Contenu

Cyberdefenders - Brave

Brave

Info

  • Category : Digital Forensics
  • SHA1SUM : fa02a505471aeb89172f89cb27dd4e2eea14bb9e
  • Published : June 20, 2021
  • Author : DFIRScience
  • Size : 1.2 GB
  • Tags : Volatility Memory Brave Winows

Unzip the challenge (pass: cyberdefenders.org)

Scenario

A memory image was taken from a seized Windows machine. Analyze the image and answer the provided questions.

Tools

  • Volatility 3
  • CertUtil
  • HxD

Questions

1 - What time was the RAM image acquired according to the suspect system ? (YYYY-MM-DD HH:MM:SS)

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
sudo vol -f 20210430-Win10Home-20H2-64bit-memdump.mem windows.info
Volatility 3 Framework 2.0.0
Progress:  100.00		PDB scanning finished                        
Variable	Value

Kernel Base	0xf8043cc00000
DTB	0x1aa000
Symbols	file:///usr/local/lib/python3.8/dist-packages/volatility3-2.0.0-py3.8.egg/volatility3/symbols/windows/ntkrnlmp.pdb/769C521E4833ECF72E21F02BF33691A5-1.json.xz
Is64Bit	True
IsPAE	False
layer_name	0 WindowsIntel32e
memory_layer	1 FileLayer
KdVersionBlock	0xf8043d80f368
Major/Minor	15.19041
MachineType	34404
KeNumberProcessors	4
SystemTime	2021-04-30 17:52:19
NtSystemRoot	C:\Windows
NtProductType	NtProductWinNt
NtMajorVersion	10
NtMinorVersion	0
PE MajorOperatingSystemVersion	10
PE MinorOperatingSystemVersion	0
PE Machine	34404
PE TimeDateStamp	Tue Oct 11 07:04:26 1977

Réponse : 2021-04-30 17:52:19

2 - What is the SHA256 hash value of the RAM image ?

1
2
sha256sum 20210430-Win10Home-20H2-64bit-memdump.mem
9db01b1e7b19a3b2113bfb65e860fffd7a1630bdf2b18613d206ebf2aa0ea172  20210430-Win10Home-20H2-64bit-memdump.mem

Réponse : 9db01b1e7b19a3b2113bfb65e860fffd7a1630bdf2b18613d206ebf2aa0ea172

3 - What is the process ID of “brave.exe” ?

1
2
3
4
5
6
sudo vol -f 20210430-Win10Home-20H2-64bit-memdump.mem windows.pstree
Volatility 3 Framework 2.0.0
Progress:  100.00		PDB scanning finished                        
PID	PPID	ImageFileName	Offset(V)	Threads	Handles	SessionId	Wow64	CreateTime	ExitTime
[...]
4856	1872	brave.exe	0xbf0f6ca782c0	0	-	1	False	2021-04-30 17:48:45.000000 	2021-04-30 17:50:56.000000 

Réponse : 4856

4 - How many established network connections were there at the time of acquisition ? (number)

1
2
sudo vol -f 20210430-Win10Home-20H2-64bit-memdump.mem windows.netscan | grep ESTABLISHED | wc -l
10

Réponse : 10

5 - What FQDN does Chrome have an established network connection with ?

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
sudo vol -f 20210430-Win10Home-20H2-64bit-memdump.mem windows.netscan | grep ESTABLISHED
0xbf0f6a53ca20.0TCPv4	10.0.2.15DB scan49833fin52.230.222.68   443     ESTABLISHED	2812	svchost.exe	2021-04-30 17:50:07.000000 
0xbf0f6ad16050	TCPv4	10.0.2.15	49829	142.250.191.208	443	ESTABLISHED	5624	svchost.exe	2021-04-30 17:49:58.000000 
0xbf0f6ad1fad0	TCPv4	10.0.2.15	49847	52.230.222.68	443	ESTABLISHED	2812	svchost.exe	2021-04-30 17:52:17.000000 
0xbf0f6c6352b0	TCPv4	10.0.2.15	49842	52.113.196.254	443	ESTABLISHED	5104	SearchApp.exe	2021-04-30 17:51:25.000000 
0xbf0f6c7104d0	TCPv4	10.0.2.15	49778	185.70.41.130	443	ESTABLISHED	1840	chrome.exe	2021-04-30 17:45:00.000000 
0xbf0f6cd4fa20	TCPv4	10.0.2.15	49837	204.79.197.200	443	ESTABLISHED	5104	SearchApp.exe	2021-04-30 17:51:18.000000 
0xbf0f6d0c64a0	TCPv4	10.0.2.15	49843	204.79.197.222	443	ESTABLISHED	5104	SearchApp.exe	2021-04-30 17:51:26.000000 
0xbf0f6d51c4a0	TCPv4	10.0.2.15	49838	13.107.3.254	443	ESTABLISHED	5104	SearchApp.exe	2021-04-30 17:51:23.000000 
0xbf0f6d525a20	TCPv4	10.0.2.15	49845	23.101.202.202	443	ESTABLISHED	1156	MsMpEng.exe	2021-04-30 17:51:36.000000 
0xe80000193a20	TCPv4	10.0.2.15	49845	23.101.202.202	443	ESTABLISHED	1156	MsMpEng.exe	2021-04-30 17:51:36.000000 

On remarque que Chrome a établis une connexion avec l’IP 185.70.41.130, on fait donc un lookup sur cette IP.

Réponse : protonmail.ch

6 - What is the MD5 hash value of process memory for PID 6988 ?

1
2
3
4
5
6
sudo vol -f 20210430-Win10Home-20H2-64bit-memdump.mem windows.pslist --pid 6988 --dump
Volatility 3 Framework 2.0.0
Progress:  100.00		PDB scanning finished                        
PID	PPID	ImageFileName	Offset(V)	Threads	Handles	SessionId	Wow64	CreateTime	ExitTime	File output

6988	4352	OneDrive.exe	0xbf0f6d4262c0	26	-	1	True	2021-04-30 17:40:01.000000 	N/A	pid.6988.0x1c0000.dmp
1
2
sudo md5sum pid.6988.0x1c0000.dmp 
0b493d8e26f03ccd2060e0be85f430af  pid.6988.0x1c0000.dmp

Réponse : 0b493d8e26f03ccd2060e0be85f430af

7 - What is the word starting at offset 0x45BE876 with a length of 6 bytes ?

Avec Ghex, on ouvre le fichier mémoire et on va à l’offset 0x45BE876 Edit > Goto Byte > 0x45BE876

2 caractères hexadécimal = 1 octet (bytes en anglais). On prend donc les 6 premiers couples de caratères hexadécimal ce qui donne hacker

Réponse : hacker

8 - What is the creation date and time of the parent process of “powershell.exe” ? (YYYY-MM-DD HH:MM:SS)

1
2
3
4
5
6
7
8
9
sudo vol -f 20210430-Win10Home-20H2-64bit-memdump.mem windows.pstree | grep -i -B 5 powershell.exe > pstree_powsershell.txt

cat pstree_powsershell.txt 
* 892	668	fontdrvhost.ex	0xbf0f6b7091c0	5	-	1	False	2021-04-30 12:39:44.000000 	N/A
* 564	668	LogonUI.exe	0xbf0f6b7b7100	0	-	1	False	2021-04-30 12:39:44.000000 	2021-04-30 17:39:58.000000 
* 4296	668	userinit.exe	0xbf0f6ca8f080	0	-	1	False	2021-04-30 17:39:48.000000 	2021-04-30 17:40:12.000000 
** 4352	4296	explorer.exe	0xbf0f6ca662c0	82	-	1	False	2021-04-30 17:39:48.000000 	N/A
*** 6884	4352	VBoxTray.exe	0xbf0f6d186080	11	-	1	False	2021-04-30 17:40:01.000000 	N/A
*** 5096	4352	powershell.exe	0xbf0f6d97f2c0	12	-	1	False	2021-04-30 17:51:19.000000 	N/A

Réponse : 2021-04-30 17:39:48

9 - What is the full path and name of the last file opened in notepad ?

1
2
3
4
sudo vol -f 20210430-Win10Home-20H2-64bit-memdump.mem windows.cmdline | grep notepad > notepad.txt

cat notepad.txt 
2520	notepad.exe	"C:\Windows\system32\NOTEPAD.EXE" C:\Users\JOHNDO~1\AppData\Local\Temp\7zO4FB31F24\accountNum

Réponse : C:\Users\JOHNDO~1\AppData\Local\Temp\7zO4FB31F24\accountNum

10 - How long did the suspect use Brave browser ? (hh:mm:ss)

1
2
3
4
5
6
7
8
9
sudo vol -f 20210430-Win10Home-20H2-64bit-memdump.mem windows.registry.userassist > userassist.log 

cat userassist.log | grep -i brave
Hive Offset	Hive Name	Path	Last Write Time	Type	Name	ID	Count	Focus Count	Time Focused	Last Updated	Raw Data
[...]
* 0xa80333cda000	\??\C:\Users\John Doe\ntuser.dat	ntuser.dat\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count	2021-04-30 17:52:18.000000 	Value	%ProgramFiles%\BraveSoftware\Temp\GUM20E0.tmp\BraveUpdate.exe	N/A	0	0	0:00:03.531000	N/A	
* 0xa80333cda000	\??\C:\Users\John Doe\ntuser.dat	ntuser.dat\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count	2021-04-30 17:52:18.000000 	Value	%ProgramFiles%\BraveSoftware\Update\BraveUpdate.exe	N/A	0	1	0:00:24.797000	N/A	
* 0xa80333cda000	\??\C:\Users\John Doe\ntuser.dat	ntuser.dat\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count	2021-04-30 17:52:18.000000 	Value	Brave	N/A	9	22	4:01:54.328000	2021-04-30 17:48:45.000000 	
* 0xa80333cda000	\??\C:\Users\John Doe\ntuser.dat	ntuser.dat\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{F4E57C4B-2036-45F0-A9AB-443BCFE33D9F}\Count	2021-04-30 17:51:18.000000 	Value	C:\Users\Public\Desktop\Brave.lnk	N/A	8	0	0:00:00.508000	2021-04-30 17:48:45.000000

Réponse : 4:01:54