MemLabs-logo

LabChallenge linkdifficultyWriteup link
Lab 1Beginner’s LuckEasyLab 1
Lab 2A New WorldEasyLab 2
Lab 3The Evil’s DenEasy - MediumLab 3
Lab 4ObsessionMediumLab 4
Lab 5Black TuesdayMedium - HardLab 5
Lab 6The ReckoningHardLab 6

Challenge description

One of the clients of our company, lost the access to his system due to an unknown error. 
He is supposedly a very popular "environmental" activist. As a part of the investigation, 
he told us that his go to applications are browsers, his password managers etc. We hope
that you can dig into this memory dump and find his important stuff and give it back to us.
  • Note: This challenge is composed of 3 flags.

Writeup

Stage 2

As always we will use imageinfo to know the profile

.\volatility.exe -f .\MemoryDump_Lab2.raw imageinfo

let’s check process

.\volatility.exe -f .\MemoryDump_Lab2.raw --profile=Win7SP1x64 pslist

lab2-1

Hmmm there is a process called (“KeePass.exe”) so after googling about it, It’s An application to save usernames and passwords and use (“.kdbx”) So let’s do file scan and grep all files that has .kdbx

.\volatility.exe -f .\MemoryDump_Lab2.raw --profile=Win7SP1x64 filescan | grep .kdbx

lab2-2

So now this is interesting (“Hidden.kdbx”) Lets extract this

.\volatility.exe -f .\MemoryDump_Lab2.raw --profile=Win7SP1x64 dumpfiles -Q 0x000000003fb112a0 -D output

lab2-3

It needs password so let’s try to grep Password in filescan

.\volatility.exe -f .\MemoryDump_Lab2.raw --profile=Win7SP1x64 filescan | grep -i Password

lab2-4

.\volatility.exe -f .\MemoryDump_Lab2.raw --profile=Win7SP1x64 dumpfiles -Q 0x000000003fce1c70 -D output

lab2-5

and here is the password:

P4SSw0rd_123 

lab2-6

And here is the flag: flag{w0w_th1s_1s_Th3_SeC0nD_ST4g3_!!} But we noticed that this is the 2nd stage flag lol :D So let’s search for the first stage flag.

Stage 1

Lets check the history

.\volatility.exe -f .\MemoryDump_Lab2.raw --profile=Win7SP1x64 envars

lab2-7 There is a base 64 encoded string

ZmxhZ3t3M2xjMG0zX1QwXyRUNGczXyFfT2ZfTDRCXzJ9

after decoding it we got the flag:

flag{w3lc0m3_T0_$T4g3_!_Of_L4B_2}

Stage 3

we are going to extract the chrome history to check it

./volatility.exe -f MemoryDump_Lab2.raw --profile=Win7SP1x64 filescan |grep '\\Chrome\\User Data\\Default\\History'

lab2-8

we are going to dump it

./volatility.exe -f MemoryDump_Lab2.raw --profile=Win7SP1x64 dumpfiles -Q 0x000000003fcfb1d0 -D .

then using “SQLiteDatabaseBrowser” to check it

lab2-9

while checking the url table there was a mega link

https://mega.nz/#F!TrgSQQTS!H0ZrUzF0B-ZKNM3y9E76lg

lab2-10

when i opened it there was a file named “Important.zip”

so i downloaded it and tried to extract the image but there is a note that says

lab2-11

Password is SHA1(stage-3-FLAG) from Lab-1. Password is in lowercase.

as we already solved the first challenge it was easy for us to get the sha1

and the password was

6045dd90029719a039fd2d2ebcca718439dd100a

in the extraxted image there was the third flag

lab2-flag3

 flag{oK_So_Now_St4g3_3_is_DoNE!!}