CyberDefender - Szechuan Sauce (Part 1)

CyberDefender - Szechuan Sauce (Part 1)

Challenge: https://cyberdefenders.org/blueteam-ctf-challenges/31 Part 2: https://hackmd.io/@SBK6401/HkAbt-NXT :::spoiler TOC [TOC] :::

Scenario

An employee at a large company was assigned a task with a two-day deadline. Realizing that he could not complete the task in that timeframe, he sought help from someone else. After one day, he received a notification from that person who informed him that he had managed to finish the assignment and sent it to the employee as a test. However, the person also sent a message to the employee stating that if he wanted the completed assignment, he would have to pay $160.

The helper’s demand for payment revealed that he was actually a threat actor. The company’s digital forensics team was called in to investigate and identify the attacker, determine the extent of the attack, and assess potential data breaches. The team must analyze the employee’s computer and communication logs to prevent similar attacks in the future.

Tools

  • volatility2
  • FTK
  • Timeline Explorer
  • Wireshark
  • Registry Explorer

前提

這一題有分兩個裝置,一個是Desktop,另外一個是server,也分別對這兩個進行FTK packet和export memory,所以在分析的時候要特別注意,以下問題的順序會在這兩個裝置之間切換

==Q1==

What’s the Operating System version of the Server? (two words)

Recon

這一題是針對server,所以可以直接用volatility對server memory進行分析,或者是直接用FTK對register進行稽核 起手式

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
$ ./volatility_2.6_win64_standalone.exe -f citadeldc01.mem imageinfo
Volatility Foundation Volatility Framework 2.6
INFO    : volatility.debug    : Determining profile based on KDBG search...
          Suggested Profile(s) : Win8SP0x64, Win81U1x64, Win2012R2x64_18340, Win2012R2x64, Win2012x64, Win8SP1x64_18340, Win8SP1x64 (Instantiated with Win8SP1x64)
                     AS Layer1 : WindowsAMD64PagedMemory (Kernel AS)
                     AS Layer2 : FileAddressSpace (D:\NTU\CTF\CyberDefenders\Szechuan Sauce\citadeldc01.mem)
                      PAE type : No PAE
                           DTB : 0x1a7000L
                          KDBG : 0xf800cba9ba20L
          Number of Processors : 2
     Image Type (Service Pack) : 0
                KPCR for CPU 0 : 0xfffff800cbaea000L
                KPCR for CPU 1 : 0xffffd0019fd55000L
             KUSER_SHARED_DATA : 0xfffff78000000000L
           Image date and time : 2020-09-19 04:39:59 UTC+0000
     Image local date and time : 2020-09-18 21:39:59 -0700

:::spoiler Flag Flag: 2012 R2 :::

==Q2==

What’s the Operating System of the Desktop? (four words separated by spaces)

Recon

這一題可以參考Hunter - Part 1 - Q5,我可以直接把Software的registry export出來,然後用registry explorer查看/root/Microsoft/Windows NT/CurrentVersion就會知道==Desktop==的OS

Exploit

圖片.png

:::spoiler Flag Flag: Windows 10 Enterprise Evaluation :::

==Q3==

What was the IP address assigned to the domain controller?

Recon

可以參考Hunter - Part 1 - Q2

Exploit

就是察看Server的SYSTEM中,ControlSet001/Services/Tcpip/Parameters/Interfaces/ 圖片.png

:::spoiler Flag Flag: 10.42.85.10 :::

==Q4==

What was the timezone of the Server?

Recon

可以先參考Hunter Part 1 - Q6

Exploit

這一題很迷,先查看Server的SYSTEM的ControlSet001/Control/TimeZoneInformation/的TimeZoneKeyName是Pacific Standard Time,代表不是UTC-8就是UTC-7,但這兩個都不是答案,隨便try了以後再看hint發現,原來是Admin設定錯時區,要發現這一件事情真的很難,看了1還是一知半解,不過我試著自己操作和解釋

  1. 首先,根據hint的說明,可以知道domain controller的timezone和應該是和desktop不一樣所以才會有這樣的問題 這件事情可以從NTP(Network Time Protocol)看到,這主要是用於同步時間的protocol,所以從這些封包中可以看到他的時間是無法同步的,由此可知時間的timezone可能有問題 圖片.png

    What is NTP?

    網路時間協定(英語:Network Time Protocol,縮寫:NTP)是在資料網路潛伏時間可變的電腦系統之間通過封包交換進行時鐘同步的一個網路協定,位於OSI模型的應用層。自1985年以來,NTP是目前仍在使用的最古老的網際網路協定之一。NTP由德拉瓦大學的David L. Mills設計。

  2. 具體來說到底差多少呢?這個可以從Server的event log和封包的時間差換算,我的想法是先把sercurity event log 從server export出來,然後找到RDP的登入時間,再比對wireshark的封包比對相對的時間就可以知道正確差多少

    1. Event Log在/root/Windows/System32/winevt/Logs/中,轉換成csv檔後再用timeline explorer打開
      1
       $ ./EvtxECmd.exe -f Security.evtx --csv output
      
    2. 找到一樣的封包和event紀錄 圖片.png 可以看到event log的時間是2020-09-19 03:21:48,而封包的時間是2020-09-19 02:21:47,兩者大約差了一個小時,因為當時的月份是9月也就是還在夏令時間,所以正確的時間應該是UTC-7,也就是說封包的時間是UTC-7的結果,而server上的3點是快了一小時的結果,所以應該是UTC-6就是server上設定的時間

:::spoiler Flag Flag: UTC-6 :::

==Q5==

What was the initial entry vector (how did they get in)?. Provide protocol name.

Recon

從上一題就可以知道他是利用RDP連到domain controller

:::spoiler Flag Flag: RDP :::

==Q6==

What was the malicious process used by the malware? (one word)

Recon

這一題提到malware馬上就要想到

  1. 他怎麼傳送過去到受害主機$\to$wireshark$\to$Export Object
  2. 如果他有跑起來,可不可以直接知道是哪一支檔案$\to$memory analysis$\to$volatility$\to$pslist
  3. 如果可以dump出來就送到virustotal看

Exploit

  1. 首先我先用volatility看他執行process的狀況 :::spoiler Result
    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50
    51
    52
    53
    54
    55
    56
    57
    58
    59
    60
    61
    62
    63
    64
    65
    66
    67
    68
    69
    70
    71
    72
    73
    74
    75
    76
    77
    78
    79
    80
    81
    82
     $ ./volatility_2.6_win64_standalone.exe -f citadeldc01.mem --profile Win2012R2x64 pslist
     Volatility Foundation Volatility Framework 2.6
     Offset(V)          Name                    PID   PPID   Thds     Hnds   Sess  Wow64 Start                         Exit
     ------------------ -------------------- ------ ------ ------ -------- ------ ------ ------------------------------ ------------------------------
     0xffffe0005f273040 System                    4      0     98        0 ------      0 2020-09-19 01:22:38 UTC+0000
    
     0xffffe00060354900 smss.exe                204      4      2        0 ------      0 2020-09-19 01:22:38 UTC+0000
    
     0xffffe000602c2080 csrss.exe               324    316      8        0      0      0 2020-09-19 01:22:39 UTC+0000
    
     0xffffe000602cc900 wininit.exe             404    316      1        0      0      0 2020-09-19 01:22:40 UTC+0000
    
     0xffffe000602c1900 csrss.exe               412    396     10        0      1      0 2020-09-19 01:22:40 UTC+0000
    
     0xffffe00060c11080 services.exe            452    404      5        0      0      0 2020-09-19 01:22:40 UTC+0000
    
     0xffffe00060c0e080 lsass.exe               460    404     31        0      0      0 2020-09-19 01:22:40 UTC+0000
    
     0xffffe00060c2a080 winlogon.exe            492    396      4        0      1      0 2020-09-19 01:22:40 UTC+0000
    
     0xffffe00060c84900 svchost.exe             640    452      8        0      0      0 2020-09-19 01:22:40 UTC+0000
    
     0xffffe00060c9a700 svchost.exe             684    452      6        0      0      0 2020-09-19 01:22:40 UTC+0000
    
     0xffffe00060ca3900 svchost.exe             800    452     12        0      0      0 2020-09-19 01:22:40 UTC+0000
    
     0xffffe00060d09680 dwm.exe                 808    492      7        0      1      0 2020-09-19 01:22:40 UTC+0000
    
     0xffffe00060d1e080 svchost.exe             848    452     39        0      0      0 2020-09-19 01:22:41 UTC+0000
    
     0xffffe00060d5d500 svchost.exe             928    452     16        0      0      0 2020-09-19 01:22:41 UTC+0000
    
     0xffffe00060da2080 svchost.exe            1000    452     18        0      0      0 2020-09-19 01:22:41 UTC+0000
    
     0xffffe00060e09900 svchost.exe             668    452     16        0      0      0 2020-09-19 01:22:41 UTC+0000
    
     0xffffe00060f73900 Microsoft.Acti         1292    452      9        0      0      0 2020-09-19 01:22:57 UTC+0000
    
     0xffffe00060fe1900 dfsrs.exe              1332    452     16        0      0      0 2020-09-19 01:22:57 UTC+0000
    
     0xffffe00060ff3080 dns.exe                1368    452     16        0      0      0 2020-09-19 01:22:57 UTC+0000
    
     0xffffe00060ff7900 ismserv.exe            1392    452      6        0      0      0 2020-09-19 01:22:57 UTC+0000
    
     0xffffe000614aa200 VGAuthService.         1556    452      2        0      0      0 2020-09-19 01:22:57 UTC+0000
    
     0xffffe00061a30900 vmtoolsd.exe           1600    452      9        0      0      0 2020-09-19 01:22:57 UTC+0000
    
     0xffffe00061a9a800 wlms.exe               1644    452      2        0      0      0 2020-09-19 01:22:57 UTC+0000
    
     0xffffe00061a9b2c0 dfssvc.exe             1660    452     11        0      0      0 2020-09-19 01:22:57 UTC+0000
    
     0xffffe0006291b7c0 svchost.exe            1956    452     30        0      0      0 2020-09-19 01:23:20 UTC+0000
    
     0xffffe000629b3080 vds.exe                 796    452     11        0      0      0 2020-09-19 01:23:20 UTC+0000
    
     0xffffe000629926c0 svchost.exe            1236    452      8        0      0      0 2020-09-19 01:23:21 UTC+0000
    
     0xffffe000629de900 WmiPrvSE.exe           2056    640     11        0      0      0 2020-09-19 01:23:21 UTC+0000
    
     0xffffe00062a26900 dllhost.exe            2216    452     10        0      0      0 2020-09-19 01:23:21 UTC+0000
    
     0xffffe00062a2a900 msdtc.exe              2460    452      9        0      0      0 2020-09-19 01:23:21 UTC+0000
    
     0xffffe000631cb900 spoolsv.exe            3724    452     13        0      0      0 2020-09-19 03:29:40 UTC+0000
    
     0xffffe00062fe7700 coreupdater.ex         3644   2244      0 --------      2      0 2020-09-19 03:56:37 UTC+0000   2020-09-19 03:56:52 UTC+0000
     0xffffe00062f04900 taskhostex.exe         3796    848      7        0      1      0 2020-09-19 04:36:03 UTC+0000
    
     0xffffe00063171900 explorer.exe           3472   3960     39        0      1      0 2020-09-19 04:36:03 UTC+0000
    
     0xffffe00060ce2080 ServerManager.          400   1904     10        0      1      0 2020-09-19 04:36:03 UTC+0000
    
     0xffffe00063299280 vm3dservice.ex         3260   3472      1        0      1      0 2020-09-19 04:36:14 UTC+0000
    
     0xffffe00062ede1c0 vmtoolsd.exe           2608   3472      8        0      1      0 2020-09-19 04:36:14 UTC+0000
    
     0xffffe00063021900 FTK Imager.exe         2840   3472      9        0      1      0 2020-09-19 04:37:04 UTC+0000
    
     0xffffe0006313f900 WMIADAP.exe            3056    848      5        0      0      0 2020-09-19 04:37:42 UTC+0000
    
     0xffffe00062c0a900 WmiPrvSE.exe           2764    640      6        0      0      0 2020-09-19 04:37:42 UTC+0000
    

    ::: 當然有幾個我是有一點懷疑,例如WmiPrvSE.exe, WMIADAP.exe, spoolsv.exe等等,不過查了一下應該都是windows裡面內建的正常程序,不過也不能掉以輕心,可能是被駭客換過只是名字一樣,不過有一個process令人擔心,就是==coreupdater.exe==,因為查資料的時候無意間看到這個網站,裡面有提到詳細這支程式的攻擊手法和IP位置,因此感覺不是巧合,先dump出來再說

  2. 我是用volatility procdump,但是遇到一些問題導致dump不出來,可能是和paging有關係,導致PEB結構parse不出來
    1
    2
    3
    4
    5
     $ ./volatility_2.6_win64_standalone.exe -f citadeldc01.mem --profile Win2012R2x64 procdump -p 3644 --dump-dir="Export Files/Server"
     Volatility Foundation Volatility Framework 2.6
     Process(V)         ImageBase          Name                 Result
     ------------------ ------------------ -------------------- ------
     0xffffe00062fe7700 ------------------ coreupdater.ex       Error: PEB at 0x7ff5ffffe000 is unavailable (possibly due to paging)
    

    這邊有簡單說明甚麼是PEB [edu-ctf 2023] week06 - rev2

  3. 所以我們就要想有甚麼其他方法可以把這個file export出來,可以從他怎麼傳進server開始切入,如果從wireshark的export file可以dump出來 圖片.png
  4. 丟到virustotal果然很有問題 完整分析結果 圖片.png

:::spoiler Flag Flag: coreupdater :::

==Q7==

Which process did malware migrate to after the initial compromise? (one word)

Recon

這一題的直覺是利用volatility的malfind看有沒有利用coreupdater去inject哪一些process

Exploit

從結果可以看到有幾個process有問題: Process: Microsoft.Acti Pid: 1292 Address: 0x10500120000 Process: svchost.exe Pid: 1236 Address: 0x1b10ee0000 Process: spoolsv.exe Pid: 3724 Address: 0x4afbf20000 Process: explorer.exe Pid: 3472 Address: 0x5770000 Process: ServerManager. Pid: 400 Address: 0x5dc9ce0000

:::spoiler Result

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
$ ./volatility_2.6_win64_standalone.exe -f citadeldc01.mem --profile Win2012R2x64 malfind
Volatility Foundation Volatility Framework 2.6
Process: Microsoft.Acti Pid: 1292 Address: 0x10500120000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6

0x10500120000  00 00 00 00 00 00 00 00 b4 26 f3 1c 40 13 00 01   .........&..@...
0x10500120010  ee ff ee ff 02 00 00 00 20 01 12 00 05 01 00 00   ................
0x10500120020  20 01 12 00 05 01 00 00 00 00 12 00 05 01 00 00   ................
0x10500120030  00 00 12 00 05 01 00 00 0f 00 00 00 00 00 00 00   ................

0x00120000 0000             ADD [EAX], AL
0x00120002 0000             ADD [EAX], AL
0x00120004 0000             ADD [EAX], AL
0x00120006 0000             ADD [EAX], AL
0x00120008 b426             MOV AH, 0x26
0x0012000a f31c40           SBB AL, 0x40
0x0012000d 1300             ADC EAX, [EAX]
0x0012000f 01ee             ADD ESI, EBP
0x00120011 ff               DB 0xff
0x00120012 ee               OUT DX, AL
0x00120013 ff02             INC DWORD [EDX]
0x00120015 0000             ADD [EAX], AL
0x00120017 0020             ADD [EAX], AH
0x00120019 0112             ADD [EDX], EDX
0x0012001b 000501000020     ADD [0x20000001], AL
0x00120021 0112             ADD [EDX], EDX
0x00120023 000501000000     ADD [0x1], AL
0x00120029 0012             ADD [EDX], DL
0x0012002b 000501000000     ADD [0x1], AL
0x00120031 0012             ADD [EDX], DL
0x00120033 00050100000f     ADD [0xf000001], AL
0x00120039 0000             ADD [EAX], AL
0x0012003b 0000             ADD [EAX], AL
0x0012003d 0000             ADD [EAX], AL
0x0012003f 00               DB 0x0

Process: Microsoft.Acti Pid: 1292 Address: 0x10500100000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6

0x10500100000  00 00 00 00 00 00 00 00 08 00 10 00 05 01 00 00   ................
0x10500100010  08 00 10 00 05 01 00 00 00 00 12 00 05 01 00 00   ................
0x10500100020  20 0d 10 00 05 01 00 00 00 10 10 00 05 01 00 00   ................
0x10500100030  00 d0 10 00 05 01 00 00 00 00 00 00 00 00 00 00   ................

0x00100000 0000             ADD [EAX], AL
0x00100002 0000             ADD [EAX], AL
0x00100004 0000             ADD [EAX], AL
0x00100006 0000             ADD [EAX], AL
0x00100008 0800             OR [EAX], AL
0x0010000a 1000             ADC [EAX], AL
0x0010000c 0501000008       ADD EAX, 0x8000001
0x00100011 0010             ADD [EAX], DL
0x00100013 000501000000     ADD [0x1], AL
0x00100019 0012             ADD [EDX], DL
0x0010001b 000501000020     ADD [0x20000001], AL
0x00100021 0d10000501       OR EAX, 0x1050010
0x00100026 0000             ADD [EAX], AL
0x00100028 0010             ADD [EAX], DL
0x0010002a 1000             ADC [EAX], AL
0x0010002c 0501000000       ADD EAX, 0x1
0x00100031 d010             RCL BYTE [EAX], 0x1
0x00100033 000501000000     ADD [0x1], AL
0x00100039 0000             ADD [EAX], AL
0x0010003b 0000             ADD [EAX], AL
0x0010003d 0000             ADD [EAX], AL
0x0010003f 00               DB 0x0

Process: Microsoft.Acti Pid: 1292 Address: 0x105001f0000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6

0x105001f0000  00 00 00 00 00 00 00 00 5c 67 95 04 1e 40 00 01   ........\g...@..
0x105001f0010  ee ff ee ff 02 00 00 00 20 01 1f 00 05 01 00 00   ................
0x105001f0020  20 01 1f 00 05 01 00 00 00 00 1f 00 05 01 00 00   ................
0x105001f0030  00 00 1f 00 05 01 00 00 0f 00 00 00 00 00 00 00   ................

0x001f0000 0000             ADD [EAX], AL
0x001f0002 0000             ADD [EAX], AL
0x001f0004 0000             ADD [EAX], AL
0x001f0006 0000             ADD [EAX], AL
0x001f0008 5c               POP ESP
0x001f0009 6795             XCHG EBP, EAX
0x001f000b 041e             ADD AL, 0x1e
0x001f000d 40               INC EAX
0x001f000e 0001             ADD [ECX], AL
0x001f0010 ee               OUT DX, AL
0x001f0011 ff               DB 0xff
0x001f0012 ee               OUT DX, AL
0x001f0013 ff02             INC DWORD [EDX]
0x001f0015 0000             ADD [EAX], AL
0x001f0017 0020             ADD [EAX], AH
0x001f0019 011f             ADD [EDI], EBX
0x001f001b 000501000020     ADD [0x20000001], AL
0x001f0021 011f             ADD [EDI], EBX
0x001f0023 000501000000     ADD [0x1], AL
0x001f0029 001f             ADD [EDI], BL
0x001f002b 000501000000     ADD [0x1], AL
0x001f0031 001f             ADD [EDI], BL
0x001f0033 00050100000f     ADD [0xf000001], AL
0x001f0039 0000             ADD [EAX], AL
0x001f003b 0000             ADD [EAX], AL
0x001f003d 0000             ADD [EAX], AL
0x001f003f 00               DB 0x0

Process: Microsoft.Acti Pid: 1292 Address: 0x7ff5ff8d0000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6

0x7ff5ff8d0000  00 00 00 00 00 00 00 00 78 0d 00 00 00 00 00 00   ........x.......
0x7ff5ff8d0010  0c 00 00 00 49 c7 c2 00 00 00 00 48 b8 f0 e4 4f   ....I......H...O
0x7ff5ff8d0020  d6 ff 7f 00 00 ff e0 49 c7 c2 01 00 00 00 48 b8   .......I......H.
0x7ff5ff8d0030  f0 e4 4f d6 ff 7f 00 00 ff e0 49 c7 c2 02 00 00   ..O.......I.....

0xff8d0000 0000             ADD [EAX], AL
0xff8d0002 0000             ADD [EAX], AL
0xff8d0004 0000             ADD [EAX], AL
0xff8d0006 0000             ADD [EAX], AL
0xff8d0008 780d             JS 0xff8d0017
0xff8d000a 0000             ADD [EAX], AL
0xff8d000c 0000             ADD [EAX], AL
0xff8d000e 0000             ADD [EAX], AL
0xff8d0010 0c00             OR AL, 0x0
0xff8d0012 0000             ADD [EAX], AL
0xff8d0014 49               DEC ECX
0xff8d0015 c7               DB 0xc7
0xff8d0016 c20000           RET 0x0
0xff8d0019 0000             ADD [EAX], AL
0xff8d001b 48               DEC EAX
0xff8d001c b8f0e44fd6       MOV EAX, 0xd64fe4f0
0xff8d0021 ff               DB 0xff
0xff8d0022 7f00             JG 0xff8d0024
0xff8d0024 00ff             ADD BH, BH
0xff8d0026 e049             LOOPNZ 0xff8d0071
0xff8d0028 c7               DB 0xc7
0xff8d0029 c20100           RET 0x1
0xff8d002c 0000             ADD [EAX], AL
0xff8d002e 48               DEC EAX
0xff8d002f b8f0e44fd6       MOV EAX, 0xd64fe4f0
0xff8d0034 ff               DB 0xff
0xff8d0035 7f00             JG 0xff8d0037
0xff8d0037 00ff             ADD BH, BH
0xff8d0039 e049             LOOPNZ 0xff8d0084
0xff8d003b c7               DB 0xc7
0xff8d003c c20200           RET 0x2
0xff8d003f 00               DB 0x0

Process: Microsoft.Acti Pid: 1292 Address: 0x7ff5ff8e0000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6

0x7ff5ff8e0000  d8 ff ff ff ff ff ff ff 08 00 00 00 00 00 00 00   ................
0x7ff5ff8e0010  01 00 00 00 00 00 00 00 00 02 0e 03 38 00 00 00   ............8...
0x7ff5ff8e0020  68 41 95 09 0c 00 00 00 b8 11 49 d5 ff 7f 00 00   hA........I.....
0x7ff5ff8e0030  00 10 e2 d4 ff 7f 00 00 f0 e0 ec d4 ff 7f 00 00   ................

0xff8e0000 d8ff             FDIVR ST0, ST7
0xff8e0002 ff               DB 0xff
0xff8e0003 ff               DB 0xff
0xff8e0004 ff               DB 0xff
0xff8e0005 ff               DB 0xff
0xff8e0006 ff               DB 0xff
0xff8e0007 ff08             DEC DWORD [EAX]
0xff8e0009 0000             ADD [EAX], AL
0xff8e000b 0000             ADD [EAX], AL
0xff8e000d 0000             ADD [EAX], AL
0xff8e000f 0001             ADD [ECX], AL
0xff8e0011 0000             ADD [EAX], AL
0xff8e0013 0000             ADD [EAX], AL
0xff8e0015 0000             ADD [EAX], AL
0xff8e0017 0000             ADD [EAX], AL
0xff8e0019 020e             ADD CL, [ESI]
0xff8e001b 0338             ADD EDI, [EAX]
0xff8e001d 0000             ADD [EAX], AL
0xff8e001f 006841           ADD [EAX+0x41], CH
0xff8e0022 95               XCHG EBP, EAX
0xff8e0023 090c00           OR [EAX+EAX], ECX
0xff8e0026 0000             ADD [EAX], AL
0xff8e0028 b81149d5ff       MOV EAX, 0xffd54911
0xff8e002d 7f00             JG 0xff8e002f
0xff8e002f 0000             ADD [EAX], AL
0xff8e0031 10e2             ADC DL, AH
0xff8e0033 d4ff             AAM 0xff
0xff8e0035 7f00             JG 0xff8e0037
0xff8e0037 00f0             ADD AL, DH
0xff8e0039 e0ec             LOOPNZ 0xff8e0027
0xff8e003b d4ff             AAM 0xff
0xff8e003d 7f00             JG 0xff8e003f
0xff8e003f 00               DB 0x0

Process: svchost.exe Pid: 1236 Address: 0x1b10ee0000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6

0x1b10ee0000  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................
0x1b10ee0010  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................
0x1b10ee0020  00 00 ee 10 1b 00 00 00 00 00 00 00 00 00 00 00   ................
0x1b10ee0030  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................

0x10ee0000 0000             ADD [EAX], AL
0x10ee0002 0000             ADD [EAX], AL
0x10ee0004 0000             ADD [EAX], AL
0x10ee0006 0000             ADD [EAX], AL
0x10ee0008 0000             ADD [EAX], AL
0x10ee000a 0000             ADD [EAX], AL
0x10ee000c 0000             ADD [EAX], AL
0x10ee000e 0000             ADD [EAX], AL
0x10ee0010 0000             ADD [EAX], AL
0x10ee0012 0000             ADD [EAX], AL
0x10ee0014 0000             ADD [EAX], AL
0x10ee0016 0000             ADD [EAX], AL
0x10ee0018 0000             ADD [EAX], AL
0x10ee001a 0000             ADD [EAX], AL
0x10ee001c 0000             ADD [EAX], AL
0x10ee001e 0000             ADD [EAX], AL
0x10ee0020 0000             ADD [EAX], AL
0x10ee0022 ee               OUT DX, AL
0x10ee0023 101b             ADC [EBX], BL
0x10ee0025 0000             ADD [EAX], AL
0x10ee0027 0000             ADD [EAX], AL
0x10ee0029 0000             ADD [EAX], AL
0x10ee002b 0000             ADD [EAX], AL
0x10ee002d 0000             ADD [EAX], AL
0x10ee002f 0000             ADD [EAX], AL
0x10ee0031 0000             ADD [EAX], AL
0x10ee0033 0000             ADD [EAX], AL
0x10ee0035 0000             ADD [EAX], AL
0x10ee0037 0000             ADD [EAX], AL
0x10ee0039 0000             ADD [EAX], AL
0x10ee003b 0000             ADD [EAX], AL
0x10ee003d 0000             ADD [EAX], AL
0x10ee003f 00               DB 0x0

Process: spoolsv.exe Pid: 3724 Address: 0x4afbf20000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6

0x4afbf20000  fc 48 89 ce 48 81 ec 00 20 00 00 48 83 e4 f0 e8   .H..H......H....
0x4afbf20010  cc 00 00 00 41 51 41 50 52 51 56 48 31 d2 65 48   ....AQAPRQVH1.eH
0x4afbf20020  8b 52 60 48 8b 52 18 48 8b 52 20 48 8b 72 50 48   .R`H.R.H.R.H.rPH
0x4afbf20030  0f b7 4a 4a 4d 31 c9 48 31 c0 ac 3c 61 7c 02 2c   ..JJM1.H1..<a|.,

0xfbf20000 fc               CLD
0xfbf20001 48               DEC EAX
0xfbf20002 89ce             MOV ESI, ECX
0xfbf20004 48               DEC EAX
0xfbf20005 81ec00200000     SUB ESP, 0x2000
0xfbf2000b 48               DEC EAX
0xfbf2000c 83e4f0           AND ESP, -0x10
0xfbf2000f e8cc000000       CALL 0xfbf200e0
0xfbf20014 41               INC ECX
0xfbf20015 51               PUSH ECX
0xfbf20016 41               INC ECX
0xfbf20017 50               PUSH EAX
0xfbf20018 52               PUSH EDX
0xfbf20019 51               PUSH ECX
0xfbf2001a 56               PUSH ESI
0xfbf2001b 48               DEC EAX
0xfbf2001c 31d2             XOR EDX, EDX
0xfbf2001e 6548             DEC EAX
0xfbf20020 8b5260           MOV EDX, [EDX+0x60]
0xfbf20023 48               DEC EAX
0xfbf20024 8b5218           MOV EDX, [EDX+0x18]
0xfbf20027 48               DEC EAX
0xfbf20028 8b5220           MOV EDX, [EDX+0x20]
0xfbf2002b 48               DEC EAX
0xfbf2002c 8b7250           MOV ESI, [EDX+0x50]
0xfbf2002f 48               DEC EAX
0xfbf20030 0fb74a4a         MOVZX ECX, WORD [EDX+0x4a]
0xfbf20034 4d               DEC EBP
0xfbf20035 31c9             XOR ECX, ECX
0xfbf20037 48               DEC EAX
0xfbf20038 31c0             XOR EAX, EAX
0xfbf2003a ac               LODSB
0xfbf2003b 3c61             CMP AL, 0x61
0xfbf2003d 7c02             JL 0xfbf20041
0xfbf2003f 2c               DB 0x2c

Process: spoolsv.exe Pid: 3724 Address: 0x4afc1f0000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6

0x4afc1f0000  4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00   MZ..............
0x4afc1f0010  b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00   ........@.......
0x4afc1f0020  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................
0x4afc1f0030  00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00   ................

0xfc1f0000 4d               DEC EBP
0xfc1f0001 5a               POP EDX
0xfc1f0002 90               NOP
0xfc1f0003 0003             ADD [EBX], AL
0xfc1f0005 0000             ADD [EAX], AL
0xfc1f0007 000400           ADD [EAX+EAX], AL
0xfc1f000a 0000             ADD [EAX], AL
0xfc1f000c ff               DB 0xff
0xfc1f000d ff00             INC DWORD [EAX]
0xfc1f000f 00b800000000     ADD [EAX+0x0], BH
0xfc1f0015 0000             ADD [EAX], AL
0xfc1f0017 004000           ADD [EAX+0x0], AL
0xfc1f001a 0000             ADD [EAX], AL
0xfc1f001c 0000             ADD [EAX], AL
0xfc1f001e 0000             ADD [EAX], AL
0xfc1f0020 0000             ADD [EAX], AL
0xfc1f0022 0000             ADD [EAX], AL
0xfc1f0024 0000             ADD [EAX], AL
0xfc1f0026 0000             ADD [EAX], AL
0xfc1f0028 0000             ADD [EAX], AL
0xfc1f002a 0000             ADD [EAX], AL
0xfc1f002c 0000             ADD [EAX], AL
0xfc1f002e 0000             ADD [EAX], AL
0xfc1f0030 0000             ADD [EAX], AL
0xfc1f0032 0000             ADD [EAX], AL
0xfc1f0034 0000             ADD [EAX], AL
0xfc1f0036 0000             ADD [EAX], AL
0xfc1f0038 0000             ADD [EAX], AL
0xfc1f003a 0000             ADD [EAX], AL
0xfc1f003c 0001             ADD [ECX], AL
0xfc1f003e 0000             ADD [EAX], AL

Process: spoolsv.exe Pid: 3724 Address: 0x4afc070000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6

0x4afc070000  4d 5a 41 52 55 48 89 e5 48 83 ec 20 48 83 e4 f0   MZARUH..H...H...
0x4afc070010  e8 00 00 00 00 5b 48 81 c3 b7 57 00 00 ff d3 48   .....[H...W....H
0x4afc070020  81 c3 34 b6 02 00 48 89 3b 49 89 d8 6a 04 5a ff   ..4...H.;I..j.Z.
0x4afc070030  d0 00 00 00 00 00 00 00 00 00 00 00 f0 00 00 00   ................

0xfc070000 4d               DEC EBP
0xfc070001 5a               POP EDX
0xfc070002 41               INC ECX
0xfc070003 52               PUSH EDX
0xfc070004 55               PUSH EBP
0xfc070005 48               DEC EAX
0xfc070006 89e5             MOV EBP, ESP
0xfc070008 48               DEC EAX
0xfc070009 83ec20           SUB ESP, 0x20
0xfc07000c 48               DEC EAX
0xfc07000d 83e4f0           AND ESP, -0x10
0xfc070010 e800000000       CALL 0xfc070015
0xfc070015 5b               POP EBX
0xfc070016 48               DEC EAX
0xfc070017 81c3b7570000     ADD EBX, 0x57b7
0xfc07001d ffd3             CALL EBX
0xfc07001f 48               DEC EAX
0xfc070020 81c334b60200     ADD EBX, 0x2b634
0xfc070026 48               DEC EAX
0xfc070027 893b             MOV [EBX], EDI
0xfc070029 49               DEC ECX
0xfc07002a 89d8             MOV EAX, EBX
0xfc07002c 6a04             PUSH 0x4
0xfc07002e 5a               POP EDX
0xfc07002f ffd0             CALL EAX
0xfc070031 0000             ADD [EAX], AL
0xfc070033 0000             ADD [EAX], AL
0xfc070035 0000             ADD [EAX], AL
0xfc070037 0000             ADD [EAX], AL
0xfc070039 0000             ADD [EAX], AL
0xfc07003b 00f0             ADD AL, DH
0xfc07003d 0000             ADD [EAX], AL
0xfc07003f 00               DB 0x0

Process: spoolsv.exe Pid: 3724 Address: 0x4afc260000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6

0x4afc260000  4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00   MZ..............
0x4afc260010  b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00   ........@.......
0x4afc260020  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................
0x4afc260030  00 00 00 00 00 00 00 00 00 00 00 00 e0 00 00 00   ................

0xfc260000 4d               DEC EBP
0xfc260001 5a               POP EDX
0xfc260002 90               NOP
0xfc260003 0003             ADD [EBX], AL
0xfc260005 0000             ADD [EAX], AL
0xfc260007 000400           ADD [EAX+EAX], AL
0xfc26000a 0000             ADD [EAX], AL
0xfc26000c ff               DB 0xff
0xfc26000d ff00             INC DWORD [EAX]
0xfc26000f 00b800000000     ADD [EAX+0x0], BH
0xfc260015 0000             ADD [EAX], AL
0xfc260017 004000           ADD [EAX+0x0], AL
0xfc26001a 0000             ADD [EAX], AL
0xfc26001c 0000             ADD [EAX], AL
0xfc26001e 0000             ADD [EAX], AL
0xfc260020 0000             ADD [EAX], AL
0xfc260022 0000             ADD [EAX], AL
0xfc260024 0000             ADD [EAX], AL
0xfc260026 0000             ADD [EAX], AL
0xfc260028 0000             ADD [EAX], AL
0xfc26002a 0000             ADD [EAX], AL
0xfc26002c 0000             ADD [EAX], AL
0xfc26002e 0000             ADD [EAX], AL
0xfc260030 0000             ADD [EAX], AL
0xfc260032 0000             ADD [EAX], AL
0xfc260034 0000             ADD [EAX], AL
0xfc260036 0000             ADD [EAX], AL
0xfc260038 0000             ADD [EAX], AL
0xfc26003a 0000             ADD [EAX], AL
0xfc26003c e000             LOOPNZ 0xfc26003e
0xfc26003e 0000             ADD [EAX], AL

Process: explorer.exe Pid: 3472 Address: 0x5770000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6

0x05770000  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................
0x05770010  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................
0x05770020  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................
0x05770030  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................

0x05770000 0000             ADD [EAX], AL
0x05770002 0000             ADD [EAX], AL
0x05770004 0000             ADD [EAX], AL
0x05770006 0000             ADD [EAX], AL
0x05770008 0000             ADD [EAX], AL
0x0577000a 0000             ADD [EAX], AL
0x0577000c 0000             ADD [EAX], AL
0x0577000e 0000             ADD [EAX], AL
0x05770010 0000             ADD [EAX], AL
0x05770012 0000             ADD [EAX], AL
0x05770014 0000             ADD [EAX], AL
0x05770016 0000             ADD [EAX], AL
0x05770018 0000             ADD [EAX], AL
0x0577001a 0000             ADD [EAX], AL
0x0577001c 0000             ADD [EAX], AL
0x0577001e 0000             ADD [EAX], AL
0x05770020 0000             ADD [EAX], AL
0x05770022 0000             ADD [EAX], AL
0x05770024 0000             ADD [EAX], AL
0x05770026 0000             ADD [EAX], AL
0x05770028 0000             ADD [EAX], AL
0x0577002a 0000             ADD [EAX], AL
0x0577002c 0000             ADD [EAX], AL
0x0577002e 0000             ADD [EAX], AL
0x05770030 0000             ADD [EAX], AL
0x05770032 0000             ADD [EAX], AL
0x05770034 0000             ADD [EAX], AL
0x05770036 0000             ADD [EAX], AL
0x05770038 0000             ADD [EAX], AL
0x0577003a 0000             ADD [EAX], AL
0x0577003c 0000             ADD [EAX], AL
0x0577003e 0000             ADD [EAX], AL

Process: explorer.exe Pid: 3472 Address: 0xd840000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6

0x0d840000  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................
0x0d840010  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................
0x0d840020  00 00 84 0d 00 00 00 00 00 00 00 00 00 00 00 00   ................
0x0d840030  00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00   ................

0x0d840000 0000             ADD [EAX], AL
0x0d840002 0000             ADD [EAX], AL
0x0d840004 0000             ADD [EAX], AL
0x0d840006 0000             ADD [EAX], AL
0x0d840008 0000             ADD [EAX], AL
0x0d84000a 0000             ADD [EAX], AL
0x0d84000c 0000             ADD [EAX], AL
0x0d84000e 0000             ADD [EAX], AL
0x0d840010 0000             ADD [EAX], AL
0x0d840012 0000             ADD [EAX], AL
0x0d840014 0000             ADD [EAX], AL
0x0d840016 0000             ADD [EAX], AL
0x0d840018 0000             ADD [EAX], AL
0x0d84001a 0000             ADD [EAX], AL
0x0d84001c 0000             ADD [EAX], AL
0x0d84001e 0000             ADD [EAX], AL
0x0d840020 0000             ADD [EAX], AL
0x0d840022 840d00000000     TEST [0x0], CL
0x0d840028 0000             ADD [EAX], AL
0x0d84002a 0000             ADD [EAX], AL
0x0d84002c 0000             ADD [EAX], AL
0x0d84002e 0000             ADD [EAX], AL
0x0d840030 0000             ADD [EAX], AL
0x0d840032 0000             ADD [EAX], AL
0x0d840034 0000             ADD [EAX], AL
0x0d840036 0000             ADD [EAX], AL
0x0d840038 0000             ADD [EAX], AL
0x0d84003a 0000             ADD [EAX], AL
0x0d84003c 0000             ADD [EAX], AL
0x0d84003e 0000             ADD [EAX], AL

Process: ServerManager. Pid: 400 Address: 0x5dc9ce0000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6

0x5dc9ce0000  00 00 00 00 00 00 00 00 0a e5 1b 68 63 23 00 01   ...........hc#..
0x5dc9ce0010  ee ff ee ff 02 00 00 00 20 01 ce c9 5d 00 00 00   ............]...
0x5dc9ce0020  20 01 ce c9 5d 00 00 00 00 00 ce c9 5d 00 00 00   ....].......]...
0x5dc9ce0030  00 00 ce c9 5d 00 00 00 0f 00 00 00 00 00 00 00   ....]...........

0xc9ce0000 0000             ADD [EAX], AL
0xc9ce0002 0000             ADD [EAX], AL
0xc9ce0004 0000             ADD [EAX], AL
0xc9ce0006 0000             ADD [EAX], AL
0xc9ce0008 0ae5             OR AH, CH
0xc9ce000a 1b6863           SBB EBP, [EAX+0x63]
0xc9ce000d 2300             AND EAX, [EAX]
0xc9ce000f 01ee             ADD ESI, EBP
0xc9ce0011 ff               DB 0xff
0xc9ce0012 ee               OUT DX, AL
0xc9ce0013 ff02             INC DWORD [EDX]
0xc9ce0015 0000             ADD [EAX], AL
0xc9ce0017 0020             ADD [EAX], AH
0xc9ce0019 01ce             ADD ESI, ECX
0xc9ce001b c9               LEAVE
0xc9ce001c 5d               POP EBP
0xc9ce001d 0000             ADD [EAX], AL
0xc9ce001f 0020             ADD [EAX], AH
0xc9ce0021 01ce             ADD ESI, ECX
0xc9ce0023 c9               LEAVE
0xc9ce0024 5d               POP EBP
0xc9ce0025 0000             ADD [EAX], AL
0xc9ce0027 0000             ADD [EAX], AL
0xc9ce0029 00ce             ADD DH, CL
0xc9ce002b c9               LEAVE
0xc9ce002c 5d               POP EBP
0xc9ce002d 0000             ADD [EAX], AL
0xc9ce002f 0000             ADD [EAX], AL
0xc9ce0031 00ce             ADD DH, CL
0xc9ce0033 c9               LEAVE
0xc9ce0034 5d               POP EBP
0xc9ce0035 0000             ADD [EAX], AL
0xc9ce0037 000f             ADD [EDI], CL
0xc9ce0039 0000             ADD [EAX], AL
0xc9ce003b 0000             ADD [EAX], AL
0xc9ce003d 0000             ADD [EAX], AL
0xc9ce003f 00               DB 0x0

Process: ServerManager. Pid: 400 Address: 0x5dc9cb0000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6

0x5dc9cb0000  00 00 00 00 00 00 00 00 90 44 ce c9 5d 00 00 00   .........D..]...
0x5dc9cb0010  90 44 ce c9 5d 00 00 00 00 00 ce c9 5d 00 00 00   .D..].......]...
0x5dc9cb0020  e0 0d cb c9 5d 00 00 00 00 10 cb c9 5d 00 00 00   ....].......]...
0x5dc9cb0030  00 d0 cb c9 5d 00 00 00 02 00 00 00 00 00 00 00   ....]...........

0xc9cb0000 0000             ADD [EAX], AL
0xc9cb0002 0000             ADD [EAX], AL
0xc9cb0004 0000             ADD [EAX], AL
0xc9cb0006 0000             ADD [EAX], AL
0xc9cb0008 90               NOP
0xc9cb0009 44               INC ESP
0xc9cb000a ce               INTO
0xc9cb000b c9               LEAVE
0xc9cb000c 5d               POP EBP
0xc9cb000d 0000             ADD [EAX], AL
0xc9cb000f 009044cec95d     ADD [EAX+0x5dc9ce44], DL
0xc9cb0015 0000             ADD [EAX], AL
0xc9cb0017 0000             ADD [EAX], AL
0xc9cb0019 00ce             ADD DH, CL
0xc9cb001b c9               LEAVE
0xc9cb001c 5d               POP EBP
0xc9cb001d 0000             ADD [EAX], AL
0xc9cb001f 00e0             ADD AL, AH
0xc9cb0021 0dcbc95d00       OR EAX, 0x5dc9cb
0xc9cb0026 0000             ADD [EAX], AL
0xc9cb0028 0010             ADD [EAX], DL
0xc9cb002a cb               RETF
0xc9cb002b c9               LEAVE
0xc9cb002c 5d               POP EBP
0xc9cb002d 0000             ADD [EAX], AL
0xc9cb002f 0000             ADD [EAX], AL
0xc9cb0031 d0cb             ROR BL, 0x1
0xc9cb0033 c9               LEAVE
0xc9cb0034 5d               POP EBP
0xc9cb0035 0000             ADD [EAX], AL
0xc9cb0037 0002             ADD [EDX], AL
0xc9cb0039 0000             ADD [EAX], AL
0xc9cb003b 0000             ADD [EAX], AL
0xc9cb003d 0000             ADD [EAX], AL
0xc9cb003f 00               DB 0x0

Process: ServerManager. Pid: 400 Address: 0x5dc9e70000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: PrivateMemory: 1, Protection: 6

0x5dc9e70000  b9 f4 ff f6 05 36 da 28 00 01 74 1c 48 8b 43 10   .....6.(..t.H.C.
0x5dc9e70010  48 8d 15 59 05 00 00 44 0f b6 48 60 44 8b 80 ec   H..Y...D..H`D...
0x5dc9e70020  00 00 00 e8 44 bf e0 ff 48 8b 4b 28 41 be 05 00   ....D...H.K(A...
0x5dc9e70030  00 00 41 8b d6 e8 16 d0 f4 ff 48 8b 43 08 41 8d   ..A.......H.C.A.

0xc9e70000 b9f4fff605       MOV ECX, 0x5f6fff4
0xc9e70005 36da28           FISUBR DWORD [SS:EAX]
0xc9e70008 0001             ADD [ECX], AL
0xc9e7000a 741c             JZ 0xc9e70028
0xc9e7000c 48               DEC EAX
0xc9e7000d 8b4310           MOV EAX, [EBX+0x10]
0xc9e70010 48               DEC EAX
0xc9e70011 8d1559050000     LEA EDX, [0x559]
0xc9e70017 44               INC ESP
0xc9e70018 0fb64860         MOVZX ECX, BYTE [EAX+0x60]
0xc9e7001c 44               INC ESP
0xc9e7001d 8b80ec000000     MOV EAX, [EAX+0xec]
0xc9e70023 e844bfe0ff       CALL 0xc9c7bf6c
0xc9e70028 48               DEC EAX
0xc9e70029 8b4b28           MOV ECX, [EBX+0x28]
0xc9e7002c 41               INC ECX
0xc9e7002d be05000000       MOV ESI, 0x5
0xc9e70032 41               INC ECX
0xc9e70033 8bd6             MOV EDX, ESI
0xc9e70035 e816d0f4ff       CALL 0xc9dbd050
0xc9e7003a 48               DEC EAX
0xc9e7003b 8b4308           MOV EAX, [EBX+0x8]
0xc9e7003e 41               INC ECX
0xc9e7003f 8d               DB 0x8d

:::

:::spoiler Flag Flag: spoolsv :::

==Q8==

Identify the IP Address that delivered the payload.

Recon

直覺會想要volatility的netscan,但是結果實在是太多了,後來轉念一想直接看封包不就好了,所以我直接看原本傳送coreupdater.exe到server的IP

Exploit

圖片.png

:::spoiler Flag Flag: 194.61.24.102 :::

==Q9==

What IP Address was the malware calling to?

Recon

直覺就是volatility netscan再grep

Exploit

1
2
3
4
$ ./volatility_2.6_win64_standalone.exe -f citadeldc01.mem --profile Win2012R2x64 netscan | grep coreupdater
Volatility Foundation Volatility Framework 2.6
0x20fc7590         TCPv4    10.42.85.10:62613              203.78.103.109:443   ESTABLISHED      3644     coreupdater.ex
0x60182590         TCPv4    10.42.85.10:62613              203.78.103.109:443   ESTABLISHED      3644     coreupdater.ex

:::spoiler Flag Flag: 203.78.103.109 :::

==Q10==

Where did the malware reside on the disk?

Recon

這一題直覺會在FTK上找,不過仔細想想可以直接volatility filescan再grep還比較快

Exploit

1
2
3
4
5
6
$ ./volatility_2.6_win64_standalone.exe -f citadeldc01.mem --profile Win2012R2x64 filescan | grep coreupdater.exe
Volatility Foundation Volatility Framework 2.6
0x00000000130ddf20     16      0 RWD--- \Device\HarddiskVolume2\Windows\System32\coreupdater.exereupdater.exe.2424urv.partial
0x000000002082ff20      5      0 R--r-d \Device\HarddiskVolume2\Windows\System32\coreupdater.exereupdater.exe
0x0000000052317f20     16      0 RWD--- \Device\HarddiskVolume2\Windows\System32\coreupdater.exereupdater.exe.2424urv.partial
0x000000005faa4f20      5      0 R--r-d \Device\HarddiskVolume2\Windows\System32\coreupdater.exereupdater.exe

:::spoiler Flag Flag: C:\Windows\System32\coreupdater.exe :::

Reference