đ Link to the Room
đˇď¸
đ Study Notes
- As a DFIR team member, you are tasked with analyzing a Windows workstation memory image suspected of compromise.
- This room is intended to strengthen your memory analysis skills and better understand the value of memory dumps during incident response.
Learning Objectives
- Uncover the TryHatMe breach with just a memory dump.
- Identify suspicious processes and network connections.
- Explore traces of execution and discovery actions.
- Detect signs of potential lateral movement and credential dumping.
Scenario
- The CEOâs workstation was compromised, and an attacker stole Domain Admin credentials.
- Your task is to analyze a memory dump from a high-privilege workstation (WIN-015) to identify signs of lateral movement or data exfiltration.
Â
[!NOTE]
đ Introduction to Volatility Plugin
- Volatility is a memory forensics framework.
- Plugins are its built-in analysis commands, each designed to extract specific artifacts from memory.
- a Volatility plugin is a module that tells Volatility what kind of analysis to run on a memory dump.
- Example of what plugins can do: list running processes (pslist, pstree), find hidden or injected processes (psscan), extract network connections (netscan), dump credentials or hashes (lsadump, hashdump), âŚ
- Basically when someone says that he is using a Volatily plugin, it means that heâs running a specific Volatily command to analyze one aspect of the memory image.
Â
-
in the roomâs example
vol -f WIN-015-20250522-111717.dmp windows.psscanthevolis Volatility 3 command,-f WIN-015-20250522-111717.dmis the memory dump file youâre analyzing andwindows.psscanis the Volatility 3 plugin thatâs being used. -
windows.psscanscans memory for process objects (running or terminated processes, hidden or unlinked procesess often used by malware)Â Âť this is useful when you suspect process hiding,pslistmight miss something, or you are hunting for malicious activity.Lateral Movement and Discovery
-
as a next step you are going to prove or disprove the teamâs suspicions regarding traces of the threat actorâs movement to the WIN-015 host.
Use memory analysis to identify lateral movement techniques
< will add screenshots >
Â
âThe IR team suspects that the threat actor may have performed lateral movement to this host. Which executed process provides evidence of this activity?
wmiprvse.exeâ Solution: Run (without brackets) [vol -f WIN-015-20250522-111717.dmp windows.pstree > pstree.txt], [cat pstree.txt | awk â{ print $1, $2, $3, $4 }â]
âWhat is the MITRE technique ID associated with the lateral movement method used by the threat actor?
T1021.006â Solution: https://attack.mitre.org/techniques/T1021/006/
âWhich other process was executed as part of the lateral movement activity to this host?
TeamsView.exeâ Solution: Youâll find it in a previous output.
âWhat is the Security Identifier (SID) of the user account under which the process was executed on this host?
S-1-5-21-3147497877-3647478928-1701467185-1008â Solution: Run (without brackets) [vol -f WIN-015-20250522-111717.dmp windows.getsids > getsids.txt], [cat getsids.txt | grep TeamsView.exe]
âWhat is the name of the domain-related security group the user account was a member of?
Domain Usersâ Solution: Youâll find it in a previous output.
âWhich processes related to discovery activity were executed by the threat actor on this host? Format: In alphabetical order
ipconfig.exe, systeminfo.exe, whoami.exeâ Solution: cat precooked/pslist.txt | grep 1672
âWhat is the Command and Control IP address that the threat actor connected to from this host as a result of the previously executed actions? Format: IP Address:Port
34.244.169.133:1995â Solution: cat precooked/netscan.txt | grep TeamsView
Â
## Privilege Escalation and Credential Dumping ##
- Check service-related processes for unusual behavior: Attackers may abuse misconfigured services to gain higher privileges.
-
Look at which users are running suspicious processes: Unexpected or high-privilege users can indicate misuse.
- In the room you can see examples of how to identify potential signs of privilege escalation through memory analysis:
- Detection of Malicious Process Execution 543mal.exe by running
vol -f apt41.dmp windows.pstree - Detecting privilege levels of malicious execution by running
vol -f apt41.dmp windows.getsids --pid 1612 - Detecting privilege escalation via service by running
vol -f apt41.dmp windows.pstree - Detecting privilege levels of malicious execution by running
vol -f apt41.dmp windows.getsids --pid 1531
- Detection of Malicious Process Execution 543mal.exe by running
-
In the example, the attacker initially operated under the user account michael.brown, executing 543mal.exe as a reverse shell, and later escalated privileges to svc_backup.
- The privilege escalation was achieved through service manipulation, exploiting misconfigured services present on the system and as a result, up.exe was executed.
Â
âConduct a deeper investigation and identify another suspicious process on the host. Provide a full path to the process in your answer.
C:\Windows\Temp\pan.exeâ Solution: cat precooked/cmdline.txt and search for pan.exe
âWhich account was used to execute this malicious process?
Local Systemâ Solution: cat getsids.txt | grep 4840
âWhat was the malicious command line executed by the process?
privilege::debug sekurlsa::logonpasswordsâ Solution: cat precooked/cmdline.txt | grep 4840
âGiven the command line from the previous question, which well-known hacker tool is most likely the malicious process?
Mimikatzâ Solution: You have to search web for âwhich hacker tool uses privilege::debug to enable debug privilegesâ or âWhich hacker tool uses sekurlsa::logonpasswordsâ for dumping credentials from LSASSâ
âWhich MITRE ATT&CK technique ID corresponds to the method the attacker employed to evade detection, as identified in the previous steps?
T1036â Solution: https://attack.mitre.org/techniques/T1036/
Â
Summary
- The attacker moved through the network, gained higher privileges, and stole credentials.
- Access keys may also have been taken, but this needs further investigation.
- The breach is more serious than first thought, and significant work is needed to assess the damage and restore normal operations.
Recap of what you covered:
- Detected lateral movement activity through memory artefacts.
- Investigated malicious process execution and system discovery behaviour.
- Uncovered privilege escalation and credential dumping indicators.
⨠Bonus
-
After finishing this room youâll receive Memory Sletuh Badge!