RogueOne
Description
Files
➜ 7z l .\RogueOne.zip
7-Zip 22.01 (x64) : Copyright (c) 1999-2022 Igor Pavlov : 2022-07-15
Date Time Attr Size Compressed Name
------------------- ----- ------------ ------------ ------------------------
2023-08-10 15:32:30 ....A 5368709120 1368046879 20230810.mem
------------------- ----- ------------ ------------ ------------------------
2023-08-10 15:32:30 5368709120 1368046879 1 files
➜ 7z x .\RogueOne.zip -p"hacktheblue"Tasks
Task 1. Please identify the malicious process and confirm process id of malicious process.
➜ vol.exe -f .\20230810.mem windows.malfind.Malfind | tee malfind.log
➜ cat .\malfind.log | select -First 3
Volatility 3 Framework 2.7.0
PID Process Start VPN End VPN Tag Protection CommitCharge PrivateMemory File output Notes Hexdump Disasm
➜ cat .\malfind.log | sls '\.exe'
3136 MsMpEng.exe 0x2bb32980000 0x2bb32980fff VadS PAGE_EXECUTE_READWRITE 1 1 Disabled Function prologue
3136 MsMpEng.exe 0x2bb331f0000 0x2bb331f0fff VadS PAGE_EXECUTE_READWRITE 1 1 Disabled Function prologue
3136 MsMpEng.exe 0x2bb335b0000 0x2bb335b0fff VadS PAGE_EXECUTE_READWRITE 1 1 Disabled Function prologue
3136 MsMpEng.exe 0x2bb333f0000 0x2bb333f0fff VadS PAGE_EXECUTE_READWRITE 1 1 Disabled Function prologue
3136 MsMpEng.exe 0x2bb33400000 0x2bb33401fff VadS PAGE_EXECUTE_READWRITE 2 1 Disabled Function prologue
3136 MsMpEng.exe 0x2bb33490000 0x2bb33492fff VadS PAGE_EXECUTE_READWRITE 3 1 Disabled Function prologue
3136 MsMpEng.exe 0x2bb334a0000 0x2bb334a0fff VadS PAGE_EXECUTE_READWRITE 1 1 Disabled Function prologue
3136 MsMpEng.exe 0x2bb33510000 0x2bb33511fff VadS PAGE_EXECUTE_READWRITE 2 1 Disabled Function prologue
3136 MsMpEng.exe 0x2bb335f0000 0x2bb335f7fff VadS PAGE_EXECUTE_READWRITE 8 1 Disabled Function prologue
3136 MsMpEng.exe 0x2bb34f70000 0x2bb3506ffff VadS PAGE_EXECUTE_READWRITE 256 1 Disabled Function prologue
3136 MsMpEng.exe 0x2bb360e0000 0x2bb362dffff VadS PAGE_EXECUTE_READWRITE 512 1 Disabled Function prologue
6812 svchost.exe 0x1b0000 0x1e1fff VadS PAGE_EXECUTE_READWRITE 50 1 Disabled MZ headerTask 2. The SOC team believe the malicious process may spawned another process which enabled threat actor to execute commands. What is the process ID of that child process?
Task 3. The reverse engineering team need the malicious file sample to analyze. Your SOC manager instructed you to find the hash of the file and then forward the sample to reverse engineering team. What's the md5 hash of the malicious file?
Task 4. In order to find the scope of the incident, the SOC manager has deployed a threat hunting team to sweep across the environment for any indicator of compromise. It would be a great help to the team if you are able to confirm the C2 IP address and ports so our team can utilize these in their sweep.
Task 5. We need a timeline to help us scope out the incident and help the wider DFIR team to perform root cause analysis. Can you confirm time the process was executed and C2 channel was established?
Task 6. What is the memory offset of the malicious process?
Task 7. You successfully analyzed a memory dump and received praise from your manager. The following day, your manager requests an update on the malicious file. You check VirusTotal and find that the file has already been uploaded, likely by the reverse engineering team. Your task is to determine when the sample was first submitted to VirusTotal.

Last updated