VeeBeeeee: A Microsoft Script Forensics Challenge
VeeBeeeee starts with an extensionless file. When attempting to open this file, we get a bunch of random junk. I used PowerShell to display the content of the file and then dropped the output into CyberChef to decode it. Using the “Magic” function on CyberChef told me that it was a Microsoft Script, and CyberChef applied the Microsoft Script Decoder function to the text blob.
Copy/Pasting the cleartext code into VSCode lets us use the find and replace function to get rid of some of this junk data.
While going through the script and getting rid of the tacked-on
strings and characters, we can see that there is an array being built called
Request. If we follow the link in this array, we get to a Pastebin file with
the flag.
Fetch: A Prefetch and WIM File Analysis Challenge
Fetch provided an unknown file with no extension. Like
previous challenges, we can use the “file” command to determine the file type. Using
the “file” command, we can see that the fetch file is actually a Windows Image Format
file (WIM). Using Google, we can find the wimtools suite, which allows for the
processing and handling of WIM files on Linux. After installing these tools, we
can use the command “wimextract fetch 1 / --nullglob” to extract the files in
the WIM file. I forgot to specify an output directory, so I moved all of the
prefetch files to a new directory as well.
Eric Zimmerman has a great tool for analyzing prefetch files
called PECmd. You can get it from his GitHub or website, alongside many other
useful Windows forensics and response tools. In order to process all the files
at once, I used a PowerShell one-liner. This puts the output of all the prefetch
file analysis into one text file.
After opening the text file in VSCode, I did a simple ctrl+f
to find matches to “flag”.
Comments
Post a Comment