Zimmer Down Writeup | Huntress Labs CTF 2024

0xh4lpy
2 min readNov 1, 2024

--

A user interacted with a suspicious file on one of our hosts.
The only thing we managed to grab was the user’s registry hive.
Are they hiding any secrets?

Zimmer Down was a Forensics challenge released on Day #8 of the Huntress Labs Capture the Flag (CTF) competition. We were provided an NTUSER.DAT file and tasked with finding a suspicious file that the user interacted with.

Given the challenge name, we opened the using Eric Zimmerman’s Registry Explorer to examine its contents. The NTUSER.DAT file stores user-specific settings and configurations located within the user’s profile folder. In digital forensics, it can provide valuable information about user activity, particularly in relation to files that may have been accessed. When combined with other artifacts, this information can help prove how a user behaved on the system in question.

For the scope of this challenge, we focused on files and folders that the user had accessed. There are various ways to track this information, but it is most commonly recorded by the RecentDocs registry key located at \Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs, grouped by file extension.

RecentDocs within Registry Explorer

In Registry Explorer, we noted 28 entries across 12 extensions, the first of which, .b62 , contained an unusual file VJGSuERgCoVhl6mJg1x87faFOPIqacI3Eby4oP5MyBYKQy5paDF[.]b62 which was opened on 2024–10–02 02:47:01.

Unusual file within .b62 directory grouping

Taking the name of this file and assuming that the extension indicated it was encoded with Base62, we decoded it to retrieve the flag.

CyberChef using “From Base62” to decode the file name

flag{4b676ccc1070be66b1a15dB601c8d500}

Below are some resources that were helpful during the challenge:

[1] Registry Explorer — Eric Zimmerman. https://ericzimmerman.github.io/#!index.md

[2] CyberChef — GCHQ. https://cyberchef.org/

[3] Windows Registry Documentation — Microsoft. https://learn.microsoft.com/en-us/troubleshoot/windows-server/performance/windows-registry-advanced-users

Sign up to discover human stories that deepen your understanding of the world.

Free

Distraction-free reading. No ads.

Organize your knowledge with lists and highlights.

Tell your story. Find your audience.

Membership

Read member-only stories

Support writers you read most

Earn money for your writing

Listen to audio narrations

Read offline with the Medium app

--

--

0xh4lpy
0xh4lpy

Written by 0xh4lpy

Cybersecurity professional with a focus on digital forensics, incident response, and CTFs. Sharing insightand experience to enhance security knowledge.

No responses yet

Write a response