Home >

Huntress CTF > Medium Challenges

Back <> Next

Snake Eater II - Revenge of the Snake Eater

The Threat Actor must have gotten word that you had no trouble dissecting Snake Eater. They said this one is a bit more… involved.

For this challenge, we are given snake_eaterII to download, and inspect. We recalled from the first snake eater challenge, we were able to find the flag using Process monitor, so we decided to start there to see if there was anything interesting to find. We loaded up Process Monitor with the following filters:

Process Name is snake_eaterII.exe

and

Path contains flag

We observe similar behavior to the first snake_eater, however, this time the flag is being written to a file which was created in a random directory (usually somewhere in the C:\Users\user\AppData\Roaming\ path) and then being deleted before the program terminates.

We attempted to use x64dbg to step through the binary and pause the program after it had written the flag, but before it was able to delete it, but we eventually realized that we could simply use a tool to recover the deleted file.

We ran the program while watching process monitor for the exact path for the flag, then used Recuva to recover the deleted file and retrieve the flag!

snake_eaterii

Back <> Next