BlackEnergy Lab
Lab URL: https://cyberdefenders.org/blueteam-ctf-challenges/blackenergy/
Question 1
Which volatility profile would be best for this machine?
vol.py -f CYBERDEF-567078-20230213-171333.raw imageinfo
Answer: WinXPSP2x86
Question 2
How many processes were running when the image was acquired?
vol.py -f CYBERDEF-567078-20230213-171333.raw --profile=WinXPSP2x86 pslist
Answer: 19
Question 3
What is the process ID of cmd.exe
?
vol.py -f CYBERDEF-567078-20230213-171333.raw --profile=WinXPSP2x86 pslist |grep cmd
Answer: 1960
Question 4
What is the name of the most suspicious process?
vol.py -f CYBERDEF-567078-20230213-171333.raw --profile=WinXPSP2x86 pslist
Answer: rootkit.exe
Question 5
Which process shows the highest likelihood of code injection?
vol3 -f CYBERDEF-567078-20230213-171333.raw windows.malfind
Answer: svchost.exe
Question 6
There is an odd file referenced in the recent process. Provide the full path of that file.
vol3 -f CYBERDEF-567078-20230213-171333.raw windows.handles --pid 880 |grep -i ".sys"
Answer: C:\WINDOWS\system32\drivers\str.sys
Question 7
What is the name of the injected DLL file loaded from the recent process?
vol3 -f CYBERDEF-567078-20230213-171333.raw windows.ldrmodules --pid 880
OR
vol3 -f CYBERDEF-567078-20230213-171333.raw windows.dlllist --pid 880
Answer: msxml3r.dll
Question 8
What is the base address of the injected DLL?
vol3 -f CYBERDEF-567078-20230213-171333.raw windows.malfind --pid 880
Answer: 0x980000
Thank you for taking the time to read this write-up! I hope you found it insightful and helpful.
Keep learning and stay sharp. 👊
Keep up the good work!