Herramienta Volatility2/3 + LAB (Windows)
Fase 1
Lo primero a la hora de sacar la principal informacion de un archivo de la imagen del sistema para realizar el análisis forense es lo siguiente.
Utilizaremos la herramienta Volatility
la cual nos podremos descargar en el siguiente repositorio de GitHub
.
URL = Download Volatility
Una vez descargado, podremos probarla ejecutando el siguiente comando.
./vol.py -h
Info:
Volatility 3 Framework 2.26.2
usage: vol.py [-h] [-c CONFIG] [--parallelism [{processes,threads,off}]] [-e EXTEND] [-p PLUGIN_DIRS] [-s SYMBOL_DIRS] [-v] [-l LOG] [-o OUTPUT_DIR] [-q]
[-r RENDERER] [-f FILE] [--write-config] [--save-config SAVE_CONFIG] [--clear-cache] [--cache-path CACHE_PATH] [--offline | -u URL]
[--filters FILTERS] [--hide-columns [HIDE_COLUMNS ...]] [--single-location SINGLE_LOCATION] [--stackers [STACKERS ...]]
[--single-swap-locations [SINGLE_SWAP_LOCATIONS ...]]
PLUGIN ...
An open-source memory forensics framework
options:
-h, --help Show this help message and exit, for specific plugin options use 'vol.py <pluginname> --help'
-c, --config CONFIG Load the configuration from a json file
--parallelism [{processes,threads,off}]
Enables parallelism (defaults to off if no argument given)
-e, --extend EXTEND Extend the configuration with a new (or changed) setting
-p, --plugin-dirs PLUGIN_DIRS
Semi-colon separated list of paths to find plugins
-s, --symbol-dirs SYMBOL_DIRS
Semi-colon separated list of paths to find symbols
-v, --verbosity Increase output verbosity
-l, --log LOG Log output to a file as well as the console
-o, --output-dir OUTPUT_DIR
Directory in which to output any generated files
-q, --quiet Remove progress feedback
-r, --renderer RENDERER
Determines how to render the output (quick, none, csv, pretty, json, jsonl)
-f, --file FILE Shorthand for --single-location=file:// if single-location is not defined
--write-config Write configuration JSON file out to config.json
--save-config SAVE_CONFIG
Save configuration JSON file to a file
--clear-cache Clears out all short-term cached items
--cache-path CACHE_PATH
Change the default path (/root/.cache/volatility3) used to store the cache
--offline Do not search online for additional JSON files
-u, --remote-isf-url URL
Search online for ISF json files
--filters FILTERS List of filters to apply to the output (in the form of [+-]columname,pattern[!])
--hide-columns [HIDE_COLUMNS ...]
Case-insensitive space separated list of prefixes to determine which columns to hide in the output if provided
--single-location SINGLE_LOCATION
Specifies a base location on which to stack
--stackers [STACKERS ...]
List of stackers
--single-swap-locations [SINGLE_SWAP_LOCATIONS ...]
Specifies a list of swap layer URIs for use with single-location
Plugins:
..................................<RESTO_HELP>.....................................
Vemos que esta funcionando de forma correcta, por lo que ya podremos utilizarla.
Si por ejemplo queremos utilizar la de Volatility2
o Volatility
, podremos descargarnoslo en este repositorio de GitHub
tambien del mismo creador, pero ya esta un poco desactualizado.
URL = Download Volatility2 GitHub
Una vez descargado, le daremos permisos de ejeccion ya que viene sin ellos.
chmod +x vol.py
Ahora entraremos a nivel de codigo con nano
y cambiaremos la siguiente linea:
#!/usr/bin/env python
Por esta:
#!/usr/bin/env python2
Lo guardamos y ahora la probaremos de esta forma:
./vol.py -h
Info:
Volatility Foundation Volatility Framework 2.6.1
Usage: Volatility - A memory forensics analysis platform.
Options:
-h, --help list all available options and their default values.
Default values may be set in the configuration file
(/etc/volatilityrc)
--conf-file=/root/.volatilityrc
User based configuration file
-d, --debug Debug volatility
--plugins=PLUGINS Additional plugin directories to use (colon separated)
--info Print information about all registered objects
--cache-directory=/root/.cache/volatility
Directory where cache files are stored
--cache Use caching
--tz=TZ Sets the (Olson) timezone for displaying timestamps
using pytz (if installed) or tzset
-f FILENAME, --filename=FILENAME
Filename to use when opening an image
--profile=WinXPSP2x86
Name of the profile to load (use --info to see a list
of supported profiles)
-l LOCATION, --location=LOCATION
A URN location from which to load an address space
-w, --write Enable write support
--dtb=DTB DTB Address
--shift=SHIFT Mac KASLR shift address
--output=text Output in this format (support is module specific, see
the Module Output Options below)
--output-file=OUTPUT_FILE
Write output in this file
-v, --verbose Verbose information
--physical_shift=PHYSICAL_SHIFT
Linux kernel physical shift address
--virtual_shift=VIRTUAL_SHIFT
Linux kernel virtual shift address
-g KDBG, --kdbg=KDBG Specify a KDBG virtual address (Note: for 64-bit
Windows 8 and above this is the address of
KdCopyDataBlock)
--force Force utilization of suspect profile
-k KPCR, --kpcr=KPCR Specify a specific KPCR address
--cookie=COOKIE Specify the address of nt!ObHeaderCookie (valid for
Windows 10 only)
Supported Plugin Commands:
..................................<RESTO_HELP>.....................................
Vemos que funciona de forma correcta.
Tambien podemos ver como se utiliza en esta pagina:
URL = Info Uso de Volatility
Ahora vamos a entrar en un repositorio de GitHub
donde descargarnos imagenes ya preparadas para parcticar esto mismo.
URL = GitHub Labs Analisis Forense
Vamos a irnos a Lab 0
y dentro clicaremos el link del drive
que nos descarga dicho archivo, lo descomprimiremos y ahora vamos a empezar con el analisis forense con la herramienta Volatility3
con dicho archivo.
Obtener información del sistema de la imagen
Vamos a probarlo tanto para la v2
como para la v3
ya que cambian en las dos versiones de volatility
.
Volatility2
./vol.py -f Challenge.raw imageinfo
Info:
INFO : volatility.debug : Determining profile based on KDBG search...
Suggested Profile(s) : Win7SP1x86_23418, Win7SP0x86, Win7SP1x86_24000, Win7SP1x86
AS Layer1 : IA32PagedMemoryPae (Kernel AS)
AS Layer2 : FileAddressSpace (/home/kali/Desktop/volatility/Challenge.raw)
PAE type : PAE
DTB : 0x185000L
KDBG : 0x8273cb78L
Number of Processors : 1
Image Type (Service Pack) : 1
KPCR for CPU 0 : 0x80b96000L
KUSER_SHARED_DATA : 0xffdf0000L
Image date and time : 2018-10-23 08:30:51 UTC+0000
Image local date and time : 2018-10-23 14:00:51 +0530
Volatility3
./vol.py -f Challenge.raw windows.info
Info:
Volatility 3 Framework 2.26.2
Progress: 100.00 PDB scanning finished
Variable Value
Kernel Base 0x82604000
DTB 0x185000
Symbols file:///home/kali/Desktop/volatility3/volatility3/symbols/windows/ntkrpamp.pdb/EDD3760CEE2B45D2A63BF8C26EE11FAF-2.json.xz
Is64Bit False
IsPAE True
layer_name 0 WindowsIntelPAE
memory_layer 1 FileLayer
KdDebuggerDataBlock 0x8273cb78
NTBuildLab 7601.24260.x86fre.win7sp1_ldr.18
CSDVersion 1
KdVersionBlock 0x8273cb50
Major/Minor 15.7601
MachineType 332
KeNumberProcessors 1
SystemTime 2018-10-23 08:30:51+00:00
NtSystemRoot C:\Windows
NtProductType NtProductWinNt
NtMajorVersion 6
NtMinorVersion 1
PE MajorOperatingSystemVersion 6
PE MinorOperatingSystemVersion 1
PE Machine 332
PE TimeDateStamp Sun Sep 9 00:14:23 2018
Con esto sabremos el profile
determinado (El S.O.
especifico que es) para posteriormente poder ejecutar los comandos correctos respecto al sistema que sea.
Obtener información de la memoria RAM
Volatility2
./vol.py -f Challenge.raw kdbgscan
Info:
**************************************************
Instantiating KDBG using: /home/kali/Desktop/volatility/Challenge.raw WinXPSP2x86 (5.1.0 32bit)
Offset (P) : 0x273cb78
KDBG owner tag check : True
Profile suggestion (KDBGHeader): Win7SP1x86_23418
Version64 : 0x273cb50 (Major: 15, Minor: 7601)
PsActiveProcessHead : 0x82751d70
PsLoadedModuleList : 0x82759730
KernelBase : 0x82604000
**************************************************
Instantiating KDBG using: /home/kali/Desktop/volatility/Challenge.raw WinXPSP2x86 (5.1.0 32bit)
Offset (P) : 0x273cb78
KDBG owner tag check : True
Profile suggestion (KDBGHeader): Win7SP1x86
Version64 : 0x273cb50 (Major: 15, Minor: 7601)
PsActiveProcessHead : 0x82751d70
PsLoadedModuleList : 0x82759730
KernelBase : 0x82604000
**************************************************
Instantiating KDBG using: /home/kali/Desktop/volatility/Challenge.raw WinXPSP2x86 (5.1.0 32bit)
Offset (P) : 0x273cb78
KDBG owner tag check : True
Profile suggestion (KDBGHeader): Win7SP1x86_24000
Version64 : 0x273cb50 (Major: 15, Minor: 7601)
PsActiveProcessHead : 0x82751d70
PsLoadedModuleList : 0x82759730
KernelBase : 0x82604000
**************************************************
Instantiating KDBG using: /home/kali/Desktop/volatility/Challenge.raw WinXPSP2x86 (5.1.0 32bit)
Offset (P) : 0x273cb78
KDBG owner tag check : True
Profile suggestion (KDBGHeader): Win7SP0x86
Version64 : 0x273cb50 (Major: 15, Minor: 7601)
PsActiveProcessHead : 0x82751d70
PsLoadedModuleList : 0x82759730
KernelBase : 0x82604000
Volatility3
Para Volatility3
al realizar el comando anterior de obtener informacion, ya de forma automatica hace lo del kdbgscan
de volatility2
, por lo que seria el mismo comando que el anterior de esta version.
Con esto obtenemos informacion respecto al dump
de la memoria RAM
solo que no se suele utilizar mucho si no es un caso real.
Esta seria la primera fase de informacion que siempre tendremos que hacer para recopilar la informacion esencial desde la memoria RAM
del dump
.
Fase 2
Obtener los procesos activos de cuando se realizo el dump del archivo
Vamos a ejecutar el parametro de pstree
que nos muestra todos los procesos de memoria RAM
en formato de árbol (Proceso padre, hijo, subprocesos, etc...).
Volatility2
El --profile=...
vamos a obtenerlo del anterior comando que ejecutamos en la linea llamada Suggested Profile(s)
mismamente el primer nombre sirve.
./vol.py -f Challenge.raw --profile=Win7SP1x86_23418 pstree
Info:
Name Pid PPid Thds Hnds Time
-------------------------------------------------- ------ ------ ------ ------ ----
0x84d93c68:wininit.exe 388 332 3 79 2018-10-23 08:29:23 UTC+0000
. 0x84debd20:services.exe 484 388 10 191 2018-10-23 08:29:25 UTC+0000
.. 0x84e8c648:svchost.exe 896 484 30 809 2018-10-23 08:29:33 UTC+0000
.. 0x84e41708:VBoxService.ex 652 484 12 116 2018-10-23 08:29:31 UTC+0000
.. 0x84e7ad20:svchost.exe 804 484 19 378 2018-10-23 08:29:32 UTC+0000
... 0x84ea7d20:audiodg.exe 988 804 6 127 2018-10-23 08:29:35 UTC+0000
.. 0x84f7d578:svchost.exe 1460 484 11 148 2018-10-23 08:29:44 UTC+0000
.. 0x84f323f8:spoolsv.exe 1336 484 16 295 2018-10-23 08:29:43 UTC+0000
.. 0x850b2538:taskhost.exe 308 484 8 151 2018-10-23 08:29:55 UTC+0000
.. 0x850d0030:sppsvc.exe 1164 484 6 154 2018-10-23 08:29:57 UTC+0000
.. 0x84e54030:svchost.exe 716 484 9 243 2018-10-23 08:29:32 UTC+0000
.. 0x84e84898:svchost.exe 848 484 20 400 2018-10-23 08:29:33 UTC+0000
... 0x85109030:dwm.exe 1992 848 5 132 2018-10-23 08:30:04 UTC+0000
.. 0x84f4dca0:svchost.exe 1364 484 19 307 2018-10-23 08:29:43 UTC+0000
.. 0x84f828f8:svchost.exe 1488 484 8 170 2018-10-23 08:29:44 UTC+0000
.. 0x84e89c68:svchost.exe 872 484 19 342 2018-10-23 08:29:33 UTC+0000
.. 0x85164030:SearchIndexer. 2032 484 14 614 2018-10-23 08:30:14 UTC+0000
... 0x8515cd20:SearchFilterHo 1292 2032 5 80 2018-10-23 08:30:17 UTC+0000
... 0x8515ad20:SearchProtocol 284 2032 7 235 2018-10-23 08:30:16 UTC+0000
.. 0x84f033c8:svchost.exe 1192 484 15 365 2018-10-23 08:29:40 UTC+0000
.. 0x84e23030:svchost.exe 592 484 12 358 2018-10-23 08:29:30 UTC+0000
. 0x84def3d8:lsass.exe 492 388 7 480 2018-10-23 08:29:25 UTC+0000
. 0x84df2378:lsm.exe 500 388 10 146 2018-10-23 08:29:25 UTC+0000
0x84d69030:csrss.exe 340 332 8 347 2018-10-23 08:29:21 UTC+0000
0x83d09c58:System 4 0 85 483 2018-10-23 08:29:16 UTC+0000
. 0x8437db18:smss.exe 260 4 2 29 2018-10-23 08:29:16 UTC+0000
0x85097870:explorer.exe 324 1876 33 827 2018-10-23 08:30:04 UTC+0000
. 0x845a8d20:DumpIt.exe 2412 324 2 38 2018-10-23 08:30:48 UTC+0000
. 0x851a6610:cmd.exe 2096 324 1 22 2018-10-23 08:30:18 UTC+0000
. 0x85135af8:VBoxTray.exe 1000 324 14 159 2018-10-23 08:30:08 UTC+0000
0x84dcbd20:winlogon.exe 424 372 6 117 2018-10-23 08:29:23 UTC+0000
0x84d8d030:csrss.exe 380 372 9 188 2018-10-23 08:29:23 UTC+0000
. 0x84d83d20:conhost.exe 2424 380 2 51 2018-10-23 08:30:48 UTC+0000
. 0x851a5cd8:conhost.exe 2104 380 2 52 2018-10-23 08:30:18 UTC+0000
Volatility3
En este caso no hace falta especificar el profile
ya que lo detecta de forma automatica.
./vol.py -f Challenge.raw windows.pstree
Info:
Volatility 3 Framework 2.26.2
Progress: 100.00 PDB scanning finished
PID PPID ImageFileName Offset(V) Threads Handles SessionId Wow64 CreateTime ExitTime Audit Cmd Path
4 0 System 0x83d09c58 85 483 N/A False 2018-10-23 08:29:16.000000 UTC N/A - - -
* 260 4 smss.exe 0x8437db18 2 29 N/A False 2018-10-23 08:29:16.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\smss.exe \SystemRoot\System32\smss.exe \SystemRoot\System32\smss.exe
340 332 csrss.exe 0x84d69030 8 347 0 False 2018-10-23 08:29:21.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\csrss.exe %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,12288,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16 C:\Windows\system32\csrss.exe
380 372 csrss.exe 0x84d8d030 9 188 1 False 2018-10-23 08:29:23.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\csrss.exe %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,12288,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16 C:\Windows\system32\csrss.exe
* 2104 380 conhost.exe 0x851a5cd8 2 52 1 False 2018-10-23 08:30:18.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\conhost.exe \??\C:\Windows\system32\conhost.exe "9597847671419376088700206021-7055470871162148935-704730587-1400429052-1906668177 C:\Windows\system32\conhost.exe
* 2424 380 conhost.exe 0x84d83d20 2 51 1 False 2018-10-23 08:30:48.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\conhost.exe \??\C:\Windows\system32\conhost.exe "499080522-1749980471992366858-146566314551631531-193375578852495345-1447858489 C:\Windows\system32\conhost.exe
388 332 wininit.exe 0x84d93c68 3 79 0 False 2018-10-23 08:29:23.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\wininit.exe wininit.exe C:\Windows\system32\wininit.exe
* 500 388 lsm.exe 0x84df2378 10 146 0 False 2018-10-23 08:29:25.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\lsm.exe C:\Windows\system32\lsm.exe C:\Windows\system32\lsm.exe
* 484 388 services.exe 0x84debd20 10 191 0 False 2018-10-23 08:29:25.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\services.exe C:\Windows\system32\services.exe C:\Windows\system32\services.exe
** 896 484 svchost.exe 0x84e8c648 30 809 0 False 2018-10-23 08:29:33.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k netsvcs C:\Windows\system32\svchost.exe
** 804 484 svchost.exe 0x84e7ad20 19 378 0 False 2018-10-23 08:29:32.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted C:\Windows\System32\svchost.exe
*** 988 804 audiodg.exe 0x84ea7d20 6 127 0 False 2018-10-23 08:29:35.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\audiodg.exe C:\Windows\system32\AUDIODG.EXE 0x2ac C:\Windows\system32\AUDIODG.EXE
** 872 484 svchost.exe 0x84e89c68 19 342 0 False 2018-10-23 08:29:33.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalService C:\Windows\system32\svchost.exe
** 1192 484 svchost.exe 0x84f033c8 15 365 0 False 2018-10-23 08:29:40.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k NetworkService C:\Windows\system32\svchost.exe
** 716 484 svchost.exe 0x84e54030 9 243 0 False 2018-10-23 08:29:32.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k RPCSS C:\Windows\system32\svchost.exe
** 652 484 VBoxService.ex 0x84e41708 12 116 0 False 2018-10-23 08:29:31.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\VBoxService.exe C:\Windows\System32\VBoxService.exe C:\Windows\System32\VBoxService.exe
** 1164 484 sppsvc.exe 0x850d0030 6 154 0 False 2018-10-23 08:29:57.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\sppsvc.exe C:\Windows\system32\sppsvc.exe C:\Windows\system32\sppsvc.exe
** 592 484 svchost.exe 0x84e23030 12 358 0 False 2018-10-23 08:29:30.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k DcomLaunch C:\Windows\system32\svchost.exe
** 848 484 svchost.exe 0x84e84898 20 400 0 False 2018-10-23 08:29:33.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted C:\Windows\System32\svchost.exe
*** 1992 848 dwm.exe 0x85109030 5 132 1 False 2018-10-23 08:30:04.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\dwm.exe "C:\Windows\system32\Dwm.exe" C:\Windows\system32\Dwm.exe
** 1488 484 svchost.exe 0x84f828f8 8 170 0 False 2018-10-23 08:29:44.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation C:\Windows\system32\svchost.exe
** 2032 484 SearchIndexer. 0x85164030 14 614 0 False 2018-10-23 08:30:14.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\SearchIndexer.exe C:\Windows\system32\SearchIndexer.exe /Embedding C:\Windows\system32\SearchIndexer.exe
*** 284 2032 SearchProtocol 0x8515ad20 7 235 0 False 2018-10-23 08:30:16.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\SearchProtocolHost.exe "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" C:\Windows\system32\SearchProtocolHost.exe
*** 1292 2032 SearchFilterHo 0x8515cd20 5 80 0 False 2018-10-23 08:30:17.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\SearchFilterHost.exe "C:\Windows\system32\SearchFilterHost.exe" 0 520 524 532 65536 528 C:\Windows\system32\SearchFilterHost.exe
** 1364 484 svchost.exe 0x84f4dca0 19 307 0 False 2018-10-23 08:29:43.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork C:\Windows\system32\svchost.exe
** 1460 484 svchost.exe 0x84f7d578 11 148 0 False 2018-10-23 08:29:44.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k utcsvc C:\Windows\System32\svchost.exe
** 308 484 taskhost.exe 0x850b2538 8 151 1 False 2018-10-23 08:29:55.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\taskhost.exe "taskhost.exe" C:\Windows\system32\taskhost.exe
** 1336 484 spoolsv.exe 0x84f323f8 16 295 0 False 2018-10-23 08:29:43.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\spoolsv.exe C:\Windows\System32\spoolsv.exe C:\Windows\System32\spoolsv.exe
* 492 388 lsass.exe 0x84def3d8 7 480 0 False 2018-10-23 08:29:25.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\lsass.exe C:\Windows\system32\lsass.exe C:\Windows\system32\lsass.exe
424 372 winlogon.exe 0x84dcbd20 6 117 1 False 2018-10-23 08:29:23.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\winlogon.exe winlogon.exe C:\Windows\system32\winlogon.exe
324 1876 explorer.exe 0x85097870 33 827 1 False 2018-10-23 08:30:04.000000 UTC N/A \Device\HarddiskVolume2\Windows\explorer.exe C:\Windows\Explorer.EXE C:\Windows\Explorer.EXE
* 1000 324 VBoxTray.exe 0x85135af8 14 159 1 False 2018-10-23 08:30:08.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\VBoxTray.exe "C:\Windows\System32\VBoxTray.exe" C:\Windows\System32\VBoxTray.exe
* 2096 324 cmd.exe 0x851a6610 1 22 1 False 2018-10-23 08:30:18.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\cmd.exe "C:\Windows\system32\cmd.exe" C:\Windows\system32\cmd.exe
* 2412 324 DumpIt.exe 0x845a8d20 2 38 1 False 2018-10-23 08:30:48.000000 UTC N/A \Device\HarddiskVolume2\Users\hello\Desktop\DumpIt\DumpIt.exe "C:\Users\hello\Desktop\DumpIt\DumpIt.exe" C:\Users\hello\Desktop\DumpIt\DumpIt.exe
Hay una pagina en la que podemos consultar para detectar procesos no maliciosos que estan recogidos en una pagina de hacking etico
llamada HackTricks
en la que podremos investigar respecto a la informacion que nos haya volcado la herramienta si hay algun proceso sospechoso en el dump
.
URL = Info Procesos HackTricks
URL2 = Info Procesos Medium
Con esto lo que podemos hacer es descartar los procesos que vengan en estas paginas, por que van a ser lo que vienen por defecto en el sistema de un Windows
.
En la lista de procesos ya podemos ver alguno sospechoso como este:
.. 0x85109030:dwm.exe 1992 848 5 132 2018-10-23 08:30:04 UTC+0000
Tiene un nombre bastante raro y no es muy comun, o desde Volatility3
esta linea:
*** 1992 848 dwm.exe 0x85109030 5 132 1 False 2018-10-23 08:30:04.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\dwm.exe "C:\Windows\system32\Dwm.exe" C:\Windows\system32\Dwm.exe
Ahora utilizaremos el parametro pslist
que es como el anterior pero en este caso te muestra simplemente los procesos, con su PID
identificativo, etc... Tambien super importante si se tuviera el Offset Virtual
se mostraria.
Volatility2
./vol.py -f Challenge.raw --profile=Win7SP1x86_23418 pslist
Info:
Offset(V) Name PID PPID Thds Hnds Sess Wow64 Start Exit
---------- -------------------- ------ ------ ------ -------- ------ ------ ------------------------------ ------------------------------
0x83d09c58 System 4 0 85 483 ------ 0 2018-10-23 08:29:16 UTC+0000
0x8437db18 smss.exe 260 4 2 29 ------ 0 2018-10-23 08:29:16 UTC+0000
0x84d69030 csrss.exe 340 332 8 347 0 0 2018-10-23 08:29:21 UTC+0000
0x84d8d030 csrss.exe 380 372 9 188 1 0 2018-10-23 08:29:23 UTC+0000
0x84d93c68 wininit.exe 388 332 3 79 0 0 2018-10-23 08:29:23 UTC+0000
0x84dcbd20 winlogon.exe 424 372 6 117 1 0 2018-10-23 08:29:23 UTC+0000
0x84debd20 services.exe 484 388 10 191 0 0 2018-10-23 08:29:25 UTC+0000
0x84def3d8 lsass.exe 492 388 7 480 0 0 2018-10-23 08:29:25 UTC+0000
0x84df2378 lsm.exe 500 388 10 146 0 0 2018-10-23 08:29:25 UTC+0000
0x84e23030 svchost.exe 592 484 12 358 0 0 2018-10-23 08:29:30 UTC+0000
0x84e41708 VBoxService.ex 652 484 12 116 0 0 2018-10-23 08:29:31 UTC+0000
0x84e54030 svchost.exe 716 484 9 243 0 0 2018-10-23 08:29:32 UTC+0000
0x84e7ad20 svchost.exe 804 484 19 378 0 0 2018-10-23 08:29:32 UTC+0000
0x84e84898 svchost.exe 848 484 20 400 0 0 2018-10-23 08:29:33 UTC+0000
0x84e89c68 svchost.exe 872 484 19 342 0 0 2018-10-23 08:29:33 UTC+0000
0x84e8c648 svchost.exe 896 484 30 809 0 0 2018-10-23 08:29:33 UTC+0000
0x84ea7d20 audiodg.exe 988 804 6 127 0 0 2018-10-23 08:29:35 UTC+0000
0x84f033c8 svchost.exe 1192 484 15 365 0 0 2018-10-23 08:29:40 UTC+0000
0x84f323f8 spoolsv.exe 1336 484 16 295 0 0 2018-10-23 08:29:43 UTC+0000
0x84f4dca0 svchost.exe 1364 484 19 307 0 0 2018-10-23 08:29:43 UTC+0000
0x84f7d578 svchost.exe 1460 484 11 148 0 0 2018-10-23 08:29:44 UTC+0000
0x84f828f8 svchost.exe 1488 484 8 170 0 0 2018-10-23 08:29:44 UTC+0000
0x850b2538 taskhost.exe 308 484 8 151 1 0 2018-10-23 08:29:55 UTC+0000
0x850d0030 sppsvc.exe 1164 484 6 154 0 0 2018-10-23 08:29:57 UTC+0000
0x85109030 dwm.exe 1992 848 5 132 1 0 2018-10-23 08:30:04 UTC+0000
0x85097870 explorer.exe 324 1876 33 827 1 0 2018-10-23 08:30:04 UTC+0000
0x85135af8 VBoxTray.exe 1000 324 14 159 1 0 2018-10-23 08:30:08 UTC+0000
0x85164030 SearchIndexer. 2032 484 14 614 0 0 2018-10-23 08:30:14 UTC+0000
0x8515ad20 SearchProtocol 284 2032 7 235 0 0 2018-10-23 08:30:16 UTC+0000
0x8515cd20 SearchFilterHo 1292 2032 5 80 0 0 2018-10-23 08:30:17 UTC+0000
0x851a6610 cmd.exe 2096 324 1 22 1 0 2018-10-23 08:30:18 UTC+0000
0x851a5cd8 conhost.exe 2104 380 2 52 1 0 2018-10-23 08:30:18 UTC+0000
0x845a8d20 DumpIt.exe 2412 324 2 38 1 0 2018-10-23 08:30:48 UTC+0000
0x84d83d20 conhost.exe 2424 380 2 51 1 0 2018-10-23 08:30:48 UTC+0000
Volatility3
./vol.py -f Challenge.raw windows.pslist
Info:
Volatility 3 Framework 2.26.2
Progress: 100.00 PDB scanning finished
PID PPID ImageFileName Offset(V) Threads Handles SessionId Wow64 CreateTime ExitTime File output
4 0 System 0x83d09c58 85 483 N/A False 2018-10-23 08:29:16.000000 UTC N/A Disabled
260 4 smss.exe 0x8437db18 2 29 N/A False 2018-10-23 08:29:16.000000 UTC N/A Disabled
340 332 csrss.exe 0x84d69030 8 347 0 False 2018-10-23 08:29:21.000000 UTC N/A Disabled
380 372 csrss.exe 0x84d8d030 9 188 1 False 2018-10-23 08:29:23.000000 UTC N/A Disabled
388 332 wininit.exe 0x84d93c68 3 79 0 False 2018-10-23 08:29:23.000000 UTC N/A Disabled
424 372 winlogon.exe 0x84dcbd20 6 117 1 False 2018-10-23 08:29:23.000000 UTC N/A Disabled
484 388 services.exe 0x84debd20 10 191 0 False 2018-10-23 08:29:25.000000 UTC N/A Disabled
492 388 lsass.exe 0x84def3d8 7 480 0 False 2018-10-23 08:29:25.000000 UTC N/A Disabled
500 388 lsm.exe 0x84df2378 10 146 0 False 2018-10-23 08:29:25.000000 UTC N/A Disabled
592 484 svchost.exe 0x84e23030 12 358 0 False 2018-10-23 08:29:30.000000 UTC N/A Disabled
652 484 VBoxService.ex 0x84e41708 12 116 0 False 2018-10-23 08:29:31.000000 UTC N/A Disabled
716 484 svchost.exe 0x84e54030 9 243 0 False 2018-10-23 08:29:32.000000 UTC N/A Disabled
804 484 svchost.exe 0x84e7ad20 19 378 0 False 2018-10-23 08:29:32.000000 UTC N/A Disabled
848 484 svchost.exe 0x84e84898 20 400 0 False 2018-10-23 08:29:33.000000 UTC N/A Disabled
872 484 svchost.exe 0x84e89c68 19 342 0 False 2018-10-23 08:29:33.000000 UTC N/A Disabled
896 484 svchost.exe 0x84e8c648 30 809 0 False 2018-10-23 08:29:33.000000 UTC N/A Disabled
988 804 audiodg.exe 0x84ea7d20 6 127 0 False 2018-10-23 08:29:35.000000 UTC N/A Disabled
1192 484 svchost.exe 0x84f033c8 15 365 0 False 2018-10-23 08:29:40.000000 UTC N/A Disabled
1336 484 spoolsv.exe 0x84f323f8 16 295 0 False 2018-10-23 08:29:43.000000 UTC N/A Disabled
1364 484 svchost.exe 0x84f4dca0 19 307 0 False 2018-10-23 08:29:43.000000 UTC N/A Disabled
1460 484 svchost.exe 0x84f7d578 11 148 0 False 2018-10-23 08:29:44.000000 UTC N/A Disabled
1488 484 svchost.exe 0x84f828f8 8 170 0 False 2018-10-23 08:29:44.000000 UTC N/A Disabled
308 484 taskhost.exe 0x850b2538 8 151 1 False 2018-10-23 08:29:55.000000 UTC N/A Disabled
1164 484 sppsvc.exe 0x850d0030 6 154 0 False 2018-10-23 08:29:57.000000 UTC N/A Disabled
1992 848 dwm.exe 0x85109030 5 132 1 False 2018-10-23 08:30:04.000000 UTC N/A Disabled
324 1876 explorer.exe 0x85097870 33 827 1 False 2018-10-23 08:30:04.000000 UTC N/A Disabled
1000 324 VBoxTray.exe 0x85135af8 14 159 1 False 2018-10-23 08:30:08.000000 UTC N/A Disabled
2032 484 SearchIndexer. 0x85164030 14 614 0 False 2018-10-23 08:30:14.000000 UTC N/A Disabled
284 2032 SearchProtocol 0x8515ad20 7 235 0 False 2018-10-23 08:30:16.000000 UTC N/A Disabled
1292 2032 SearchFilterHo 0x8515cd20 5 80 0 False 2018-10-23 08:30:17.000000 UTC N/A Disabled
2096 324 cmd.exe 0x851a6610 1 22 1 False 2018-10-23 08:30:18.000000 UTC N/A Disabled
2104 380 conhost.exe 0x851a5cd8 2 52 1 False 2018-10-23 08:30:18.000000 UTC N/A Disabled
2412 324 DumpIt.exe 0x845a8d20 2 38 1 False 2018-10-23 08:30:48.000000 UTC N/A Disabled
2424 380 conhost.exe 0x84d83d20 2 51 1 False 2018-10-23 08:30:48.000000 UTC N/A Disabled
Con este listado podremos ver en mas profundidad procesos que a lo mejor no veiamos antes de forma un poco mas detallada y clara.
Con el parametro psscan
podremos obtener los procesos que en ese momento se estaban ejecutando en memoria, es decir, los procesos con mayor importancia (Procesos grandes) se estaban ejecutando en ese momento.
Volatility2
./vol.py -f Challenge.raw --profile=Win7SP1x86_23418 psscan
Info:
Offset(P) Name PID PPID PDB Time created Time exited
------------------ ---------------- ------ ------ ---------- ------------------------------ ------------------------------
Volatility3
./vol.py -f Challenge.raw windows.psscan
Info:
Volatility 3 Framework 2.26.2
Progress: 100.00 PDB scanning finished
PID PPID ImageFileName Offset(V) Threads Handles SessionId Wow64 CreateTime ExitTime File output
324 1876 explorer.exe 0x3d297870 33 827 1 False 2018-10-23 08:30:04.000000 UTC N/A Disabled
308 484 taskhost.exe 0x3d2b2538 8 151 1 False 2018-10-23 08:29:55.000000 UTC N/A Disabled
1164 484 sppsvc.exe 0x3d2d0030 6 154 0 False 2018-10-23 08:29:57.000000 UTC N/A Disabled
1992 848 dwm.exe 0x3d309030 5 132 1 False 2018-10-23 08:30:04.000000 UTC N/A Disabled
1000 324 VBoxTray.exe 0x3d335af8 14 159 1 False 2018-10-23 08:30:08.000000 UTC N/A Disabled
284 2032 SearchProtocol 0x3d35ad20 7 235 0 False 2018-10-23 08:30:16.000000 UTC N/A Disabled
1292 2032 SearchFilterHo 0x3d35cd20 5 80 0 False 2018-10-23 08:30:17.000000 UTC N/A Disabled
2032 484 SearchIndexer. 0x3d364030 14 614 0 False 2018-10-23 08:30:14.000000 UTC N/A Disabled
2104 380 conhost.exe 0x3d3a5cd8 2 52 1 False 2018-10-23 08:30:18.000000 UTC N/A Disabled
2096 324 cmd.exe 0x3d3a6610 1 22 1 False 2018-10-23 08:30:18.000000 UTC N/A Disabled
1992 848 dwm.exe 0x3d3bc030 5 132 1 False 2018-10-23 08:30:04.000000 UTC N/A Disabled
1000 324 VBoxTray.exe 0x3d3e8af8 14 159 1 False 2018-10-23 08:30:08.000000 UTC N/A Disabled
592 484 svchost.exe 0x3d423030 12 358 0 False 2018-10-23 08:29:30.000000 UTC N/A Disabled
652 484 VBoxService.ex 0x3d441708 12 116 0 False 2018-10-23 08:29:31.000000 UTC N/A Disabled
716 484 svchost.exe 0x3d454030 9 243 0 False 2018-10-23 08:29:32.000000 UTC N/A Disabled
804 484 svchost.exe 0x3d47ad20 19 378 0 False 2018-10-23 08:29:32.000000 UTC N/A Disabled
848 484 svchost.exe 0x3d484898 20 400 0 False 2018-10-23 08:29:33.000000 UTC N/A Disabled
872 484 svchost.exe 0x3d489c68 19 342 0 False 2018-10-23 08:29:33.000000 UTC N/A Disabled
896 484 svchost.exe 0x3d48c648 30 809 0 False 2018-10-23 08:29:33.000000 UTC N/A Disabled
988 804 audiodg.exe 0x3d4a7d20 6 127 0 False 2018-10-23 08:29:35.000000 UTC N/A Disabled
1192 484 svchost.exe 0x3d5033c8 15 365 0 False 2018-10-23 08:29:40.000000 UTC N/A Disabled
1336 484 spoolsv.exe 0x3d5323f8 16 295 0 False 2018-10-23 08:29:43.000000 UTC N/A Disabled
1364 484 svchost.exe 0x3d54dca0 19 307 0 False 2018-10-23 08:29:43.000000 UTC N/A Disabled
1460 484 svchost.exe 0x3d57d578 11 148 0 False 2018-10-23 08:29:44.000000 UTC N/A Disabled
1488 484 svchost.exe 0x3d5828f8 8 170 0 False 2018-10-23 08:29:44.000000 UTC N/A Disabled
340 332 csrss.exe 0x3d769030 8 347 0 False 2018-10-23 08:29:21.000000 UTC N/A Disabled
2424 380 conhost.exe 0x3d783d20 2 51 1 False 2018-10-23 08:30:48.000000 UTC N/A Disabled
380 372 csrss.exe 0x3d78d030 9 188 1 False 2018-10-23 08:29:23.000000 UTC N/A Disabled
388 332 wininit.exe 0x3d793c68 3 79 0 False 2018-10-23 08:29:23.000000 UTC N/A Disabled
424 372 winlogon.exe 0x3d7cbd20 6 117 1 False 2018-10-23 08:29:23.000000 UTC N/A Disabled
484 388 services.exe 0x3d7ebd20 10 191 0 False 2018-10-23 08:29:25.000000 UTC N/A Disabled
492 388 lsass.exe 0x3d7ef3d8 7 480 0 False 2018-10-23 08:29:25.000000 UTC N/A Disabled
500 388 lsm.exe 0x3d7f2378 10 146 0 False 2018-10-23 08:29:25.000000 UTC N/A Disabled
2412 324 DumpIt.exe 0x3dfa8d20 2 38 1 False 2018-10-23 08:30:48.000000 UTC N/A Disabled
260 4 smss.exe 0x3e17db18 2 29 N/A False 2018-10-23 08:29:16.000000 UTC N/A Disabled
4 0 System 0x3e7b3c58 85 483 N/A False 2018-10-23 08:29:16.000000 UTC N/A Disabled
En este caso con la v2
de volatility
no nos detecto ningun proceso asi grande, pero con la v3
si nos detecto unos cuantos procesos, pero siguen siendo practicamente los mismos que antes, por lo que no pasa nada.
Con el parametro psxview
podremos ver si algun proceso que hemos listado antes con los anteriores parametros, estaba de forma oculta, es decir, con este parametro podremos visualizar procesos que estaban ocultos cuando se realizo el dump
.
Volatility2
./vol.py -f Challenge.raw --profile=Win7SP1x86_23418 psxview
Info:
Offset(P) Name PID pslist psscan thrdproc pspcid csrss session deskthrd ExitTime
---------- -------------------- ------ ------ ------ -------- ------ ----- ------- -------- --------
0x3d441708 VBoxService.ex 652 True False True True True True False
0x3dfa8d20 DumpIt.exe 2412 True False True True True True True
0x3d3a6610 cmd.exe 2096 True False True True True True True
0x3d3a5cd8 conhost.exe 2104 True False True True True True True
0x3d484898 svchost.exe 848 True False True True True True True
0x3d35ad20 SearchProtocol 284 True False True True True True True
0x3d7ebd20 services.exe 484 True False True True True True False
0x3d2d0030 sppsvc.exe 1164 True False True True True True True
0x3d364030 SearchIndexer. 2032 True False True True True True True
0x3d54dca0 svchost.exe 1364 True False True True True True True
0x3d7cbd20 winlogon.exe 424 True False True True True True True
0x3d454030 svchost.exe 716 True False True True True True True
0x3d5033c8 svchost.exe 1192 True False True True True True True
0x3d2b2538 taskhost.exe 308 True False True True True True True
0x3d7f2378 lsm.exe 500 True False True True True True False
0x3d4a7d20 audiodg.exe 988 True False True True True True True
0x3d48c648 svchost.exe 896 True False True True True True True
0x3d423030 svchost.exe 592 True False True True True True True
0x3d57d578 svchost.exe 1460 True False True True True True True
0x3d47ad20 svchost.exe 804 True False True True True True True
0x3d7ef3d8 lsass.exe 492 True False True True True True False
0x3d5828f8 svchost.exe 1488 True False True True True True True
0x3d35cd20 SearchFilterHo 1292 True False True True True True True
0x3d793c68 wininit.exe 388 True False True True True True True
0x3d309030 dwm.exe 1992 True False True True True True True
0x3d335af8 VBoxTray.exe 1000 True False True True True True True
0x3d297870 explorer.exe 324 True False True True True True True
0x3d489c68 svchost.exe 872 True False True True True True True
0x3d5323f8 spoolsv.exe 1336 True False True True True True True
0x3d783d20 conhost.exe 2424 True False True True True True True
0x3e7b3c58 System 4 True False True True False False False
0x3e17db18 smss.exe 260 True False True True False False False
0x3d78d030 csrss.exe 380 True False True True False True True
0x3d769030 csrss.exe 340 True False True True False True True
Volatility3
./vol.py -f Challenge.raw windows.psxview
Info:
Volatility 3 Framework 2.26.2
Offset(Virtual) Name PID pslist psscan thrdscan csrss Exit Time
0x84f7d578 svchost.exe 1460 True False True True
0x3d57d578 svchost.exe 1460 False True False False
0x3d54dca0 svchost.exe 1364 False True False False
0x84e41708 VBoxService.ex 652 True False True True
0x3d441708 VBoxService.ex 652 False True False False
0x3d35ad20 SearchProtocol 284 False True False False
0x3d35cd20 SearchFilterHo 1292 False True False False
0x3d47ad20 svchost.exe 804 False True False False
0x3d4a7d20 audiodg.exe 988 False True False False
0x3d783d20 conhost.exe 2424 False True False False
0x3d7cbd20 winlogon.exe 424 False True False False
0x851a6610 cmd.exe 2096 True False True True
0x3d3a6610 cmd.exe 2096 False True False False
0x3d7ebd20 services.exe 484 False True False False
0x3d3e8af8 VBoxTray.exe 1000 False True False False
0x8437db18 smss.exe 260 True False True False
0x84e84898 svchost.exe 848 True False True True
0x3d484898 svchost.exe 848 False True False False
0x3e17db18 smss.exe 260 False True False False
0x84dcbd20 winlogon.exe 424 True False True True
0x84debd20 services.exe 484 True False True True
0x84e7ad20 svchost.exe 804 True False True True
0x84ea7d20 audiodg.exe 988 True False True True
0x84f4dca0 svchost.exe 1364 True False True True
0x84f828f8 svchost.exe 1488 True False True True
0x8515ad20 SearchProtocol 284 True False True True
0x8515cd20 SearchFilterHo 1292 True False True True
0x845a8d20 DumpIt.exe 2412 True False True True
0x84d83d20 conhost.exe 2424 True False True True
0x3d5323f8 spoolsv.exe 1336 False True False False
0x3d5828f8 svchost.exe 1488 False True False False
0x84d69030 csrss.exe 340 True False True False
0x84d8d030 csrss.exe 380 True False True False
0x84e23030 svchost.exe 592 True False True True
0x84e54030 svchost.exe 716 True False True True
0x850d0030 sppsvc.exe 1164 True False True True
0x85109030 dwm.exe 1992 True False True True
0x85135af8 VBoxTray.exe 1000 True False True True
0x85164030 SearchIndexer. 2032 True False True True
0x850b2538 taskhost.exe 308 True False True True
0x3d2b2538 taskhost.exe 308 False True False False
0x3d335af8 VBoxTray.exe 1000 False True False False
0x84e8c648 svchost.exe 896 True False True True
0x84f033c8 svchost.exe 1192 True False True True
0x3d48c648 svchost.exe 896 False True False False
0x3d5033c8 svchost.exe 1192 False True False False
0x3dfa8d20 DumpIt.exe 2412 False True False False
0x84def3d8 lsass.exe 492 True False True True
0x83d09c58 System 4 True False True False
0x851a5cd8 conhost.exe 2104 True False True True
0x3d3a5cd8 conhost.exe 2104 False True False False
0x3d7ef3d8 lsass.exe 492 False True False False
0x3e7b3c58 System 4 False True False False
0x84d93c68 wininit.exe 388 True False True True
0x84e89c68 svchost.exe 872 True False True True
0x3d489c68 svchost.exe 872 False True False False
0x3d793c68 wininit.exe 388 False True False False
0x85097870 explorer.exe 324 True False True True
0x3d297870 explorer.exe 324 False True False False
0x3d2d0030 sppsvc.exe 1164 False True False False
0x3d309030 dwm.exe 1992 False True False False
0x84df2378 lsm.exe 500 True False True True
0x3d364030 SearchIndexer. 2032 False True False False
0x3d3bc030 dwm.exe 1992 False True False False
0x3d423030 svchost.exe 592 False True False False
0x84f323f8 spoolsv.exe 1336 True False True True
0x3d454030 svchost.exe 716 False True False False
0x3d769030 csrss.exe 340 False True False False
0x3d78d030 csrss.exe 380 False True False False
0x3d7f2378 lsm.exe 500 False True False False
Si en la parte de los comandos que hemos lanzado anteriormente como por ejemplo psscan, pslist, etc...
aparece como True
significa que no tienen ningun subproceso
oculto, por lo que con esta vista no hay nada oculto cuando se realizo el dump
en la parte de la v2
de volatility
en la columna de psscan
vemos todo en False
ya que no detecto nada anteriormente eso es un falso positivo.
Pero en la v3
si esta detectando algunos subprocesos
ocultos, que tambien pueden ser falsos positivos, pero nunca esta demas investigarlo.
Fase 3
Obtener informacion de las conexiones (IPs) dentro de los procesos
Con el parametro connscan
para la v2
, pero para la v3
seria con netscan
, lo que podremos ver sera las conexiones que ha realizado el sistema clasificando la IP
local hacia la IP
remota (IP publica
) de cualquier conexion que se haya echo, con esto podremos ver si hay alguna conexion remota sospechosa o no.
Volatility2
./vol.py -f Challenge.raw --profile=Win7SP1x86_23418 connscan
Info:
ERROR : volatility.debug : This command does not support the profile Win7SP0x86
Aqui por lo que se ve en este tipo de perfil da un error, pero si lo hacemos en la v3
de Volatility
...
Volatility3
./vol.py -f Challenge.raw windows.netscan
Info:
Volatility 3 Framework 2.26.2
Progress: 100.00 PDB scanning finished
Offset Proto LocalAddr LocalPort ForeignAddr ForeignPort State PID Owner Created
0x3d23ff58 TCPv4 0.0.0.0 49156 0.0.0.0 0 LISTENING 484 services.exe N/A
0x3d23ff58 TCPv6 :: 49156 :: 0 LISTENING 484 services.exe N/A
0x3d257308 UDPv4 0.0.0.0 0 * 0 652 VBoxService.ex 2018-10-23 08:31:02.000000 UTC
0x3d25d6a8 UDPv4 0.0.0.0 3702 * 0 1488 svchost.exe 2018-10-23 08:29:53.000000 UTC
0x3d25d6a8 UDPv6 :: 3702 * 0 1488 svchost.exe 2018-10-23 08:29:53.000000 UTC
0x3d25dc30 UDPv4 0.0.0.0 3702 * 0 1488 svchost.exe 2018-10-23 08:29:53.000000 UTC
0x3d31c310 UDPv4 0.0.0.0 0 * 0 652 VBoxService.ex 2018-10-23 08:31:07.000000 UTC
0x3d38a008 UDPv4 0.0.0.0 0 * 0 652 VBoxService.ex 2018-10-23 08:31:13.000000 UTC
0x3d3cf310 UDPv4 0.0.0.0 0 * 0 652 VBoxService.ex 2018-10-23 08:31:07.000000 UTC
0x3d435008 UDPv6 fe80::147b:c8fd:e2c6:69de 546 * 0 804 svchost.exe 2018-10-23 08:29:41.000000 UTC
0x3d43c350 UDPv4 10.0.2.15 137 * 0 4 System 2018-10-23 08:29:41.000000 UTC
0x3d43cc90 TCPv4 10.0.2.15 139 0.0.0.0 0 LISTENING 4 System N/A
0x3d43e8c0 UDPv4 10.0.2.15 138 * 0 4 System 2018-10-23 08:29:41.000000 UTC
0x3d45cf58 TCPv4 0.0.0.0 135 0.0.0.0 0 LISTENING 716 svchost.exe N/A
0x3d45cf58 TCPv6 :: 135 :: 0 LISTENING 716 svchost.exe N/A
0x3d465508 TCPv4 0.0.0.0 135 0.0.0.0 0 LISTENING 716 svchost.exe N/A
0x3d46c1a0 TCPv4 0.0.0.0 49152 0.0.0.0 0 LISTENING 388 wininit.exe N/A
0x3d46c1a0 TCPv6 :: 49152 :: 0 LISTENING 388 wininit.exe N/A
0x3d46cd28 TCPv4 0.0.0.0 49152 0.0.0.0 0 LISTENING 388 wininit.exe N/A
0x3d48b530 TCPv4 0.0.0.0 49153 0.0.0.0 0 LISTENING 804 svchost.exe N/A
0x3d48b530 TCPv6 :: 49153 :: 0 LISTENING 804 svchost.exe N/A
0x3d48d808 TCPv4 0.0.0.0 49153 0.0.0.0 0 LISTENING 804 svchost.exe N/A
0x3d507120 TCPv4 0.0.0.0 49154 0.0.0.0 0 LISTENING 492 lsass.exe N/A
0x3d508850 TCPv4 0.0.0.0 49154 0.0.0.0 0 LISTENING 492 lsass.exe N/A
0x3d508850 TCPv6 :: 49154 :: 0 LISTENING 492 lsass.exe N/A
0x3d51dd10 UDPv4 0.0.0.0 0 * 0 1192 svchost.exe 2018-10-23 08:29:41.000000 UTC
0x3d51dd10 UDPv6 :: 0 * 0 1192 svchost.exe 2018-10-23 08:29:41.000000 UTC
0x3d521a38 UDPv4 0.0.0.0 5355 * 0 1192 svchost.exe 2018-10-23 08:29:46.000000 UTC
0x3d521a38 UDPv6 :: 5355 * 0 1192 svchost.exe 2018-10-23 08:29:46.000000 UTC
0x3d52f0d0 TCPv4 0.0.0.0 49155 0.0.0.0 0 LISTENING 896 svchost.exe N/A
0x3d530d58 TCPv4 0.0.0.0 49155 0.0.0.0 0 LISTENING 896 svchost.exe N/A
0x3d530d58 TCPv6 :: 49155 :: 0 LISTENING 896 svchost.exe N/A
0x3d5be698 UDPv4 0.0.0.0 5355 * 0 1192 svchost.exe 2018-10-23 08:29:46.000000 UTC
0x3d5d3268 TCPv4 0.0.0.0 5357 0.0.0.0 0 LISTENING 4 System N/A
0x3d5d3268 TCPv6 :: 5357 :: 0 LISTENING 4 System N/A
0x3d7fb008 UDPv4 0.0.0.0 0 * 0 652 VBoxService.ex 2018-10-23 08:30:56.000000 UTC
0x3e708a70 UDPv4 0.0.0.0 3702 * 0 1488 svchost.exe 2018-10-23 08:29:53.000000 UTC
0x3e708a70 UDPv6 :: 3702 * 0 1488 svchost.exe 2018-10-23 08:29:53.000000 UTC
0x3e708e98 UDPv4 0.0.0.0 3702 * 0 1488 svchost.exe 2018-10-23 08:29:53.000000 UTC
0x3e70f570 UDPv4 0.0.0.0 55478 * 0 1488 svchost.exe 2018-10-23 08:29:49.000000 UTC
0x3e70f570 UDPv6 :: 55478 * 0 1488 svchost.exe 2018-10-23 08:29:49.000000 UTC
0x3e70fad8 UDPv4 0.0.0.0 55477 * 0 1488 svchost.exe 2018-10-23 08:29:49.000000 UTC
0x3e71fba0 TCPv4 0.0.0.0 49156 0.0.0.0 0 LISTENING 484 services.exe N/A
0x3e725008 TCPv4 0.0.0.0 445 0.0.0.0 0 LISTENING 4 System N/A
0x3e725008 TCPv6 :: 445 :: 0 LISTENING 4 System N/A
En este caso no veremos nada raro, ni extraño, pero imaginemos que este proceso nos parece extraño o sospechoso:
0x3d435008 UDPv6 fe80::147b:c8fd:e2c6:69de 546 * 0 804 svchost.exe 2018-10-23 08:29:41.000000 UTC
Podremos filtrarlo con el pstree
y con grep
de esta forma.
Volatility2
./vol.py -f Challenge.raw --profile=Win7SP1x86_23418 pstree | grep "804"
Info:
Volatility Foundation Volatility Framework 2.6.1
.. 0x84e7ad20:svchost.exe 804 484 19 378 2018-10-23 08:29:32 UTC+0000
... 0x84ea7d20:audiodg.exe 988 804 6 127 2018-10-23 08:29:35 UTC+0000
Con esto veremos que podremos filtrar en la seccion de PID
y despues utilizar pstree
para mostrarnos el proceso que tiene ese PID
junto con su árbol de procesos.
Volatility3
./vol.py -f Challenge.raw windows.pstree | grep "804"
Info:
* 2424ss380100.0conhost.exe 0x84d83d20ng fin2shed 51 1 False 2018-10-23 08:30:48.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\conhost.exe \??\C:\Windows\system32\conhost.exe "499080522-1749980471992366858-146566314551631531-193375578852495345-1447858489 C:\Windows\system32\conhost.exe
** 804 484 svchost.exe 0x84e7ad20 19 378 0 False 2018-10-23 08:29:32.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted C:\Windows\System32\svchost.exe
*** 988 804 audiodg.exe 0x84ea7d20 6 127 0 False 2018-10-23 08:29:35.000000 UTC N/A \Device\HarddiskVolume2\Windows\System32\audiodg.exe C:\Windows\system32\AUDIODG.EXE 0x2ac C:\Windows\system32\AUDIODG.EXE
De la misma forma que el anterior, pero en este caso en la v3
.
Con el parametro sockets
podremos ver las conexiones a nivel de procesos
que ha tenido el sistema en ese momento, para investigar mas a fondo esto, pero como en la v2
da un fallo o no tiene directamente la imagen sockets
no veremos nada.
Volatility2
./vol.py -f Challenge.raw --profile=Win7SP1x86_23418 sockets
Info:
ERROR : volatility.debug : This command does not support the profile Win7SP1x86_23418
Volatility3
En este caso para la v3
con el parametro windows.netscan
ya te muestra lo del comando anterior de v2
como hemos visto antes en el de v3
.
Obtener información de las instrucciones que se ha realizado en el sistema
Con el parametro cmdscan
podremos ver todas las instrucciones que se ha realizado en el sistema, tanto los comandos que se hayan ejecutado, como las ventanas de consola que se haya abierto, etc... Podremos ver todo lo que se haya ejecutando a nivel de comandos con dicho parametro.
Volatility2
./vol.py -f Challenge.raw --profile=Win7SP1x86_23418 cmdscan
Info:
**************************************************
CommandProcess: conhost.exe Pid: 2104
CommandHistory: 0x300498 Application: cmd.exe Flags: Allocated, Reset
CommandCount: 1 LastAdded: 0 LastDisplayed: 0
FirstCommand: 0 CommandCountMax: 50
ProcessHandle: 0x5c
Cmd #0 @ 0x2f43c0: C:\Python27\python.exe C:\Users\hello\Desktop\demon.py.txt
Cmd #12 @ 0x2d0039: ???
Cmd #19 @ 0x300030: ???
Cmd #22 @ 0xff818488: ?
Cmd #25 @ 0xff818488: ?
Cmd #36 @ 0x2d00c4: /?0?-???-
Cmd #37 @ 0x2fd058: 0?-????
**************************************************
CommandProcess: conhost.exe Pid: 2424
CommandHistory: 0x2b04c8 Application: DumpIt.exe Flags: Allocated
CommandCount: 0 LastAdded: -1 LastDisplayed: -1
FirstCommand: 0 CommandCountMax: 50
ProcessHandle: 0x5c
Cmd #22 @ 0xff818488: ?
Cmd #25 @ 0xff818488: ?
Cmd #36 @ 0x2800c4: *?+?(???(
Cmd #37 @ 0x2ad070: +?(????
Volatility3
./vol.py -f Challenge.raw windows.cmdscan
Con este comando dara error pero por que no soporta perfiles tan bajos a nivel de sistema operativo, en este caso es recomendable la de v2
, ya que al tratarse de un Windows
de versiones tan bajas el de v3
nos dara un error, pero para versiones altas si nos sirve.
Por lo que vemos en la salida de v2
veremos que se han registrado varios comandos a nivel de sistema y veremos bastante raro estas lineas:
Cmd #0 @ 0x2f43c0: C:\Python27\python.exe C:\Users\hello\Desktop\demon.py.txt
CommandHistory: 0x2b04c8 Application: DumpIt.exe Flags: Allocated
Por lo que ya vamos obteniendo informacion mucho mas valiosa que antes.
Con el parametro consoles
podremos ver todas las instrucciones que el usuario a ejecutado en la terminal del sistema, absolutamente todas, por lo que con ese parametro nos detalla mas la busqueda.
Volatility2
./vol.py -f Challenge.raw --profile=Win7SP1x86_23418 consoles
Info:
**************************************************
ConsoleProcess: conhost.exe Pid: 2104
Console: 0xe981c0 CommandHistorySize: 50
HistoryBufferCount: 2 HistoryBufferMax: 4
OriginalTitle: %SystemRoot%\system32\cmd.exe
Title: C:\Windows\system32\cmd.exe
AttachedProcess: cmd.exe Pid: 2096 Handle: 0x5c
----
CommandHistory: 0x300690 Application: python.exe Flags:
CommandCount: 0 LastAdded: -1 LastDisplayed: -1
FirstCommand: 0 CommandCountMax: 50
ProcessHandle: 0x0
----
CommandHistory: 0x300498 Application: cmd.exe Flags: Allocated, Reset
CommandCount: 1 LastAdded: 0 LastDisplayed: 0
FirstCommand: 0 CommandCountMax: 50
ProcessHandle: 0x5c
Cmd #0 at 0x2f43c0: C:\Python27\python.exe C:\Users\hello\Desktop\demon.py.txt
----
Screen 0x2e6368 X:80 Y:300
Dump:
Microsoft Windows [Version 6.1.7601]
Copyright (c) 2009 Microsoft Corporation. All rights reserved.
C:\Users\hello>C:\Python27\python.exe C:\Users\hello\Desktop\demon.py.txt
335d366f5d6031767631707f
C:\Users\hello>
**************************************************
ConsoleProcess: conhost.exe Pid: 2424
Console: 0xe981c0 CommandHistorySize: 50
HistoryBufferCount: 1 HistoryBufferMax: 4
OriginalTitle: C:\Users\hello\Desktop\DumpIt\DumpIt.exe
Title: C:\Users\hello\Desktop\DumpIt\DumpIt.exe
AttachedProcess: DumpIt.exe Pid: 2412 Handle: 0x5c
----
CommandHistory: 0x2b04c8 Application: DumpIt.exe Flags: Allocated
CommandCount: 0 LastAdded: -1 LastDisplayed: -1
FirstCommand: 0 CommandCountMax: 50
ProcessHandle: 0x5c
----
Screen 0x2963a0 X:80 Y:300
Dump:
DumpIt - v1.3.2.20110401 - One click memory memory dumper
Copyright (c) 2007 - 2011, Matthieu Suiche <http://www.msuiche.net>
Copyright (c) 2010 - 2011, MoonSols <http://www.moonsols.com>
Address space size: 1048510464 bytes ( 999 Mb)
Free space size: 20896800768 bytes ( 19928 Mb)
* Destination = \??\C:\Users\hello\Desktop\DumpIt\HELLO-PC-20181023-083048.r
aw
--> Are you sure you want to continue? [y/n] y
+ Processing...
Volatility3
./vol.py -f Challenge.raw windows.consoles
En esta parte de aqui pasa lo mismo de antes, si no es compatible con el profile
dara un error.
Con esta linea de la v2
podemos ver mejor que se trata del dump
de la memoria por lo que no es malicioso:
* Destination = \??\C:\Users\hello\Desktop\DumpIt\HELLO-PC-20181023-083048.r
aw
Pero en esta linea de aqui si es bastante sospechosa:
Cmd #0 at 0x2f43c0: C:\Python27\python.exe C:\Users\hello\Desktop\demon.py.txt
Con el parametro cmdline
podremos ver como una especie de agrupacion o combinacion de los comandos anteriores mostrando directamente toda la informacion de lo que se ha estado ejecutando en el sistema.
Volatility2
./vol.py -f Challenge.raw --profile=Win7SP1x86_23418 cmdline
Info:
************************************************************************
System pid: 4
************************************************************************
smss.exe pid: 260
Command line : \SystemRoot\System32\smss.exe
************************************************************************
csrss.exe pid: 340
Command line : %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,12288,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
************************************************************************
csrss.exe pid: 380
Command line : %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,12288,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
************************************************************************
wininit.exe pid: 388
Command line : wininit.exe
************************************************************************
winlogon.exe pid: 424
Command line : winlogon.exe
************************************************************************
services.exe pid: 484
Command line : C:\Windows\system32\services.exe
************************************************************************
lsass.exe pid: 492
Command line : C:\Windows\system32\lsass.exe
************************************************************************
lsm.exe pid: 500
Command line : C:\Windows\system32\lsm.exe
************************************************************************
svchost.exe pid: 592
Command line : C:\Windows\system32\svchost.exe -k DcomLaunch
************************************************************************
VBoxService.ex pid: 652
Command line : C:\Windows\System32\VBoxService.exe
************************************************************************
svchost.exe pid: 716
Command line : C:\Windows\system32\svchost.exe -k RPCSS
************************************************************************
svchost.exe pid: 804
Command line : C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
************************************************************************
svchost.exe pid: 848
Command line : C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
************************************************************************
svchost.exe pid: 872
Command line : C:\Windows\system32\svchost.exe -k LocalService
************************************************************************
svchost.exe pid: 896
Command line : C:\Windows\system32\svchost.exe -k netsvcs
************************************************************************
audiodg.exe pid: 988
Command line : C:\Windows\system32\AUDIODG.EXE 0x2ac
************************************************************************
svchost.exe pid: 1192
Command line : C:\Windows\system32\svchost.exe -k NetworkService
************************************************************************
spoolsv.exe pid: 1336
Command line : C:\Windows\System32\spoolsv.exe
************************************************************************
svchost.exe pid: 1364
Command line : C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
************************************************************************
svchost.exe pid: 1460
Command line : C:\Windows\System32\svchost.exe -k utcsvc
************************************************************************
svchost.exe pid: 1488
Command line : C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
************************************************************************
taskhost.exe pid: 308
Command line : "taskhost.exe"
************************************************************************
sppsvc.exe pid: 1164
Command line : C:\Windows\system32\sppsvc.exe
************************************************************************
dwm.exe pid: 1992
Command line : "C:\Windows\system32\Dwm.exe"
************************************************************************
explorer.exe pid: 324
Command line : C:\Windows\Explorer.EXE
************************************************************************
VBoxTray.exe pid: 1000
Command line : "C:\Windows\System32\VBoxTray.exe"
************************************************************************
SearchIndexer. pid: 2032
Command line : C:\Windows\system32\SearchIndexer.exe /Embedding
************************************************************************
SearchProtocol pid: 284
Command line : "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
************************************************************************
SearchFilterHo pid: 1292
Command line : "C:\Windows\system32\SearchFilterHost.exe" 0 520 524 532 65536 528
************************************************************************
cmd.exe pid: 2096
Command line : "C:\Windows\system32\cmd.exe"
************************************************************************
conhost.exe pid: 2104
Command line : \??\C:\Windows\system32\conhost.exe "9597847671419376088700206021-7055470871162148935-704730587-1400429052-1906668177
************************************************************************
DumpIt.exe pid: 2412
Command line : "C:\Users\hello\Desktop\DumpIt\DumpIt.exe"
************************************************************************
conhost.exe pid: 2424
Command line : \??\C:\Windows\system32\conhost.exe "499080522-1749980471992366858-146566314551631531-193375578852495345-1447858489
Volatility3
./vol.py -f Challenge.raw windows.cmdline
Info:
Volatility 3 Framework 2.26.2
Progress: 100.00 PDB scanning finished
PID Process Args
4 System -
260 smss.exe \SystemRoot\System32\smss.exe
340 csrss.exe %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,12288,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
380 csrss.exe %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,12288,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
388 wininit.exe wininit.exe
424 winlogon.exe winlogon.exe
484 services.exe C:\Windows\system32\services.exe
492 lsass.exe C:\Windows\system32\lsass.exe
500 lsm.exe C:\Windows\system32\lsm.exe
592 svchost.exe C:\Windows\system32\svchost.exe -k DcomLaunch
652 VBoxService.ex C:\Windows\System32\VBoxService.exe
716 svchost.exe C:\Windows\system32\svchost.exe -k RPCSS
804 svchost.exe C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
848 svchost.exe C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
872 svchost.exe C:\Windows\system32\svchost.exe -k LocalService
896 svchost.exe C:\Windows\system32\svchost.exe -k netsvcs
988 audiodg.exe C:\Windows\system32\AUDIODG.EXE 0x2ac
1192 svchost.exe C:\Windows\system32\svchost.exe -k NetworkService
1336 spoolsv.exe C:\Windows\System32\spoolsv.exe
1364 svchost.exe C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
1460 svchost.exe C:\Windows\System32\svchost.exe -k utcsvc
1488 svchost.exe C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
308 taskhost.exe "taskhost.exe"
1164 sppsvc.exe C:\Windows\system32\sppsvc.exe
1992 dwm.exe "C:\Windows\system32\Dwm.exe"
324 explorer.exe C:\Windows\Explorer.EXE
1000 VBoxTray.exe "C:\Windows\System32\VBoxTray.exe"
2032 SearchIndexer. C:\Windows\system32\SearchIndexer.exe /Embedding
284 SearchProtocol "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"
1292 SearchFilterHo "C:\Windows\system32\SearchFilterHost.exe" 0 520 524 532 65536 528
2096 cmd.exe "C:\Windows\system32\cmd.exe"
2104 conhost.exe \??\C:\Windows\system32\conhost.exe "9597847671419376088700206021-7055470871162148935-704730587-1400429052-1906668177
2412 DumpIt.exe "C:\Users\hello\Desktop\DumpIt\DumpIt.exe"
2424 conhost.exe \??\C:\Windows\system32\conhost.exe "499080522-1749980471992366858-146566314551631531-193375578852495345-1447858489
En este caso funciona para las 2
versiones el parametro cmdline
con este tipo de profile
.
Obtener informacion de las DLLs que estan ejecutandose dentro del sistema en ese momento
Con el parametro dlllist
podremos obtener la informacion de todas las DLLs
que se estaban ejecutando en ese momento, con esto podremos ver de forma mas detallada que procesos pueden ser maliciosos respecto a las DLLs
que estaban activas en ese momento.
Volatility2
./vol.py -f Challenge.raw --profile=Win7SP1x86_23418 dlllist
Info:
************************************************************************
System pid: 4
Unable to read PEB for task.
************************************************************************
smss.exe pid: 260
Command line : \SystemRoot\System32\smss.exe
Base Size LoadCount LoadTime Path
---------- ---------- ---------- ------------------------------ ----
0x47640000 0x13000 0xffff 1513472 \SystemRoot\System32\smss.exe
0x76e50000 0x142000 0xffff 1513600 C:\Windows\SYSTEM32\ntdll.dll
************************************************************************
csrss.exe pid: 340
Command line : %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,12288,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
Service Pack 1
Base Size LoadCount LoadTime Path
---------- ---------- ---------- ------------------------------ ----
0x4a5a0000 0x5000 0xffff 3675776 C:\Windows\system32\csrss.exe
0x76e50000 0x142000 0xffff 3675904 C:\Windows\SYSTEM32\ntdll.dll
0x74fa0000 0xd000 0xffff 3677352 C:\Windows\system32\CSRSRV.dll
0x74f90000 0xe000 0x4 3677008 C:\Windows\system32\basesrv.DLL
0x74f60000 0x2c000 0x2 3679208 C:\Windows\system32\winsrv.DLL
0x75430000 0xc9000 0xb 3678536 C:\Windows\system32\USER32.dll
0x762d0000 0x4e000 0xc 3678760 C:\Windows\system32\GDI32.dll
0x76980000 0xd5000 0x44 3678992 C:\Windows\SYSTEM32\kernel32.dll
0x75050000 0x4b000 0xe0 3679496 C:\Windows\system32\KERNELBASE.dll
0x75280000 0xa000 0x3 3679808 C:\Windows\system32\LPK.dll
0x76fe0000 0x9d000 0x3 3725264 C:\Windows\system32\USP10.dll
0x75290000 0xac000 0x3 3725464 C:\Windows\system32\msvcrt.dll
0x74f50000 0x9000 0x1 3735856 C:\Windows\system32\sxssrv.DLL
0x74ea0000 0x5f000 0x1 3741696 C:\Windows\system32\sxs.dll
0x76660000 0xa2000 0x1 3771560 C:\Windows\system32\RPCRT4.dll
0x74e90000 0xc000 0x1 3771688 C:\Windows\system32\CRYPTBASE.dll
************************************************************************
csrss.exe pid: 380
Command line : %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,12288,512 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
Service Pack 1
Base Size LoadCount LoadTime Path
---------- ---------- ---------- ------------------------------ ----
0x4a5a0000 0x5000 0xffff 2299520 C:\Windows\system32\csrss.exe
0x76e50000 0x142000 0xffff 2299648 C:\Windows\SYSTEM32\ntdll.dll
0x74fa0000 0xd000 0xffff 2301096 C:\Windows\system32\CSRSRV.dll
0x74f90000 0xe000 0x4 2300768 C:\Windows\system32\basesrv.DLL
0x74f60000 0x2c000 0x2 2302952 C:\Windows\system32\winsrv.DLL
0x75430000 0xc9000 0xb 2302280 C:\Windows\system32\USER32.dll
0x762d0000 0x4e000 0xc 2302504 C:\Windows\system32\GDI32.dll
0x76980000 0xd5000 0x63 2302736 C:\Windows\SYSTEM32\kernel32.dll
0x75050000 0x4b000 0x13a 2303240 C:\Windows\system32\KERNELBASE.dll
0x75280000 0xa000 0x3 2303552 C:\Windows\system32\LPK.dll
0x76fe0000 0x9d000 0x3 2349008 C:\Windows\system32\USP10.dll
0x75290000 0xac000 0x5 2349208 C:\Windows\system32\msvcrt.dll
0x74f50000 0x9000 0x1 2359040 C:\Windows\system32\sxssrv.DLL
0x74ea0000 0x5f000 0x1 2366704 C:\Windows\system32\sxs.dll
0x76660000 0xa2000 0x3 2400600 C:\Windows\system32\RPCRT4.dll
0x74e90000 0xc000 0x2 2400728 C:\Windows\system32\CRYPTBASE.dll
0x76380000 0xa1000 0x1 2400856 C:\Windows\system32\ADVAPI32.dll
0x762b0000 0x19000 0x4 2400984 C:\Windows\SYSTEM32\sechost.dll
************************************************************************
wininit.exe pid: 388
Command line : wininit.exe
Service Pack 1
Base Size LoadCount LoadTime Path
---------- ---------- ---------- ------------------------------ ----
0x00b20000 0x1a000 0xffff 4265048 C:\Windows\system32\wininit.exe
0x76e50000 0x142000 0xffff 4265176 C:\Windows\SYSTEM32\ntdll.dll
0x76980000 0xd5000 0xffff 4265936 C:\Windows\system32\kernel32.dll
0x75050000 0x4b000 0xffff 4266168 C:\Windows\system32\KERNELBASE.dll
0x75430000 0xc9000 0xffff 4268000 C:\Windows\system32\USER32.dll
0x762d0000 0x4e000 0xffff 4268224 C:\Windows\system32\GDI32.dll
0x75280000 0xa000 0xffff 4268512 C:\Windows\system32\LPK.dll
0x76fe0000 0x9d000 0xffff 4268832 C:\Windows\system32\USP10.dll
0x75290000 0xac000 0xffff 4269032 C:\Windows\system32\msvcrt.dll
0x76660000 0xa2000 0xffff 4314488 C:\Windows\system32\RPCRT4.dll
0x762b0000 0x19000 0xffff 4315240 C:\Windows\SYSTEM32\sechost.dll
0x74f10000 0xb000 0xffff 4314808 C:\Windows\system32\profapi.dll
0x75340000 0x1f000 0x2 4320128 C:\Windows\system32\IMM32.DLL
0x75360000 0xcd000 0x1 4319576 C:\Windows\system32\MSCTF.dll
0x74f00000 0xe000 0x1 4330104 C:\Windows\system32\RpcRtRemote.dll
0x74e40000 0x4c000 0xffff 4366168 C:\Windows\system32\apphelp.dll
0x74e90000 0xc000 0x1 4366296 C:\Windows\system32\CRYPTBASE.dll
0x76fa0000 0x35000 0x6 4366424 C:\Windows\system32\WS2_32.dll
0x76320000 0x6000 0x6 4366552 C:\Windows\system32\NSI.dll
0x74960000 0x3c000 0x3 4366680 C:\Windows\system32\mswsock.dll
0x74440000 0x5000 0x1 4366936 C:\Windows\System32\wshtcpip.dll
0x74950000 0x6000 0x1 4367192 C:\Windows\System32\wship6.dll
0x74c20000 0x8000 0x1 4367576 C:\Windows\system32\secur32.dll
0x74e20000 0x1b000 0x2 4367704 C:\Windows\system32\SSPICLI.DLL
0x74630000 0x8000 0x1 4367960 C:\Windows\system32\credssp.dll
0x76380000 0xa1000 0x1 4367832 C:\Windows\system32\ADVAPI32.dll
************************************************************************
winlogon.exe pid: 424
Command line : winlogon.exe
Service Pack 1
Base Size LoadCount LoadTime Path
---------- ---------- ---------- ------------------------------ ----
0x00bb0000 0x4c000 0xffff 2298976 C:\Windows\system32\winlogon.exe
0x76e50000 0x142000 0xffff 2299104 C:\Windows\SYSTEM32\ntdll.dll
0x76980000 0xd5000 0xffff 2299864 C:\Windows\system32\kernel32.dll
0x75050000 0x4b000 0xffff 2300096 C:\Windows\system32\KERNELBASE.dll
0x75430000 0xc9000 0xffff 2301952 C:\Windows\system32\USER32.dll
0x762d0000 0x4e000 0xffff 2302176 C:\Windows\system32\GDI32.dll
0x75280000 0xa000 0xffff 2302464 C:\Windows\system32\LPK.dll
0x76fe0000 0x9d000 0xffff 2302784 C:\Windows\system32\USP10.dll
0x75290000 0xac000 0xffff 2302984 C:\Windows\system32\msvcrt.dll
0x74f20000 0x29000 0xffff 2349112 C:\Windows\system32\WINSTA.dll
0x76660000 0xa2000 0xffff 2348440 C:\Windows\system32\RPCRT4.dll
0x75340000 0x1f000 0x2 2353880 C:\Windows\system32\IMM32.DLL
0x75360000 0xcd000 0x1 2353328 C:\Windows\system32\MSCTF.dll
0x76380000 0xa1000 0x6 2362816 C:\Windows\system32\ADVAPI32.dll
0x762b0000 0x19000 0x22 2363568 C:\Windows\SYSTEM32\sechost.dll
0x74f10000 0xb000 0x1 2363344 C:\Windows\system32\profapi.dll
0x74f00000 0xe000 0x1 2376920 C:\Windows\system32\RpcRtRemote.dll
0x74e40000 0x4c000 0xffff 2377048 C:\Windows\system32\apphelp.dll
0x72eb0000 0x8000 0x1 2377176 C:\Windows\system32\UXINIT.dll
0x73a10000 0x40000 0x3 2377944 C:\Windows\system32\UxTheme.dll
0x749a0000 0x17000 0x1 2378072 C:\Windows\system32\CRYPTSP.dll
0x74730000 0x3b000 0x1 2378200 C:\Windows\system32\rsaenh.dll
0x74e90000 0xc000 0x1 2378328 C:\Windows\system32\CRYPTBASE.dll
0x735d0000 0x130000 0x1 2378456 C:\Windows\system32\WindowsCodecs.dll
0x75500000 0x15d000 0x1 2378584 C:\Windows\system32\ole32.dll
0x73520000 0xf000 0x1 2378712 C:\Windows\system32\wkscli.dll
0x74a70000 0x2b000 0x1 2378840 C:\Windows\system32\netjoin.dll
0x73530000 0x9000 0x2 2378968 C:\Windows\system32\netutils.dll
0x74e20000 0x1b000 0x1 2379096 C:\Windows\system32\SspiCli.dll
0x730b0000 0xa000 0x1 2379224 C:\Windows\system32\slc.dll
0x74360000 0x12000 0x1 2379352 C:\Windows\system32\MPR.dll
************************************************************************
.................................<RESTO_DE_DLLs>...................................
Volatility3
./vol.py -f Challenge.raw windows.dlllist
Info:
Volatility 3 Framework 2.26.2
Progress: 100.00 PDB scanning finished
PID Process Base Size Name Path LoadTime File output
260 smss.exe 0x47640000 0x13000 smss.exe \SystemRoot\System32\smss.exe N/A Disabled
260 smss.exe 0x76e50000 0x142000 ntdll.dll C:\Windows\SYSTEM32\ntdll.dll N/A Disabled
340 csrss.exe 0x4a5a0000 0x5000 csrss.exe C:\Windows\system32\csrss.exe N/A Disabled
340 csrss.exe 0x76e50000 0x142000 ntdll.dll C:\Windows\SYSTEM32\ntdll.dll N/A Disabled
340 csrss.exe 0x74fa0000 0xd000 CSRSRV.dll C:\Windows\system32\CSRSRV.dll 2018-10-23 08:29:21.000000 UTC Disabled
340 csrss.exe 0x74f90000 0xe000 basesrv.DLL C:\Windows\system32\basesrv.DLL 2018-10-23 08:29:21.000000 UTC Disabled
340 csrss.exe 0x74f60000 0x2c000 winsrv.DLL C:\Windows\system32\winsrv.DLL 2018-10-23 08:29:22.000000 UTC Disabled
340 csrss.exe 0x75430000 0xc9000 USER32.dll C:\Windows\system32\USER32.dll 2018-10-23 08:29:22.000000 UTC Disabled
340 csrss.exe 0x762d0000 0x4e000 GDI32.dll C:\Windows\system32\GDI32.dll 2018-10-23 08:29:22.000000 UTC Disabled
340 csrss.exe 0x76980000 0xd5000 kernel32.dll C:\Windows\SYSTEM32\kernel32.dll 2018-10-23 08:29:22.000000 UTC Disabled
340 csrss.exe 0x75050000 0x4b000 KERNELBASE.dll C:\Windows\system32\KERNELBASE.dll 2018-10-23 08:29:22.000000 UTC Disabled
340 csrss.exe 0x75280000 0xa000 LPK.dll C:\Windows\system32\LPK.dll 2018-10-23 08:29:22.000000 UTC Disabled
340 csrss.exe 0x76fe0000 0x9d000 USP10.dll C:\Windows\system32\USP10.dll 2018-10-23 08:29:22.000000 UTC Disabled
340 csrss.exe 0x75290000 0xac000 msvcrt.dll C:\Windows\system32\msvcrt.dll 2018-10-23 08:29:22.000000 UTC Disabled
340 csrss.exe 0x74f50000 0x9000 sxssrv.DLL C:\Windows\system32\sxssrv.DLL 2018-10-23 08:29:23.000000 UTC Disabled
340 csrss.exe 0x74ea0000 0x5f000 sxs.dll C:\Windows\system32\sxs.dll 2018-10-23 08:29:25.000000 UTC Disabled
340 csrss.exe 0x76660000 0xa2000 RPCRT4.dll C:\Windows\system32\RPCRT4.dll 2018-10-23 08:29:25.000000 UTC Disabled
340 csrss.exe 0x74e90000 0xc000 CRYPTBASE.dll C:\Windows\system32\CRYPTBASE.dll 2018-10-23 08:29:25.000000 UTC Disabled
380 csrss.exe 0x4a5a0000 0x5000 csrss.exe C:\Windows\system32\csrss.exe N/A Disabled
380 csrss.exe 0x76e50000 0x142000 ntdll.dll C:\Windows\SYSTEM32\ntdll.dll N/A Disabled
380 csrss.exe 0x74fa0000 0xd000 CSRSRV.dll C:\Windows\system32\CSRSRV.dll 2018-10-23 08:29:23.000000 UTC Disabled
380 csrss.exe 0x74f90000 0xe000 basesrv.DLL C:\Windows\system32\basesrv.DLL 2018-10-23 08:29:23.000000 UTC Disabled
380 csrss.exe 0x74f60000 0x2c000 winsrv.DLL C:\Windows\system32\winsrv.DLL 2018-10-23 08:29:23.000000 UTC Disabled
380 csrss.exe 0x75430000 0xc9000 USER32.dll C:\Windows\system32\USER32.dll 2018-10-23 08:29:23.000000 UTC Disabled
380 csrss.exe 0x762d0000 0x4e000 GDI32.dll C:\Windows\system32\GDI32.dll 2018-10-23 08:29:23.000000 UTC Disabled
380 csrss.exe 0x76980000 0xd5000 kernel32.dll C:\Windows\SYSTEM32\kernel32.dll 2018-10-23 08:29:23.000000 UTC Disabled
380 csrss.exe 0x75050000 0x4b000 KERNELBASE.dll C:\Windows\system32\KERNELBASE.dll 2018-10-23 08:29:23.000000 UTC Disabled
380 csrss.exe 0x75280000 0xa000 LPK.dll C:\Windows\system32\LPK.dll 2018-10-23 08:29:23.000000 UTC Disabled
380 csrss.exe 0x76fe0000 0x9d000 USP10.dll C:\Windows\system32\USP10.dll 2018-10-23 08:29:23.000000 UTC Disabled
380 csrss.exe 0x75290000 0xac000 msvcrt.dll C:\Windows\system32\msvcrt.dll 2018-10-23 08:29:23.000000 UTC Disabled
380 csrss.exe 0x74f50000 0x9000 sxssrv.DLL C:\Windows\system32\sxssrv.DLL 2018-10-23 08:29:23.000000 UTC Disabled
380 csrss.exe 0x74ea0000 0x5f000 sxs.dll C:\Windows\system32\sxs.dll 2018-10-23 08:29:32.000000 UTC Disabled
380 csrss.exe 0x76660000 0xa2000 RPCRT4.dll C:\Windows\system32\RPCRT4.dll 2018-10-23 08:29:32.000000 UTC Disabled
380 csrss.exe 0x74e90000 0xc000 CRYPTBASE.dll C:\Windows\system32\CRYPTBASE.dll 2018-10-23 08:29:32.000000 UTC Disabled
380 csrss.exe 0x76380000 0xa1000 ADVAPI32.dll C:\Windows\system32\ADVAPI32.dll 2018-10-23 08:30:18.000000 UTC Disabled
380 csrss.exe 0x762b0000 0x19000 sechost.dll C:\Windows\SYSTEM32\sechost.dll 2018-10-23 08:30:18.000000 UTC Disabled
388 wininit.exe 0xb20000 0x1a000 wininit.exe C:\Windows\system32\wininit.exe N/A Disabled
388 wininit.exe 0x76e50000 0x142000 ntdll.dll C:\Windows\SYSTEM32\ntdll.dll N/A Disabled
388 wininit.exe 0x76980000 0xd5000 kernel32.dll C:\Windows\system32\kernel32.dll 2018-10-23 08:29:23.000000 UTC Disabled
388 wininit.exe 0x75050000 0x4b000 KERNELBASE.dll C:\Windows\system32\KERNELBASE.dll 2018-10-23 08:29:23.000000 UTC Disabled
388 wininit.exe 0x75430000 0xc9000 USER32.dll C:\Windows\system32\USER32.dll 2018-10-23 08:29:23.000000 UTC Disabled
388 wininit.exe 0x762d0000 0x4e000 GDI32.dll C:\Windows\system32\GDI32.dll 2018-10-23 08:29:23.000000 UTC Disabled
388 wininit.exe 0x75280000 0xa000 LPK.dll C:\Windows\system32\LPK.dll 2018-10-23 08:29:23.000000 UTC Disabled
388 wininit.exe 0x76fe0000 0x9d000 USP10.dll C:\Windows\system32\USP10.dll 2018-10-23 08:29:23.000000 UTC Disabled
388 wininit.exe 0x75290000 0xac000 msvcrt.dll C:\Windows\system32\msvcrt.dll 2018-10-23 08:29:23.000000 UTC Disabled
388 wininit.exe 0x76660000 0xa2000 RPCRT4.dll C:\Windows\system32\RPCRT4.dll 2018-10-23 08:29:23.000000 UTC Disabled
388 wininit.exe 0x762b0000 0x19000 sechost.dll C:\Windows\SYSTEM32\sechost.dll 2018-10-23 08:29:23.000000 UTC Disabled
388 wininit.exe 0x74f10000 0xb000 profapi.dll C:\Windows\system32\profapi.dll 2018-10-23 08:29:23.000000 UTC Disabled
388 wininit.exe 0x75340000 0x1f000 IMM32.DLL C:\Windows\system32\IMM32.DLL 2018-10-23 08:29:23.000000 UTC Disabled
388 wininit.exe 0x75360000 0xcd000 MSCTF.dll C:\Windows\system32\MSCTF.dll 2018-10-23 08:29:23.000000 UTC Disabled
388 wininit.exe 0x74f00000 0xe000 RpcRtRemote.dll C:\Windows\system32\RpcRtRemote.dll 2018-10-23 08:29:24.000000 UTC Disabled
388 wininit.exe 0x74e40000 0x4c000 apphelp.dll C:\Windows\system32\apphelp.dll 2018-10-23 08:29:25.000000 UTC Disabled
388 wininit.exe 0x74e90000 0xc000 CRYPTBASE.dll C:\Windows\system32\CRYPTBASE.dll 2018-10-23 08:29:30.000000 UTC Disabled
388 wininit.exe 0x76fa0000 0x35000 WS2_32.dll C:\Windows\system32\WS2_32.dll 2018-10-23 08:29:32.000000 UTC Disabled
388 wininit.exe 0x76320000 0x6000 NSI.dll C:\Windows\system32\NSI.dll 2018-10-23 08:29:32.000000 UTC Disabled
388 wininit.exe 0x74960000 0x3c000 mswsock.dll C:\Windows\system32\mswsock.dll 2018-10-23 08:29:32.000000 UTC Disabled
388 wininit.exe 0x74440000 0x5000 wshtcpip.dll C:\Windows\System32\wshtcpip.dll 2018-10-23 08:29:32.000000 UTC Disabled
388 wininit.exe 0x74950000 0x6000 wship6.dll C:\Windows\System32\wship6.dll 2018-10-23 08:29:32.000000 UTC Disabled
388 wininit.exe 0x74c20000 0x8000 secur32.dll C:\Windows\system32\secur32.dll 2018-10-23 08:29:32.000000 UTC Disabled
388 wininit.exe 0x74e20000 0x1b000 SSPICLI.DLL C:\Windows\system32\SSPICLI.DLL 2018-10-23 08:29:32.000000 UTC Disabled
388 wininit.exe 0x74630000 0x8000 credssp.dll C:\Windows\system32\credssp.dll 2018-10-23 08:29:32.000000 UTC Disabled
388 wininit.exe 0x76380000 0xa1000 ADVAPI32.dll C:\Windows\system32\ADVAPI32.dll 2018-10-23 08:29:35.000000 UTC Disabled
424 winlogon.exe 0xbb0000 0x4c000 winlogon.exe C:\Windows\system32\winlogon.exe N/A Disabled
424 winlogon.exe 0x76e50000 0x142000 ntdll.dll C:\Windows\SYSTEM32\ntdll.dll N/A Disabled
424 winlogon.exe 0x76980000 0xd5000 kernel32.dll C:\Windows\system32\kernel32.dll 2018-10-23 08:29:23.000000 UTC Disabled
424 winlogon.exe 0x75050000 0x4b000 KERNELBASE.dll C:\Windows\system32\KERNELBASE.dll 2018-10-23 08:29:23.000000 UTC Disabled
424 winlogon.exe 0x75430000 0xc9000 USER32.dll C:\Windows\system32\USER32.dll 2018-10-23 08:29:23.000000 UTC Disabled
424 winlogon.exe 0x762d0000 0x4e000 GDI32.dll C:\Windows\system32\GDI32.dll 2018-10-23 08:29:23.000000 UTC Disabled
424 winlogon.exe 0x75280000 0xa000 LPK.dll C:\Windows\system32\LPK.dll 2018-10-23 08:29:23.000000 UTC Disabled
424 winlogon.exe 0x76fe0000 0x9d000 USP10.dll C:\Windows\system32\USP10.dll 2018-10-23 08:29:23.000000 UTC Disabled
424 winlogon.exe 0x75290000 0xac000 msvcrt.dll C:\Windows\system32\msvcrt.dll 2018-10-23 08:29:23.000000 UTC Disabled
424 winlogon.exe 0x74f20000 0x29000 WINSTA.dll C:\Windows\system32\WINSTA.dll 2018-10-23 08:29:23.000000 UTC Disabled
424 winlogon.exe 0x76660000 0xa2000 RPCRT4.dll C:\Windows\system32\RPCRT4.dll 2018-10-23 08:29:23.000000 UTC Disabled
424 winlogon.exe 0x75340000 0x1f000 IMM32.DLL C:\Windows\system32\IMM32.DLL 2018-10-23 08:29:23.000000 UTC Disabled
424 winlogon.exe 0x75360000 0xcd000 MSCTF.dll C:\Windows\system32\MSCTF.dll 2018-10-23 08:29:23.000000 UTC Disabled
424 winlogon.exe 0x76380000 0xa1000 ADVAPI32.dll C:\Windows\system32\ADVAPI32.dll 2018-10-23 08:29:24.000000 UTC Disabled
424 winlogon.exe 0x762b0000 0x19000 sechost.dll C:\Windows\SYSTEM32\sechost.dll 2018-10-23 08:29:24.000000 UTC Disabled
424 winlogon.exe 0x74f10000 0xb000 profapi.dll C:\Windows\system32\profapi.dll 2018-10-23 08:29:24.000000 UTC Disabled
424 winlogon.exe 0x74f00000 0xe000 RpcRtRemote.dll C:\Windows\system32\RpcRtRemote.dll 2018-10-23 08:29:24.000000 UTC Disabled
424 winlogon.exe 0x74e40000 0x4c000 apphelp.dll C:\Windows\system32\apphelp.dll 2018-10-23 08:29:32.000000 UTC Disabled
424 winlogon.exe 0x72eb0000 0x8000 UXINIT.dll C:\Windows\system32\UXINIT.dll 2018-10-23 08:29:40.000000 UTC Disabled
424 winlogon.exe 0x73a10000 0x40000 UxTheme.dll C:\Windows\system32\UxTheme.dll 2018-10-23 08:29:40.000000 UTC Disabled
424 winlogon.exe 0x749a0000 0x17000 CRYPTSP.dll C:\Windows\system32\CRYPTSP.dll 2018-10-23 08:29:40.000000 UTC Disabled
424 winlogon.exe 0x74730000 0x3b000 rsaenh.dll C:\Windows\system32\rsaenh.dll 2018-10-23 08:29:40.000000 UTC Disabled
424 winlogon.exe 0x74e90000 0xc000 CRYPTBASE.dll C:\Windows\system32\CRYPTBASE.dll 2018-10-23 08:29:40.000000 UTC Disabled
424 winlogon.exe 0x735d0000 0x130000 WindowsCodecs.dll C:\Windows\system32\WindowsCodecs.dll 2018-10-23 08:29:40.000000 UTC Disabled
424 winlogon.exe 0x75500000 0x15d000 ole32.dll C:\Windows\system32\ole32.dll 2018-10-23 08:29:40.000000 UTC Disabled
424 winlogon.exe 0x73520000 0xf000 wkscli.dll C:\Windows\system32\wkscli.dll 2018-10-23 08:29:40.000000 UTC Disabled
424 winlogon.exe 0x74a70000 0x2b000 netjoin.dll C:\Windows\system32\netjoin.dll 2018-10-23 08:29:40.000000 UTC Disabled
424 winlogon.exe 0x73530000 0x9000 netutils.dll C:\Windows\system32\netutils.dll 2018-10-23 08:29:40.000000 UTC Disabled
424 winlogon.exe 0x74e20000 0x1b000 SspiCli.dll C:\Windows\system32\SspiCli.dll 2018-10-23 08:29:52.000000 UTC Disabled
424 winlogon.exe 0x730b0000 0xa000 slc.dll C:\Windows\system32\slc.dll 2018-10-23 08:29:55.000000 UTC Disabled
424 winlogon.exe 0x74360000 0x12000 MPR.dll C:\Windows\system32\MPR.dll 2018-10-23 08:30:04.000000 UTC Disabled
484 services.exe 0xa80000 0x41000 services.exe C:\Windows\system32\services.exe N/A Disabled
484 services.exe 0x76e50000 0x142000 ntdll.dll C:\Windows\SYSTEM32\ntdll.dll N/A Disabled
484 services.exe 0x76980000 0xd5000 kernel32.dll C:\Windows\system32\kernel32.dll 2018-10-23 08:29:25.000000 UTC Disabled
484 services.exe 0x75050000 0x4b000 KERNELBASE.dll C:\Windows\system32\KERNELBASE.dll 2018-10-23 08:29:25.000000 UTC Disabled
484 services.exe 0x75290000 0xac000 msvcrt.dll C:\Windows\system32\msvcrt.dll 2018-10-23 08:29:25.000000 UTC Disabled
484 services.exe 0x76660000 0xa2000 RPCRT4.dll C:\Windows\system32\RPCRT4.dll 2018-10-23 08:29:25.000000 UTC Disabled
484 services.exe 0x74e20000 0x1b000 SspiCli.dll C:\Windows\system32\SspiCli.dll 2018-10-23 08:29:25.000000 UTC Disabled
484 services.exe 0x74f10000 0xb000 profapi.dll C:\Windows\system32\profapi.dll 2018-10-23 08:29:25.000000 UTC Disabled
484 services.exe 0x762b0000 0x19000 sechost.dll C:\Windows\SYSTEM32\sechost.dll 2018-10-23 08:29:25.000000 UTC Disabled
484 services.exe 0x74e90000 0xc000 CRYPTBASE.dll C:\Windows\system32\CRYPTBASE.dll 2018-10-23 08:29:25.000000 UTC Disabled
484 services.exe 0x74cd0000 0xf000 scext.dll C:\Windows\system32\scext.dll 2018-10-23 08:29:25.000000 UTC Disabled
484 services.exe 0x75430000 0xc9000 USER32.dll C:\Windows\system32\USER32.dll 2018-10-23 08:29:25.000000 UTC Disabled
484 services.exe 0x762d0000 0x4e000 GDI32.dll C:\Windows\system32\GDI32.dll 2018-10-23 08:29:25.000000 UTC Disabled
484 services.exe 0x75280000 0xa000 LPK.dll C:\Windows\system32\LPK.dll 2018-10-23 08:29:25.000000 UTC Disabled
484 services.exe 0x76fe0000 0x9d000 USP10.dll C:\Windows\system32\USP10.dll 2018-10-23 08:29:25.000000 UTC Disabled
484 services.exe 0x74c20000 0x8000 Secur32.dll C:\Windows\system32\Secur32.dll 2018-10-23 08:29:26.000000 UTC Disabled
484 services.exe 0x74bd0000 0x4e000 SCESRV.dll C:\Windows\system32\SCESRV.dll 2018-10-23 08:29:26.000000 UTC Disabled
484 services.exe 0x74b40000 0x19000 srvcli.dll C:\Windows\system32\srvcli.dll 2018-10-23 08:29:26.000000 UTC Disabled
484 services.exe 0x75340000 0x1f000 IMM32.DLL C:\Windows\system32\IMM32.DLL 2018-10-23 08:29:26.000000 UTC Disabled
484 services.exe 0x75360000 0xcd000 MSCTF.dll C:\Windows\system32\MSCTF.dll 2018-10-23 08:29:26.000000 UTC Disabled
484 services.exe 0x74f00000 0xe000 RpcRtRemote.dll C:\Windows\system32\RpcRtRemote.dll 2018-10-23 08:29:30.000000 UTC Disabled
484 services.exe 0x74630000 0x8000 credssp.dll C:\Windows\system32\credssp.dll 2018-10-23 08:29:30.000000 UTC Disabled
484 services.exe 0x74b10000 0x1b000 AUTHZ.dll C:\Windows\system32\AUTHZ.dll 2018-10-23 08:29:30.000000 UTC Disabled
484 services.exe 0x74600000 0x2d000 UBPM.dll C:\Windows\system32\UBPM.dll 2018-10-23 08:29:30.000000 UTC Disabled
484 services.exe 0x76380000 0xa1000 ADVAPI32.dll C:\Windows\system32\ADVAPI32.dll 2018-10-23 08:29:30.000000 UTC Disabled
484 services.exe 0x74e40000 0x4c000 apphelp.dll C:\Windows\system32\apphelp.dll 2018-10-23 08:29:30.000000 UTC Disabled
484 services.exe 0x74430000 0xd000 WTSAPI32.dll C:\Windows\system32\WTSAPI32.dll 2018-10-23 08:29:43.000000 UTC Disabled
484 services.exe 0x74f20000 0x29000 WINSTA.dll C:\Windows\system32\WINSTA.dll 2018-10-23 08:29:43.000000 UTC Disabled
484 services.exe 0x76fa0000 0x35000 WS2_32.dll C:\Windows\system32\WS2_32.dll 2018-10-23 08:29:50.000000 UTC Disabled
484 services.exe 0x76320000 0x6000 NSI.dll C:\Windows\system32\NSI.dll 2018-10-23 08:29:50.000000 UTC Disabled
484 services.exe 0x74960000 0x3c000 mswsock.dll C:\Windows\system32\mswsock.dll 2018-10-23 08:29:50.000000 UTC Disabled
484 services.exe 0x74440000 0x5000 wshtcpip.dll C:\Windows\System32\wshtcpip.dll 2018-10-23 08:29:50.000000 UTC Disabled
484 services.exe 0x74950000 0x6000 wship6.dll C:\Windows\System32\wship6.dll 2018-10-23 08:29:50.000000 UTC Disabled
492 lsass.exe 0x5b0000 0x9000 lsass.exe C:\Windows\system32\lsass.exe N/A Disabled
492 lsass.exe 0x76e50000 0x142000 ntdll.dll C:\Windows\SYSTEM32\ntdll.dll N/A Disabled
492 lsass.exe 0x76980000 0xd5000 kernel32.dll C:\Windows\system32\kernel32.dll 2018-10-23 08:29:25.000000 UTC Disabled
492 lsass.exe 0x75050000 0x4b000 KERNELBASE.dll C:\Windows\system32\KERNELBASE.dll 2018-10-23 08:29:25.000000 UTC Disabled
492 lsass.exe 0x75290000 0xac000 msvcrt.dll C:\Windows\system32\msvcrt.dll 2018-10-23 08:29:25.000000 UTC Disabled
492 lsass.exe 0x76660000 0xa2000 RPCRT4.dll C:\Windows\system32\RPCRT4.dll 2018-10-23 08:29:25.000000 UTC Disabled
492 lsass.exe 0x74e10000 0x7000 SspiSrv.dll
.................................<RESTO_DE_DLLs>...................................
Con esto podremos ver que nos muestra muchisima informacion sobre las DLLs
.
Obtener información de un proceso malicioso dumpeando dicho proceso entero
Con el parametro memdump
junto con el PID
del proceso y la ruta donde queremos que se nos descargue la informacion, podremos volcar la informacion de ficheros o de lo que conlleve dicho proceso a nuestro host
para poder analizarlo de forma mas detallada.
Con el parametro que utilizamos de cmdline
pongamos que el proceso con PID
2096
(cmd.exe
) creemos que puede ser sospechoso, por lo que vamos a volcarlo de esta forma.
Volatility2
./vol.py -f Challenge.raw --profile=Win7SP1x86_23418 memdump -p 2096 --dump-dir .
Info:
************************************************************************
Writing cmd.exe [ 2096] to 2096.dmp
Con esto veremos que ya se nos ha realizado el dump
de dicho proceso.
Volatility3
mkdir dumps
./vol.py -f Challenge.raw -o ./dumps windows.dumpfiles --pid 2096
Info:
Volatility 3 Framework 2.26.2
Progress: 100.00 PDB scanning finished
Cache FileObject FileName Result
DataSectionObject 0x851ac410 cmd.exe.mui file.0x851ac410.0x851a9518.DataSectionObject.cmd.exe.mui.dat
ImageSectionObject 0x843d7908 KernelBase.dll file.0x843d7908.0x84d5df10.ImageSectionObject.KernelBase.dll.img
DataSectionObject 0x851a9ec8 cmd.exe.mui file.0x851a9ec8.0x851a9518.DataSectionObject.cmd.exe.mui.dat
ImageSectionObject 0x85188a80 cmd.exe file.0x85188a80.0x851a73f0.ImageSectionObject.cmd.exe.img
ImageSectionObject 0x84eb5ec8 winbrand.dll file.0x84eb5ec8.0x84eb5da0.ImageSectionObject.winbrand.dll.img
ImageSectionObject 0x84deca60 apphelp.dll file.0x84deca60.0x84dee5e8.ImageSectionObject.apphelp.dll.img
ImageSectionObject 0x844227b8 ntdll.dll file.0x844227b8.0x84374a38.ImageSectionObject.ntdll.dll.img
ImageSectionObject 0x84d0ed68 user32.dll file.0x84d0ed68.0x84d0ea58.ImageSectionObject.user32.dll.img
ImageSectionObject 0x8438b928 msvcrt.dll file.0x8438b928.0x84385798.ImageSectionObject.msvcrt.dll.img
ImageSectionObject 0x8438a7e8 lpk.dll file.0x8438a7e8.0x84385da0.ImageSectionObject.lpk.dll.img
ImageSectionObject 0x84d1dca0 imm32.dll file.0x84d1dca0.0x84383360.ImageSectionObject.imm32.dll.img
ImageSectionObject 0x84d23c80 msctf.dll file.0x84d23c80.0x84d22700.ImageSectionObject.msctf.dll.img
ImageSectionObject 0x845af548 kernel32.dll file.0x845af548.0x843e4c58.ImageSectionObject.kernel32.dll.img
ImageSectionObject 0x83d094a8 gdi32.dll file.0x83d094a8.0x83d8c0e0.ImageSectionObject.gdi32.dll.img
ImageSectionObject 0x8454f0a0 apisetschema.dll file.0x8454f0a0.0x84563d38.ImageSectionObject.apisetschema.dll.img
ImageSectionObject 0x845f74e8 usp10.dll file.0x845f74e8.0x845f5378.ImageSectionObject.usp10.dll.img
Con esto veremos que en la v3
sera con este comando, el cual nos habra volcado la informacion de dicho proceso a la carpeta dumps
.
En la parte de v2
podremos investigar el archivo dumpeado de esta forma:
strings 2096.dmp | less
Y en la parte de v3
sera de la misma forma pero con los archivos separados uno por uno.
strings file.0x851ac410.0x851a9518.DataSectionObject.cmd.exe.mui.dat | less
Y ya con esto ir viendo irregularidades dentro del proceso dumpeado.
Obtener información de los hashes de los usuarios logueados/registrados en el sistema
Con el parametro hashdump
podremos obtener un listado de hashes NTLM
de los usuarios que estan registrados o logueados en el sistema, esto en tal caso de que la imagen del dump
tuviera estos hashes
inyectados, si no, no veremos nada.
Pero para comprobar que nos va a funcionar el hashdump
podremos hacer un hivelist
para ver todos los registros que tenemos disponibles en nuestro dump
, si aparece el SAM
sabremos que si podremos obtener dichos hashes
.
Volatility2
./vol.py -f Challenge.raw --profile=Win7SP1x86_23418 hivelist
Info:
Virtual Physical Name
---------- ---------- ----
0x8780a6a8 0x251a16a8 [no name]
0x87818218 0x251e7218 \REGISTRY\MACHINE\SYSTEM
0x87838008 0x250c7008 \REGISTRY\MACHINE\HARDWARE
0x878c23b0 0x1fc543b0 \SystemRoot\System32\Config\DEFAULT
0x88575460 0x18cc1460 \SystemRoot\System32\Config\SECURITY
0x885cb3d8 0x183063d8 \SystemRoot\System32\Config\SAM
0x8f4ef008 0x20d43008 \Device\HarddiskVolume1\Boot\BCD
0x8f589510 0x20d9e510 \SystemRoot\System32\Config\SOFTWARE
0x9140b9c8 0x180ae9c8 \??\C:\Windows\ServiceProfiles\NetworkService\NTUSER.DAT
0x914619c8 0x184a79c8 \??\C:\Windows\ServiceProfiles\LocalService\NTUSER.DAT
0x9687a198 0x0d4af198 \??\C:\Users\hello\ntuser.dat
0x96923648 0x0d44d648 \??\C:\Users\hello\AppData\Local\Microsoft\Windows\UsrClass.dat
Por lo que vemos en este caso si tenemos el SAM
por lo que podremos obtener los hashes
de los usuarios.
./vol.py -f Challenge.raw --profile=Win7SP1x86_23418 hashdump
En este caso nos da un error, por que a lo mejor no es compatible, pero con ese comando tiene que funcionar.
Instalar snap volatility2
Pero si lo instalamos desde snap
en Kali Linux
.
snap install volatility-phocean
El dump
lo tenemos que copiar a nuestra carpeta /home
ya que snap
no puede acceder a ningun sitio extra de nuestra carpeta /home
.
cp /<PATH>/Challenge.raw ~/
Ahora vamos a ejecutar la herramienta de esta forma:
/snap/bin/volatility -f ~/Challenge.raw --profile=Win7SP1x86_23418 hashdump
Info:
Volatility Foundation Volatility Framework 2.6.1
Administrator:500:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
hello:1000:aad3b435b51404eeaad3b435b51404ee:101da33f44e92c27835e64322d72e8b7:::
Con esto veremos que ha funcionado de forma correcta.
Volatility3
./vol.py -f Challenge.raw windows.registry.hivelist
Info:
Volatility 3 Framework 2.26.2
Progress: 100.00 PDB scanning finished
Offset FileFullPath File output
0x8780a6a8 Disabled
0x87818218 \REGISTRY\MACHINE\SYSTEM Disabled
0x87838008 \REGISTRY\MACHINE\HARDWARE Disabled
0x878c23b0 \SystemRoot\System32\Config\DEFAULT Disabled
0x88575460 \SystemRoot\System32\Config\SECURITY Disabled
0x885cb3d8 \SystemRoot\System32\Config\SAM Disabled
0x8f4ef008 \Device\HarddiskVolume1\Boot\BCD Disabled
0x8f589510 \SystemRoot\System32\Config\SOFTWARE Disabled
0x9140b9c8 \??\C:\Windows\ServiceProfiles\NetworkService\NTUSER.DAT Disabled
0x914619c8 \??\C:\Windows\ServiceProfiles\LocalService\NTUSER.DAT Disabled
0x9687a198 \??\C:\Users\hello\ntuser.dat Disabled
0x96923648 \??\C:\Users\hello\AppData\Local\Microsoft\Windows\UsrClass.dat Disabled
Ahora para obtener el SAM
haremos lo siguiente:
./vol.py -f Challenge.raw windows.hashdump.Hashdump
En este caso tambien nos dara un error, por que a lo mejor es incompatible la memoria dumpeada o cualquier otro factor, pero con eso deberia de funcionar, tambien tenemos este otro:
./vol.py -f Challenge.raw windows.lsadump.Lsadump
En este caso es para el LSA
.
Resolver el Lab 0
Siguiendo todo lo que tenemos descubierto, ya dijimos que el proceso de demon.py.txt
era bastante sospechoso, si realizamos de nuevo el parametro consoles
para ver lo que nos muestra, veremos esta linea interesante.
C:\Users\hello>C:\Python27\python.exe C:\Users\hello\Desktop\demon.py.txt
335d366f5d6031767631707f
Estamos viendo este numero codificado:
335d366f5d6031767631707f
Esto esta en Hexadecimal
si lo intentamos decodificar veremos esto:
3]6o]`1vv1p
Veremos esto tan raro, por lo que ya dudamos en que pueda ser ese tipo de decodificacion, vamos a investigar un poco mas en las variables de entorno.
./vol.py -f Challenge.raw windows.envars
Info:
Volatility 3 Framework 2.26.2
Progress: 100.00 PDB scanning finished
PID Process Block Variable Value
260 smss.exe 0x1708c0 Path C:\Windows\System32
260 smss.exe 0x1708c0 SystemDrive C:
260 smss.exe 0x1708c0 SystemRoot C:\Windows
340 csrss.exe 0x380db0 ComSpec C:\Windows\system32\cmd.exe
340 csrss.exe 0x380db0 FP_NO_HOST_CHECK NO
340 csrss.exe 0x380db0 NUMBER_OF_PROCESSORS 1
340 csrss.exe 0x380db0 OS Windows_NT
340 csrss.exe 0x380db0 Path C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\
340 csrss.exe 0x380db0 PATHEXT .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
340 csrss.exe 0x380db0 PROCESSOR_ARCHITECTURE x86
340 csrss.exe 0x380db0 PROCESSOR_IDENTIFIER x86 Family 6 Model 142 Stepping 9, GenuineIntel
340 csrss.exe 0x380db0 PROCESSOR_LEVEL 6
340 csrss.exe 0x380db0 PROCESSOR_REVISION 8e09
340 csrss.exe 0x380db0 PSModulePath C:\Windows\system32\WindowsPowerShell\v1.0\Modules\
340 csrss.exe 0x380db0 SystemDrive C:
340 csrss.exe 0x380db0 SystemRoot C:\Windows
340 csrss.exe 0x380db0 TEMP C:\Windows\TEMP
340 csrss.exe 0x380db0 Thanos xor and password
340 csrss.exe 0x380db0 TMP C:\Windows\TEMP
340 csrss.exe 0x380db0 USERNAME SYSTEM
340 csrss.exe 0x380db0 windir C:\Windows
340 csrss.exe 0x380db0 windows_tracing_flags 3
340 csrss.exe 0x380db0 windows_tracing_logfile C:\BVTBin\Tests\installpackage\csilogfile.log
380 csrss.exe 0x230db0 ComSpec C:\Windows\system32\cmd.exe
380 csrss.exe 0x230db0 FP_NO_HOST_CHECK NO
380 csrss.exe 0x230db0 NUMBER_OF_PROCESSORS 1
380 csrss.exe 0x230db0 OS Windows_NT
380 csrss.exe 0x230db0 Path C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\
380 csrss.exe 0x230db0 PATHEXT .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC
380 csrss.exe 0x230db0 PROCESSOR_ARCHITECTURE x86
380 csrss.exe 0x230db0 PROCESSOR_IDENTIFIER x86 Family 6 Model 142 Stepping 9, GenuineIntel
380 csrss.exe 0x230db0 PROCESSOR_LEVEL 6
380 csrss.exe 0x230db0 PROCESSOR_REVISION 8e09
380 csrss.exe 0x230db0 PSModulePath C:\Windows\system32\WindowsPowerShell\v1.0\Modules\
380 csrss.exe 0x230db0 SystemDrive C:
380 csrss.exe 0x230db0 SystemRoot C:\Windows
380 csrss.exe 0x230db0 TEMP C:\Windows\TEMP
380 csrss.exe 0x230db0 Thanos xor and password
380 csrss.exe 0x230db0 TMP C:\Windows\TEMP
380 csrss.exe 0x230db0 USERNAME SYSTEM
380 csrss.exe 0x230db0 windir C:\Windows
380 csrss.exe 0x230db0 windows_tracing_flags 3
380 csrss.exe 0x230db0 windows_tracing_logfile C:\BVTBin\Tests\installpackage\csilogfile.log
...............................<RESTO_DE_LOGS>.....................................
Si vemos en esos primeros procesos nos viene uno bastante raro llamado Thanos
como variable de entorno y que contiene lo siguiente:
340 csrss.exe 0x380db0 Thanos xor and password
Vemos que esta mencionando la codificacion de XOR
por lo que vamos a probar a decodificar el numero de antes en XOR
, a ver que vemos.
Vamos a montarnos un script.
decode_XOR.py
# Hexadecimal a texto y prueba todas las claves XOR posibles
# Hex string
hex_data = "335d366f5d6031767631707f"
# Convertir de hex a bytes
decoded_bytes = bytes.fromhex(hex_data)
print("[*] Texto decodificado del hex (sin XOR):")
print(decoded_bytes.decode(errors="ignore"))
print("\n[*] Probando todas las claves XOR posibles:\n")
# Probar todas las claves XOR (0-255)
for key in range(256):
xor_decoded = bytes([b ^ key for b in decoded_bytes])
try:
# Intentar decodificar como texto legible
text = xor_decoded.decode("utf-8")
except UnicodeDecodeError:
# Ignorar claves que no producen texto legible
continue
print(f"Clave XOR {key:02x}: {text}")
Hay que probar las 255
posibilidades de resultados y quedarnos con la que tenga un texto aparentemente normal.
python3 decode_XOR.py
Info:
[*] Texto decodificado del hex (sin XOR):
3]6o]`1vv1p
[*] Probando todas las claves XOR posibles:
Clave XOR 00: 3]6o]`1vv1p
Clave XOR 01: 2\7n\a0ww0q~
Clave XOR 02: 1_4m_b3tt3r}
Clave XOR 03: 0^5l^c2uu2s|
Clave XOR 04: 7Y2kYd5rr5t{
Clave XOR 05: 6X3jXe4ss4uz
Clave XOR 06: 5[0i[f7pp7vy
Clave XOR 07: 4Z1hZg6qq6wx
Clave XOR 08: ;U>gUh9~~9xw
Clave XOR 09: :T?fTi88yv
Clave XOR 0a: 9W<eWj;||;zu
Clave XOR 0b: 8V=dVk:}}:{t
Clave XOR 0c: ?Q:cQl=zz=|s
Clave XOR 0d: >P;bPm<{{<}r
Clave XOR 0e: =S8aSn?xx?~q
Clave XOR 0f: <R9`Ro>yy>p
Clave XOR 10: #M&Mp!ff!`o
Clave XOR 11: "L'~Lq gg an
Clave XOR 12: !O$}Or#dd#bm
Clave XOR 13: N%|Ns"ee"cl
Clave XOR 14: 'I"{It%bb%dk
Clave XOR 15: &H#zHu$cc$ej
Clave XOR 16: %K yKv'``'fi
Clave XOR 17: $J!xJw&aa&gh
Clave XOR 18: +E.wEx)nn)hg
Clave XOR 19: *D/vDy(oo(if
Clave XOR 1a: )G,uGz+ll+je
Clave XOR 1b: (F-tF{*mm*kd
Clave XOR 1c: /A*sA|-jj-lc
Clave XOR 1d: .@+r@},kk,mb
Clave XOR 1e: -C(qC~/hh/na
Clave XOR 1f: ,B)pB.ii.o`
................................<RESTO_DE_CODIGO>..................................
Vemos que la mas clara es esta linea de aqui:
Clave XOR 02: 1_4m_b3tt3r}
Pertenece al final de una flag
, tendremos que obtener la primera parte que es lo que falta, por lo que vamos a obtener los hashes
de los usuarios, a ver si esta por ahi lo que falta de forma codificada.
Si hacemos como antes para dumpearnos todos los hashes
NTLM
de esta forma:
/snap/bin/volatility -f ~/Challenge.raw --profile=Win7SP1x86_23418 hashdump
Info:
Volatility Foundation Volatility Framework 2.6.1
Administrator:500:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
Guest:501:aad3b435b51404eeaad3b435b51404ee:31d6cfe0d16ae931b73c59d7e0c089c0:::
hello:1000:aad3b435b51404eeaad3b435b51404ee:101da33f44e92c27835e64322d72e8b7:::
Veremos que hay un usuario que no viene por defecto llamado hello
, vamos a intentar crackear
dicha contraseña con el hash NTLM
.
URL = Crack Hash Page
Si metemos simplemente el NT
para ver que encuentra, veremos lo siguiente:
flag{you_are_good_but

Ahora si juntamos las 2
partes que tenemos para formar la flag
nos quedara asi:
flag{you_are_good_but1_4m_b3tt3r}
Con esto ya habremos obtenido bien toda la informacion.
Last updated