HackTheBox: Export

We spotted a suspicious connection to one of our servers, and immediately took a memory dump. Can you figure out what the attackers were up to?

Information

Challenge: Export

Category:
Forensics

Difficulty:
Easy

Files : Export.zip 138 MB
– WIN-LQS146OE2S1-20201027-142607.raw 512 MB

Environment: Remnux VM

My Recommendations

Download it from hackthebox and verify it with:

sha256sum /path/to/Export.zip

SHA256SUM: 0ea5363cd1ee973de4f5d1853f4dd04a8d25f1e701e34100e0e702fb85db1796

Walkthrough

1. Memory Analysis

First, we need to find the correct Volatility profile for this memory dump:

				
					vol.py -f WIN-LQS146OE2S1-20201027-142607.raw imageinfo 
				
			

Usually the first one works:

Next, we can check the connections and try to find which one is suspicious:

				
					vol.py -f WIN-LQS146OE2S1-20201027-142607.raw --profile=Win7SP1x64 netscan
				
			

I’m going to assume that this is the attacker’s/suspicious IP in question. However, it’s all speculation, so we can move on to another plugin, such as cmdline:

				
					vol.py -f WIN-LQS146OE2S1-20201027-142607.raw --profile=Win7SP1x64 cmdline
				
			

Here we can se that a PowerShell script was Downloaded to the Start up directory. We can decode the URL, which results into the following:

The link contains a base64 encoded string… which decodes to:

				
					echo -n 'SFRCe1cxTmQwd3NfZjByM05zMUNTXzNIP30=' | base64 -d
#HTB{W1Nd0ws_f0r3Ns1CS_3H?}
				
			

Flag: HTB{W1Nd0ws_f0r3Ns1CS_3H?}

TLDR

– A straightforward memory forensics challenge. 
– Use volatility2 to find IOCs & decode the flag.

Recent Posts

Follow Us

Featured Video

Guide

Discover more from forensicskween

Subscribe now to keep reading and get access to the full archive.

Continue reading

Exit mobile version
%%footer%%