Hidden Streams Writeup | Huntress Labs CTF 2024

0xh4lpy
2 min readNov 1, 2024

Beneath the surface, secrets glide,
A gentle flow where whispers hide.
Unseen currents, silent dreams,
Carrying tales in hidden streams.

Can you find the secrets in these Sysmon logs?

Hidden Streams was a Forensics challenge released on Day #14 of the Huntress Labs Capture the Flag (CTF) competition. We were given a Zip file containing Sysmon logs (Sysmon.evtx) and tasked with finding the flag within these events.

After opening the event logs within Event Log Explorer, we discovered a total of 2850 events recorded between 2024-08-28 00:18:19 UTC and 2024-08-28 00:20:49 UTC.

By referencing the documentation for Sysmon Event IDs, we focused on Event ID (EID) 15FileCreateStreamHash. This EID is triggered when a named file stream is created, logging the file’s content. This is commonly observed in Alternate Data Streams (ADS), such as Zone.Identifier, which is created when files are downloaded via a web browser.

Filtering for this EID resulted in one event for the ADS C:\Temp:$5GMLW.

FileStreamCreate (EID 15) for an alternate data stream with Base64-encoded data

The content of this ADS was a Base64-encoded string:

ZmxhZ3tiZmVmYjg5MTE4MzAzMmY0NGZhOTNkMGM3YmQ0MGRhOX0=

We decoded this to obtain the flag:

Decoding Base64 to get the flag
flag{bfefb891183032f44fa93d0c7bd40da9}

Resources

[1] Sysmon Event IDs — Microsoft Documentation. https://learn.microsoft.com/en-us/sysinternals/downloads/sysmon

[2] Alternate Data Streams Overview — SANS Institute. https://www.sans.org/blog/alternate-data-streams-overview/

Sign up to discover human stories that deepen your understanding of the world.

0xh4lpy
0xh4lpy

Written by 0xh4lpy

Cybersecurity professional with a focus on digital forensics, incident response, and CTFs. Sharing insightand experience to enhance security knowledge.

No responses yet

Write a response