DumpMe - Memory Image Forensics

What is the SHA1 hash of triage.mem (memory dump)?

$ sha1sum Triage-Memory.mem 
c95e8cc8c946f95a109ea8e47a6800de10a27abd  Triage-Memory.mem

What volatility profile is the most appropriate for this machine? (ex: Win10x86_14393)

Win7SP1x64

What was the process ID of notepad.exe?

$ volatility -f Triage-Memory.mem --profile=Win7SP1x64 pslist | grep notepad
Volatility Foundation Volatility Framework 2.6
0xfffffa80054f9060 notepad.exe            3032   1432      1       60      1      0 2019-03-22 05:32:22 UTC+0000                                 

3032

Name the child process of wscript.exe.

$ volatility -f Triage-Memory.mem --profile=Win7SP1x64 pslist
0xfffffa8005a80060 wscript.exe            5116   3952      8      312      1      1 2019-03-22 05:35:32 UTC+0000                                 
0xfffffa8005a1d9e0 UWkpjFjDzM.exe         3496   5116      5      109      1      1 2019-03-22 05:35:33 UTC+0000

UWkpjFjDzM.exe

What was the IP address of the machine at the time the RAM dump was created?

$ volatility -f Triage-Memory.mem --profile=Win7SP1x64 netscan
Volatility Foundation Volatility Framework 2.6
Offset(P)          Proto    Local Address                  Foreign Address      State            Pid      Owner          Created
0x13e057300        UDPv4    10.0.0.101:55736               *:*                                   2888     svchost.exe    2019-03-22 05:32:20 UTC+0000
0x13e05b4f0        UDPv6    ::1:55735                      *:*                                   2888     svchost.exe    2019-03-22 05:32:20 UTC+0000
0x13e05b790        UDPv6    fe80::7475:ef30:be18:7807:55734 *:*                                   2888     svchost.exe    2019-03-22 05:32:20 UTC+0000
0x13e05d4b0        UDPv6    fe80::7475:ef30:be18:7807:1900 *:*                                   2888     svchost.exe    2019-03-22 05:32:20 UTC+0000
0x13e05dec0        UDPv4    127.0.0.1:55737                *:*                                   2888     svchost.exe    2019-03-22 05:32:20 UTC+0000
0x13e05e3f0        UDPv4    10.0.0.101:1900                *:*                                   2888     svchost.exe    2019-03-22 05:32:20 UTC+0000
0x13e05eab0        UDPv6    ::1:1900                       *:*                                   2888     svchost.exe    2019-03-22 05:32:20 UTC+0000

10.0.0.101

Based on the answer regarding the infected PID, can you determine the IP of the attacker?

$ volatility -f Triage-Memory.mem --profile=Win7SP1x64 netscan
Volatility Foundation Volatility Framework 2.6
0x13ebcdef0        TCPv4    0.0.0.0:80                     0.0.0.0:0            LISTENING        3952     hfs.exe        
0x13e2348a0        TCPv4    -:49366                        192.168.206.181:389  CLOSED           504                     
0x13e397190        TCPv4    10.0.0.101:49217               10.0.0.106:4444      ESTABLISHED      3496     UWkpjFjDzM.exe 
0x13e3986d0        TCPv4    -:49378                        213.209.1.129:25     CLOSED           504                     
0x13e3abae0        TCPv4    -:49226                        72.51.60.132:443     CLOSED           4048     POWERPNT.EXE   

10.0.0.106

How many processes are associated with VCRUNTIME140.dll?

volatility -f Triage-Memory.mem --profile=Win7SP1x64 dlllist
Volatility Foundation Volatility Framework 2.6
0x000007fefa5c0000            0x16000             0xffff C:\Program Files\Common Files\Microsoft Shared\ClickToRun\VCRUNTIME140.dll
0x000007fefa5b0000             0x4000             0xffff C:\Program Files\Common Files\Microsoft Shared\ClickToRun\api-ms-win-crt-runtime-l1-1-0.dll
0x000007fefa4a0000            0xf2000             0xffff C:\Program Files\Common Files\Microsoft Shared\ClickToRun\ucrtbase.DLL
0x000007fefa5a0000             0x3000             0xffff C:\Program Files\Common Files\Microsoft Shared\ClickToRun\api-ms-win-core-timezone-l1-1-0.dll
0x000007fefa490000             0x3000             0xffff C:\Program Files\Common Files\Microsoft Shared\ClickToRun\api-ms-win-core-file-l2-1-0.dll

5

What is the md5 hash of the potential malware on the system?

# Look process number
$ volatility -f Triage-Memory.mem --profile=Win7SP1x64 pslist | grep UWkpjFjDzM.exe
Volatility Foundation Volatility Framework 2.6
0xfffffa8005a1d9e0 UWkpjFjDzM.exe         3496   5116      5      109      1      1 2019-03-22 05:35:33 UTC+0000                                 

# Dump Process
volatility -f Triage-Memory.mem --profile=Win7SP1x64 procdump -p 3496 --dump-dir=./

# md5 hash
$ md5sum executable.3496.exe 
690ea20bc3bdfb328e23005d9a80c290  executable.3496.exe

What is the LM hash of Bob's account?

$ volatility -f Triage-Memory.mem --profile=Win7SP1x64 hashdump
Volatility Foundation Volatility Framework 2.6
Administrator:500:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
Bob:1000:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::

aad3b435b51404eeaad3b435b51404ee

What memory protection constants does the VAD node at 0xfffffa800577ba10 have?

$ volatility -f Triage-Memory.mem --profile=Win7SP1x64 vadinfo > vadinfo.txt
Volatility Foundation Volatility Framework 2.6

VAD node @ 0xfffffa800577ba10 Start 0x0000000000030000 End 0x0000000000033fff Tag Vad 
Flags: NoChange: 1, Protection: 1
Protection: PAGE_READONLY
Vad Type: VadNone
ControlArea @fffffa8005687a50 Segment fffff8a000c4f870
NumberOfSectionReferences:          1 NumberOfPfnReferences:           0
NumberOfMappedViews:               29 NumberOfUserReferences:         30
Control Flags: Commit: 1
First prototype PTE: fffff8a000c4f8b8 Last contiguous PTE: fffff8a000c4f8d0
Flags2: Inherit: 1, SecNoChange: 1

PAGE_READONLY

What memory protection did the VAD starting at 0x00000000033c0000 and ending at 0x00000000033dffff have?

$ volatility -f Triage-Memory.mem --profile=Win7SP1x64 vadinfo > vadinfo.txt
Volatility Foundation Volatility Framework 2.6

VAD node @ 0xfffffa80052652b0 Start 0x00000000033c0000 End 0x00000000033dffff Tag VadS
Flags: CommitCharge: 32, PrivateMemory: 1, Protection: 24
Protection: PAGE_NOACCESS
Vad Type: VadNone

PAGE_NOACCESS

There was a VBS script that ran on the machine. What is the name of the script? (submit without file extension)

$ volatility -f Triage-Memory.mem --profile=Win7SP1x64 cmdline > cmdline.txt
Volatility Foundation Volatility Framework 2.6

wscript.exe pid:   5116
Command line : "C:\Windows\System32\wscript.exe" //B //NOLOGO %TEMP%\vhjReUDEuumrX.vbs
************************************************************************

vhjReUDEuumrX

An application was run at 2019-03-07 23:06:58 UTC. What is the name of the program? (Include extension)

$ volatility -f Triage-Memory.mem --profile=Win7SP1x64 shimcache
Volatility Foundation Volatility Framework 2.6

2019-03-07 23:06:58 UTC+0000   \??\C:\Program Files (x86)\Microsoft\Skype for Desktop\Skype.exe

Skype.exe

What was written in notepad.exe at the time when the memory dump was captured?

# Dump notepad.exe process
$ volatility -f Triage-Memory.mem --profile=Win7SP1x64 memdump -p 3032 --dump-dir=./
Volatility Foundation Volatility Framework 2.6
************************************************************************
Writing notepad.exe [  3032] to 3032.dmp

# Grep flag with flag keyword
$ strings -e l 3032.dmp  | grep 'flag*' > flag.txt
flag<REDBULL_IS_LIFE>

What is the short name of the file at file record 59045?

$ volatility -f Triage-Memory.mem --profile=Win7SP1x64 mftparser
Volatility Foundation Volatility Framework 2.6

MFT entry found at offset 0x2193d400
Attribute: In Use & File
Record Number: 59045
Link count: 2


$STANDARD_INFORMATION
Creation                       Modified                       MFT Altered                    Access Date                    Type
------------------------------ ------------------------------ ------------------------------ ------------------------------ ----
2019-03-17 06:50:07 UTC+0000 2019-03-17 07:04:43 UTC+0000   2019-03-17 07:04:43 UTC+0000   2019-03-17 07:04:42 UTC+0000   Archive

$FILE_NAME
Creation                       Modified                       MFT Altered                    Access Date                    Name/Path
------------------------------ ------------------------------ ------------------------------ ------------------------------ ---------
2019-03-17 06:50:07 UTC+0000 2019-03-17 07:04:43 UTC+0000   2019-03-17 07:04:43 UTC+0000   2019-03-17 07:04:42 UTC+0000   Users\Bob\DOCUME~1\EMPLOY~1\EMPLOY~1.XLS


EMPLOY~1.XLS

This box was exploited and is running meterpreter. What was the infected PID?

0xfffffa8005a1d9e0 UWkpjFjDzM.exe         3496   5116      5      109      1      1 2019-03-22 05:35:33 UTC+0000

Last updated

Was this helpful?