TETctf

Forensics - 4n6

image

The chall gives us 2 files one is Ad1 file and the other one is Raw file

you can use the Ad1 file in FTK-imager and Raw image in Volatility3 (I would recommand you using FTK cause it has UI and you can see all the file and path clearly). For me I will be using the FTK imager cause It really help me solve DFIR chall easier and faster

image

Ok the first thing we need to do is read the Challenge description to know where to start.

“After reading the rules, my computer seemed unusual” Remember this line.

The victim’s Computer seem to be infected after reading some word files so this maybe the clue for our problem, and we have an evidence thats the malicious code may in the docx file so its must VBA macro.

image

Checking the Recent folder We can see that the victim download some files and “TetCTF2024-Rules” seem to be Word file that was said to be had the malicous code.

image

(You can search Google to know where the macros stored)

image

export The dotm file then copy it to Linux to check Macros with Olevba we can see the Ip and Port. At the end you can see a hex string look suspicous

image

image

image

Decode the strings with base64 5 times and you will got the full First flag

TETctf{172.20.25.15:4444_VBA-M4cR0

My route to find second part of the Flag is unintentional!!!

The victim said that He had registerd an Account but He no longer remember the password

->So the First thing we need to know that What site did he created the account by checking the history file stored in chrome

image

Export this file then Open it with SQLite checking the URl visited

image

Then we can see the 2nd part of the flag

REMEMBER THIS IS AN UNINTENTIONAL ROUTE IT SHOULDNT BE SOLVED LIKE THIS

Flag: TETctf{172.20.25.15:4444_VBA-M4cR0_R3c0v3rry_34sy_R1ght?}

TET CTF 2024

Author

Raviyelna

Publish Date

04 - 04 - 2024

Avatar
Raviyelna

Simple guy who in fond of white/silver hair girl also DFIR and RE