logo

Description

A user thought they were downloading the SysInternals tool suite and attempted to open it, but the tools did not launch and became inaccessible. Since then, the user has observed that their system has gradually slowed down and become less responsive.
https://cyberdefenders.org/blueteam-ctf-challenges/55

Writeup

Q1

1: What was the malicious executable file name that the user downloaded?

this one was an easy Question all u needed to do is to search for the downloaded executable which was the only progroam in the public download folder

1

Answer : SysInternals.exe

Q2

When was the last time the malicious executable file was modified? 12-hour format

once you identfied the file in Q1 it’s easy to get the last modified date once you extract the exe all u need to do is to check the properites you will find the modification time but As my time zone is UTC +2 so i needed to substract 2 hours from the time to get the correct answer

2

Answer : 11/15/2022 09:18:51 PM

Q3

What is the SHA1 hash value of the malware?

I stucked in this question for a while then i decided to check the free hint

3

So i started there Using the Eric Zimmerman Great tools “AmcacheParser” to parse the data we found

.\AmcacheParser.exe -f .\Amcache.hve --csv out

when i checked the output theree was 2 files that has data by cheacking the 20230415203241_Amcache_UnassociatedFileEntries.csv i found the hash

4

Answer : fa1002b02fc5551e075ec44bb4ff9cc13d563dcf

Q4

What is the malware's family?

once I got the hash i used viurstotal to identfy the malware family Viurstotal

5

Q5

What is the first mapped domain's Fully Qualified Domain Name (FQDN)?

also from the same Viurstotal Page in the relastion tab i found the URL which has most detection than the others

Answer : www.malware430.com

Q6

The mapped domain is linked to an IP address. What is that IP address?

I couldn’t find this IP in virus total and after a while i unlocked the hint which guided me to the powershell history once i know that i went there right away to get the answer

6

Answer : 192.168.15.10

Q7

What is the name of the executable dropped by the first-stage executable?

I Couldn’t find the name in vuirstotal eather so i did a quick analysis with my ultimte tool strings over the sample i found the exe name

strings SysInternals.exe |grep exe

7

Answer : vmtoolsIO.exe

Q8

What is the name of the service installed by 2nd stage executable?

that was a quick one from the same output as the last i found the service that the vmtoolsIO.exe starting which is VMwareIOHelperService

Answer : VMwareIOHelperService

Q9

What is the extension of files deleted by the 2nd stage executable?

That was a tricky one it took me a while to solve it i tried to get it from online sandbox but couldn’t so i did it into my virtual lab using vmware i executed the sample and with sysmon to see file modifications as i was dump to not enable the filedeletation rule so i had to be creative so i checked for file created so finally i go the answer

8

Answer : pf

9