Kwelwild Posted March 8, 2013 Report Posted March 8, 2013 Description: In this video I will show you how to solve Jackcr's forensic challenge using Volatility Framework.1. Who delivered the attack?"Security Department"2. Who was the attack delivered too?amirs@petro-market.orgcallb@petro-market.orgwrightd@petro-market.org3. What time was the attack delivered?Mon, 26 Nov 2012 14:00:08 -0600 via phishing email.4. What time was the attack executed?By the user callb on machine ENG-USTXHOU-148:Downloaded at Mon, 26 Nov 2012 23:01:53 UTCExecuted at Mon, 26 Nov 2012 23:01:54 UTC(from IE history fragment, verified with timeline and prefetch entry)By the user amirs on machine FLD-SARIYADH-43:Downloaded at unknown (Visited: fragment in memory without timestamp)Executed at Tue, 27 Nov 2012 00:17:58 UTC (timeline and prefetch entry)5. What is the C2 IP Address?58.64.132.1416. What is the name of the dropper?Symantec-1.43-1.exe7. What is the name of the backdoor?Gh0st8. What is the process name the backdoor is running in?svchost.exe via the injected DLL 6to4ex.dll9. What is the process id on all the machines the backdoor is installed on?ENG-USTXHOU-148 PID 1024FLD-SARIYADH-43 PID 103210. What usernames were used in this attack?callb (password Mar1ners@4655)sysbackup (password T1g3rsL10n5)11. What level of access did the attacker have?Local Administrator (via sysbackup account)12. How was lateral movement performed?cmd.exe executed via PSEXEC from ENG-USTXHOU-148 to IIS-SARIYADH-03PSEXEC was attempted against DC-USTXHOU but was not successful.13. What .bat scripts were placed on the machines?FLD-SARIYADH-43system1.batsystem2.batsystem3.batsystem4.batsystem5.batsystem6.batENG-USTXHOU-148system5.batIIS-SARIYADH-03system1.batsystem4.batsystem5.bat14. What are the contents of each .bat script?system1.bat – make the c:\windows\webuidirectory and share it as “Z” granting thesysbackup user full permissions.System2.bat – execute gs.exe and output to c:\windows\webui\svchost.dllsystem3.bat – perform a recursive directory listing of c:\*.dwg and write output toc:\windows\webui\https.dllsystem4.bat – using winrar, compress the contents of“C:\Engineering\Designs\Pumps\*.dwg” excluding *.dll, writing the resulting rar archive intoc:\WINDOWS\webui\netstat.dll using the password hclllsddlsdiddklljh.system5.bat - copies wc.exe from the c:\windows\webui\ directory into thec:\windows\system32\ directory and creates an AT task to execute it at various times.system6.bat – execute various system utilities to gather information on the network.15. What other tools were placed on the machines by the attacker?PSEXEC (ps.exe)Windows Credentials Editor (wc.exe)WinRAR (ra.exe)ScanLine (sl.exe)gsecdump (gs.exe)16. What directory was used by the attacker to drop tools?C:\WINDOWS\webui17. Was the directory newly created or was it there prior to the attack?Newly created for the attack18. What were the names of the exfiltrated files?netuse.dllsystem.dllsvchost.dllnetstat.dllhttps.dll19. What did the exfiltrated files contain?netuse.dll – output of various commands executed on ENG-USTXHOU-148 - hashes includedsystem.dll – output of various commands executed on IIS-SARIYADH-03 - no hashes includedsvchost.dll – output of hash dumping commands on IIS-SARIYADH-03https.dll – directory listing of C:\Engineering\Designs\Pumps from IIS-SARIYADH-03netstat.dll – RAR file20. What time did winrar run?Tue Nov 27 2012 01:11:19 UTC21. What is the md5sum of pump1.dwg?a48266248c04b2ba733238a480690a1c22. Which machines were compromised and need to be remediated?ENG-USTSXHOU-148FLD-SARIYADH-43IIS-SARIYADH-0323. Which user accounts were compromised and need to be remediated?callbsysbackupsaadmin24. Are there additional machines that need to be analyzed?No.25. Describe how each machine was involvedPDF: - file:///C:/Users/Administrator/Downloads/Jackcr+Forensic+Challenge+report+-+ver2-20121202-BN.pdfDisclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.Original Source: Surs?: Jackcr's Forensic Challenge Solutions With Volatility Framework Quote