hunt Write-Up Walk Through
Utilize your macOS investigation skills to reveal the mystery behind a compromise.
Investigating a macOS Compromise: Mac Hunt Walkthrough (Part 1)
In this TryHackMe room Mac Hunt, we investigate how Jake’s macOS system was compromised through a fake job offer. Let’s solve the first three questions to uncover the attack chain.
You can follow YouTube video walk through here
🛠️ Scenario Recap
Jake had gained some good knowledge and skills in the game development field. So, he decided to enter the industry through a decent job and upgrade his finances. Little did he know that there were many fake recruiters in search of people looking for jobs. These fake recruiters lure the victim through attractive jobs to achieve their objectives, often to compromise the victim’s machines and use them for malicious purposes. Having conventionally overlooked cyber security, Jake fell prey to such an attack. A well-crafted phishing attack with a promising job offer compromised his Mac machine.
You can follow YouTube video walk through here
🔐 Q1: Most Recently Accessed Folder
To find the most recently accessed folder, we examine macOS artifacts, specifically the Finder preferences plistutil -p Library/Preferences/com.apple.finder.plist
:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
root@tryhackme:/home/ubuntu/mac/root/Users/jake# plistutil -p Library/Preferences/com.apple.finder.plist
{
"FXDesktopVolumePositions": {
"GUEST TOOLS_-0x1.d27e44p+29": {
"xRelative": -65,
"ScreenID": 0,
"AnchorRelativeTo": 1,
"yRelative": 65
}
},
[REDACTED]
{
"file-bookmark": <626f6f6b 98020000 00000410 30000000 ... 04 00000000 000000>,
"name": "Downloads"
},
{
"file-bookmark": <626f6f6b 98020000 00000410 30000000 ... 04 00000000 000000>,
"name": "Documents"
},
{
"file-bookmark": <626f6f6b 6c030000 00000410 30000000 ... 04 00000000 000000>,
"name": "GUEST TOOLS"
}
],
This reveals the recently accessed folders, with the most recent one being our answer.
You can follow YouTube video walk through here
⚙️ Q2: Attacker’s Delivery Platform
The attacker likely delivered the malicious document via a social platform. We check Safari’s download history plistutil -p Library/Safari/Downloads.plist
:
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
root@tryhackme:/home/ubuntu/mac/root/Users/jake# plistutil -p Library/Safari/Downloads.plist
{
"DownloadHistory": [
{
"DownloadEntryProgressTotalToLoad": 3915,
"DownloadEntryProgressBytesSoFar": 3915,
"DownloadEntryPath": "/Users/jake/Downloads/MeetMeLiveInstaller.pkg",
"DownloadEntryDateAddedKey": 2025-04-30 08:53:46 +0000,
"DownloadEntryRemoveWhenDoneKey": false,
"DownloadEntryShouldUseRequestURLAsOriginURLIfNecessaryKey": false,
"DownloadEntryProfileUUIDStringKey": "DefaultProfile",
"DownloadEntryDateFinishedKey": 2025-04-30 08:53:49 +0000,
"DownloadEntryURL": "http://files.techthm.careers.thm:8080/MeetMeLiveInstaller.pkg",
"DownloadEntrySandboxIdentifier": "E226AE37-B1E0-4273-B615-D742DCE5AC46",
"DownloadEntryBookmarkBlob": <626f6f6b c4020000 00000410 30000000 ... 04 00000000 000000>,
"DownloadEntryIdentifier": "9AF3855A-649A-4BFE-844E-7DCEC97A2B19"
},
{
"DownloadEntryProgressTotalToLoad": 48401,
"DownloadEntryProgressBytesSoFar": 48401,
"DownloadEntryPath": "/Users/jake/Downloads/TechTHM Interview Instructions ? Content Writer.pdf",
"DownloadEntryDateAddedKey": 2025-04-30 08:48:27 +0000,
"DownloadEntryRemoveWhenDoneKey": false,
"DownloadEntryShouldUseRequestURLAsOriginURLIfNecessaryKey": false,
"DownloadEntryProfileUUIDStringKey": "DefaultProfile",
"DownloadEntryDateFinishedKey": 2025-04-30 08:48:29 +0000,
"DownloadEntryURL": "https://www.linkedin.com/dms/prv/vid/v2/D4D06AQGm4JKZe0_YOg/messaging-attachmentFile/B4DZaFtOpBH4AI-/0/1745999948823?m=AQLwEV_pZVeJggAAAZaF4f1sF3cQqoqdWb6NBttKAHbEUTE25fLpzLG5LiE&ne=1&v=beta&t=SBiD-QsKelAXCBMiHy1dRdm001vHvuqqkKADE9dBV10",
"DownloadEntrySandboxIdentifier": "ED8D283A-8AB7-40D8-B9F1-944DE44B7CA0",
"DownloadEntryBookmarkBlob": <626f6f6b e0020000 00000410 30000000 ... 04 00000000 000000>,
"DownloadEntryIdentifier": "B0A2342C-E7D7-45D8-B3B2-247B916EA283"
}
]
}
This shows downloads from platforms like LinkedIn, revealing where the attacker contacted Jake.
You can follow YouTube video walk through here
Q3: Malicious Download Link
Inside Jake’s Downloads folder, we find a suspicious PDF. Opening it reveals a hyperlink Click here to download MeetMeLive!
:
This crafted link leads to the malicious application.
🎥 Want to Go Deeper? Watch the Full Walkthrough
Watch the complete step-by-step solution on my
👉 🔗 You can follow YouTube video walk through here
Check out my full video walkthrough on my YouTube channel for step-by-step guidance:
Stay tuned for more macOS forensic investigations! 🔍💻