MemLabs-logo

LabChallenge linkdifficultyWriteup link
Lab 1Beginner’s LuckEasyLab 1
Lab 2A New WorldEasyLab 2
Lab 3The Evil’s DenEasy - MediumLab 3
Lab 4ObsessionMediumLab 4
Lab 5Black TuesdayMedium - HardLab 5
Lab 6The ReckoningHardLab 6

Challenge description

We received this memory dump from our client recently. Someone accessed his system when he was not
there and he found some rather strange files being accessed. Find those files and they might be useful.
I quote his exact statement,
"The names were not readable. They were composed of alphabets and numbers but 
I wasn't able to make out what exactly it was."
Also, he noticed his most loved application that he always used crashed every time he ran it. Was it a virus?
  • Note-1: This challenge is composed of 3 flags. If you think 2nd flag is the end, it isn’t!! :P

  • Note-2: There was a small mistake when making this challenge. If you find any string which has the string “L4B_3_D0n3!!” in it, please change it to “L4B_5_D0n3!!” and then proceed.

  • Note-3: You’ll get the stage 2 flag only when you have the stage 1 flag.

Writeup

Stage 1

first cheching for the profille

./volatility.exe -f MemoryDump_Lab5.raw imageinfo

lab5-1

so it’s “Win7SP1x64 " like most of the challenges when he tries to open the file the device crashed so let’s see the iehistory

./volatility.exe -f MemoryDump_Lab5.raw --profile=Win7SP1x64 iehistory

lab5-2

the first thing that poped was bmp with a base64 text

ZmxhZ3shIV93M0xMX2QwbjNfU3Q0ZzMtMV8wZl9MNEJfNV9EMG4zXyEhfQ

so let’s decode it and we got the first flag

flag{!!_w3LL_d0n3_St4g3-1_0f_L4B_5_D0n3_!!}

Stage 2

now let’s check the pslist

./volatility.exe -f MemoryDump_Lab5.raw --profile=Win7SP1x64 pslist           

there was 2 process that got my attention WinRAR and process called NOTEPAD.EXE

lab5-3

so let’s check the files for .rar

./volatility.exe -f MemoryDump_Lab5.raw --profile=Win7SP1x64 filescan |grep .rar      

lab5-4

i dumped it

./volatility.exe -f MemoryDump_Lab5.raw --profile=Win7SP1x64 dumpfiles -Q 0x000000003eed56f0 -D .

then extracted it but it was password protected but as note 3 said i must get the fist flag to get the seconed so i usedthe flag as password to extract the image

flag2

and i got the 2nd flag

flag{W1th_th1s_$taGe_2_1s_c0mPL3T3!!} 

Stage 3

The picture said that lab 5 is finished but the note said there is 3 flags and I noticed a suspicious process called “NOTEPAD.EXE” so i will do psxview to get the pid

./volatility.exe -f MemoryDump_Lab5.raw --profile=Win7SP1x64 psxview

lab5-5

let’s dump it

./volatility.exe -f MemoryDump_Lab5.raw --profile=Win7SP1x64 procdump -p 2724 -D .

I opened with IDAPro64 for analysis

lab5-6

and the flag was there

 bi0s{M3m_l4b5_OVeR_!}