BankingTroubles - Memory Image Forensics

What was the local IP address for the victim's machine?

$ volatility -f Bob.vmem imageinfo
Volatility Foundation Volatility Framework 2.6
INFO    : volatility.debug    : Determining profile based on KDBG search...
          Suggested Profile(s) : WinXPSP2x86, WinXPSP3x86 (Instantiated with WinXPSP2x86)
                     AS Layer1 : IA32PagedMemoryPae (Kernel AS)
                     AS Layer2 : FileAddressSpace (/home/hnl/Desktop/ctf/cyberdefenders/banking-trouble/Bob.vmem)
                      PAE type : PAE
                           DTB : 0x319000L
                          KDBG : 0x80544ce0L
          Number of Processors : 1
     Image Type (Service Pack) : 2
                KPCR for CPU 0 : 0xffdff000L
             KUSER_SHARED_DATA : 0xffdf0000L
           Image date and time : 2010-02-27 20:12:38 UTC+0000
     Image local date and time : 2010-02-27 15:12:38 -0500

$ volatility -f Bob.vmem --profile=WinXPSP2x86 connections
Volatility Foundation Volatility Framework 2.6
Offset(V)  Local Address             Remote Address            Pid
---------- ------------------------- ------------------------- ---
0x81c6a9f0 192.168.0.176:1176        212.150.164.203:80        888
0x82123008 192.168.0.176:1184        193.104.22.71:80          880
0x81cd4270 192.168.0.176:2869        192.168.0.1:30379         1244
0x81e41108 127.0.0.1:1168            127.0.0.1:1169            888
0x8206ac58 127.0.0.1:1169            127.0.0.1:1168            888
0x82108890 192.168.0.176:1178        212.150.164.203:80        1752
0x82210440 192.168.0.176:1185        193.104.22.71:80          880
0x8207ac58 192.168.0.176:1171        66.249.90.104:80          888
0x81cef808 192.168.0.176:2869        192.168.0.1:30380         4
0x81cc57c0 192.168.0.176:1189        192.168.0.1:9393          1244
0x8205a448 192.168.0.176:1172        66.249.91.104:80          888

What was the OS variable value?

$ volatility -f Bob.vmem --profile=WinXPSP2x86 envars | more
Volatility Foundation Volatility Framework 2.6
Pid      Process              Block      Variable                       Value
-------- -------------------- ---------- ------------------------------ -----
     548 smss.exe             0x00100000 CommonProgramFiles             
     548 smss.exe             0x00100000 Path                           C:\WINDOWS\System32
     548 smss.exe             0x00100000 ProgramFiles                   
     548 smss.exe             0x00100000 SystemDrive                    C:
     548 smss.exe             0x00100000 SystemRoot                     C:\WINDOWS
     612 csrss.exe            0x00100000 ComSpec                        C:\WINDOWS\system32\cmd.exe
     612 csrss.exe            0x00100000 FP_NO_HOST_CHECK               NO
     612 csrss.exe            0x00100000 NUMBER_OF_PROCESSORS           1
     612 csrss.exe            0x00100000 OS                             Windows_NT
     612 csrss.exe            0x00100000 Path                           C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
     612 csrss.exe            0x00100000 PATHEXT                        .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH
     612 csrss.exe            0x00100000 PROCESSOR_ARCHITECTURE         x86
     612 csrss.exe            0x00100000 PROCESSOR_IDENTIFIER           x86 Family 6 Model 26 Stepping 5, GenuineIntel
     612 csrss.exe            0x00100000 PROCESSOR_LEVEL                6
     612 csrss.exe            0x00100000 PROCESSOR_REVISION             1a05
     612 csrss.exe            0x00100000 SystemDrive                    C:
     612 csrss.exe            0x00100000 SystemRoot                     C:\WINDOWS
     612 csrss.exe            0x00100000 TEMP                           C:\WINDOWS\TEMP
     612 csrss.exe            0x00100000 TMP                            C:\WINDOWS\TEMP
     612 csrss.exe            0x00100000 windir                         C:\WINDOWS
     644 winlogon.exe         0x00010000 ALLUSERSPROFILE                C:\Documents and Settings\All Users
     644 winlogon.exe         0x00010000 APPDATA                        C:\Documents and Settings\Administrator\Application Data
     644 winlogon.exe         0x00010000 CommonProgramFiles             C:\Program Files\Common Files
     644 winlogon.exe         0x00010000 COMPUTERNAME                   BOB-DCADFEDC55C
     644 winlogon.exe         0x00010000 ComSpec                        C:\WINDOWS\system32\cmd.exe
     644 winlogon.exe         0x00010000 FP_NO_HOST_CHECK               NO
     644 winlogon.exe         0x00010000 LOGONSERVER                    \\BOB-DCADFEDC55C

What was the Administrator's password?

$ volatility -f Bob.vmem --profile=WinXPSP2x86 hashdump > hash.txt
Volatility Foundation Volatility Framework 2.6
Administrator:500:<redacted>:::

$ hashcat -m 100 hash.txt /usr/share/wordlists/rockyou.txt --force

Which process was most likely responsible for the initial exploit?

$ volatility -f Bob.vmem --profile=WinXPSP2x86 pslist
Volatility Foundation Volatility Framework 2.6
Offset(V)  Name                    PID   PPID   Thds     Hnds   Sess  Wow64 Start                          Exit                          
---------- -------------------- ------ ------ ------ -------- ------ ------ ------------------------------ ------------------------------
0x823c8830 System                    4      0     58      573 ------      0                                                              
0x81f04228 smss.exe                548      4      3       21 ------      0 2010-02-26 03:34:02 UTC+0000                                 
0x822eeda0 csrss.exe               612    548     12      423      0      0 2010-02-26 03:34:04 UTC+0000                                 
0x81e5b2e8 winlogon.exe            644    548     21      521      0      0 2010-02-26 03:34:04 UTC+0000                                 
0x82256da0 services.exe            688    644     16      293      0      0 2010-02-26 03:34:05 UTC+0000                                 
0x82129da0 lsass.exe               700    644     22      416      0      0 2010-02-26 03:34:06 UTC+0000                                 
0x81d3f020 vmacthlp.exe            852    688      1       35      0      0 2010-02-26 03:34:06 UTC+0000                                 
0x82266870 svchost.exe             880    688     28      340      0      0 2010-02-26 03:34:07 UTC+0000                                 
0x822e1da0 svchost.exe             948    688     10      276      0      0 2010-02-26 03:34:07 UTC+0000                                 
0x822ea020 svchost.exe            1040    688     83     1515      0      0 2010-02-26 03:34:07 UTC+0000                                 
0x81dea020 svchost.exe            1100    688      6       96      0      0 2010-02-26 03:34:07 UTC+0000                                 
0x81de55f0 svchost.exe            1244    688     19      239      0      0 2010-02-26 03:34:08 UTC+0000                                 
0x81dde568 spoolsv.exe            1460    688     11      129      0      0 2010-02-26 03:34:10 UTC+0000                                 
0x821018b0 vmtoolsd.exe           1628    688      5      220      0      0 2010-02-26 03:34:25 UTC+0000                                 
0x81ddd8d0 VMUpgradeHelper        1836    688      4      108      0      0 2010-02-26 03:34:34 UTC+0000                                 
0x820d6b88 alg.exe                2024    688      7      130      0      0 2010-02-26 03:34:35 UTC+0000                                 
0x81cdd790 explorer.exe           1756   1660     14      345      0      0 2010-02-26 03:34:38 UTC+0000                                 
0x81ca96f0 VMwareTray.exe         1108   1756      1       59      0      0 2010-02-26 03:34:39 UTC+0000                                 
0x820cd5c8 VMwareUser.exe         1116   1756      4      179      0      0 2010-02-26 03:34:39 UTC+0000                                 
0x81cee5f8 wscntfy.exe            1132   1040      1       38      0      0 2010-02-26 03:34:40 UTC+0000                                 
0x82333620 msiexec.exe             244    688      5      181      0      0 2010-02-26 03:46:06 UTC+0000                                 
0x81ce1af8 msiexec.exe             452    244      0 --------      0      0 2010-02-26 03:46:07 UTC+0000   2010-02-26 03:46:28 UTC+0000  
0x81c80c78 wuauclt.exe             440   1040      8      188      0      0 2010-02-27 19:48:49 UTC+0000                                 
0x8221a020 wuauclt.exe             232   1040      4      136      0      0 2010-02-27 19:49:11 UTC+0000                                 
0x82068020 firefox.exe             888   1756      9      172      0      0 2010-02-27 20:11:53 UTC+0000                                 
0x820618c8 AcroRd32.exe           1752    888      8      184      0      0 2010-02-27 20:12:23 UTC+0000                                 
0x82209640 svchost.exe            1384    688      9      101      0      0 2010-02-27 20:12:36 UTC+0000

What is the extension of the malicious file retrieved from the process responsible for the initial exploit?

AcroRd32.exe is an executable file required to run Adobe Acrobat Reader in a computer. It is an important component needed to view pdf documents.

Suspicious processes opened network connections to external IPs. Provide the two external IP addresses. (comma-separated without spaces, ascending)

$ volatility -f Bob.vmem --profile=WinXPSP2x86 connections
Volatility Foundation Volatility Framework 2.6
Offset(V)  Local Address             Remote Address            Pid
---------- ------------------------- ------------------------- ---
0x81c6a9f0 192.168.0.176:1176        212.150.164.203:80        888
0x82123008 192.168.0.176:1184        193.104.22.71:80          880
0x81cd4270 192.168.0.176:2869        192.168.0.1:30379         1244
0x81e41108 127.0.0.1:1168            127.0.0.1:1169            888
0x8206ac58 127.0.0.1:1169            127.0.0.1:1168            888
0x82108890 192.168.0.176:1178        212.150.164.203:80        1752
0x82210440 192.168.0.176:1185        193.104.22.71:80          880
0x8207ac58 192.168.0.176:1171        66.249.90.104:80          888
0x81cef808 192.168.0.176:2869        192.168.0.1:30380         4
0x81cc57c0 192.168.0.176:1189        192.168.0.1:9393          1244
0x8205a448 192.168.0.176:1172        66.249.91.104:80          888

A suspicious URL was present in process svchost.exe memory. Provide the full URL that points to a PHP page hosted over a public IP (no FQDN).

# We see svchost.exe PID
volatility -f Bob.vmem --profile=WinXPSP2x86 pslist

# We dump these process. Here is an example
volatility -f Bob.vmem --profile=WinXPSP2x86 memdump -p 880 --dump-dir=./dump

# We grep all of the http from these file, but we dont see nothing
strings * | grep -Eo "(http|https)://[a-zA-Z0-9./?=_%:-]*" | sort -u

# Finally, I decided to grep ip from Question Number 6.
strings * | grep "http://193.104.22.71/"

Extract files from the initial process. One file has an MD5 hash ending with "528afe08e437765cc. When was this file first submitted for analysis on VirusTotal?

$ volatility -f Bob.vmem --profile=WinXPSP2x pslist
Volatility Foundation Volatility Framework 2.6
Offset(V)  Name                    PID   PPID   Thds     Hnds   Sess  Wow64 Start                          Exit                          
---------- -------------------- ------ ------ ------ -------- ------ ------ ------------------------------ ------------------------------
0x823c8830 System                    4      0     58      573 ------      0                                                              
0x81f04228 smss.exe                548      4      3       21 ------      0 2010-02-26 03:34:02 UTC+0000                                 
0x822eeda0 csrss.exe               612    548     12      423      0      0 2010-02-26 03:34:04 UTC+0000                                 
0x81e5b2e8 winlogon.exe            644    548     21      521      0      0 2010-02-26 03:34:04 UTC+0000                                 
0x82256da0 services.exe            688    644     16      293      0      0 2010-02-26 03:34:05 UTC+0000                                 
0x82129da0 lsass.exe               700    644     22      416      0      0 2010-02-26 03:34:06 UTC+0000                                 
0x81d3f020 vmacthlp.exe            852    688      1       35      0      0 2010-02-26 03:34:06 UTC+0000                                 
0x82266870 svchost.exe             880    688     28      340      0      0 2010-02-26 03:34:07 UTC+0000                                 
0x822e1da0 svchost.exe             948    688     10      276      0      0 2010-02-26 03:34:07 UTC+0000                                 
0x822ea020 svchost.exe            1040    688     83     1515      0      0 2010-02-26 03:34:07 UTC+0000                                 
0x81dea020 svchost.exe            1100    688      6       96      0      0 2010-02-26 03:34:07 UTC+0000                                 
0x81de55f0 svchost.exe            1244    688     19      239      0      0 2010-02-26 03:34:08 UTC+0000                                 
0x81dde568 spoolsv.exe            1460    688     11      129      0      0 2010-02-26 03:34:10 UTC+0000                                 
0x821018b0 vmtoolsd.exe           1628    688      5      220      0      0 2010-02-26 03:34:25 UTC+0000                                 
0x81ddd8d0 VMUpgradeHelper        1836    688      4      108      0      0 2010-02-26 03:34:34 UTC+0000                                 
0x820d6b88 alg.exe                2024    688      7      130      0      0 2010-02-26 03:34:35 UTC+0000                                 
0x81cdd790 explorer.exe           1756   1660     14      345      0      0 2010-02-26 03:34:38 UTC+0000                                 
0x81ca96f0 VMwareTray.exe         1108   1756      1       59      0      0 2010-02-26 03:34:39 UTC+0000                                 
0x820cd5c8 VMwareUser.exe         1116   1756      4      179      0      0 2010-02-26 03:34:39 UTC+0000                                 
0x81cee5f8 wscntfy.exe            1132   1040      1       38      0      0 2010-02-26 03:34:40 UTC+0000                                 
0x82333620 msiexec.exe             244    688      5      181      0      0 2010-02-26 03:46:06 UTC+0000                                 
0x81ce1af8 msiexec.exe             452    244      0 --------      0      0 2010-02-26 03:46:07 UTC+0000   2010-02-26 03:46:28 UTC+0000  
0x81c80c78 wuauclt.exe             440   1040      8      188      0      0 2010-02-27 19:48:49 UTC+0000                                 
0x8221a020 wuauclt.exe             232   1040      4      136      0      0 2010-02-27 19:49:11 UTC+0000                                 
0x82068020 firefox.exe             888   1756      9      172      0      0 2010-02-27 20:11:53 UTC+0000                                 
0x820618c8 AcroRd32.exe           1752    888      8      184      0      0 2010-02-27 20:12:23 UTC+0000                                 
0x82209640 svchost.exe            1384    688      9      101      0      0 2010-02-27 20:12:36 UTC+0000

# we dump AcroRd32.exe from process                             
hnl@hnl-Inspiron-5468:~/Desktop/ctf/cyberdefenders/banking-trouble$ volatility -f Bob.vmem --profile=WinXPSP2x86 memdump -p 1752 --dump-dir=./dump
Volatility Foundation Volatility Framework 2.6
************************************************************************
Writing AcroRd32.exe [  1752] to 1752.dmp

# Let's extract some of the contents from this dump file
$ foremost 1752.dmp

# You will see all of the extracted data from this dump files. Our main process is AcroRd32.exe and it open the document files (PDF). So, our main purpose will be 'PDF' folder.
$ ls
audit.txt  bmp  dll  exe  gif  htm  jar  jpg  ole  pdf  png  zip
$ cd pdf/

# Question  said our suspicious file md5 hash is end with 528afe08e437765cc . You will see this hash with '00601560.pdf' name.
$ md5sum *
4c1d41459dc5b476394ceb06471dd1f8  00445397.pdf
4c1d41459dc5b476394ceb06471dd1f8  00446730.pdf
1873297b6b3702817a760f95187236bc  00579981.pdf
1873297b6b3702817a760f95187236bc  00585184.pdf
1873297b6b3702817a760f95187236bc  00600544.pdf
70ebcd37c81e49858b8946ba49eb44b5  00600928.pdf
f32aa81676c7391528afe08e437765cc  00601560.pdf

# And then upload in virus total. You will see first submit date in Details tab.

What was the PID of the process that loaded the file PDF.php?

0x820618c8 AcroRd32.exe           1752    888      8      184      0      0 2010-02-27 20:12:23 UTC+0000

The JS includes a function meant to hide the call to function eval(). Provide the name of that function.

# We will use peepdf tool. Finally, you will see javascript function name
$ git clone https://github.com/jesparza/peepdf.git
$ echo 'extract js > all-javascripts-from-my.pdf' > extract.txt
$ peepdf.py -l -f -s extract.txt ../00601560.pdf
$ cat all-javascripts-from-my.pdf

The payload includes 3 shellcodes for different versions of Acrobat reader. Provide the function name that corresponds to Acrobat v9.

js malware.js
cat shellcode.js

Process winlogon.exe hosted a popular malware that was first submitted for analysis at VirusTotal on 2010-03-29 11:34:01. Provide the MD5 hash of that malware.

$ volatility -f Bob.vmem --profile=WinXPSP2x86 malfind -p 644 -D ./malfind
$ cd malfind/
$ md5sum *
a713f24caea9f219ee4c4b8c780fc3b2  process.0x81e5b2e8.0x24990000.dmp
baa16a4a537f2a13f99dd8a065ae8c92  process.0x81e5b2e8.0x26200000.dmp
f59c1246231631494ac73e61b9dfeb4c  process.0x81e5b2e8.0x42e60000.dmp
8e77e4e4b8f10c6122693a88e9da4d31  process.0x81e5b2e8.0x7a330000.dmp
61467d672b45dc64ca4f5dc919c8826f  process.0x81e5b2e8.0x7fc00000.dmp
066---------31db4b----------5269  process.0x81e5b2e8.0xa10000.dmp

What is the name of the malicious executable referenced in registry hive '\WINDOWS\system32\config\software', and is variant of ZeuS trojan?

$ volatility -f Bob.vmem --profile=WinXPSP2x86 hivelist

# Dump all registry
$ volatility -f Bob.vmem --profile=WinXPSP2x86 dumpregistry --dump-dir=./registrydump

# Question said '\WINDOWS\system32\config\software'. So, Let analyse registry.0xe1526748.software.reg. I opened in Regisry Explorer.
# Let find winlogon registry path by googling,

The shellcode for Acrobat v7 downloads a file named e.exe from a specific URL. Provide the URL.

js shellcode.js
ghex <logfilename.log>

The shellcode for Acrobat v8 exploits a specific vulnerability. Provide the CVE number.

python jsunpack-n.py -v 00601560.pdf

Last updated

Was this helpful?