[Day 8] Santa's Bag of Toys

{Incident response = PowerShell Transcription Logs}

Story

McSkidy was notified of some terrible news! Santa's laptop, which he uses to prepare his bag of toys for Christmas, is missing! We believe a minion at the Grinch Enterprise stole it, but we need to find out for sure. It is up to us to determine what actor compromised the laptop and recover Santa's bag of toys!

Unfortunately, The Best Festival Company had minimal monitoring tools on Santa's laptop (he is the boss, after all)! All we have to work with are some PowerShell Transcription Logs we were able to remotely recover just after it went missing. You can find the transcription logs within the SantasLaptopLogs folder on the Desktop of the attached Windows virtual machine.

Challenge

Inspecting the Powershell logs gives more information of what was ran on the system

Now that we know that UsrClass.dat was exfiltrated from the system, lets try to make out what it was with the help of cyber chef.

This file can be used to aid in our investigation. The UsrClass.dat file contains "Shellbags," or artifacts contained within the Windows registry that store user preferences while viewing folders within the Windows Explorer GUI. If you could carve out this information, you could get an idea as to what user activity was performed on the laptop before it was stolen or compromised!

Using ShellBagsExplorer, we can explore the file as shown below.

Since there was a .github file under SantaRat-main, googling that led to the github repo.

Looking at one of the older commits revealed the password to the archive

Last updated

Was this helpful?