Memory Analysis - Ransomware

1 minute read

Lab URL: https://blueteamlabs.online/home/challenge/memory-analysis-ransomware-7da6c9244d

Question 1

Run “vol.py -f infected.vmem –profile=Win7SP1x86 psscan” that will list all processes. What is the name of the suspicious process?

vol.py -f infected.vmem --profile=Win7SP1x86 psscan

MemoryAnalysis-Ransomware

Answer: @WanaDecryptor

Question 2

What is the parent process ID for the suspicious process?

vol3 -f infected.vmem windows.pslist

MemoryAnalysis-Ransomware

Answer: 2732

Question 3

What is the initial malicious executable that created this process?

vol3 -f infected.vmem windows.cmdline

OR

vol3 -f infected.vmem windows.filescan |grep -E ".exe"

MemoryAnalysis-Ransomware

Answer: or4qtckT.exe

Question 4

If you drill down on the suspicious PID (vol.py -f infected.vmem –profile=Win7SP1x86 psscan | grep (PIDhere)), find the process used to delete files

vol.py -f infected.vmem --profile=Win7SP1x86 psscan | grep 2732

OR

vol3 -f infected.vmem windows.psscan |grep 2732

MemoryAnalysis-Ransomware

Answer: taskdl.exe

Question 5

Find the path where the malicious file was first executed.

vol3 -f infected.vmem windows.pstree

OR

vol3 -f infected.vmem windows.pstree | grep or4q

MemoryAnalysis-Ransomware

Answer: C:\Users\hacker\Desktop\or4qtckT.exe

Question 6

Can you identify what ransomware it is?

Google Search

MemoryAnalysis-Ransomware

Answer: Wanacry

Question 7

What is the filename for the file with the ransomware public key that was used to encrypt the private key? (.eky extension)

vol3 -f infected.vmem windows.filescan |grep -i ".eky"

MemoryAnalysis-Ransomware

Answer: 00000000.eky

Thank you for taking the time to read this write-up! I hope you found it insightful and helpful.

Keep learning and stay sharp. 👊

Keep up the good work!