k.eii

Finding Malicious Application with Prefetch | SNI CTF 2024 - pf-ing

pf-ing (prefetch-ing)

this is a challenge that i created for SNI CTF 2024

given a memdump files (.mem) with description:

believe me, its just an intro to DFIR about ransom cases

If you analyze it with pslist or pstree, you wont notice anything suspicious

Because of that, try to check the prefetch artifacts that residen in the memory dumo

https://www.geeksforgeeks.org/prefetch-files-in-windows/

vol -f dump.dmp windows.filescan | grep ".pf"

image

Analyze the prefetch files. You will notice there is Edge.exe proccess that suspicious. (Remember that the process of MS Edge is msedge.exe, not Edge.exe)

Analyze the Edge.exe prefetch with PECmd and you will find out that this exe will load some files in the Documents folder, resulting .dll files in %localappdata%/temp which is suspicious

image

By that evidence, you can assume that the Edge.exe is the malicious program and the data might be encrypted in the temp folder. Proceed to decrypt by dump the Edge.exe and the encrypted files

image

Decompile Edge.exe

image

XOR Encryption function.

image

Key is being randomized but only in the range of % 256 which can be bruteforced

Dumping Encrypted File

image image

Command:

vol -f dump.dmp windows.dumpfiles --virtaddr {offset}

Decrypt:

image

flag: SNI{intr0_t0_df1r_and_th1s_g1rl_is_w4y_b3tter_than_Chizuru}