20-Reverse Engineering
➜  www cat RunAudit.bat 
CascAudit.exe "\\CASC-DC1\Audit$\DB\Audit.db"%

The .exe is doing something with the db file, lets check it out with dnspy.

Transfer all the file retrieved from smb audit share to your windows machine.

Opened the caseCrypto.dll first because it had crypto in its name.

Pasted image 20240116203233.png

Pasted image 20240116203511.png
Its doing some kind of aes magic with a plain text and a key.

Opened the .exe file in dnsspy
Pasted image 20240116203833.png
Its decrypting the encrypted string

We ll set a break point with f9, execute the executable, bring the .db file in same working dir as of .exe,

Pasted image 20240116204302.png

Press f10 to step one step forward. And we ll be able to see the credentail.
Pasted image 20240116204411.png

arksvc:w3lc0meFr31nd