2023 HuntressCTF - Snake Eater

2023-11-01

Summary

Author: @HuskyHacks

Hey Analyst, I've never seen an executable icon that looks like this. I don't like things I'm not familiar with. Can you check it out and see what it's doing?

Steps

I started up my Windows 11 VM with Flare installed. I began by disabling my network connectivity, USB controller, and shared files and folders. Once the VM was ready, I executed the binary and didn’t see any response or indication on the OS.

Before starting IDA, I wanted to try a few things. I tried to see if there was a help menu and to my surpise there was.

Using the information provided to me, I executed the binary with the -v flag.

I worked on this for a big longer but after a period of time I didn’t get anywhere. This time I decided to use ProcMon to see what was happening on the OS. I know ProcMon is going to generate alot of information, so I decided to create an Include filter to only display events by snake_eater.exe.

I navigated back to cmd prompt and executed snake_eater.exe continuing to use –verbose mode.

I stopped capturing after events stopping reporting in the application. Before going line-by-line, I wanted to get an overview of what was happening with an easier glance by looking at all the file events, network events, and registry events. In ProcMon, I went to Tools -> File Summary… and to my surprise, the application was writing out the flag within the ApPData Roaming folder!

Flag: flag{d1343a2fc5d8427801dd1fd417f12628}