CAT CTF 2023 Digital Forensics writeup
In this post, I’ll be describing how I solved all Digital Forensics Challenges
its memory image and need suitable profile?
vol.py -f R4n.vmem imageinfo
FLAG: CATF{Win10x64_19041}
from description its need the parent process of the ransomware?
and extension after encrypt the data
i used pstree plugin to show all process
this the malware but we need check if we are right or not i used plugin procdump
and upload it in virustotal
then ppid for R4n50m.exe is 3564
refer to explorer.exe
to get ext we have two method
filescan
and show encrypted file- search about ransomware.dacic/clop
vol.py -f R4n.vmem windows.filescan | grep Desktop
FLAG: CATF{explorer.exe_Clop}
we have the name of malware R4n50m.exe
i used filescan
to get all files and grep
to get only R4n50m.exe path
now we have the path we need to get DTB
to get DTB
we need use volshell
and we remember the pid of malware
FLAG: CATF{C:\Users\Work\AppData\Local\Temp\R4n50m.exe_0x45ebb000}
in here need Mitre ID and email of manager
note: all the ransomware after encrypt files leave a message contain some information such as email address to contact them
after dump it and upload it in hybrid-analysis
i used photorec
to get the readme you can get it using strings
two method are right
strings R4n.vmem| grep -i “Contact email” -A 10 -B 10
FLAG: CATF{T1027_managersmaers@tutanota.com}
in first i tried analysis it used oletools
to show any malicious code or macros inside it
its clean
exiftool Targets.xlsx
we got the creator name and i used unzip to show files
FLAG: CATF{Th3–0b3l1sk_n!NjaTur7l5}
file is memory image from windows
after reading the description we knew it’s a developer
this info will help us
- Q1 bitcoin wallet address, to get we have two method use strings or unpack the malware
- all of ransomware leave a message with some information like email to contact them and unique id for all victims and the bitcoin wallet
strings RanDev.vmem | grep bitcon
- A1: bc1qwe5qxdj7aekpj8aeeeey6tf5hjzugk3jkax6lm
now we need to get the ransomware
i used pstree
to show all process
no process are suspicious but we remember its developer
vol.py -f RanDev.vmem windows.netscan
and the server was up and ports for mysql and web server
in first xampp
is web server and important artifacts we can get from it
- web logs for access
- code of running web server
vol.py -f RanDev.vmem windows.filescan | grep xampp
we need dump the access.log and error.log to show what happen
we can do this using pid
or address
vol.py -f RanDev.vmem windows.dumpfiles — virtaddr address
there are access for the php files we need dump it to show what inside it
vol.py -f RanDev.vmem windows.filescan | grep -E “\.php”
after get it we can now read content
its php code to check if POST
request and username
= user
and password
= password
will run the malicious code to download the ransomware -> save it -> execute
if the if condition not true will redirect to login.php
after decode the base64 encode http://192.168.235.137/download/R.exe
http://192.168.235.137/download/R.exe
url for the ransomware- file name
R.exe
- save it in
C:\Users\Work\Downloads\
exec
function to execute it
now we need to dump ransomware
vol.py -f RanDev.vmem windows.filescan | grep R.exe
after dump it just we need get sha256sum
FLAG: CATF{bc1qwe5qxdj7aekpj8aeeeey6tf5hjzugk3jkax6lm_d22aff59eae7201e6a4f82dbe99173c7103665beaa0860f81db7130f38c99a35_http://192.168.235.137/download/R.exe_exec}
all data we need inside the ransomware
after open it in ghidra
- A1 fake key
KRKTCUCXIZJESUSVNBBFCMDUIZKWOPJ5
- from function name we know its
xor encryption
- its contain the key and ext
- right key =
0x2c
- ext =
.D7K
- and we can solve it by other method to decrypt file run the malware in vm and will decrypt the
Tasks.txt
because it xor encryption
FLAG: CATF{KRKTCUCXIZJESUSVNBBFCMDUIZKWOPJ5_.D7K_0x2c_17}