Hunter Blue Team Challenge Walkthrough Write-Up

BY : AHMED Nasser

أحمد ناصر
8 min readDec 8, 2023

Category : Endpoint Forensics

LEVEL : Medium

Challenge Download link : https://cyberdefenders.org/blueteam-ctf-challenges/enroll/32

Instructions:

Unzip the challenge (pass: cyberdefenders.org), examine the image, and answer the provided questions.

Case Overview:

The SOC team got an alert regarding some illegal port scanning activity coming from an employee’s system. The employee was not authorized to do any port scanning or any offensive hacking activity within the network. The employee claimed that he had no idea about that, and it is probably a malware acting on his behalf. The IR team managed to respond immediately and take a full forensic image of the user’s system to perform some investigations.

There is a theory that the user intentionally installed illegal applications to do port scanning and maybe other things. He was probably planning for something bigger, far beyond a port scanning!

It all began when the user asked for a salary raise that was rejected. After that, his behavior was abnormal and different. The suspect is believed to have weak technical skills, and there might be an outsider helping him!

Your objective as a soc analyst is to analyze the image and to either confirm or deny this theory.

Supportive Tools:

First of all , we need to dump some important registry hives :

  • SAM
  • SECURITY
  • SOFTWARE
  • SYSTEM
  • ntuser.dat
  • usrClass.dat
/root/Users/Hunter/AppData/Local/Microsoft/Windows
/root/Windows/System32/systemprofile
/root/Windows/System32/config

Now Load these hives into registry Explorer

Registry Explorer

Q1-What is the computer name of the suspect machine?

  • Go to System/Controlset001/Control/ComputerName
Go to System\Controlset001\Control\ComputerName
THE Answer : 4ORENSICS

Q2-What is the computer IP?

  • Go to System\Controlset001\Services\TCPIP\Parameters\Interfaces{8CB9FBF6-AE*****} :
System\Controlset001\Services\TCPIP\Parameters\Interfaces{8CB9FBF6-AE*****}
THE Answer : 10.0.2.15

Q3-What was the DHCP LeaseObtainedTime?

  • In the same path form previous question , look at LeaseObtainedTime value :
System\Controlset001\Services\TCPIP\Parameters\Interfaces{8CB9FBF6-AE*****}
  • THE value is 1466475852 , Now we need to change it to UTC
  • Go to this site epochconverter :
epochconverter
THE Answer : 21/06/2016 02:24:12 UTC

Q4-What is the computer SID?

  • Go to SAM\Domains\Account\Aliases\Members\ S-1–5–21–2489440558–2754304563–710705792
SAM\Domains\Account\Aliases\Members
THE ANSWER : S-1-5-21-2489440558-2754304563-710705792

Q5-What is the Operating System(OS) version?

  • Go to Microsoft\Windows NT\CurrentVersion , and look at
    ProductName value :
Microsoft\Windows NT\CurrentVersion
THE ANSWER : 8.1

Q6-What was the computer timezone?

  • Go to SYSTEM\ControlSet001\Control\TimeZoneInformation\ and look at “TimeZoneKeyName” :
SYSTEM\ControlSet001\Control\TimeZoneInformation
THE ANSWER : UTC-07:00

Q7-How many times did this user log on to the computer?

  • I used Reg Ripper tool to analyses SAM file :
  • Now open report file generated by Reg Ripper :
THE ANSWER : 3

Q8-When was the last login time for the discovered account? Format: one-space between date and time

  • Form the screenshot above form previous question :
THE ANSWER : 2016-06-21 01:42:40

Q9-There was a “Network Scanner” running on this computer, what was it? And when was the last time the suspect used it? Format: program.exe,YYYY-MM-DD HH:MM:SS UTC

  • First thing dump prefetch folder using FTK :
/root/Windows/Prefetch

. Now open it with WinPrefetchView :

WinPrefetchView
  • Now scroll down you will notice a process with name ZENMAP.EXE ( network scanner tool ) :
THE ANSWER : zenmap.exe,2016-06-21 12:08:13 UTC

Q10-When did the port scan end? (Example: Sat Jan 23 hh:mm:ss 2016)

  • Go to /root/Users/Hunter/Desktop , and dump nmapscan.xml file
  • Now open the file with any xml viwer :
THE ANSWER : Tue Jun 21 05:12:09 2016

Q11-How many ports were scanned?

  • Form the same file :
THE ANSWER : 1000

Q12-What ports were found “open”?(comma-separated, ascending)

  • Form the same file :
nmapscan.xml
THE ANSWER : 22,80,9929,31337

Q13-What was the version of the network scanner running on this computer?

  • Form the same file :
nmapscan.xml
THE Answer : 7.12

Q14-The employee engaged in a Skype conversation with someone. What is the skype username of the other party?

  • I used Skyperious tool to do skype forensics , a resource that may help you with your investigation .
  • first , we need to dump skype database , so go to /root/Users/Hunter/AppData/Roaming/skype and dump the skype folder :
  • now open main Database (Root/Users/Hunter/AppData/Roaming/Skype/hunterehpt/main.db) with Skyperious :
  • Open the database in Skyperious and go to chat section:
THE ANSWER : linux-rul3z

Q14-What is the name of the application both parties agreed to use to exfiltrate data and provide remote access for the external attacker in their Skype conversation?

  • With the same tool open the chat between the attacker and the employee :
THE ANSWER : Teamviewer

Q16-What is the Gmail email address of the suspect employee?

  • Go to information section :
Skyperious
THE ANSWER : ehptmsgs@gmail.com

Q18-The user Documents’ directory contained a PDF file discussing data exfiltration techniques. What is the name of the file?

  • Go to Documents directory in FTK (root/Users/Hunter/Documents)
root/Users/Hunter/Documents
THE ANSWER : Ryan_VanAntwerp_thesis.pdf

Q19-What was the name of the Disk Encryption application Installed on the victim system? (two words space separated)

  • In FTK go to /root/Program Files[x86]/Jetico/BCWIPE .
  • In the BCWipe directory, there is the “UnInstall.log” file, which contains the answer:
/root/Program Files[x86]/Jetico/BCWIPE/Uninstall.log
THE Answer : Crypto Swap

Q20-What are the serial numbers of the two identified USB storage?

  • In Registry Viewer Go to SYSTEM\ControlSet001\Enum\USB :
SYSTEM\ControlSet001\Enum\USB
THE ANSWER : 07B20C03C80830A9,AAI6UXDKZDV8E9OU

Q21-One of the installed applications is a file shredder. What is the name of the application? (two words space separated)

  • check program names in /root/Users/Hunter/Program Files[x86]/jetico
/root/Users/Hunter/Program Files[x86]/jetico
THE ANSWER : Jetico BCWipe

Q22-How many prefetch files were discovered on the system?

  • Use PECmd tool to list all prefetch files :
E:\tools\Get-ZimmermanTools\net6>PECmd.exe -d "C:\Users\user\Desktop\New folder\Prefetch"
PECmd.exe
THE Answer : 174

Q23-How many times was the file shredder application executed?

  • Since we know the tool name form previous question (BCWipe) , so we can go and check Prefetch :
THE ANSWER : 5

Q24-Using prefetch, determine when was the last time ZENMAP.EXE-56B17C4C.pf was executed?

  • Easy , check prefetch files :
THE ANSWER : 06/21/2016 12:08:13 PM

Q25-A JAR file for an offensive traffic manipulation tool was executed. What is the absolute path of the file?

  • In Download folder you can find a jar file so i guess the file name is the answer :
/root/Users/Hunter/Downloads
THE ANSWER : C:\Users\Hunter\Downloads\Burpsuite_free_v1.7.03.jar

Q27-Shellbags shows that the employee created a folder to include all the data he will exfiltrate. What is the full path of that folder?

THE Answer : C:\Users\Hunter\Pictures\Exfil

Q28-The user deleted two JPG files from the system and moved them to $Recycle-Bin. What is the file name that has the resolution of 1920x1200?

  • If you checked the second photo in $Recyclebin, you would notice that it is the same as ws_Small_cute_kitty_1920x1200.jpg in “Users\Hunter\Picture\Private.”
Users\Hunter\Picture\Private
THE ANSWER : ws_Small_cute_kitty_1920x1200.jpg

Q29-Provide the name of the directory where information about jump lists items (created automatically by the system) is stored?

  • Jump Lists are stored in sub-folders of the user’s Recent folder previously identified as storing LNK files (C:\Users<username>\AppData\Roaming\Microsoft\Windows\Recent).
  • Now go to : /root/Users/Hunter/AppData\Roaming\Microsoft\Windows\Recent
Now go to : /root/Users/Hunter/AppData\Roaming\Microsoft\Windows\Recent
THE ANswer : AutomaticDestinations

Q30-Using JUMP LIST analysis, provide the full path of the application with the AppID of “aa28770954eaeaaa” used to bypass network security monitoring controls.

  • Now we need to dump the files form above question AutomaticDestinations and CustomDestinations and load this with JumpListExplorer tool :
  • Load AutomaticDestinations files in JumpListExplorer and search for aa28770954eaeaaa :
THE Answer : C:\Users\Hunter\Desktop\Tor Browser\Browser\firefox.exe

THE END

BY : Ahmed Nasser

--

--

أحمد ناصر
أحمد ناصر

Written by أحمد ناصر

CyberSecurity Analyst || DFIR || CTF player

No responses yet