Skip to the content.

🔗 Link to the Room

🏷️

📚 Study Notes

Learning Objectives

Scenario

 

[!NOTE]

📌 Introduction to Volatility Plugin

 

Use memory analysis to identify lateral movement techniques

< will add screenshots >

 


❓The IR team suspects that the threat actor may have performed lateral movement to this host. Which executed process provides evidence of this activity?wmiprvse.exe

✅Solution: Run (without brackets) [vol -f WIN-015-20250522-111717.dmp windows.pstree > pstree.txt], [cat pstree.txt | awk ‘{ print $1, $2, $3, $4 }’]


❓What is the MITRE technique ID associated with the lateral movement method used by the threat actor?T1021.006

✅Solution: https://attack.mitre.org/techniques/T1021/006/


❓Which other process was executed as part of the lateral movement activity to this host?TeamsView.exe

✅Solution: You’ll find it in a previous output.


❓What is the Security Identifier (SID) of the user account under which the process was executed on this host?S-1-5-21-3147497877-3647478928-1701467185-1008

✅Solution: Run (without brackets) [vol -f WIN-015-20250522-111717.dmp windows.getsids > getsids.txt], [cat getsids.txt | grep TeamsView.exe]


❓What is the name of the domain-related security group the user account was a member of?Domain Users

✅Solution: You’ll find it in a previous output.


❓Which processes related to discovery activity were executed by the threat actor on this host? Format: In alphabetical orderipconfig.exe, systeminfo.exe, whoami.exe

✅Solution: cat precooked/pslist.txt | grep 1672


❓What is the Command and Control IP address that the threat actor connected to from this host as a result of the previously executed actions? Format: IP Address:Port34.244.169.133:1995

✅Solution: cat precooked/netscan.txt | grep TeamsView


 

## Privilege Escalation and Credential Dumping ##

 


❓Conduct a deeper investigation and identify another suspicious process on the host. Provide a full path to the process in your answer. C:\Windows\Temp\pan.exe

✅Solution: cat precooked/cmdline.txt and search for pan.exe


❓Which account was used to execute this malicious process? Local System

✅Solution: cat getsids.txt | grep 4840


❓What was the malicious command line executed by the process?privilege::debug sekurlsa::logonpasswords

✅Solution: cat precooked/cmdline.txt | grep 4840


❓Given the command line from the previous question, which well-known hacker tool is most likely the malicious process?Mimikatz

✅Solution: You have to search web for “which hacker tool uses privilege::debug to enable debug privileges” or “Which hacker tool uses sekurlsa::logonpasswords” for dumping credentials from LSASS”


❓Which MITRE ATT&CK technique ID corresponds to the method the attacker employed to evade detection, as identified in the previous steps?T1036

✅Solution: https://attack.mitre.org/techniques/T1036/


 

Summary

Recap of what you covered:

✨ Bonus