Suninatas Game 29
challenges
Game 29
This challenge is a forensic incident response scenario with four
answers (Q1-Q4) and a final auth hash.
Given artifact:
1 | $ file 'Windows7(SuNiNaTaS)' |
EGG is an ALZip archive format. I extracted it in a
Windows guest (Bandizip), then analyzed the VM artifacts from Linux.
Extracted files include:
Windows 7.vmdk(disk)Windows 7-Snapshot2.vmem(memory)
Environment setup used
1 | # mount Windows disk read-only |
Q1: Fix broken
www.naver.com and recover key
hosts was tampered:
1 | $ cat /mnt/win/Windows/System32/drivers/etc/hosts |
Q1 key:
1 | what_the_he11_1s_keey |
Q2: Installed keylogger location + filename (lowercase)
From memory process list and command line:
1 | $ vol -f 'Windows 7-Snapshot2.vmem' -s ./volsym windows.pslist |
Q2 answer:
1 | c:\v196vv8\v1tvr0.exe |
Q3: Download time of keylogger
I first checked filesystem/MFT timestamps, but they are not the best source for “download time”:
1 | $ stat /mnt/win/v196vv8/v1tvr0.exe |
Better evidence: Internet Explorer history
(index.dat).
1 | $ find /mnt/win -name 'index.dat' -exec strings -f {} \; | grep -i 'spy-2010-keylogger-surveillance-spy-3.exe' |
Challenge format: yyyy-mm-dd_hh:mm:ss. Original analysis
timezone was UTC+8, challenge expected UTC+9, so:
1 | 2016-05-24_04:25:06 |
Q4: What did the keylogger capture?
Recovered log snippet (z1.dat):
1 | 4:37:57 How did you know pAsS\orD? Wow... Kee22 ls "blackkey is a Good man" |
Q4 key:
1 | blackkey is a Good man |
Final Auth Key
Rule:
1 | lowercase(md5(Q1_key + Q2_answer + Q3_answer + Q4_key)) |
Concatenation:
1 | what_the_he11_1s_keeyc:\v196vv8\v1tvr0.exe2016-05-24_04:25:06blackkey is a Good man |
Result:
970f891e3667fce147b222cc9a8699d4