TrueSecrets

Description

Our cybercrime unit has been investigating a well-known APT group for several months. The group has been responsible for several high-profile attacks on corporate organizations. However, what is interesting about that case, is that they have developed a custom command & control server of their own. Fortunately, our unit was able to raid the home of the leader of the APT group and take a memory capture of his computer while it was still powered on. Analyze the capture to try to find the source code of the server.

Source

 7z l .\TrueSecrets.zip
   Date      Time    Attr         Size   Compressed  Name
------------------- ----- ------------ ------------  ------------------------
2022-12-14 19:34:32 .....    209649664     78802404  TrueSecrets.raw
------------------- ----- ------------ ------------  ------------------------
2022-12-14 19:34:32          209649664     78802404  1 files
 7z x .\TrueSecrets.zip -p'hackthebox'
└─$ file TrueSecrets.raw
TrueSecrets.raw: data

Solution

Because this is a memory dump volatilityarrow-up-right will be very useful.

Get some information about dump:

└─$ vol3 -f TrueSecrets.raw windows.info.Info | tee windows.info.log
Volatility 3 Framework 2.7.0
Progress:  100.00               PDB scanning finished
Variable        Value

Kernel Base     0x82606000
DTB     0x185000
Symbols file:///home//.local/lib/python3.11/site-packages/volatility3/symbols/windows/ntkrpamp.pdb/92D32EE7188A4CB3AB23EDA0CB0F9D7B-2.json.xz
Is64Bit False
IsPAE   True
layer_name      0 WindowsIntelPAE
memory_layer    1 FileLayer
KdDebuggerDataBlock     0x82732c78
NTBuildLab      7601.23915.x86fre.win7sp1_ldr.17
CSDVersion      1
KdVersionBlock  0x82732c50
Major/Minor     15.7601
MachineType     332
KeNumberProcessors      1
SystemTime      2022-12-14 21:33:30
NtSystemRoot    C:\Windows
NtProductType   NtProductWinNt
NtMajorVersion  6
NtMinorVersion  1
PE MajorOperatingSystemVersion  6
PE MinorOperatingSystemVersion  1
PE Machine      332
PE TimeDateStamp        Wed Sep 13 14:47:57 2017

Get running processes:

Backup seems interesting:

Scan for files to get offset:

We saw TrueCrypt.exe which suggest that the development is probably encrypted with it.

We can try to crack the password, but john came empty handed.

Volatility2 has a plugin to recover TrueCrypt details: Open an encrypted Truecrypt volumearrow-up-right

Download VeraCrypt https://www.veracrypt.fr/en/Downloads.htmlarrow-up-right. TrueCrypt is not supported software anymore, but VeraCrypt has some backwards compatibility.

💀 The latest version doesn't support TrueCrypt anymore.. Can VeraCrypt open an old TrueCrypt container?arrow-up-right

Supported version: https://www.veracrypt.fr/en/Downloads_1.25.9.htmlarrow-up-right

Mount > paste password > Ok

TrueSecrets.png

Decode the encrypted files because we have Key and IV in plaintext.

circle-check

Last updated