Command & Control level 2

root-me challenge: Congratulations Berthier, thanks to your help the computer has been identified. You have requested a memory dump but before starting your analysis you wanted to take a look at the antivirus’ logs. Unfortunately, you forgot to write down the workstation’s hostname. But since you have its memory dump you should be able to get it back!

The validation flag is the workstation’s hostname. The uncompressed memory dump md5 hash is e3a902d4d44e0f7bd9cb29865e0a15de


Get file:

┌──(kali㉿kali)-[~/Downloads/root-me]
└─$ wget http://challenge01.root-me.org/forensic/ch2/ch2.tbz2

Unpack:

┌──(kali㉿kali)-[~/Downloads/root-me/forensic]
└─$ tar -jxvf ch2.tbz2
ch2.dmp

Using volatility3, get info:

┌──(kali㉿kali)-[~/Downloads/volatility3]
└─$ ./vol.py -f ../root-me/forensic/ch2.dmp windows.info
...
Variable        Value

Kernel Base     0x82801000
DTB     0x185000
Symbols file:///home/kali/Downloads/volatility3/volatility3/symbols/windows/ntkrpamp.pdb/5B308B4ED6464159B87117C711E7340C-2.json.z
Is64Bit False
IsPAE   True
layer_name      0 WindowsIntelPAE
memory_layer    1 FileLayer
KdDebuggerDataBlock     0x82929be8
NTBuildLab      7600.16385.x86fre.win7_rtm.09071
CSDVersion      0
KdVersionBlock  0x82929bc0
Major/Minor     15.7600
MachineType     332
KeNumberProcessors      1
SystemTime      2013-01-12 16:59:18
NtSystemRoot    C:\Windows
NtProductType   NtProductWinNt
NtMajorVersion  6
NtMinorVersion  1
PE MajorOperatingSystemVersion  6
PE MinorOperatingSystemVersion  1
PE Machine      332
PE TimeDateStamp        Mon Jul 13 23:15:19 2009

Dump the hives:

┌──(kali㉿kali)-[~/Downloads/volatility3]
└─$ ./vol.py -f ../root-me/forensic/ch2.dmp hivelist        
Volatility 3 Framework 2.4.2
Progress:  100.00               PDB scanning finished                        
Offset  FileFullPath    File output

0x8b20c008              Disabled
0x8b21c008      \REGISTRY\MACHINE\SYSTEM        Disabled
0x8b23c008      \REGISTRY\MACHINE\HARDWARE      Disabled
0x8ee66008      \Device\HarddiskVolume1\Boot\BCD        Disabled
0x8ee66740      \SystemRoot\System32\Config\SOFTWARE    Disabled
0x90cab9d0      \SystemRoot\System32\Config\DEFAULT     Disabled
0x9670e9d0      \??\C:\Users\John Doe\ntuser.dat        Disabled
0x9670f9d0      \??\C:\Users\John Doe\AppData\Local\Microsoft\Windows\UsrClass.dat      Disabled
0x9aad6148      \SystemRoot\System32\Config\SAM Disabled
0x9ab25008      \SystemRoot\System32\Config\SECURITY    Disabled
0x9aba79d0      \??\C:\Windows\ServiceProfiles\LocalService\NTUSER.DAT  Disabled
0x9abb1720      \??\C:\Windows\ServiceProfiles\NetworkService\NTUSER.DAT        Disabled

Dump the registry key for getting the ComputerName:

┌──(kali㉿kali)-[~/Downloads/volatility3]
└─$ ./vol.py -f ../root-me/forensic/ch2.dmp windows.registry.printkey --key "ControlSet001\Control\ComputerName\ComputerName"          
Volatility 3 Framework 2.4.2
Progress:  100.00               PDB scanning finished                        
Last Write Time Hive Offset     Type    Key     Name    Data    Volatile

-       0x8b20c008      Key     ?\ControlSet001\Control\ComputerName\ComputerName       -               -
2013-01-12 00:58:30.000000      0x8b21c008      REG_SZ  \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\ComputerName\ComputerName(Default)        "mnmsrvc"       False
2013-01-12 00:58:30.000000      0x8b21c008      REG_SZ  \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\ComputerName\ComputerNameComputerName     "WIN-ETSA91RK***"       False
...