Rundeer - Blue Team Lab Online Writeup

Rundeer - Blue Team Lab Online Writeup

Mon Jan 13 2025
BTLO
5 minutes

❄️ Challenge Story ❄️ Link to ❄️ Challenge Story ❄️

A malicious document has taken down our systems… could this be FrostGuard?


Scenario

An attacker sneaks in through a malicious document and gains control over the system. They move quickly, causing trouble and eventually deploying malware to lock up important files. Your mission is to track down their actions, find the attacker, and recover the encrypted files to bring everything back to normal.

list

list

We have “Cutter” for use in this challenge. This tool can use for RE.🥳

list

Evidence come with sample malware and memory dump.

list

Don’t forget to use python ver. 3.8 to use volatility.

list

Before start Q1, I’m prepare more information for investigate.

Question#1 Link to Question#1

  1. Using volatility, find the file that led to Initial Access to the workstation. (Format: Filename.extension) (5 points)
list

list

Scenario tell us about malicious document, so I found “PendingInvoice.docm” that look suspicious. After investigation from cmdline, that Powershell is launched by activating a .docm file. This Questoin want only filename to answer, use that name to solve.


Question#2 Link to Question#2

  1. Provide the name of the compromised user account. (Format: User) (3 points)

From Q1 we found that file in Reindeer user Desktop, that mean this user got compromised.

Question#3 Link to Question#3

  1. A reverse shell activity took place, find the IP and associated port. (Format: IP, Port) (4 points)
list

list

After Decyrpted base64 command we found that try to connect “139[.]177[.]207[.]94” port 8080.

Question#4 Link to Question#4

  1. Analyze the given malware file and provide the category to which it best belongs. (Format: Category) (3 points)
list

Import sample malware(Conhost.exe) to Cutter.

list

Decomplie function Main first.
We found 2 function that interesting (fnc_00402234 & fnc_00403abc).

list

Decomplie fnc_00402234 we found the API that call Computer name for do something.
After that XOR with 0x23.

list

Decomplie fnc_00403abc we found this function gonna change extension file after encrypted.

Overall summary is that this program will use fnc_00402234 for call Computer name,then XOR with 0x23 and use that to be key. And use that key XOR with all files in target folder, change extension to .FROSTED file.

The program’s procedure is to encrypt files and make them unreadable, which is what “Ransomware” is all about.

Question#5 Link to Question#5

  1. A component of the Windows workstation is being used for key creation in malware. Which API call is responsible for fetching it? (Format: API) (5 points)

From Q4 we found this program use an API that call Computer name. Use name of that API for answer this question.

Question#6 Link to Question#6

  1. What extension is the malware adding to the files it is affecting? (Format: EXTENSION (without dot)) (8 points)

From Q4 we know that gonna changed to .FROSTED after encrypted file.

Question#7 Link to Question#7

  1. There was a key text file affected by malware. Find and dump it. Provide its MD5 hash. (Format: MD5 hash) (8 points)
list

Try to find .FROSTED file from volatility filescan.
I found README.txt.FROSTED in S3cr3t folder that look interesting.

list

list

Use offset of README.txt.FROSTED for recovery file from memory dump file.
Option : windows.dumpfiles --virtaddr 0x.........
Answer this question by MD5 hash

Question#8 Link to Question#8

  1. You are tasked to decrypt the file. Analyze the malware and get the decryption key. (Format: decryption key (in lowercase, ASCII format)) (8 points)
list

From Q7 we remember that key encrypted by Computername.
Use option :
windows.registry.printkey --key "Control001\\Control\ComputerName"


list

Found ComputerName and ActiveComputerName, then print more key with ActiveComputerName. And I found this computer name is “FROSTBTYE”


list

XOR computer name with 0x23, and we will get the key. !!!

If you want to learn about this more, I recommend this Video.
Ref : https://youtu.be/1dbepxN2YD8?si=TIhOedf2ZzJRis6k&t=1553

Question#9 Link to Question#9

  1. Decrypt the text file. Read the content. Who sent the information to the user, provide the name. (As per the content inside the text file) (Format: Name) (6 points)
list

Last step use the Key from Q8 XOR with README.txt.FROSTED. (Don’t forget to import file in Cyberchef first)
Now, we got something look like message from someone to Reindeer.

End Link to End