Home front-page port 80-shoopyuMemLabs Lab4 πŸ›‘οΈ
Post
Cancel

front-page port 80-shoopyuMemLabs Lab4 πŸ›‘οΈ

## Challenge Description

My system was recently compromised. The Hacker stole a lot of information but he also deleted a very important file of mine. I have no idea on how to recover it. The only evidence we have, at this point of time is this memory dump. Please help me.

Note: This challenge is composed of only 1 flag.

The flag format for this lab is: inctf{s0me_l33t_Str1ng}

Challenge file: MemLabs_Lab4

First we need to identify the operating system of the memory image.

1
2
$ volatility -f MemoryDump_Lab4.raw imageinfo

1

The next thing is to check running processes.

1
2
$ volatility -f MemoryDump_Lab4.raw --profile Win7SP1x64 pslist

2

The only interesting process here is StikyNot.exe (this is a rabbit hole, nothing important there).

Looking back at the challenge description, it says something about files and a deleted file. So we can use filescan to search for interesting files in memory, but for the sake of variety, I will use iehistory plugin instead.

iehistory plugin recovers fragments of IE history index.dat cache files. It can find basic accessed links (via FTP or HTTP), redirected links (–REDR), and deleted entries (–LEAK). It applies to any process which loads and uses the wininet.dll library, not just Internet Explorer. Typically that includes Windows Explorer and even malware samples.

so we can use it to view the history of visited files and directories by windows explorer.

1
2
3
4
5
6
7
8
9
10
$ volatility -f MemoryDump_Lab4.raw --profile Win7SP1x64 iehistory
..........
Process: 3012 explorer.exe
Cache type "URL " at 0x42f5000
Record length: 0x100
Location: :2019062920190630: SlimShady@file:///C:/Users/SlimShady/Desktop/Important.txt
Last modified: 2019-06-29 12:59:43 UTC+0000
Last accessed: 2019-06-29 07:29:43 UTC+0000
File Offset: 0x100, Data Offset: 0x0, Data Length: 0x0

What do we have here, a text file that looks important!!!

Now let’s scan for this file in memory to dump it out.

1
2
3
4
5
6
7
8
$ volatility -f MemoryDump_Lab4.raw --profile Win7SP1x64 filescan | grep Important.txt
Volatility Foundation Volatility Framework 2.6.1
0x000000003fc398d0     16      0 R--rw- \Device\HarddiskVolume2\Users\SlimShady\Desktop\Important.txt

$ volatility -f MemoryDump_Lab4.raw --profile Win7SP1x64 dumpfiles -Q 0x000000003fc398d0 -D lab4_output/
Volatility Foundation Volatility Framework 2.6.1
DataSectionObject 0x3fc398d0   None   \Device\HarddiskVolume2\Users\SlimShady\Desktop\Important.txt

Unfortunately, dumpfiles was not able to dump the text file (it was deleted by the hacker).

We need to know a little bit about the MFT table to solve this challenge.

  • The NTFS file system contains a file called the master file table, or MFT. There is at least one entry in the MFT for every file on an NTFS file system volume. All information about a file, including its name, size, time and date stamps, permissions, and data content, is stored either in MFT entries, or in space outside the MFT that is described by MFT entries.

  • As files are added to an NTFS file system volume, more entries are added to the MFT and the MFT increases in size. When files are deleted from an NTFS file system volume, their MFT entries are marked as free and may be reused. However, disk space that has been allocated for these entries is not reallocated, and the size of the MFT does not decrease.

  • A file whose size is less than or equal to 1024 bytes will be stored directly in the MFT table (named β€œresident” file), if it exceeds 1024 bytes the table will only contain the information of its location (named β€œnon-resident” file).

So let’s search for Important.txt in the MFT table.

1
2
$ volatility -f MemoryDump_Lab4.raw --profile Win7SP1x64 mftparser > mft.txt

3

And here it’s, the flag characters are scattered across the file, anti-strings technique :)

Flag: inctf{1_is_n0t_EQu4l_7o_2_bUt_th1s_d0s3nt_m4ke_s3ns3}




enter image description here

This post is licensed under CC BY 4.0 by the author.

front-page port 80-shoopyuMemLabs Lab3 πŸ›‘οΈ

front-page port 80-shoopyuMemLabs Lab5 πŸ›‘οΈ