Writeup author : Hicham Terkiba (@IOBreaker)

Try Hack Me – Box Description :
This is a memory dump of compromised system, do some forensics kung-fu to explore the inside
Level : Medium
I downloaded the zip file which is the entry point.
First, I checked if the md5 hash is the correct one : ba44c4b977d28132faeb5fb8b06debce
$ md5sum victim.zip
0e0e783c777cbdb75e055bf8046c50b7 victim.zip
$ unzip victim.zip
Archive: victim.zip
inflating: victim.raw
$ md5sum victim.raw
ba44c4b977d28132faeb5fb8b06debce victim.raw
Question : What is the Operating System of this Dump file? (OS name)
I used hexEditor for that
$ hexeditor victim.raw

The OSName is : windows
According to the Hexdump information, the os was ruinning under VirtualBox
I got more information using volatility framwork
$ volatility -f victim.raw imageinfo
Volatility Foundation Volatility Framework 2.6
INFO : volatility.debug : Determining profile based on KDBG search...
Suggested Profile(s) : Win7SP1x64, Win7SP0x64, Win2008R2SP0x64, Win2008R2SP1x64_23418, Win2008R2SP1x64, Win7SP1x64_23418
AS Layer1 : WindowsAMD64PagedMemory (Kernel AS)
AS Layer2 : FileAddressSpace (/home/iobreaker/THM/victim.raw)
PAE type : No PAE
DTB : 0x187000L
KDBG : 0xf800028420a0L
Number of Processors : 1
Image Type (Service Pack) : 1
KPCR for CPU 0 : 0xfffff80002843d00L
KUSER_SHARED_DATA : 0xfffff78000000000L
Image date and time : 2019-05-02 18:11:45 UTC+0000
Image local date and time : 2019-05-02 11:11:45 -0700
Question is : What is the PID of SearchIndexer?
I used volatility with plugin pslist
to get all running processes by following the EPROCESS
lists
$ volatility -f victim.raw --profile=Win7SP1x64 pslist
Volatility Foundation Volatility Framework 2.6
Offset(V) Name PID PPID Thds Hnds Sess Wow64 Start
------------------ -------------------- ------ ------ ------ -------- ------ ------ -------------------------
------[ REDACTED ] ----------
0xfffffa8003148b30 taskhost.exe 1788 504 8 159 1 0 2019-05-02 18:03:09 UTC+0000
0xfffffa8003172b30 explorer.exe 1860 1756 19 645 1 0 2019-05-02 18:03:09 UTC+0000
0xfffffa800315eb30 dwm.exe 1896 892 3 69 1 0 2019-05-02 18:03:09 UTC+0000
0xfffffa800300d700 VBoxTray.exe 1600 1860 13 141 1 0 2019-05-02 18:03:25 UTC+0000
0xfffffa8003367060 SearchIndexer. ==> xxxx 504 11 629 0 0 2019-05-02 18:03:32 UTC+0000
0xfffffa80033f6060 WmiPrvSE.exe 2876 628 5 113 0 0 2019-05-02 18:03:55 UTC+0000
0xfffffa8003162060 svchost.exe 1820 504 11 317 0 0 2019-05-02 18:05:09 UTC+0000
0xfffffa8003371540 wmpnetwk.exe 2464 504 14 440 0 0 2019-05-02 18:05:10 UTC+0000
0xfffffa80014eeb30 taskhost.exe 1148 504 8 176 0 0 2019-05-02 18:09:58 UTC+0000
The PID of SearchIndexer
process is replaced by the xxxx
Question : What is the last directory accessed by the user?
I used the plugin shellbags
in order to gather all the information about a viewed directory such as size, position, and icon
$ volatility -f victim.raw --profile=Win7SP1x64 shellbags
Volatility Foundation Volatility Framework 2.6
Scanning for registries....
Gathering shellbag items and building path tree...
------[ REDACTED ] ----------
***************************************************************************
Registry: \??\C:\Users\victim\AppData\Local\Microsoft\Windows\UsrClass.dat
Key: Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\2\0
Last updated: 2019-04-27 10:48:33 UTC+0000
Value Mru File Name Modified Date Create Date Access Date File Attr Path
------- ----- -------------- ------------------------------ ------------------------------ ------------------------------ ------------------------- ----
0 0 deleted_files 2019-04-27 10:30:26 UTC+0000 2019-04-27 10:38:24 UTC+0000 2019-04-27 10:38:24 UTC+0000 NI, DIR Z:\logs\dxxxxx_xxxxxxs
***************************************************************************
------[ REDACTED ] ----------
To be sure of that, I redirected the output to a text fil and did some filters to be able to sort the result
$ cat shellbags.txt | grep " DIR " | egrep -iv 'itempos1366|1970-01-01' | tr -s ' ' ' ' | cut -d ' ' -f10- | sort -u
------[ REDACTED ] ----------
2019-04-23 06:44:46 UTC+0000 DIR C:\Users\victim\Downloads\Microsoft Office Enterprise 2010 Corporate Final (full activated)\Microsoft Office Enterprise 2010 Corporate Final (full activated)
2019-04-23 07:08:44 UTC+0000 NI, DIR C:\Users\victim\AppData\LocalLow\Mozilla
2019-04-23 07:26:08 UTC+0000 NI, DIR Local\Temp\VBE
2019-04-27 10:27:26 UTC+0000 RO, DIR C:\Program Files (x86)
2019-04-27 10:33:16 UTC+0000 NI, DIR Local\Temp\TCD9312.tmp
2019-04-27 10:33:16 UTC+0000 NI, DIR Local\Temp\TCD9405.tmp
2019-04-27 10:36:06 UTC+0000 DIR C:\Program Files (x86)\Capture
2019-04-27 10:38:22 UTC+0000 NI, DIR Z:\logs
2019-04-27 10:38:24 UTC+0000 NI, DIR Z:\logs\dxxxxxx_xxxxxxs <========== THE LAST ONE
The Last visited drectory is Z:\logs\dxxxxx_xxxxxxs , caracters are replaced by the xxxx
Question : There are many suspicious open ports; which one is it? (ANSWER format: protocol:port)
The plugin i used was the netscan
$ volatility -f victim.raw --profile=Win7SP1x64 netscan
Volatility Foundation Volatility Framework 2.6
Offset(P) Proto Local Address Foreign Address State Pid Owner Created
------[ REDACTED ] ----------
0x5c49cbb0 UDPv4 0.0.0.0:59471 *:* 1368 svchost.exe 2019-05-02 18:03:06 UTC+0000
0x5c4a31c0 UDPv4 0.0.0.0:59472 *:* 1368 svchost.exe 2019-05-02 18:03:06 UTC+0000
0x5c4a31c0 UDPv6 :::59472 *:* 1368 svchost.exe 2019-05-02 18:03:06 UTC+0000
0x5c4ac630 UDPv4 0.0.0.0:3702 *:* 1368 svchost.exe 2019-05-02 18:03:14 UTC+0000
0x5c4ac630 UDPv6 :::3702 *:* 1368 svchost.exe 2019-05-02 18:03:14 UTC+0000
0x5c519b30 UDPv4 0.0.0.0:3702 *:* 1368 svchost.exe 2019-05-02 18:03:14 UTC+0000
0x5c537ec0 UDPv4 0.0.0.0:3702 *:* 1368 svchost.exe 2019-05-02 18:03:14 UTC+0000
0x5c690360 UDPv4 0.0.0.0:0 *:* 1004 svchost.exe 2019-05-02 18:02:56 UTC+0000
0x5c690360 UDPv6 :::0 *:* 1004 svchost.exe 2019-05-02 18:02:56 UTC+0000
0x5c6918e0 UDPv4 0.0.0.0:5355 *:* 1004 svchost.exe 2019-05-02 18:02:56 UTC+0000
0x5c6918e0 UDPv6 :::5355 *:* 1004 svchost.exe 2019-05-02 18:02:56 UTC+0000
0x5c692ae0 UDPv4 0.0.0.0:5355 *:* 1004 svchost.exe 2019-05-02 18:02:56 UTC+0000
0x5c7f9600 UDPv4 0.0.0.0:3702 *:* 1368 svchost.exe 2019-05-02 18:03:14 UTC+0000
0x5c7f9600 UDPv6 :::3702 *:* 1368 svchost.exe 2019-05-02 18:03:14 UTC+0000
0x5c44e1b0 TCPv4 0.0.0.0:5357 0.0.0.0:0 LISTENING 4 System
0x5c44e1b0 TCPv6 :::5357 :::0 LISTENING 4 System
0x5c528010 TCPv4 0.0.0.0:445 0.0.0.0:0 LISTENING 4 System
0x5c528010 TCPv6 :::445 :::0 LISTENING 4 System
0x5c534c60 TCPv4 0.0.0.0:49156 0.0.0.0:0 LISTENING 504 services.exe
0x5c534c60 TCPv6 :::49156 :::0 LISTENING 504 services.exe
0x5c535010 TCPv4 0.0.0.0:49156 0.0.0.0:0 LISTENING 504 services.exe
0x5c6de720 TCPv4 0.0.0.0:49154 0.0.0.0:0 LISTENING 920 svchost.exe
0x5c6de720 TCPv6 :::49154 :::0 LISTENING 920 svchost.exe
0x5c6e0df0 TCPv4 0.0.0.0:49154 0.0.0.0:0 LISTENING 920 svchost.exe
0x5c717460 TCPv4 0.0.0.0:49155 0.0.0.0:0 LISTENING 512 lsass.exe
------[ REDACTED ] ----------
A lot of process founded that can be the answer to the question, but to be dure which one is the one I am looking for, I checked if any malious process exist using malfind
$ volatility -f victim.raw --profile=Win7SP1x64 malfind
Volatility Foundation Volatility Framework 2.6
Process: explorer.exe Pid: 1860 Address: 0x3ee0000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: CommitCharge: 1, MemCommit: 1, PrivateMemory: 1, Protection: 6
0x03ee0000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0x03ee0010 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0x03ee0020 00 00 ee 03 00 00 00 00 00 00 00 00 00 00 00 00 ................
0x03ee0030 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0x03ee0000 0000 ADD [EAX], AL
0x03ee0002 0000 ADD [EAX], AL
0x03ee0004 0000 ADD [EAX], AL
0x03ee0006 0000 ADD [EAX], AL
0x03ee0008 0000 ADD [EAX], AL
0x03ee000a 0000 ADD [EAX], AL
0x03ee000c 0000 ADD [EAX], AL
0x03ee000e 0000 ADD [EAX], AL
0x03ee0010 0000 ADD [EAX], AL
0x03ee0012 0000 ADD [EAX], AL
0x03ee0014 0000 ADD [EAX], AL
0x03ee0016 0000 ADD [EAX], AL
0x03ee0018 0000 ADD [EAX], AL
0x03ee001a 0000 ADD [EAX], AL
0x03ee001c 0000 ADD [EAX], AL
0x03ee001e 0000 ADD [EAX], AL
0x03ee0020 0000 ADD [EAX], AL
0x03ee0022 ee OUT DX, AL
0x03ee0023 0300 ADD EAX, [EAX]
0x03ee0025 0000 ADD [EAX], AL
0x03ee0027 0000 ADD [EAX], AL
0x03ee0029 0000 ADD [EAX], AL
0x03ee002b 0000 ADD [EAX], AL
0x03ee002d 0000 ADD [EAX], AL
0x03ee002f 0000 ADD [EAX], AL
0x03ee0031 0000 ADD [EAX], AL
0x03ee0033 0000 ADD [EAX], AL
0x03ee0035 0000 ADD [EAX], AL
0x03ee0037 0000 ADD [EAX], AL
0x03ee0039 0000 ADD [EAX], AL
0x03ee003b 0000 ADD [EAX], AL
0x03ee003d 0000 ADD [EAX], AL
0x03ee003f 00 DB 0x0
Process: explorer.exe Pid: 1860 Address: 0x3f90000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: CommitCharge: 2, PrivateMemory: 1, Protection: 6
0x03f90000 00 00 00 00 00 00 00 00 4b 5b b2 8d 2d d2 00 01 ........K[..-...
0x03f90010 ee ff ee ff 00 00 00 00 28 01 f9 03 00 00 00 00 ........(.......
0x03f90020 28 01 f9 03 00 00 00 00 00 00 f9 03 00 00 00 00 (...............
0x03f90030 00 00 f9 03 00 00 00 00 80 00 00 00 00 00 00 00 ................
0x03f90000 0000 ADD [EAX], AL
0x03f90002 0000 ADD [EAX], AL
0x03f90004 0000 ADD [EAX], AL
0x03f90006 0000 ADD [EAX], AL
0x03f90008 4b DEC EBX
0x03f90009 5b POP EBX
0x03f9000a b28d MOV DL, 0x8d
0x03f9000c 2dd20001ee SUB EAX, 0xee0100d2
0x03f90011 ff DB 0xff
0x03f90012 ee OUT DX, AL
0x03f90013 ff00 INC DWORD [EAX]
0x03f90015 0000 ADD [EAX], AL
0x03f90017 0028 ADD [EAX], CH
0x03f90019 01f9 ADD ECX, EDI
0x03f9001b 0300 ADD EAX, [EAX]
0x03f9001d 0000 ADD [EAX], AL
0x03f9001f 0028 ADD [EAX], CH
0x03f90021 01f9 ADD ECX, EDI
0x03f90023 0300 ADD EAX, [EAX]
0x03f90025 0000 ADD [EAX], AL
0x03f90027 0000 ADD [EAX], AL
0x03f90029 00f9 ADD CL, BH
0x03f9002b 0300 ADD EAX, [EAX]
0x03f9002d 0000 ADD [EAX], AL
0x03f9002f 0000 ADD [EAX], AL
0x03f90031 00f9 ADD CL, BH
0x03f90033 0300 ADD EAX, [EAX]
0x03f90035 0000 ADD [EAX], AL
0x03f90037 008000000000 ADD [EAX+0x0], AL
0x03f9003d 0000 ADD [EAX], AL
0x03f9003f 00 DB 0x0
Process: svchost.exe Pid: 1820 Address: 0x24f0000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: CommitCharge: 128, MemCommit: 1, PrivateMemory: 1, Protection: 6
0x024f0000 20 00 00 00 e0 ff 07 00 0c 00 00 00 01 00 05 00 ................
0x024f0010 00 42 00 50 00 30 00 70 00 60 00 00 00 00 00 00 .B.P.0.p.`......
0x024f0020 48 8b 45 28 c7 00 00 00 00 00 c7 40 04 00 00 00 H.E(.......@....
0x024f0030 00 48 8b 45 28 48 8d 40 08 48 89 c2 48 8b 45 20 .H.E(H.@.H..H.E.
0x024f0000 2000 AND [EAX], AL
0x024f0002 0000 ADD [EAX], AL
0x024f0004 e0ff LOOPNZ 0x24f0005
0x024f0006 07 POP ES
0x024f0007 000c00 ADD [EAX+EAX], CL
0x024f000a 0000 ADD [EAX], AL
0x024f000c 0100 ADD [EAX], EAX
0x024f000e 0500004200 ADD EAX, 0x420000
0x024f0013 50 PUSH EAX
0x024f0014 0030 ADD [EAX], DH
0x024f0016 007000 ADD [EAX+0x0], DH
0x024f0019 60 PUSHA
0x024f001a 0000 ADD [EAX], AL
0x024f001c 0000 ADD [EAX], AL
0x024f001e 0000 ADD [EAX], AL
0x024f0020 48 DEC EAX
0x024f0021 8b4528 MOV EAX, [EBP+0x28]
0x024f0024 c70000000000 MOV DWORD [EAX], 0x0
0x024f002a c7400400000000 MOV DWORD [EAX+0x4], 0x0
0x024f0031 48 DEC EAX
0x024f0032 8b4528 MOV EAX, [EBP+0x28]
0x024f0035 48 DEC EAX
0x024f0036 8d4008 LEA EAX, [EAX+0x8]
0x024f0039 48 DEC EAX
0x024f003a 89c2 MOV EDX, EAX
0x024f003c 48 DEC EAX
0x024f003d 8b4520 MOV EAX, [EBP+0x20]
Process: svchost.exe Pid: 1820 Address: 0x4d90000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: CommitCharge: 256, MemCommit: 1, PrivateMemory: 1, Protection: 6
0x04d90000 20 00 00 00 e0 ff 0f 00 0c 00 00 00 01 00 05 00 ................
0x04d90010 00 42 00 50 00 30 00 70 00 60 00 00 00 00 00 00 .B.P.0.p.`......
0x04d90020 ba fc ff ff ff 03 55 20 03 55 5c b9 04 00 1a 00 ......U..U\.....
0x04d90030 4c 8b c5 ff 95 e0 37 00 00 8b 4d 24 89 08 48 8d L.....7...M$..H.
0x04d90000 2000 AND [EAX], AL
0x04d90002 0000 ADD [EAX], AL
0x04d90004 e0ff LOOPNZ 0x4d90005
0x04d90006 0f000c00 STR WORD [EAX+EAX]
0x04d9000a 0000 ADD [EAX], AL
0x04d9000c 0100 ADD [EAX], EAX
0x04d9000e 0500004200 ADD EAX, 0x420000
0x04d90013 50 PUSH EAX
0x04d90014 0030 ADD [EAX], DH
0x04d90016 007000 ADD [EAX+0x0], DH
0x04d90019 60 PUSHA
0x04d9001a 0000 ADD [EAX], AL
0x04d9001c 0000 ADD [EAX], AL
0x04d9001e 0000 ADD [EAX], AL
0x04d90020 bafcffffff MOV EDX, 0xfffffffc
0x04d90025 035520 ADD EDX, [EBP+0x20]
0x04d90028 03555c ADD EDX, [EBP+0x5c]
0x04d9002b b904001a00 MOV ECX, 0x1a0004
0x04d90030 4c DEC ESP
0x04d90031 8bc5 MOV EAX, EBP
0x04d90033 ff95e0370000 CALL DWORD [EBP+0x37e0]
0x04d90039 8b4d24 MOV ECX, [EBP+0x24]
0x04d9003c 8908 MOV [EAX], ECX
0x04d9003e 48 DEC EAX
0x04d9003f 8d DB 0x8d
Process: wmpnetwk.exe Pid: 2464 Address: 0x280000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: CommitCharge: 16, MemCommit: 1, PrivateMemory: 1, Protection: 6
0x00280000 41 ba 80 00 00 00 48 b8 38 a1 e6 ff fe 07 00 00 A.....H.8.......
0x00280010 48 ff 20 90 41 ba 81 00 00 00 48 b8 38 a1 e6 ff H...A.....H.8...
0x00280020 fe 07 00 00 48 ff 20 90 41 ba 82 00 00 00 48 b8 ....H...A.....H.
0x00280030 38 a1 e6 ff fe 07 00 00 48 ff 20 90 41 ba 83 00 8.......H...A...
0x00280000 41 INC ECX
0x00280001 ba80000000 MOV EDX, 0x80
0x00280006 48 DEC EAX
0x00280007 b838a1e6ff MOV EAX, 0xffe6a138
0x0028000c fe07 INC BYTE [EDI]
0x0028000e 0000 ADD [EAX], AL
0x00280010 48 DEC EAX
0x00280011 ff20 JMP DWORD [EAX]
0x00280013 90 NOP
0x00280014 41 INC ECX
0x00280015 ba81000000 MOV EDX, 0x81
0x0028001a 48 DEC EAX
0x0028001b b838a1e6ff MOV EAX, 0xffe6a138
0x00280020 fe07 INC BYTE [EDI]
0x00280022 0000 ADD [EAX], AL
0x00280024 48 DEC EAX
0x00280025 ff20 JMP DWORD [EAX]
0x00280027 90 NOP
0x00280028 41 INC ECX
0x00280029 ba82000000 MOV EDX, 0x82
0x0028002e 48 DEC EAX
0x0028002f b838a1e6ff MOV EAX, 0xffe6a138
0x00280034 fe07 INC BYTE [EDI]
0x00280036 0000 ADD [EAX], AL
0x00280038 48 DEC EAX
0x00280039 ff20 JMP DWORD [EAX]
0x0028003b 90 NOP
0x0028003c 41 INC ECX
0x0028003d ba DB 0xba
0x0028003e 83 DB 0x83
0x0028003f 00 DB 0x0
I founded malicious hidden processes :
- 1820
- 1860
- 2464
So when i crosschecked the previous list with those processes i founded the answer
$ volatility -f victim.raw --profile=Win7SP1x64 netscan | egrep '1820|1860|2464'
Volatility Foundation Volatility Framework 2.6
0x5c201ca0 UDPv4 0.0.0.0:5005 *:* 2464 wmpnetwk.exe 2019-05-02 18:05:14 UTC+0000
0x5c201ca0 UDPv6 :::5005 *:* 2464 wmpnetwk.exe 2019-05-02 18:05:14 UTC+0000
0x5c692940 UDPv4 0.0.0.0:5005 *:* 2464 wmpnetwk.exe 2019-05-02 18:05:14 UTC+0000
0x5c7bac70 UDPv4 0.0.0.0:5004 *:* 2464 wmpnetwk.exe 2019-05-02 18:05:14 UTC+0000
0x5c7bac70 UDPv6 :::5004 *:* 2464 wmpnetwk.exe 2019-05-02 18:05:14 UTC+0000
0x5ca517c0 UDPv4 0.0.0.0:5004 *:* 2464 wmpnetwk.exe 2019-05-02 18:05:14 UTC+0000
0x5cabcdd0 TCPv4 0.0.0.0:554 0.0.0.0:0 LISTENING 2464 wmpnetwk.exe
0x5cad94a0 TCPv6 -:49158 ::1:2869 CLOSED 2464 wmpnetwk.exe
0x5d5f79c0 TCPv4 0.0.0.0:554 0.0.0.0:0 LISTENING 2464 wmpnetwk.exe
0x5d5f79c0 TCPv6 :::554 :::0 LISTENING 2464 wmpnetwk.exe
So the answer was udp:xxxx (xxxx was the port number)
Question : Vads tag and execute protection are strong indicators of malicious processes; can you find which they are? (ANSWER format: Pid1;Pid2;Pid3)
I already answered to this question 😉
‘www.go.ru’ (write full url without any quotation marks)
I decided to dump the malicious processes and save them for analysis
$ volatility -f victim.raw --profile=Win7SP1x64 procdump -p 1860 --dump-dir .
Volatility Foundation Volatility Framework 2.6
Process(V) ImageBase Name Result
------------------ ------------------ -------------------- ------
0xfffffa8003172b30 0x00000000ffa20000 explorer.exe OK: executable.1860.exe
$ volatility -f victim.raw --profile=Win7SP1x64 procdump -p 1820 --dump-dir .
Volatility Foundation Volatility Framework 2.6
Process(V) ImageBase Name Result
------------------ ------------------ -------------------- ------
0xfffffa8003162060 0x00000000ff300000 svchost.exe OK: executable.1820.exe
$ volatility -f victim.raw --profile=Win7SP1x64 procdump -p 2464 --dump-dir .
Volatility Foundation Volatility Framework 2.6
Process(V) ImageBase Name Result
------------------ ------------------ -------------------- ------
0xfffffa8003371540 0x00000000ff190000 wmpnetwk.exe OK: executable.2464.exe
I decided to upload the files to virustotal to see if it can detect something



No process was detected as malicious
I did the same for memory dump
$ volatility -f victim.raw --profile=Win7SP1x64 memdump -p 1860 --dump-dir .
Volatility Foundation Volatility Framework 2.6
************************************************************************
Writing explorer.exe [ 1860] to 1860.dmp
$ volatility -f victim.raw --profile=Win7SP1x64 memdump -p 1820 --dump-dir .
Volatility Foundation Volatility Framework 2.6
************************************************************************
Writing svchost.exe [ 1820] to 1820.dmp
$ volatility -f victim.raw --profile=Win7SP1x64 memdump -p 2464 --dump-dir .
Volatility Foundation Volatility Framework 2.6
************************************************************************
Writing wmpnetwk.exe [ 2464] to 2464.dmp



Only 1820.dmp was detected by avast as a malicious
Time to get strings and much theme with the www.go****.ru
as indicated in the question
$ strings 1820.dmp 1860.dmp 2464.dmp| egrep -i 'www.go([[:alpha:]])*.ru'
www.google.ru
www.gocaps.ru
www.goporn.ru
www.godyaev.ru
www.goldfon.ru
www.gogo.ru
www.godvesny.ru
www.gogoasia.ru
www.goldorden.ru
www.goexchange.ru
www.goldchrome.ru
According to the hint : This site is little naughty, I spoted it easily 🙂
Question : ‘www.i.com’ (write full url without any quotation marks)
Hint : Do you like football
$ strings 1820.dmp 1860.dmp 2464.dmp| egrep -i 'www.i([[:alpha:]])*.com$'
www.itau.com
www.imdb.com
www.ikaka.com
www.icsalabs.com
www.icubed.com
www.icq.com
www.infospyware.com
www.ibookprice.com
www.irangoals.com
www.ixomodels.com
www.infosecpodcast.com
www.idealpackhk.com
www.identityhit.com
www.incodesolutions.com
www.indielisboa.com
www.intsecureprof.com
www.internationalservicecheck.com
if you want to be more specific counting the number of missing characters
$ strings 1820.dmp 1860.dmp 2464.dmp| egrep -i 'www.i([[:alpha:]]){4}.com$'
www.ikaka.com
Question : ‘www.ic**.com’
Hint : Very strong IOC
IOC stands for Indicators Of Compromise
$ strings 1820.dmp 1860.dmp 2464.dmp | egrep -i 'www.ic([[:alpha:]]){6}.com$'
www.icsalabs.com
Question : 202..233. (Write full IP)
$ strings 1820.dmp 1860.dmp 2464.dmp | egrep -i '202.([[:digit:]]){3}.233'
202.107.233.211
Question : ***.200.**.164 (Write full IP)
$ strings 1820.dmp 1860.dmp 2464.dmp | egrep -i '([[:digit:]]){3}.200.([[:digit:]]){2}.164'
phttp://209.200.12.164/drm/provider_license_v7.php
Question : 209.190.***.***
$ strings 1820.dmp 1860.dmp 2464.dmp | egrep -i '209.190.([[:digit:]]){3}.([[:digit:]]){3}'
`http://209.190.122.186/drm/license-savenow.asp
Question : What is the unique environmental variable of PID 2464?
$ volatility -f victim.raw --profile=Win7SP1x64 envars -p 2464
Volatility Foundation Volatility Framework 2.6
Pid Process Block Variable Value
-------- -------------------- ------------------ ------------------------------ -----
2464 wmpnetwk.exe 0x00000000002c47a0 ALLUSERSPROFILE C:\ProgramData
2464 wmpnetwk.exe 0x00000000002c47a0 APPDATA C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming
2464 wmpnetwk.exe 0x00000000002c47a0 CommonProgramFiles C:\Program Files\Common Files
2464 wmpnetwk.exe 0x00000000002c47a0 CommonProgramFiles(x86) C:\Program Files (x86)\Common Files
2464 wmpnetwk.exe 0x00000000002c47a0 CommonProgramW6432 C:\Program Files\Common Files
2464 wmpnetwk.exe 0x00000000002c47a0 COMPUTERNAME VICTIM-PC
2464 wmpnetwk.exe 0x00000000002c47a0 ComSpec C:\Windows\system32\cmd.exe
2464 wmpnetwk.exe 0x00000000002c47a0 FP_NO_HOST_CHECK NO
2464 wmpnetwk.exe 0x00000000002c47a0 LOCALAPPDATA C:\Windows\ServiceProfiles\NetworkService\AppData\Local
2464 wmpnetwk.exe 0x00000000002c47a0 NUMBER_OF_PROCESSORS 1
2464 wmpnetwk.exe 0x00000000002c47a0 OxxxxxxxxE 1 <====== HRE
2464 wmpnetwk.exe 0x00000000002c47a0 OS Windows_NT
----------- [ REDACTED ] ------------------
The only variable available (not standard one) is : OxxxxxxxE (characters hidden by the xxxxx)
Enjoy 😉