CyberDefenders_NintendoHunt Lab

Writeup Image

Overview

Hi Geeks, Here is my writeup for NintendoHunt LAB. My approach is a bit different, I focus on how to think through the lab, not just how to solve the Qs.

hope you enjoy it.

First I started with vol3

started with usual steps to with volatility, like pslist and pscan but i notice something is stranger the svchosts.exe is repeat a lot!!!, I think is so stranger so let’s digging

In the order I found this malicious process, I think will help us later

Writeup Image Writeup Image

when I started with cmdline, i notice the same things with repeat of svchost.exe so let’s more focus

Writeup Image

wait a minute, I think this abnormal cuz svchost.exe - is not in correct path should be in

C:\Windows\System32\svchost.exe

and there are is abnormal thing, I notice that

so let’s investigate in it

Writeup Image

when investigating in svchost.exe PID 8560

Writeup Image

I notice the parent process of the svchost.exe is 4824 this is explorer.exe and this is abnormal

Writeup Image

so this is malicious process

in the Q

Writeup Image

I will try a lot to get the MAC from netscan and didin’t got it

when i searched to that’s should in this path

HKLM\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{Interface-GUID}

but i didn’t found anything, so let’t digging into it

                   I think this note may help U

Windows keeps a fingerprint for every network it connects to 
so it can recognize it later.

For example:

Home Wi-Fi
University network
Office LAN
Public hotspot

Each network gets a unique signature stored in the registry.
SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Signatures
Inside Signatures there are usually two folders:
Managed
Unmanaged
-----------
Unmanaged
Networks not controlled by Active Directory
Managed
Networks controlled by domain infrastructure (corporate networks)  

U can usw volatility or MemProcFS to get the answer

so let’s using volatility to get the Unmanaged to get the machine default gateway

Writeup Image

I found one subkey, let’s check it, yahh U will get the MAC address

Writeup Image

OR using MemProcFS to get it

M:\registry\HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Signatures\Unmanaged\ Writeup Image Writeup Image

------

in last 2 Q U can usemftparser to get the ans.

mftparser → analyze the MFT entries ( short file name ,file record , …) Writeup Image

For this Q U need to search in mft entraies, Using “txt” or “$DATA” U will find it

Writeup Image Writeup Image

U will get the hidden file in ADS

Writeup Image

For this Q

Writeup Image

just need to search in mft entaries using "www.13cubed.com" U will get the path

--------

Hope U enjoy it

← Back to Home