← Back to Index

HackTheBox Sherlocks - Noted

Created: 20/05/2024 22:41 Last Updated: 20/05/2024 23:48


b9cd861ecf5f3248e8bf25ec84c86a13.png Scenario: Simon, a developer working at Forela, notified the CERT team about a note that appeared on his desktop. The note claimed that his system had been compromised and that sensitive data from Simon's workstation had been collected. The perpetrators performed data extortion on his workstation and are now threatening to release the data on the dark web unless their demands are met. Simon's workstation contained multiple sensitive files, including planned software projects, internal development plans, and application codebases. The threat intelligence team believes that the threat actor made some mistakes, but they have not found any way to contact the threat actors. The company's stakeholders are insisting that this incident be resolved and all sensitive data be recovered. They demand that under no circumstances should the data be leaked. As our junior security analyst, you have been assigned a specific type of DFIR (Digital Forensics and Incident Response) investigation in this case. The CERT lead, after triaging the workstation, has provided you with only the Notepad++ artifacts, suspecting that the attacker created the extortion note and conducted other activities with hands-on keyboard access. Your duty is to determine how the attack occurred and find a way to contact the threat actors, as they accidentally locked out their own contact information.


Task 1: What is the full path of the script used by Simon for AWS operations?

207faffeff8182662c1a24d1ebe9b016.png As the scenario tell us, we only have notepad++ artifacts d863de196ef6223a96a2a729dc9ec82c.png We got back up file of ransomnote 6a515fa729e40bd5747c57a066e4c602.png Which lead to this password required pastebin.ai b4ec7db48db46540b77b80da55a80fb1.png The other file we got it the problematic script written in Java, you can see that it collect sensitive files and compress it with specific password 51522e575967427a1463a127673fcb4e.png Using that password, we got crypto wallet and contact of an attacker (task 5 and 6) 7db3bfad96dcf2590b51763cef31c98a.png But the answer of this task lie in config.xml file

C:\Users\Simon.stark\Documents\Dev_Ops\AWS_objects migration.pl

Task 2: The attacker duplicated some program code and compiled it on the system, knowing that the victim was a software engineer and had all the necessary utilities. They did this to blend into the environment and didn't bring any of their tools. This code gathered sensitive data and prepared it for exfiltration. What is the full path of the program's source file?

5b46a2d4c74db272dd14b66672e51c90.png You can see its original path from sessions.xml

C:\Users\Simon.stark\Desktop\LootAndPurge.java

Task 3: What's the name of the final archive file containing all the data to be exfiltrated?

35369e9c83f30cacc521b8f5774d97fb.png Read Java script again then you will find a name

Forela-Dev-Data.zip

Task 4: What's the timestamp in UTC when attacker last modified the program source file?

6e68281356f58a4dd799a5dc7731995f.png Go to sessions.xml again to grab File timestamp both Low and High 37a2513baa18a1375173f064d58d7daf.png I did some research on how to convert them to FILETIME and found this post on Notepad++ communuity that taught us how to do it

in our case full value = 31047188 * 4294967296 + (4294967296-1354503710) 9c229769049c15f163c3ed71ff08343d.png I let WolframAlpha does it thing and we finally got LDAP filetime (133346660033227234) a5532994ec27ed1915ff6b3bd2db26ed.png Lastly we will use epoch converter to convert to UTC

2023-07-24 09:53:23

Task 5: The attacker wrote a data extortion note after exfiltrating data. What is the crypto wallet address to which attackers demanded payment?

0xca8fa8f0b631ecdb18cda619c4fc9d197c8affca

Task 6: What's the email address of the person to contact for support?

CyberJunkie@mail2torjgmxgexntbrmhvgluavhj7ouul5yar6ylbvjkxwqf6ixkwyd.onion

7e81a79ec8f334bf5c1047b2d8543f84.png