since a file memdump.raw
was given as a challenge, lets try to analyze it with volatility. There are 2 types of volatility, volatility2 and volatility3, which is basically written in python2 and python3. Both volatility will be used for testing purpose.
Volatility 2
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
| vol2 -f memdump.raw imageinfo
Volatility Foundation Volatility Framework 2.6
INFO : volatility.debug : Determining profile based on KDBG search...
Suggested Profile(s) : Win7SP1x64, Win7SP0x64, Win2008R2SP0x64, Win2008R2SP1x64_23418, Win2008R2SP1x64, Win7SP1x64_23418
AS Layer1 : WindowsAMD64PagedMemory (Kernel AS)
AS Layer2 : FileAddressSpace (/root/bat/memdump.raw)
PAE type : No PAE
DTB : 0x187000L
KDBG : 0xf80002bfd120L
Number of Processors : 1
Image Type (Service Pack) : 1
KPCR for CPU 0 : 0xfffff80002bff000L
KUSER_SHARED_DATA : 0xfffff78000000000L
Image date and time : 2023-06-20 08:28:07 UTC+0000
Image local date and time : 2023-06-20 16:28:07 +0800
|
Volatility 3
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
| vol -f memdump.raw windows.info
Volatility 3 Framework 2.4.1
Progress: 100.00 PDB scanning finished
Variable Value
Kernel Base 0xf80002a1b000
DTB 0x187000
Symbols file:///usr/local/lib/python3.11/dist-packages/volatility3/symbols/windows/ntkrnlmp.pdb/ECE191A20CFF4465AE46DF96C2263845-1.json.xz
Is64Bit True
IsPAE False
layer_name 0 WindowsIntel32e
memory_layer 1 FileLayer
KdDebuggerDataBlock 0xf80002bfd120
NTBuildLab 7601.24384.amd64fre.win7sp1_ldr_
CSDVersion 1
KdVersionBlock 0xf80002bfd0e8
Major/Minor 15.7601
MachineType 34404
KeNumberProcessors 1
SystemTime 2023-06-20 08:28:07
NtSystemRoot C:\Windows
NtProductType NtProductWinNt
NtMajorVersion 6
NtMinorVersion 1
PE MajorOperatingSystemVersion 6
PE MinorOperatingSystemVersion 1
PE Machine 34404
PE TimeDateStamp Thu Feb 21 03:36:29 2019
|
After getting some information from the memdump.raw
such as Windows OS, the next step would be to check the processes to have an idea about the situation.
Step 2: Gathering and analyzing processes
In volatiltiy 2 and 3, there are several command to check processes. The example below will show the result of PSList and PSTree.
Volatility 2
PSList
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
| vol2 -f memdump.raw --profile Win7SP1x64 pslist
Volatility Foundation Volatility Framework 2.6
Offset(V) Name PID PPID Thds Hnds Sess Wow64 Start Exit
------------------ -------------------- ------ ------ ------ -------- ------ ------ ------------------------------ ------------------------------
0xfffffa8006c7fb00 System 4 0 91 577 ------ 0 2023-06-20 07:22:42 UTC+0000
0xfffffa8007d39610 smss.exe 260 4 2 29 ------ 0 2023-06-20 07:22:42 UTC+0000
0xfffffa80089a2b00 csrss.exe 348 340 9 505 0 0 2023-06-20 07:22:43 UTC+0000
0xfffffa80089ffb00 wininit.exe 388 340 3 76 0 0 2023-06-20 07:22:43 UTC+0000
0xfffffa8008993b00 csrss.exe 400 380 11 352 1 0 2023-06-20 07:22:43 UTC+0000
0xfffffa8008c28b00 services.exe 464 388 13 241 0 0 2023-06-20 07:22:43 UTC+0000
0xfffffa8008c35b00 lsass.exe 472 388 8 767 0 0 2023-06-20 07:22:43 UTC+0000
0xfffffa8008c45b00 lsm.exe 480 388 10 153 0 0 2023-06-20 07:22:43 UTC+0000
0xfffffa8008c39b00 winlogon.exe 492 380 3 113 1 0 2023-06-20 07:22:43 UTC+0000
0xfffffa8008c49b00 svchost.exe 612 464 10 367 0 0 2023-06-20 07:22:43 UTC+0000
0xfffffa8008d1d7e0 svchost.exe 680 464 9 309 0 0 2023-06-20 07:22:43 UTC+0000
0xfffffa8008d3a6d0 svchost.exe 732 464 23 596 0 0 2023-06-20 07:22:43 UTC+0000
0xfffffa8008d758b0 svchost.exe 820 464 29 630 0 0 2023-06-20 07:22:43 UTC+0000
0xfffffa8008de1170 svchost.exe 892 464 39 958 0 0 2023-06-20 07:22:44 UTC+0000
0xfffffa8008e17b00 svchost.exe 240 464 20 777 0 0 2023-06-20 07:22:44 UTC+0000
0xfffffa8008e6eb00 svchost.exe 440 464 17 490 0 0 2023-06-20 07:22:44 UTC+0000
0xfffffa8008ed6220 dwm.exe 1128 820 3 72 1 0 2023-06-20 07:22:44 UTC+0000
0xfffffa8008ee4b00 explorer.exe 1152 1108 36 1013 1 0 2023-06-20 07:22:44 UTC+0000
0xfffffa8008f2c260 spoolsv.exe 1188 464 13 278 0 0 2023-06-20 07:22:44 UTC+0000
0xfffffa8008f4a5e0 taskhost.exe 1220 464 8 195 1 0 2023-06-20 07:22:44 UTC+0000
0xfffffa8008f51320 svchost.exe 1244 464 18 327 0 0 2023-06-20 07:22:44 UTC+0000
0xfffffa8008fd9060 svchost.exe 1360 464 23 318 0 0 2023-06-20 07:22:45 UTC+0000
0xfffffa8009002b00 FoxitPDFReader 1404 464 3 68 0 1 2023-06-20 07:22:45 UTC+0000
0xfffffa800905bb00 vmtoolsd.exe 1508 1152 8 188 1 0 2023-06-20 07:22:45 UTC+0000
0xfffffa8007bb54b0 VGAuthService. 1676 464 3 87 0 0 2023-06-20 07:22:46 UTC+0000
0xfffffa8009117b00 vm3dservice.ex 1708 464 4 61 0 0 2023-06-20 07:22:46 UTC+0000
0xfffffa80091135f0 vmtoolsd.exe 1736 464 12 282 0 0 2023-06-20 07:22:46 UTC+0000
0xfffffa8009086b00 vm3dservice.ex 1760 1708 2 53 1 0 2023-06-20 07:22:46 UTC+0000
0xfffffa8008d628b0 svchost.exe 2000 464 6 97 0 0 2023-06-20 07:22:47 UTC+0000
0xfffffa8008055060 WmiPrvSE.exe 332 612 10 206 0 0 2023-06-20 07:22:47 UTC+0000
0xfffffa8008146b00 dllhost.exe 196 464 13 194 0 0 2023-06-20 07:22:48 UTC+0000
0xfffffa800824f3f0 SearchIndexer. 2136 464 11 586 0 0 2023-06-20 07:22:52 UTC+0000
0xfffffa80083acb00 msdtc.exe 2256 464 12 149 0 0 2023-06-20 07:22:52 UTC+0000
0xfffffa80083e5b00 wmpnetwk.exe 2512 464 13 422 0 0 2023-06-20 07:22:53 UTC+0000
0xfffffa800921fb00 svchost.exe 2624 464 8 356 0 0 2023-06-20 07:22:54 UTC+0000
0xfffffa800931a750 WUDFHost.exe 3024 820 8 202 0 0 2023-06-20 07:23:14 UTC+0000
0xfffffa8006da0b00 sppsvc.exe 2456 464 4 152 0 0 2023-06-20 07:24:47 UTC+0000
0xfffffa80074a5b00 svchost.exe 3284 464 13 353 0 0 2023-06-20 07:24:47 UTC+0000
0xfffffa8008df32b0 taskhost.exe 3356 464 5 123 1 0 2023-06-20 07:54:22 UTC+0000
0xfffffa8008e9c060 MRCv120.exe 2496 1152 4 282 1 1 2023-06-20 08:08:46 UTC+0000
0xfffffa800742ab00 audiodg.exe 3468 732 5 128 0 0 2023-06-20 08:22:23 UTC+0000
0xfffffa8008f8ab00 WmiPrvSE.exe 3316 612 5 113 0 0 2023-06-20 08:22:56 UTC+0000
0xfffffa800748fb00 FoxitPDFReader 1872 1152 18 492 1 1 2023-06-20 08:26:55 UTC+0000
0xfffffa800740d060 FoxitPDFReader 4060 1872 0 -------- 1 0 2023-06-20 08:27:01 UTC+0000 2023-06-20 08:27:02 UTC+0000
0xfffffa8006db7980 FirefoxPortabl 2420 1152 6 147 1 1 2023-06-20 08:27:05 UTC+0000
0xfffffa8007fe0060 firefox.exe 3716 2420 57 648 1 0 2023-06-20 08:27:05 UTC+0000
0xfffffa8008d03b00 firefox.exe 4000 3716 26 313 1 0 2023-06-20 08:27:20 UTC+0000
0xfffffa8008b60a80 FoxitPDFReader 3476 1152 2 113 1 1 2023-06-20 08:28:04 UTC+0000
0xfffffa8008b66760 dllhost.exe 3396 612 6 7536754 1 0 2023-06-20 08:28:09 UTC+0000
|
PSTree
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
| vol2 -f memdump.raw --profile Win7SP1x64 pstree
Volatility Foundation Volatility Framework 2.6
Name Pid PPid Thds Hnds Time
-------------------------------------------------- ------ ------ ------ ------ ----
0xfffffa8008ee4b00:explorer.exe 1152 1108 36 1013 2023-06-20 07:22:44 UTC+0000
. 0xfffffa8008e9c060:MRCv120.exe 2496 1152 4 282 2023-06-20 08:08:46 UTC+0000
. 0xfffffa8008b60a80:FoxitPDFReader 3476 1152 2 113 2023-06-20 08:28:04 UTC+0000
. 0xfffffa800748fb00:FoxitPDFReader 1872 1152 18 492 2023-06-20 08:26:55 UTC+0000
.. 0xfffffa800740d060:FoxitPDFReader 4060 1872 0 ------ 2023-06-20 08:27:01 UTC+0000
. 0xfffffa8006db7980:FirefoxPortabl 2420 1152 6 147 2023-06-20 08:27:05 UTC+0000
.. 0xfffffa8007fe0060:firefox.exe 3716 2420 57 648 2023-06-20 08:27:05 UTC+0000
... 0xfffffa8008d03b00:firefox.exe 4000 3716 26 313 2023-06-20 08:27:20 UTC+0000
. 0xfffffa800905bb00:vmtoolsd.exe 1508 1152 8 188 2023-06-20 07:22:45 UTC+0000
0xfffffa8006c7fb00:System 4 0 91 577 2023-06-20 07:22:42 UTC+0000
. 0xfffffa8007d39610:smss.exe 260 4 2 29 2023-06-20 07:22:42 UTC+0000
0xfffffa80089ffb00:wininit.exe 388 340 3 76 2023-06-20 07:22:43 UTC+0000
. 0xfffffa8008c28b00:services.exe 464 388 13 241 2023-06-20 07:22:43 UTC+0000
.. 0xfffffa80083e5b00:wmpnetwk.exe 2512 464 13 422 2023-06-20 07:22:53 UTC+0000
.. 0xfffffa8007bb54b0:VGAuthService. 1676 464 3 87 2023-06-20 07:22:46 UTC+0000
.. 0xfffffa800824f3f0:SearchIndexer. 2136 464 11 586 2023-06-20 07:22:52 UTC+0000
.. 0xfffffa8008146b00:dllhost.exe 196 464 13 194 2023-06-20 07:22:48 UTC+0000
.. 0xfffffa8006da0b00:sppsvc.exe 2456 464 4 152 2023-06-20 07:24:47 UTC+0000
.. 0xfffffa8008df32b0:taskhost.exe 3356 464 5 123 2023-06-20 07:54:22 UTC+0000
.. 0xfffffa8008f2c260:spoolsv.exe 1188 464 13 278 2023-06-20 07:22:44 UTC+0000
.. 0xfffffa8008d1d7e0:svchost.exe 680 464 9 309 2023-06-20 07:22:43 UTC+0000
.. 0xfffffa8008d3a6d0:svchost.exe 732 464 23 596 2023-06-20 07:22:43 UTC+0000
... 0xfffffa800742ab00:audiodg.exe 3468 732 5 128 2023-06-20 08:22:23 UTC+0000
.. 0xfffffa8009117b00:vm3dservice.ex 1708 464 4 61 2023-06-20 07:22:46 UTC+0000
... 0xfffffa8009086b00:vm3dservice.ex 1760 1708 2 53 2023-06-20 07:22:46 UTC+0000
.. 0xfffffa8008d758b0:svchost.exe 820 464 29 630 2023-06-20 07:22:43 UTC+0000
... 0xfffffa800931a750:WUDFHost.exe 3024 820 8 202 2023-06-20 07:23:14 UTC+0000
... 0xfffffa8008ed6220:dwm.exe 1128 820 3 72 2023-06-20 07:22:44 UTC+0000
.. 0xfffffa8008d628b0:svchost.exe 2000 464 6 97 2023-06-20 07:22:47 UTC+0000
.. 0xfffffa8008e6eb00:svchost.exe 440 464 17 490 2023-06-20 07:22:44 UTC+0000
.. 0xfffffa800921fb00:svchost.exe 2624 464 8 356 2023-06-20 07:22:54 UTC+0000
.. 0xfffffa8008f4a5e0:taskhost.exe 1220 464 8 195 2023-06-20 07:22:44 UTC+0000
.. 0xfffffa80091135f0:vmtoolsd.exe 1736 464 12 282 2023-06-20 07:22:46 UTC+0000
.. 0xfffffa80074a5b00:svchost.exe 3284 464 13 353 2023-06-20 07:24:47 UTC+0000
.. 0xfffffa8008f51320:svchost.exe 1244 464 18 327 2023-06-20 07:22:44 UTC+0000
.. 0xfffffa80083acb00:msdtc.exe 2256 464 12 149 2023-06-20 07:22:52 UTC+0000
.. 0xfffffa8008fd9060:svchost.exe 1360 464 23 318 2023-06-20 07:22:45 UTC+0000
.. 0xfffffa8008c49b00:svchost.exe 612 464 10 367 2023-06-20 07:22:43 UTC+0000
... 0xfffffa8008b66760:dllhost.exe 3396 612 6 75...4 2023-06-20 08:28:09 UTC+0000
... 0xfffffa8008055060:WmiPrvSE.exe 332 612 10 206 2023-06-20 07:22:47 UTC+0000
... 0xfffffa8008f8ab00:WmiPrvSE.exe 3316 612 5 113 2023-06-20 08:22:56 UTC+0000
.. 0xfffffa8009002b00:FoxitPDFReader 1404 464 3 68 2023-06-20 07:22:45 UTC+0000
.. 0xfffffa8008e17b00:svchost.exe 240 464 20 777 2023-06-20 07:22:44 UTC+0000
.. 0xfffffa8008de1170:svchost.exe 892 464 39 958 2023-06-20 07:22:44 UTC+0000
. 0xfffffa8008c35b00:lsass.exe 472 388 8 767 2023-06-20 07:22:43 UTC+0000
. 0xfffffa8008c45b00:lsm.exe 480 388 10 153 2023-06-20 07:22:43 UTC+0000
0xfffffa80089a2b00:csrss.exe 348 340 9 505 2023-06-20 07:22:43 UTC+0000
0xfffffa8008993b00:csrss.exe 400 380 11 352 2023-06-20 07:22:43 UTC+0000
0xfffffa8008c39b00:winlogon.exe 492 380 3 113 2023-06-20 07:22:43 UTC+0000
|
Volatility 3
PSList
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
| vol -f memdump.raw windows.pslist
Volatility 3 Framework 2.4.1
Progress: 100.00 PDB scanning finished
PID PPID ImageFileName Offset(V) Threads Handles SessionId Wow64 CreateTime ExitTime File output
4 0 System 0xfa8006c7fb00 91 577 N/A False 2023-06-20 07:22:42.000000 N/A Disabled
260 4 smss.exe 0xfa8007d39610 2 29 N/A False 2023-06-20 07:22:42.000000 N/A Disabled
348 340 csrss.exe 0xfa80089a2b00 9 505 0 False 2023-06-20 07:22:43.000000 N/A Disabled
388 340 wininit.exe 0xfa80089ffb00 3 76 0 False 2023-06-20 07:22:43.000000 N/A Disabled
400 380 csrss.exe 0xfa8008993b00 11 352 1 False 2023-06-20 07:22:43.000000 N/A Disabled
464 388 services.exe 0xfa8008c28b00 13 241 0 False 2023-06-20 07:22:43.000000 N/A Disabled
472 388 lsass.exe 0xfa8008c35b00 8 767 0 False 2023-06-20 07:22:43.000000 N/A Disabled
480 388 lsm.exe 0xfa8008c45b00 10 153 0 False 2023-06-20 07:22:43.000000 N/A Disabled
492 380 winlogon.exe 0xfa8008c39b00 3 113 1 False 2023-06-20 07:22:43.000000 N/A Disabled
612 464 svchost.exe 0xfa8008c49b00 10 367 0 False 2023-06-20 07:22:43.000000 N/A Disabled
680 464 svchost.exe 0xfa8008d1d7e0 9 309 0 False 2023-06-20 07:22:43.000000 N/A Disabled
732 464 svchost.exe 0xfa8008d3a6d0 23 596 0 False 2023-06-20 07:22:43.000000 N/A Disabled
820 464 svchost.exe 0xfa8008d758b0 29 630 0 False 2023-06-20 07:22:43.000000 N/A Disabled
892 464 svchost.exe 0xfa8008de1170 39 958 0 False 2023-06-20 07:22:44.000000 N/A Disabled
240 464 svchost.exe 0xfa8008e17b00 20 777 0 False 2023-06-20 07:22:44.000000 N/A Disabled
440 464 svchost.exe 0xfa8008e6eb00 17 490 0 False 2023-06-20 07:22:44.000000 N/A Disabled
1128 820 dwm.exe 0xfa8008ed6220 3 72 1 False 2023-06-20 07:22:44.000000 N/A Disabled
1152 1108 explorer.exe 0xfa8008ee4b00 36 1013 1 False 2023-06-20 07:22:44.000000 N/A Disabled
1188 464 spoolsv.exe 0xfa8008f2c260 13 278 0 False 2023-06-20 07:22:44.000000 N/A Disabled
1220 464 taskhost.exe 0xfa8008f4a5e0 8 195 1 False 2023-06-20 07:22:44.000000 N/A Disabled
1244 464 svchost.exe 0xfa8008f51320 18 327 0 False 2023-06-20 07:22:44.000000 N/A Disabled
1360 464 svchost.exe 0xfa8008fd9060 23 318 0 False 2023-06-20 07:22:45.000000 N/A Disabled
1404 464 FoxitPDFReader 0xfa8009002b00 3 68 0 True 2023-06-20 07:22:45.000000 N/A Disabled
1508 1152 vmtoolsd.exe 0xfa800905bb00 8 188 1 False 2023-06-20 07:22:45.000000 N/A Disabled
1676 464 VGAuthService. 0xfa8007bb54b0 3 87 0 False 2023-06-20 07:22:46.000000 N/A Disabled
1708 464 vm3dservice.ex 0xfa8009117b00 4 61 0 False 2023-06-20 07:22:46.000000 N/A Disabled
1736 464 vmtoolsd.exe 0xfa80091135f0 12 282 0 False 2023-06-20 07:22:46.000000 N/A Disabled
1760 1708 vm3dservice.ex 0xfa8009086b00 2 53 1 False 2023-06-20 07:22:46.000000 N/A Disabled
2000 464 svchost.exe 0xfa8008d628b0 6 97 0 False 2023-06-20 07:22:47.000000 N/A Disabled
332 612 WmiPrvSE.exe 0xfa8008055060 10 206 0 False 2023-06-20 07:22:47.000000 N/A Disabled
196 464 dllhost.exe 0xfa8008146b00 13 194 0 False 2023-06-20 07:22:48.000000 N/A Disabled
2136 464 SearchIndexer. 0xfa800824f3f0 11 586 0 False 2023-06-20 07:22:52.000000 N/A Disabled
2256 464 msdtc.exe 0xfa80083acb00 12 149 0 False 2023-06-20 07:22:52.000000 N/A Disabled
2512 464 wmpnetwk.exe 0xfa80083e5b00 13 422 0 False 2023-06-20 07:22:53.000000 N/A Disabled
2624 464 svchost.exe 0xfa800921fb00 8 356 0 False 2023-06-20 07:22:54.000000 N/A Disabled
3024 820 WUDFHost.exe 0xfa800931a750 8 202 0 False 2023-06-20 07:23:14.000000 N/A Disabled
2456 464 sppsvc.exe 0xfa8006da0b00 4 152 0 False 2023-06-20 07:24:47.000000 N/A Disabled
3284 464 svchost.exe 0xfa80074a5b00 13 353 0 False 2023-06-20 07:24:47.000000 N/A Disabled
3356 464 taskhost.exe 0xfa8008df32b0 5 123 1 False 2023-06-20 07:54:22.000000 N/A Disabled
2496 1152 MRCv120.exe 0xfa8008e9c060 4 282 1 True 2023-06-20 08:08:46.000000 N/A Disabled
3468 732 audiodg.exe 0xfa800742ab00 5 128 0 False 2023-06-20 08:22:23.000000 N/A Disabled
3316 612 WmiPrvSE.exe 0xfa8008f8ab00 5 113 0 False 2023-06-20 08:22:56.000000 N/A Disabled
1872 1152 FoxitPDFReader 0xfa800748fb00 18 492 1 True 2023-06-20 08:26:55.000000 N/A Disabled
4060 1872 FoxitPDFReader 0xfa800740d060 0 - 1 False 2023-06-20 08:27:01.000000 2023-06-20 08:27:02.000000 Disabled
2420 1152 FirefoxPortabl 0xfa8006db7980 6 147 1 True 2023-06-20 08:27:05.000000 N/A Disabled
3716 2420 firefox.exe 0xfa8007fe0060 57 648 1 False 2023-06-20 08:27:05.000000 N/A Disabled
4000 3716 firefox.exe 0xfa8008d03b00 26 313 1 False 2023-06-20 08:27:20.000000 N/A Disabled
3476 1152 FoxitPDFReader 0xfa8008b60a80 2 113 1 True 2023-06-20 08:28:04.000000 N/A Disabled
3396 612 dllhost.exe 0xfa8008b66760 6 7536754 1 False 2023-06-20 08:28:09.000000 N/A Disabled
|
PSTree
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
| vol -f memdump.raw windows.pstree
Volatility 3 Framework 2.4.1
Progress: 100.00 PDB scanning finished
PID PPID ImageFileName Offset(V) Threads Handles SessionId Wow64 CreateTime ExitTime
4 0 System 0xfa8006c7fb00 91 577 N/A False 2023-06-20 07:22:42.000000 N/A
* 260 4 smss.exe 0xfa8007d39610 2 29 N/A False 2023-06-20 07:22:42.000000 N/A
348 340 csrss.exe 0xfa80089a2b00 9 505 0 False 2023-06-20 07:22:43.000000 N/A
388 340 wininit.exe 0xfa80089ffb00 3 76 0 False 2023-06-20 07:22:43.000000 N/A
* 464 388 services.exe 0xfa8008c28b00 13 241 0 False 2023-06-20 07:22:43.000000 N/A
** 892 464 svchost.exe 0xfa8008de1170 39 958 0 False 2023-06-20 07:22:44.000000 N/A
** 1676 464 VGAuthService. 0xfa8007bb54b0 3 87 0 False 2023-06-20 07:22:46.000000 N/A
** 2456 464 sppsvc.exe 0xfa8006da0b00 4 152 0 False 2023-06-20 07:24:47.000000 N/A
** 3356 464 taskhost.exe 0xfa8008df32b0 5 123 1 False 2023-06-20 07:54:22.000000 N/A
** 1188 464 spoolsv.exe 0xfa8008f2c260 13 278 0 False 2023-06-20 07:22:44.000000 N/A
** 680 464 svchost.exe 0xfa8008d1d7e0 9 309 0 False 2023-06-20 07:22:43.000000 N/A
** 1708 464 vm3dservice.ex 0xfa8009117b00 4 61 0 False 2023-06-20 07:22:46.000000 N/A
*** 1760 1708 vm3dservice.ex 0xfa8009086b00 2 53 1 False 2023-06-20 07:22:46.000000 N/A
** 820 464 svchost.exe 0xfa8008d758b0 29 630 0 False 2023-06-20 07:22:43.000000 N/A
*** 1128 820 dwm.exe 0xfa8008ed6220 3 72 1 False 2023-06-20 07:22:44.000000 N/A
*** 3024 820 WUDFHost.exe 0xfa800931a750 8 202 0 False 2023-06-20 07:23:14.000000 N/A
** 440 464 svchost.exe 0xfa8008e6eb00 17 490 0 False 2023-06-20 07:22:44.000000 N/A
** 2624 464 svchost.exe 0xfa800921fb00 8 356 0 False 2023-06-20 07:22:54.000000 N/A
** 1220 464 taskhost.exe 0xfa8008f4a5e0 8 195 1 False 2023-06-20 07:22:44.000000 N/A
** 196 464 dllhost.exe 0xfa8008146b00 13 194 0 False 2023-06-20 07:22:48.000000 N/A
** 1736 464 vmtoolsd.exe 0xfa80091135f0 12 282 0 False 2023-06-20 07:22:46.000000 N/A
** 1360 464 svchost.exe 0xfa8008fd9060 23 318 0 False 2023-06-20 07:22:45.000000 N/A
** 2000 464 svchost.exe 0xfa8008d628b0 6 97 0 False 2023-06-20 07:22:47.000000 N/A
** 2256 464 msdtc.exe 0xfa80083acb00 12 149 0 False 2023-06-20 07:22:52.000000 N/A
** 2512 464 wmpnetwk.exe 0xfa80083e5b00 13 422 0 False 2023-06-20 07:22:53.000000 N/A
** 3284 464 svchost.exe 0xfa80074a5b00 13 353 0 False 2023-06-20 07:24:47.000000 N/A
** 2136 464 SearchIndexer. 0xfa800824f3f0 11 586 0 False 2023-06-20 07:22:52.000000 N/A
** 732 464 svchost.exe 0xfa8008d3a6d0 23 596 0 False 2023-06-20 07:22:43.000000 N/A
*** 3468 732 audiodg.exe 0xfa800742ab00 5 128 0 False 2023-06-20 08:22:23.000000 N/A
** 1244 464 svchost.exe 0xfa8008f51320 18 327 0 False 2023-06-20 07:22:44.000000 N/A
** 612 464 svchost.exe 0xfa8008c49b00 10 367 0 False 2023-06-20 07:22:43.000000 N/A
*** 3316 612 WmiPrvSE.exe 0xfa8008f8ab00 5 113 0 False 2023-06-20 08:22:56.000000 N/A
*** 332 612 WmiPrvSE.exe 0xfa8008055060 10 206 0 False 2023-06-20 07:22:47.000000 N/A
*** 3396 612 dllhost.exe 0xfa8008b66760 6 7536754 1 False 2023-06-20 08:28:09.000000 N/A
** 240 464 svchost.exe 0xfa8008e17b00 20 777 0 False 2023-06-20 07:22:44.000000 N/A
** 1404 464 FoxitPDFReader 0xfa8009002b00 3 68 0 True 2023-06-20 07:22:45.000000 N/A
* 480 388 lsm.exe 0xfa8008c45b00 10 153 0 False 2023-06-20 07:22:43.000000 N/A
* 472 388 lsass.exe 0xfa8008c35b00 8 767 0 False 2023-06-20 07:22:43.000000 N/A
400 380 csrss.exe 0xfa8008993b00 11 352 1 False 2023-06-20 07:22:43.000000 N/A
492 380 winlogon.exe 0xfa8008c39b00 3 113 1 False 2023-06-20 07:22:43.000000 N/A
1152 1108 explorer.exe 0xfa8008ee4b00 36 1013 1 False 2023-06-20 07:22:44.000000 N/A
* 2496 1152 MRCv120.exe 0xfa8008e9c060 4 282 1 True 2023-06-20 08:08:46.000000 N/A
* 1508 1152 vmtoolsd.exe 0xfa800905bb00 8 188 1 False 2023-06-20 07:22:45.000000 N/A
* 1872 1152 FoxitPDFReader 0xfa800748fb00 18 492 1 True 2023-06-20 08:26:55.000000 N/A
** 4060 1872 FoxitPDFReader 0xfa800740d060 0 - 1 False 2023-06-20 08:27:01.000000 2023-06-20 08:27:02.000000
* 2420 1152 FirefoxPortabl 0xfa8006db7980 6 147 1 True 2023-06-20 08:27:05.000000 N/A
** 3716 2420 firefox.exe 0xfa8007fe0060 57 648 1 False 2023-06-20 08:27:05.000000 N/A
*** 4000 3716 firefox.exe 0xfa8008d03b00 26 313 1 False 2023-06-20 08:27:20.000000 N/A
* 3476 1152 FoxitPDFReader 0xfa8008b60a80 2 113 1 True 2023-06-20 08:28:04.000000 N/A
|
Based on the result provided from both volatility 2 and 3, there is several interesting processes such as FoxitPDFReader
and firefox.exe
which might have some information in it. Before further digging into the processes, lets try to check the command line first to see if there is any information
Step 3: gathering and analyzing command line
To check the command line from the given file, the command used for both volatility 2 and 3 is cmdline.
Volatility 2
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
| vol2 -f memdump.raw --profile Win7SP1x64 cmdline
Volatility Foundation Volatility Framework 2.6
************************************************************************
System pid: 4
************************************************************************
smss.exe pid: 260
************************************************************************
csrss.exe pid: 348
************************************************************************
wininit.exe pid: 388
************************************************************************
csrss.exe pid: 400
Command line :
************************************************************************
services.exe pid: 464
Command line :
************************************************************************
lsass.exe pid: 472
Command line :
************************************************************************
lsm.exe pid: 480
Command line :
************************************************************************
winlogon.exe pid: 492
************************************************************************
svchost.exe pid: 612
Command line :
************************************************************************
svchost.exe pid: 680
Command line :
************************************************************************
svchost.exe pid: 732
Command line : C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
************************************************************************
svchost.exe pid: 820
Command line : C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
************************************************************************
svchost.exe pid: 892
Command line : C:\Windows\system32\svchost.exe -k netsvcs
************************************************************************
svchost.exe pid: 240
Command line :
************************************************************************
svchost.exe pid: 440
Command line :
************************************************************************
dwm.exe pid: 1128
************************************************************************
explorer.exe pid: 1152
Command line : C:\Windows\Explorer.EXE
************************************************************************
spoolsv.exe pid: 1188
Command line :
************************************************************************
taskhost.exe pid: 1220
Command line :
************************************************************************
svchost.exe pid: 1244
Command line :
************************************************************************
svchost.exe pid: 1360
Command line :
************************************************************************
FoxitPDFReader pid: 1404
************************************************************************
vmtoolsd.exe pid: 1508
Command line : "C:\Program Files\VMware\VMware Tools\vmtoolsd.exe" -n vmusr
************************************************************************
VGAuthService. pid: 1676
************************************************************************
vm3dservice.ex pid: 1708
************************************************************************
vmtoolsd.exe pid: 1736
Command line : "C:\Program Files\VMware\VMware Tools\vmtoolsd.exe"
************************************************************************
vm3dservice.ex pid: 1760
************************************************************************
svchost.exe pid: 2000
************************************************************************
WmiPrvSE.exe pid: 332
Command line : C:\Windows\system32\wbem\wmiprvse.exe
************************************************************************
dllhost.exe pid: 196
************************************************************************
SearchIndexer. pid: 2136
Command line : C:\Windows\system32\SearchIndexer.exe /Embedding
************************************************************************
msdtc.exe pid: 2256
************************************************************************
wmpnetwk.exe pid: 2512
Command line :
************************************************************************
svchost.exe pid: 2624
Command line : C:\Windows\System32\svchost.exe -k LocalServicePeerNet
************************************************************************
WUDFHost.exe pid: 3024
************************************************************************
sppsvc.exe pid: 2456
************************************************************************
svchost.exe pid: 3284
Command line : C:\Windows\System32\svchost.exe -k secsvcs
************************************************************************
taskhost.exe pid: 3356
************************************************************************
MRCv120.exe pid: 2496
Command line :
************************************************************************
audiodg.exe pid: 3468
Command line : C:\Windows\system32\AUDIODG.EXE 0x814
************************************************************************
WmiPrvSE.exe pid: 3316
Command line :
************************************************************************
FoxitPDFReader pid: 1872
Command line :
************************************************************************
FoxitPDFReader pid: 4060
************************************************************************
FirefoxPortabl pid: 2420
************************************************************************
firefox.exe pid: 3716
Command line :
************************************************************************
firefox.exe pid: 4000
Command line : "E:\FirefoxPortable\App\firefox64\firefox.exe" -contentproc --channel="3716.0.1257441394\170687372" -greomni "E:\FirefoxPortable\App\firefox64\omni.ja" -appomni "E:\FirefoxPortable\App\firefox64\browser\omni.ja" -appdir "E:\FirefoxPortable\App\firefox64\browser" 3716 "\\.\pipe\gecko-crash-server-pipe.3716" tab
************************************************************************
FoxitPDFReader pid: 3476
Command line : "C:\Program Files (x86)\Foxit Software\Foxit PDF Reader\FoxitPDFReader.exe" "E:\591dedcb722fc7fea0c0f378e3192d78.pdf"
************************************************************************
dllhost.exe pid: 3396
|
Volatility 3
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
| vol -f memdump.raw windows.cmdline
Volatility 3 Framework 2.4.1
Progress: 100.00 PDB scanning finished
PID Process Args
4 System Required memory at 0x20 is inaccessible (swapped)
260 smss.exe Required memory at 0x7fffffd4020 is inaccessible (swapped)
348 csrss.exe Required memory at 0x7fffffdd020 is inaccessible (swapped)
388 wininit.exe Required memory at 0x7fffffdf020 is inaccessible (swapped)
400 csrss.exe Required memory at 0x818e8 is inaccessible (swapped)
464 services.exe Required memory at 0x361c28 is inaccessible (swapped)
472 lsass.exe Required memory at 0x361c28 is inaccessible (swapped)
480 lsm.exe Required memory at 0x2b1c28 is inaccessible (swapped)
492 winlogon.exe Required memory at 0x7fffffd7020 is inaccessible (swapped)
612 svchost.exe Required memory at 0x894c38244489 is not valid (process exited?)
680 svchost.exe Required memory at 0x271df8 is inaccessible (swapped)
732 svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
820 svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
892 svchost.exe C:\Windows\system32\svchost.exe -k netsvcs
240 svchost.exe Required memory at 0x421df8 is inaccessible (swapped)
440 svchost.exe Required memory at 0x341df8 is inaccessible (swapped)
1128 dwm.exe Required memory at 0x7fffffda020 is inaccessible (swapped)
1152 explorer.exe C:\Windows\Explorer.EXE
1188 spoolsv.exe Required memory at 0x301d68 is inaccessible (swapped)
1220 taskhost.exe Required memory at 0x281e48 is inaccessible (swapped)
1244 svchost.exe Required memory at 0x311df8 is inaccessible (swapped)
1360 svchost.exe Required memory at 0x191df8 is inaccessible (swapped)
1404 FoxitPDFReader Required memory at 0x7efdf020 is inaccessible (swapped)
1508 vmtoolsd.exe "C:\Program Files\VMware\VMware Tools\vmtoolsd.exe" -n vmusr
1676 VGAuthService. Required memory at 0x7fffffdf020 is inaccessible (swapped)
1708 vm3dservice.ex Required memory at 0x7fffffdf020 is inaccessible (swapped)
1736 vmtoolsd.exe "C:\Program Files\VMware\VMware Tools\vmtoolsd.exe"
1760 vm3dservice.ex Required memory at 0x7fffffd8020 is inaccessible (swapped)
2000 svchost.exe Required memory at 0x7fffffdf020 is inaccessible (swapped)
332 WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe
196 dllhost.exe Required memory at 0x7fffffdf020 is inaccessible (swapped)
2136 SearchIndexer. C:\Windows\system32\SearchIndexer.exe /Embedding
2256 msdtc.exe Required memory at 0x7fffffd4020 is inaccessible (swapped)
2512 wmpnetwk.exe Required memory at 0x1d1df8 is inaccessible (swapped)
2624 svchost.exe C:\Windows\System32\svchost.exe -k LocalServicePeerNet
3024 WUDFHost.exe Required memory at 0x7fffffdd020 is inaccessible (swapped)
2456 sppsvc.exe Required memory at 0x7fffffdb020 is inaccessible (swapped)
3284 svchost.exe C:\Windows\System32\svchost.exe -k secsvcs
3356 taskhost.exe Required memory at 0x7fffffde020 is inaccessible (swapped)
2496 MRCv120.exe Required memory at 0x1f1e48 is inaccessible (swapped)
3468 audiodg.exe C:\Windows\system32\AUDIODG.EXE 0x814
3316 WmiPrvSE.exe Required memory at 0x251d68 is inaccessible (swapped)
1872 FoxitPDFReader Required memory at 0x271ee8 is inaccessible (swapped)
4060 FoxitPDFReader Required memory at 0x7efdf020 is not valid (process exited?)
2420 FirefoxPortabl Required memory at 0x7efdf020 is inaccessible (swapped)
3716 firefox.exe Required memory at 0x302682 is inaccessible (swapped)
4000 firefox.exe "E:\FirefoxPortable\App\firefox64\firefox.exe" -contentproc --channel="3716.0.1257441394\170687372" -greomni "E:\FirefoxPortable\App\firefox64\omni.ja" -appomni "E:\FirefoxPortable\App\firefox64\browser\omni.ja" -appdir "E:\FirefoxPortable\App\firefox64\browser" 3716 "\\.\pipe\gecko-crash-server-pipe.3716" tab
3476 FoxitPDFReader "C:\Program Files (x86)\Foxit Software\Foxit PDF Reader\FoxitPDFReader.exe" "E:\591dedcb722fc7fea0c0f378e3192d78.pdf"
3396 dllhost.exe Required memory at 0x7fffffd5020 is not valid (process exited?)
|
Based on the result above, there is 2 things to take note. One of it is firefox
is running and the another one is the FoxitPDFReader
is reading a file named 591dedcb722fc7fea0c0f378e3192d78.pdf
. Aside from that, each of the command line has its own PID
which is useful for dumping out more information. Moving on will be trying to dump out the information based on the processes.
Step 4: Dumping out the memory of the processes
Based on previous information, the processes that will be dump out is FoxitPDFReader
and the PID is 3476
. The command that will be used for volatiltiy 2 and 3 will be different
Volatility 2
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
| vol2 -f memdump.raw --profile Win7SP1x64 memdump -p 3476 --dump-dir=v2
Volatility Foundation Volatility Framework 2.6
************************************************************************
Writing FoxitPDFReader [ 3476] to 3476.dmp
strings v2/3476.dmp | grep pdf | head
"C:\Program Files (x86)\Foxit Software\Foxit PDF Reader\FoxitPDFReader.exe" "E:\591dedcb722fc7fea0c0f378e3192d78.pdf"
isCpdf
c:\phantompdfci\jenkins\workspace\taa-ph-auto-compile\starship\bcgcbpro\bcgglobals.cpp
c:\phantompdfci\jenkins\workspace\taa-ph-auto-compile\starship\bcgcbpro\bcgpvisualmanager.cpp
c:\phantompdfci\jenkins\workspace\taa-ph-auto-compile\starship\bcgcbpro\bcgpmenubar.cpp
c:\phantompdfci\jenkins\workspace\taa-ph-auto-compile\starship\bcgcbpro\bcgpcontrolbar.cpp
c:\phantompdfci\jenkins\workspace\taa-ph-auto-compile\starship\bcgcbpro\bcgptabwnd.cpp
c:\phantompdfci\jenkins\workspace\taa-ph-auto-compile\starship\bcgcbpro\bcgpribbonbar.cpp
c:\phantompdfci\jenkins\workspace\taa-ph-auto-compile\starship\bcgcbpro\bcgpmainclientareawnd.cpp
c:\phantompdfci\jenkins\workspace\taa-ph-auto-compile\starship\bcgcbpro\bcgpfullscreenimpl.cpp
|
Volatility 3
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
| vol -f memdump.raw -o v3 windows.memmap --dump --pid 3476
Volatility 3 Framework 2.4.1
Progress: 100.00 PDB scanning finished
Virtual Physical Size Offset in File File output
strings v3/pid.3476.dmp | grep pdf | head
"C:\Program Files (x86)\Foxit Software\Foxit PDF Reader\FoxitPDFReader.exe" "E:\591dedcb722fc7fea0c0f378e3192d78.pdf"
isCpdf
c:\phantompdfci\jenkins\workspace\taa-ph-auto-compile\starship\bcgcbpro\bcgglobals.cpp
c:\phantompdfci\jenkins\workspace\taa-ph-auto-compile\starship\bcgcbpro\bcgpvisualmanager.cpp
c:\phantompdfci\jenkins\workspace\taa-ph-auto-compile\starship\bcgcbpro\bcgpmenubar.cpp
c:\phantompdfci\jenkins\workspace\taa-ph-auto-compile\starship\bcgcbpro\bcgpcontrolbar.cpp
c:\phantompdfci\jenkins\workspace\taa-ph-auto-compile\starship\bcgcbpro\bcgptabwnd.cpp
c:\phantompdfci\jenkins\workspace\taa-ph-auto-compile\starship\bcgcbpro\bcgpribbonbar.cpp
c:\phantompdfci\jenkins\workspace\taa-ph-auto-compile\starship\bcgcbpro\bcgpmainclientareawnd.cpp
c:\phantompdfci\jenkins\workspace\taa-ph-auto-compile\starship\bcgcbpro\bcgpfullscreenimpl.cpp
|
Based on the result, it is confirmed that someone is trying to read 591dedcb722fc7fea0c0f378e3192d78.pdf
. Moving on, lets try to search the pdf file and dump it out.
Step 5: searching the pdf file
Before dumping out the pdf file, we will need to search for the file to ensure it exist in the raw image first. To do so, both volatility will be using the same command filescan.
Volatility 2
1
2
3
4
| vol2 -f memdump.raw --profile Win7SP1x64 filescan | grep 591dedcb722fc7fea0c0f378e3192d78.pdf
Volatility Foundation Volatility Framework 2.6
0x000000001ea48070 3 0 R--rw- \Device\HarddiskVolume3\591dedcb722fc7fea0c0f378e3192d78.pdf
0x000000001edb2470 1 1 R--r-- \Device\HarddiskVolume3\591dedcb722fc7fea0c0f378e3192d78.pdf
|
Volatility 3
1
2
3
| vol -f memdump.raw windows.filescan | grep 591dedcb722fc7fea0c0f378e3192d78.pdf
0x1ea48070 100.0\591dedcb722fc7fea0c0f378e3192d78.pdf 216
0x1edb2470 \591dedcb722fc7fea0c0f378e3192d78.pdf 216
|
Now that we had confimed that the file exist in the raw image, lets try to dump it out.
Step 6: Dump the pdf file
To dump the pdf file, the both volatility command will be the same which is dumpfiles.
Volatiltiy 2
1
2
3
4
5
6
7
8
9
| vol2 -f memdump.raw --profile Win7SP1x64 dumpfiles --dump-dir=v2 -Q 0x000000001ea48070
Volatility Foundation Volatility Framework 2.6
DataSectionObject 0x1ea48070 None \Device\HarddiskVolume3\591dedcb722fc7fea0c0f378e3192d78.pdf
SharedCacheMap 0x1ea48070 None \Device\HarddiskVolume3\591dedcb722fc7fea0c0f378e3192d78.pdf
vol2 -f memdump.raw --profile Win7SP1x64 dumpfiles --dump-dir=v2 -Q 0x000000001edb2470
Volatility Foundation Volatility Framework 2.6
DataSectionObject 0x1edb2470 None \Device\HarddiskVolume3\591dedcb722fc7fea0c0f378e3192d78.pdf
SharedCacheMap 0x1edb2470 None \Device\HarddiskVolume3\591dedcb722fc7fea0c0f378e3192d78.pdf
|
Volatility 3
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
| vol -f memdump.raw -o v3 windows.dumpfiles --physaddr 0x1ea48070
Volatility 3 Framework 2.4.1
Progress: 100.00 PDB scanning finished
Cache FileObject FileName Result
DataSectionObject 0x1ea48070 591dedcb722fc7fea0c0f378e3192d78.pdf file.0x1ea48070.0xfa800743b250.DataSectionObject.591dedcb722fc7fea0c0f378e3192d78.pdf.dat
SharedCacheMap 0x1ea48070 591dedcb722fc7fea0c0f378e3192d78.pdf file.0x1ea48070.0xfa8008ba3e00.SharedCacheMap.591dedcb722fc7fea0c0f378e3192d78.pdf.vacb
vol -f memdump.raw -o v3 windows.dumpfiles --physaddr 0x1edb2470
Volatility 3 Framework 2.4.1
Progress: 100.00 PDB scanning finished
Cache FileObject FileName Result
DataSectionObject 0x1edb2470 591dedcb722fc7fea0c0f378e3192d78.pdf file.0x1edb2470.0xfa800743b250.DataSectionObject.591dedcb722fc7fea0c0f378e3192d78.pdf.dat
SharedCacheMap 0x1edb2470 591dedcb722fc7fea0c0f378e3192d78.pdf file.0x1edb2470.0xfa8008ba3e00.SharedCacheMap.591dedcb722fc7fea0c0f378e3192d78.pdf.vacb
|
After dumping out the file, the next thing to do is try to analyze the file.
Step 7: Analyzing the dumped file
this section will still be same as previous as we will analyze files that dumped from both volatility.
Volatility 2 dumped file
1
2
3
| file v2/*
v2/file.None.0xfffffa8008ba3e00.vacb: Zip archive data, at least v2.0 to extract, compression method=AES Encrypted
v2/file.None.0xfffffa800743b250.dat: Zip archive data, at least v2.0 to extract, compression method=AES Encrypted
|
Volatility 3 dumped file
1
2
3
4
5
| file v3/*
v3/file.0x1ea48070.0xfa8008ba3e00.SharedCacheMap.591dedcb722fc7fea0c0f378e3192d78.pdf.vacb: Zip archive data, at least v2.0 to extract, compression method=AES Encrypted
v3/file.0x1ea48070.0xfa800743b250.DataSectionObject.591dedcb722fc7fea0c0f378e3192d78.pdf.dat: Zip archive data, at least v2.0 to extract, compression method=AES Encrypted
v3/file.0x1edb2470.0xfa8008ba3e00.SharedCacheMap.591dedcb722fc7fea0c0f378e3192d78.pdf.vacb: Zip archive data, at least v2.0 to extract, compression method=AES Encrypted
v3/file.0x1edb2470.0xfa800743b250.DataSectionObject.591dedcb722fc7fea0c0f378e3192d78.pdf.dat: Zip archive data, at least v2.0 to extract, compression method=AES Encrypted
|
Volatility 2 only have 2 files while volatility 3 have 4 files. This is because volatility 2 overwrite the file since it is same name while volatility 3 have different names. Based on the result, the files is not a pdf file but instead a zip file. The next step would be trying to unzip it.
Step 8: Unzip the file
Before that unzipping the file, it is compulsory to change the file extension to .zip
to succuessfully unzip it.
Volatility 2 dumped file
1
2
3
4
5
6
7
| mv file.None.0xfffffa8008ba3e00.vacb test.zip
mv file.None.0xfffffa800743b250.dat test2.zip
zip2john *.zip
test2.zip/flag.txt:$zip2$*0*3*0*810ac093ee40b9a6e100e9c136806c67*1712*27*5c46c3495afd25681727887a9c7f9b1cb6692d6fc7b9b9a6f1bb369073c1b6e8897d567bedbc2d*59f3515251e6914d983d*$/zip2$:flag.txt:test2.zip:test2.zip
Did not find End Of Central Directory.
|
Volatility 3 dumped file
1
2
3
4
5
6
7
8
9
10
11
12
13
| mv file.0x1ea48070.0xfa8008ba3e00.SharedCacheMap.591dedcb722fc7fea0c0f378e3192d78.pdf.vacb test.zip
mv file.0x1ea48070.0xfa800743b250.DataSectionObject.591dedcb722fc7fea0c0f378e3192d78.pdf.dat test2.zip
mv file.0x1edb2470.0xfa8008ba3e00.SharedCacheMap.591dedcb722fc7fea0c0f378e3192d78.pdf.vacb test3.zip
mv file.0x1edb2470.0xfa800743b250.DataSectionObject.591dedcb722fc7fea0c0f378e3192d78.pdf.dat test4.zip
zip2john *.zip
test2.zip/flag.txt:$zip2$*0*3*0*810ac093ee40b9a6e100e9c136806c67*1712*27*5c46c3495afd25681727887a9c7f9b1cb6692d6fc7b9b9a6f1bb369073c1b6e8897d567bedbc2d*59f3515251e6914d983d*$/zip2$:flag.txt:test2.zip:test2.zip
Did not find End Of Central Directory.
test4.zip/flag.txt:$zip2$*0*3*0*810ac093ee40b9a6e100e9c136806c67*1712*27*5c46c3495afd25681727887a9c7f9b1cb6692d6fc7b9b9a6f1bb369073c1b6e8897d567bedbc2d*59f3515251e6914d983d*$/zip2$:flag.txt:test4.zip:test4.zip
Did not find End Of Central Directory.
|
After renaming the file, I used a tool named zip2john
to check if the zip file is having any password. Based on the result, all the result is same as the provide the same hashes which means the zip file is password protected. Since the firefox
processes has not gone through yet, lets try to go through it to check if there is any password.
Since the processes stated that someone is running firefox, the best way to gather information is by checking the browser history. By default, the history of firefox will be saved into a file named places
. for more information about default file name for each browser history, click here. Since we are looking for files, lets search for the relevant file name
Volatility 2
1
2
3
4
5
6
7
8
9
10
11
| vol2 -f memdump.raw --profile Win7SP1x64 filescan | grep places.sql
Volatility Foundation Volatility Framework 2.6
0x000000001d8e3c60 1 1 R--rw- \Device\HarddiskVolume3\FirefoxPortable\Data\profile\places.sqlite
0x000000001dad8070 15 1 RW-rw- \Device\HarddiskVolume3\FirefoxPortable\Data\profile\places.sqlite-shm
0x000000001df039c0 1 1 RW-rw- \Device\HarddiskVolume3\FirefoxPortable\Data\profile\places.sqlite-wal
0x000000001e8ae250 14 1 RW-rw- \Device\HarddiskVolume3\FirefoxPortable\Data\profile\places.sqlite-wal
0x000000001eb898c0 1 1 R--rw- \Device\HarddiskVolume3\FirefoxPortable\Data\profile\places.sqlite
0x000000001ed846b0 1 1 R--rw- \Device\HarddiskVolume3\FirefoxPortable\Data\profile\places.sqlite
0x000000001edc01d0 1 1 RW-rw- \Device\HarddiskVolume3\FirefoxPortable\Data\profile\places.sqlite-wal
0x000000001ef895b0 1 1 RW-rw- \Device\HarddiskVolume3\FirefoxPortable\Data\profile\places.sqlite-wal
0x000000001fe27830 5 1 RW-rw- \Device\HarddiskVolume3\FirefoxPortable\Data\profile\places.sqlite
|
Volatility 3
1
2
3
4
5
6
7
8
9
10
| vol -f memdump.raw windows.filescan | grep places.sql
0x1d8e3c60 100.0\FirefoxPortable\Data\profile\places.sqlite 216
0x1dad8070 \FirefoxPortable\Data\profile\places.sqlite-shm 216
0x1df039c0 \FirefoxPortable\Data\profile\places.sqlite-wal 216
0x1e8ae250 \FirefoxPortable\Data\profile\places.sqlite-wal 216
0x1eb898c0 \FirefoxPortable\Data\profile\places.sqlite 216
0x1ed846b0 \FirefoxPortable\Data\profile\places.sqlite 216
0x1edc01d0 \FirefoxPortable\Data\profile\places.sqlite-wal 216
0x1ef895b0 \FirefoxPortable\Data\profile\places.sqlite-wal 216
0x1fe27830 \FirefoxPortable\Data\profile\places.sqlite 216
|
Based on the result, there are a few files that contain the names of places
. Lets just dump one out from each volatility to check the information inside it.
Step 10: Dump the sqlite file
The command will be same as previous for dumping the files.
Volatility 2
1
2
3
4
| vol2 -f memdump.raw --profile Win7SP1x64 dumpfiles --dump-dir=v2 -Q 0x000000001d8e3c60
Volatility Foundation Volatility Framework 2.6
DataSectionObject 0x1d8e3c60 None \Device\HarddiskVolume3\FirefoxPortable\Data\profile\places.sqlite
SharedCacheMap 0x1d8e3c60 None \Device\HarddiskVolume3\FirefoxPortable\Data\profile\places.sqlite
|
Volatility 3
1
2
3
4
5
6
7
| vol -f memdump.raw -o v3 windows.dumpfiles --physaddr 0x1d8e3c60
Volatility 3 Framework 2.4.1
Progress: 100.00 PDB scanning finished
Cache FileObject FileName Result
DataSectionObject 0x1d8e3c60 places.sqlite Error dumping file
SharedCacheMap 0x1d8e3c60 places.sqlite file.0x1d8e3c60.0xfa8009074d80.SharedCacheMap.places.sqlite.vacb
|
After dumping out the file, lets read the file.
Step 11: read the dumped sqlite file
Volatility 2 dumped file
1
2
3
4
5
6
7
8
9
10
11
12
| strings v2/file.None.0xfffffa8009074d80.vacb| grep google.com/search
https://www.google.com/search?hl=en-MY&gbv=2&q=amitriptyline+malaysia&oq=amitriptyline+malaysia&aqs=heirloom-srp..0l5amitriptyline malaysia - Google Searchmoc.elgoog.www.
https://www.google.com/search?hl=en-MY&gbv=2&q=passwd%3A+whodiditidk&oq=passwd%3A+whodiditidk&aqs=heirloom-srp..passwd: whodiditidk - Google Searchmoc.elgoog.www.
https://www.google.com/search?hl=en-MY&gbv=2&q=amitriptyline+overdose&oq=amitriptyline++over&aqs=heirloom-srp.0.0l5amitriptyline overdose - Google Searchmoc.elgoog.www.
https://www.google.com/search?hl=en-MY&source=hp&biw=&bih=&q=can+i+buy+amitriptyline+over+the+counter+malaysia&iflsig=AOEireoAAAAAZJFiMvT6EIZLI3gc6YwsYTCfmgRHROIi&gbv=2&oq=can+i+buy+amitriptyline+over+the+counter+malaysia&gs_l=heirloom-hp.3..0i546l5.6365.18936.0.19223.29.28.0.1.1.0.2237.12264.4j5j9j4j2j9-3.27.0....0...1ac.1.34.heirloom-hp..13.16.4581.6kGofs948xEcan i buy amitriptyline over the counter malaysia - Google Searchmoc.elgoog.www.
https://www.google.com/search?hl=en-MY&source=hp&biw=&bih=&q=amitriptyline&iflsig=AOEireoAAAAAZJE-FIBk0yE9cTyRfsJGgKzsGpPtubIo&gbv=2&oq=amitriptyline&gs_l=heirloom-hp.3..0i512i433i131l3j0i512l7.23131.26384.0.28332.8.7.0.1.1.0.153.549.6j1.7.0....0...1ac.1.34.heirloom-hp..0.8.577.n4YLioOAAPcamitriptyline - Google Searchmoc.elgoog.www.
strings v2/file.None.0xfffffa8009074d80.vacb| grep google.com/search
https://www.google.com/search?hl=en-MY&gbv=2&q=amitriptyline+malaysia&oq=amitriptyline+malaysia&aqs=heirloom-srp..0l5amitriptyline malaysia - Google Searchmoc.elgoog.www.
https://www.google.com/search?hl=en-MY&gbv=2&q=passwd%3A+whodiditidk&oq=passwd%3A+whodiditidk&aqs=heirloom-srp..passwd: whodiditidk - Google Searchmoc.elgoog.www.
https://www.google.com/search?hl=en-MY&gbv=2&q=amitriptyline+overdose&oq=amitriptyline++over&aqs=heirloom-srp.0.0l5amitriptyline overdose - Google Searchmoc.elgoog.www.
https://www.google.com/search?hl=en-MY&source=hp&biw=&bih=&q=can+i+buy+amitriptyline+over+the+counter+malaysia&iflsig=AOEireoAAAAAZJFiMvT6EIZLI3gc6YwsYTCfmgRHROIi&gbv=2&oq=can+i+buy+amitriptyline+over+the+counter+malaysia&gs_l=heirloom-hp.3..0i546l5.6365.18936.0.19223.29.28.0.1.1.0.2237.12264.4j5j9j4j2j9-3.27.0....0...1ac.1.34.heirloom-hp..13.16.4581.6kGofs948xEcan i buy amitriptyline over the counter malaysia - Google Searchmoc.elgoog.www.
https://www.google.com/search?hl=en-MY&source=hp&biw=&bih=&q=amitriptyline&iflsig=AOEireoAAAAAZJE-FIBk0yE9cTyRfsJGgKzsGpPtubIo&gbv=2&oq=amitriptyline&gs_l=heirloom-hp.3..0i512i433i131l3j0i512l7.23131.26384.0.28332.8.7.0.1.1.0.153.549.6j1.7.0....0...1ac.1.34.heirloom-hp..0.8.577.n4YLioOAAPcamitriptyline - Google Searchmoc.elgoog.www.
|
Volatility 3 dumped file
1
2
3
4
5
6
| strings v3/file.0x1d8e3c60.0xfa8009074d80.SharedCacheMap.places.sqlite.vacb| grep google.com/search
https://www.google.com/search?hl=en-MY&gbv=2&q=amitriptyline+malaysia&oq=amitriptyline+malaysia&aqs=heirloom-srp..0l5amitriptyline malaysia - Google Searchmoc.elgoog.www.
https://www.google.com/search?hl=en-MY&gbv=2&q=passwd%3A+whodiditidk&oq=passwd%3A+whodiditidk&aqs=heirloom-srp..passwd: whodiditidk - Google Searchmoc.elgoog.www.
https://www.google.com/search?hl=en-MY&gbv=2&q=amitriptyline+overdose&oq=amitriptyline++over&aqs=heirloom-srp.0.0l5amitriptyline overdose - Google Searchmoc.elgoog.www.
https://www.google.com/search?hl=en-MY&source=hp&biw=&bih=&q=can+i+buy+amitriptyline+over+the+counter+malaysia&iflsig=AOEireoAAAAAZJFiMvT6EIZLI3gc6YwsYTCfmgRHROIi&gbv=2&oq=can+i+buy+amitriptyline+over+the+counter+malaysia&gs_l=heirloom-hp.3..0i546l5.6365.18936.0.19223.29.28.0.1.1.0.2237.12264.4j5j9j4j2j9-3.27.0....0...1ac.1.34.heirloom-hp..13.16.4581.6kGofs948xEcan i buy amitriptyline over the counter malaysia - Google Searchmoc.elgoog.www.
https://www.google.com/search?hl=en-MY&source=hp&biw=&bih=&q=amitriptyline&iflsig=AOEireoAAAAAZJE-FIBk0yE9cTyRfsJGgKzsGpPtubIo&gbv=2&oq=amitriptyline&gs_l=heirloom-hp.3..0i512i433i131l3j0i512l7.23131.26384.0.28332.8.7.0.1.1.0.153.549.6j1.7.0....0...1ac.1.34.heirloom-hp..0.8.577.n4YLioOAAPcamitriptyline - Google Searchmoc.elgoog.www.
|
Based on the information provided from the places.sqlite
file, there is a potential password provided passwd: whodiditidk
. Lets just try to unzip the file with the password and hope it works.
Step 12: Unzip the file with the password given
all files dumped from volatility 2 and 3 gives the same hashes which mean the password should be same. one of the filed will be used as example to unzip.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
| 7z x test2.zip
7-Zip [64] 16.02 : Copyright (c) 1999-2016 Igor Pavlov : 2016-05-21
p7zip Version 16.02 (locale=en_US.UTF-8,Utf16=on,HugeFiles=on,64 bits,128 CPUs Intel(R) Core(TM) i5-9300H CPU @ 2.40GHz (906EA),ASM,AES-NI)
Scanning the drive for archives:
1 file, 4096 bytes (4 KiB)
Extracting archive: test2.zip
WARNINGS:
There are data after the end of archive
--
Path = test2.zip
Type = zip
WARNINGS:
There are data after the end of archive
Physical Size = 255
Tail Size = 3841
Enter password (will not be echoed):
Everything is Ok
Archives with Warnings: 1
Warnings: 1
Size: 37
Compressed: 4096
cat flag.txt
BAT{442b6acb58091deddb8bf3b6f1062ee4}
|
With that, we managed to solve the challenge and get the exact flag.
Things I learned from the challenge
- volatility 2 and 3 commands
- dumping out interesting files from raw image
- browser history default name