This will only cover Task 10 – Practical Investigations
Question 1: What is the build version of the host machine in Case 001?
In the above screenshot look at NTBuildLab.
Answer: 2600.xpsp.080413-2111
Question 2: At what time was the memory file acquired in Case 001?
Also, in the previous screenshot look at SystemTime.
Answer: 2012-07-22 02:45:08
Question 3: What process can be considered suspicious in Case 001?
Find the last line PID 1640.
Answer: reader_sl.exe
Question 4: What is the parent process of the suspicious process in Case 001?
See previous screenshot. It is the executable just above reader_sl.exe
Answer: explorer.exe
Question 5: What is the PID of the suspicious process in Case 001?
Also in the last screenshot, look under the PID column.
Answer: 1640
Question 6: What is the parent process PID in Case 001?
Again, same screenshot, look at the PID for explorer.exe
Answer: 1484
Question 7: What user-agent was employed by the adversary in Case 001?
We are going to use memmap to figure this out:
./vol.py -f /Scenarios/Investigations/Investigation-1.vmem -o /tmp windows.memmap --pid 1640 --dump
This will load pid.1640.dmp in tmp
Now we use string to dig deeper
Answer: Mozilla/5.0 (Windows; U; MSIE 7.0; Windows NT 6.0; en-US
Question 8: Was Chase Bank one of the suspicious bank domains found in Case 001? (Y/N)
Strings to the recue again…
strings /tmp/pid.1640.dmp | grep "chase"
Answer: Y
Question 9: What suspicious process is running at PID 740 in Case 002?
Okay, case 2.
./vol.py -f /Scenarios/Investigations/Investigation-2.raw windows.pstree
Look at PID 740
Answer: @WanaDecryptor@
Question 10: What is the full path of the suspicious binary in PID 740 in Case 002?
Time to break out dlllist and our friend grep
./vol.py -f /Scenarios/Investigations/Investigation-2.raw windows.dlllist | grep 740
The directory is in the second line.
Answer: C:\Intel\ivecuqmanpnirkt615\@WanaDecryptor@.exe
Question 11: What is the parent process of PID 740 in Case 002?
See screenshot above with PIDs listed. You can see that the executable before PID 740 is…
Answer: tasksche.exe
Question 12: What is the suspicious parent process PID connected to the decryptor in Case 002?
This is in the same screenshot. Basically this is asking what the PID for tasksche.exe is…
Answer: 1940
Question 13: From our current information, what malware is present on the system in Case 002?
This is kinda self-explanatory, so let’s take a wild guess..
Answer: WannaCry
Question 14: What DLL is loaded by the decryptor used for socket creation in Case 002?
PID 740 has a lot of DLLs listed. We could try each one in the answer box, but it did say socket in the question. WS stands for WinSock as in Winsock DLLs.
Answer: WS2_32.dll
Question 15: What mutex can be found that is a known indicator of the malware in question in Case 002?
We are going to use handles on this one and look for PID 1940
./vol.py -f /Scenarios/Investigations/Investigation-2.raw windows.handles | grep 1940
I could have searched for this one, but it popped out of the screen when looking for mutex…
Answer: MsWinZonesCacheCounterMutexA
Question 16: What plugin could be used to identify all files loaded from the malware working directory in Case 002?
Again, we look at the reference and find filescan
Answer: windows.filescan
One thought on “TryHackMe – Volatility Walk-Through”
Comments are closed.