3
0

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?

More than 1 year has passed since last update.

初めに

どうも、クソ雑魚のなんちゃてエンジニアです。
本記事は CyberDefenders (以下リンク参考)の「RedLine」にチャレンジした際のWriteupになります。

※本チャレンジについてはRed側のペネトレというよりはBlue側の分析力を問われるものになります。

What is the name of the suspicious process?

とりあえずimageinfoでOSプロファイルを確認しておきます。

remnux@remnux:~/Downloads$ vol.py -f MemoryDump.mem imageinfo
Volatility Foundation Volatility Framework 2.6.1
/usr/local/lib/python2.7/dist-packages/volatility/plugins/community/YingLi/ssh_agent_key.py:12: CryptographyDeprecationWarning: Python 2 is no longer supported by the Python core team. Support for it is now deprecated in cryptography, and will be removed in the next release.
  from cryptography.hazmat.backends.openssl import backend
INFO    : volatility.debug    : Determining profile based on KDBG search...
          Suggested Profile(s) : Win10x64_19041
                     AS Layer1 : SkipDuplicatesAMD64PagedMemory (Kernel AS)
                     AS Layer2 : FileAddressSpace (/home/remnux/Downloads/MemoryDump.mem)
                      PAE type : No PAE
                           DTB : 0x1ad002L
                          KDBG : 0xf80762e1ab20L
          Number of Processors : 4
     Image Type (Service Pack) : 0
                KPCR for CPU 0 : 0xfffff80761287000L
                KPCR for CPU 1 : 0xffff8a0094dc0000L
                KPCR for CPU 2 : 0xffff8a00949e8000L
                KPCR for CPU 3 : 0xffff8a0094b5d000L
             KUSER_SHARED_DATA : 0xfffff78000000000L
           Image date and time : 2023-05-21 23:02:39 UTC+0000
     Image local date and time : 2023-05-22 01:02:39 +0200
remnux@remnux:~/Downloads$ 

おお、win10なので最近の奴ですね。
あまりvolatility2の特殊コマンドが効かなさそうなのでvolatility3主軸で攻めようかなと思います。

不審なプロセスを見つけるためにmalfindコマンドを実施します。

remnux@remnux:~/Downloads$ vol3 -f MemoryDump.mem windows.malfind.Malfind
Volatility 3 Framework 2.4.1
Progress:  100.00		PDB scanning finished                        
PID	Process	Start VPN	End VPN	Tag	Protection	CommitCharge	PrivateMemory	File output	Hexdump	Disasm

5896	oneetx.exe	0x400000	0x437fff	VadS	PAGE_EXECUTE_READWRITE	56	1	Disabled	
4d 5a 90 00 03 00 00 00	MZ......
04 00 00 00 ff ff 00 00	........
b8 00 00 00 00 00 00 00	........
40 00 00 00 00 00 00 00	@.......
00 00 00 00 00 00 00 00	........
00 00 00 00 00 00 00 00	........
00 00 00 00 00 00 00 00	........
00 00 00 00 00 01 00 00	........	
0x400000:	dec	ebp
0x400001:	pop	edx
0x400002:	nop	
0x400003:	add	byte ptr [ebx], al
0x400005:	add	byte ptr [eax], al
0x400007:	add	byte ptr [eax + eax], al
0x40000a:	add	byte ptr [eax], al
7540	smartscreen.ex	0x2505c140000	0x2505c15ffff	VadS	PAGE_EXECUTE_READWRITE	1	1	Disabled	
48 89 54 24 10 48 89 4c	H.T$.H.L
24 08 4c 89 44 24 18 4c	$.L.D$.L
89 4c 24 20 48 8b 41 28	.L$.H.A(
48 8b 48 08 48 8b 51 50	H.H.H.QP
48 83 e2 f8 48 8b ca 48	H...H..H
b8 60 00 14 5c 50 02 00	.`..\P..
00 48 2b c8 48 81 f9 70	.H+.H..p
0f 00 00 76 09 48 c7 c1	...v.H..	
0x2505c140000:	mov	qword ptr [rsp + 0x10], rdx
0x2505c140005:	mov	qword ptr [rsp + 8], rcx
0x2505c14000a:	mov	qword ptr [rsp + 0x18], r8
0x2505c14000f:	mov	qword ptr [rsp + 0x20], r9
0x2505c140014:	mov	rax, qword ptr [rcx + 0x28]
0x2505c140018:	mov	rcx, qword ptr [rax + 8]
0x2505c14001c:	mov	rdx, qword ptr [rcx + 0x50]
0x2505c140020:	and	rdx, 0xfffffffffffffff8
0x2505c140024:	mov	rcx, rdx
0x2505c140027:	movabs	rax, 0x2505c140060
0x2505c140031:	sub	rcx, rax
0x2505c140034:	cmp	rcx, 0xf70
0x2505c14003b:	jbe	0x2505c140046
remnux@remnux:~/Downloads$ 

ふむoneetx.exeかな?pslistも確認しておきます。

remnux@remnux:~/Downloads$ vol3 -f MemoryDump.mem windows.pslist.PsList
Volatility 3 Framework 2.4.1
WARNING  volatility3.framework.symbols.windows.pdbutil: Cannot write necessary symbol file, please check permissions on /usr/local/lib/python3.8/dist-packages/volatility3/symbols/windows/ntkrnlmp.pdb/68A17FAF3012B7846079AEECDBE0A583-1.json.xz
Progress:  100.00		PDB scanning finished                                                                                              
PID	PPID	ImageFileName	Offset(V)	Threads	Handles	SessionId	Wow64	CreateTime	ExitTime	File output

4	0	System	0xad8185883180	157	-	N/A	False	2023-05-21 22:27:10.000000 	N/A	Disabled
108	4	Registry	0xad81858f2080	4	-	N/A	False	2023-05-21 22:26:54.000000 	N/A	Disabled
332	4	smss.exe	0xad81860dc040	2	-	N/A	False	2023-05-21 22:27:10.000000 	N/A	Disabled
452	444	csrss.exe	0xad81861cd080	12	-	0	False	2023-05-21 22:27:22.000000 	N/A	Disabled
528	520	csrss.exe	0xad8186f1b140	14	-	1	False	2023-05-21 22:27:25.000000 	N/A	Disabled
552	444	wininit.exe	0xad8186f2b080	1	-	0	False	2023-05-21 22:27:25.000000 	N/A	Disabled
588	520	winlogon.exe	0xad8186f450c0	5	-	1	False	2023-05-21 22:27:25.000000 	N/A	Disabled
676	552	services.exe	0xad8186f4d080	7	-	0	False	2023-05-21 22:27:29.000000 	N/A	Disabled
696	552	lsass.exe	0xad8186fc6080	10	-	0	False	2023-05-21 22:27:29.000000 	N/A	Disabled
824	676	svchost.exe	0xad818761d240	22	-	0	False	2023-05-21 22:27:32.000000 	N/A	Disabled
852	552	fontdrvhost.ex	0xad818761b0c0	5	-	0	False	2023-05-21 22:27:33.000000 	N/A	Disabled
860	588	fontdrvhost.ex	0xad818761f140	5	-	1	False	2023-05-21 22:27:33.000000 	N/A	Disabled
952	676	svchost.exe	0xad81876802c0	12	-	0	False	2023-05-21 22:27:36.000000 	N/A	Disabled
1016	588	dwm.exe	0xad81876e4340	15	-	1	False	2023-05-21 22:27:38.000000 	N/A	Disabled
448	676	svchost.exe	0xad8187721240	54	-	0	False	2023-05-21 22:27:41.000000 	N/A	Disabled
752	676	svchost.exe	0xad8187758280	21	-	0	False	2023-05-21 22:27:43.000000 	N/A	Disabled
1012	676	svchost.exe	0xad818774c080	19	-	0	False	2023-05-21 22:27:43.000000 	N/A	Disabled
1196	676	svchost.exe	0xad81877972c0	34	-	0	False	2023-05-21 22:27:46.000000 	N/A	Disabled
1280	4	MemCompression	0xad8187835080	62	-	N/A	False	2023-05-21 22:27:49.000000 	N/A	Disabled
1376	676	svchost.exe	0xad81878020c0	15	-	0	False	2023-05-21 22:27:49.000000 	N/A	Disabled
1448	676	svchost.exe	0xad818796c2c0	30	-	0	False	2023-05-21 22:27:52.000000 	N/A	Disabled
1496	676	svchost.exe	0xad81879752c0	12	-	0	False	2023-05-21 22:27:52.000000 	N/A	Disabled
1644	676	svchost.exe	0xad8187a112c0	6	-	0	False	2023-05-21 22:27:58.000000 	N/A	Disabled
1652	676	svchost.exe	0xad8187a2d2c0	10	-	0	False	2023-05-21 22:27:58.000000 	N/A	Disabled
1840	676	spoolsv.exe	0xad8187acb200	10	-	0	False	2023-05-21 22:28:03.000000 	N/A	Disabled
1892	676	svchost.exe	0xad8187b34080	14	-	0	False	2023-05-21 22:28:05.000000 	N/A	Disabled
2024	676	svchost.exe	0xad8187b65240	7	-	0	False	2023-05-21 22:28:11.000000 	N/A	Disabled
2076	676	svchost.exe	0xad8187b94080	10	-	0	False	2023-05-21 22:28:19.000000 	N/A	Disabled
2144	676	vmtoolsd.exe	0xad81896ab080	11	-	0	False	2023-05-21 22:28:19.000000 	N/A	Disabled
2152	676	vm3dservice.ex	0xad81896ae240	2	-	0	False	2023-05-21 22:28:19.000000 	N/A	Disabled
2200	676	VGAuthService.	0xad81896b3300	2	-	0	False	2023-05-21 22:28:19.000000 	N/A	Disabled
2404	2152	vm3dservice.ex	0xad8186619200	2	-	1	False	2023-05-21 22:28:32.000000 	N/A	Disabled
3028	676	dllhost.exe	0xad8185907080	12	-	0	False	2023-05-21 22:29:20.000000 	N/A	Disabled
832	676	msdtc.exe	0xad8185861280	9	-	0	False	2023-05-21 22:29:25.000000 	N/A	Disabled
1232	676	svchost.exe	0xad8186f4a2c0	7	-	0	False	2023-05-21 22:29:39.000000 	N/A	Disabled
1392	448	sihost.exe	0xad8189e94280	11	-	1	False	2023-05-21 22:30:08.000000 	N/A	Disabled
1064	676	svchost.exe	0xad8189d7c2c0	15	-	1	False	2023-05-21 22:30:09.000000 	N/A	Disabled
1600	448	taskhostw.exe	0xad8189d07300	10	-	1	False	2023-05-21 22:30:09.000000 	N/A	Disabled
3204	752	ctfmon.exe	0xad8189c8b280	12	-	1	False	2023-05-21 22:30:11.000000 	N/A	Disabled
3556	588	userinit.exe	0xad818c02f340	0	-	1	False	2023-05-21 22:30:28.000000 	2023-05-21 22:30:43.000000 	Disabled
3580	3556	explorer.exe	0xad818c047340	76	-	1	False	2023-05-21 22:30:28.000000 	N/A	Disabled
3944	824	WmiPrvSE.exe	0xad818c054080	13	-	0	False	2023-05-21 22:30:44.000000 	N/A	Disabled
3004	676	svchost.exe	0xad818c4212c0	7	-	0	False	2023-05-21 22:30:55.000000 	N/A	Disabled
1116	676	svchost.exe	0xad818c426080	6	-	1	False	2023-05-21 22:31:00.000000 	N/A	Disabled
3160	824	StartMenuExper	0xad818cad3240	14	-	1	False	2023-05-21 22:31:21.000000 	N/A	Disabled
4116	824	RuntimeBroker.	0xad818cd93300	3	-	1	False	2023-05-21 22:31:24.000000 	N/A	Disabled
4228	676	SearchIndexer.	0xad818ce06240	15	-	0	False	2023-05-21 22:31:27.000000 	N/A	Disabled
4448	824	RuntimeBroker.	0xad818c09a080	9	-	1	False	2023-05-21 22:31:33.000000 	N/A	Disabled
464	3580	SecurityHealth	0xad818979d080	3	-	1	False	2023-05-21 22:31:59.000000 	N/A	Disabled
3252	3580	vmtoolsd.exe	0xad8189796300	8	-	1	False	2023-05-21 22:31:59.000000 	N/A	Disabled
5136	676	SecurityHealth	0xad818d374280	7	-	0	False	2023-05-21 22:32:01.000000 	N/A	Disabled
5328	3580	msedge.exe	0xad818d0980c0	54	-	1	False	2023-05-21 22:32:02.000000 	N/A	Disabled
4396	5328	msedge.exe	0xad818d515080	7	-	1	False	2023-05-21 22:32:19.000000 	N/A	Disabled
1144	5328	msedge.exe	0xad818d75f080	18	-	1	False	2023-05-21 22:32:38.000000 	N/A	Disabled
4544	5328	msedge.exe	0xad818d75b080	14	-	1	False	2023-05-21 22:32:39.000000 	N/A	Disabled
5340	5328	msedge.exe	0xad818d7b3080	10	-	1	False	2023-05-21 22:32:39.000000 	N/A	Disabled
5704	824	RuntimeBroker.	0xad8185962080	5	-	1	False	2023-05-21 22:32:44.000000 	N/A	Disabled
1764	824	dllhost.exe	0xad818d176080	7	-	1	False	2023-05-21 22:32:48.000000 	N/A	Disabled
1916	824	SearchApp.exe	0xad818d099080	24	-	1	False	2023-05-21 22:33:05.000000 	N/A	Disabled
6200	676	SgrmBroker.exe	0xad818d09f080	7	-	0	False	2023-05-21 22:33:42.000000 	N/A	Disabled
6696	676	svchost.exe	0xad818c532080	8	-	0	False	2023-05-21 22:34:07.000000 	N/A	Disabled
7312	824	ApplicationFra	0xad818e84f300	10	-	1	False	2023-05-21 22:35:44.000000 	N/A	Disabled
7772	676	svchost.exe	0xad818e88e140	3	-	0	False	2023-05-21 22:36:03.000000 	N/A	Disabled
6724	3580	Outline.exe	0xad818e578080	0	-	1	True	2023-05-21 22:36:09.000000 	2023-05-21 23:01:24.000000 	Disabled
4224	6724	Outline.exe	0xad818e88b080	0	-	1	True	2023-05-21 22:36:23.000000 	2023-05-21 23:01:24.000000 	Disabled
7160	824	SearchApp.exe	0xad818ccc4080	57	-	1	False	2023-05-21 22:39:13.000000 	N/A	Disabled
4628	6724	tun2socks.exe	0xad818de82340	0	-	1	True	2023-05-21 22:40:10.000000 	2023-05-21 23:01:24.000000 	Disabled
6048	448	taskhostw.exe	0xad818dc5d080	5	-	1	False	2023-05-21 22:40:20.000000 	N/A	Disabled
8264	824	RuntimeBroker.	0xad818eec8080	4	-	1	False	2023-05-21 22:40:33.000000 	N/A	Disabled
3608	676	svchost.exe	0xad818d07a080	3	-	0	False	2023-05-21 22:41:28.000000 	N/A	Disabled
6644	824	SkypeApp.exe	0xad818d3ac080	49	-	1	False	2023-05-21 22:41:52.000000 	N/A	Disabled
5656	824	RuntimeBroker.	0xad81876e8080	0	-	1	False	2023-05-21 21:58:19.000000 	2023-05-21 22:02:01.000000 	Disabled
8952	824	TextInputHost.	0xad818e6db080	10	-	1	False	2023-05-21 21:59:11.000000 	N/A	Disabled
5808	824	HxTsr.exe	0xad818de5d080	0	-	1	False	2023-05-21 21:59:58.000000 	2023-05-21 22:07:45.000000 	Disabled
2388	5328	msedge.exe	0xad818e54c340	18	-	1	False	2023-05-21 22:05:35.000000 	N/A	Disabled
6292	5328	msedge.exe	0xad818d7a1080	20	-	1	False	2023-05-21 22:06:15.000000 	N/A	Disabled
3876	448	taskhostw.exe	0xad8189b30080	8	-	1	False	2023-05-21 22:08:02.000000 	N/A	Disabled
372	824	SkypeBackgroun	0xad8186f49080	3	-	1	False	2023-05-21 22:10:00.000000 	N/A	Disabled
1120	676	MsMpEng.exe	0xad818945c080	12	-	0	False	2023-05-21 22:10:01.000000 	N/A	Disabled
6076	824	ShellExperienc	0xad818eb18080	14	-	1	False	2023-05-21 22:11:36.000000 	N/A	Disabled
7336	824	RuntimeBroker.	0xad818e8bb080	2	-	1	False	2023-05-21 22:11:39.000000 	N/A	Disabled
7964	5328	msedge.exe	0xad818dee5080	19	-	1	False	2023-05-21 22:22:09.000000 	N/A	Disabled
6544	5328	msedge.exe	0xad818c0ea080	18	-	1	False	2023-05-21 22:22:35.000000 	N/A	Disabled
5964	676	svchost.exe	0xad818ef86080	5	-	0	False	2023-05-21 22:27:56.000000 	N/A	Disabled
8896	5328	msedge.exe	0xad8187a39080	18	-	1	False	2023-05-21 22:28:21.000000 	N/A	Disabled
5156	5328	msedge.exe	0xad818c553080	14	-	1	False	2023-05-21 22:28:22.000000 	N/A	Disabled
5896	8844	oneetx.exe	0xad8189b41080	5	-	1	True	2023-05-21 22:30:56.000000 	N/A	Disabled
7732	5896	rundll32.exe	0xad818d1912c0	1	-	1	True	2023-05-21 22:31:53.000000 	N/A	Disabled
6324	1496	audiodg.exe	0xad818df2e080	4	-	0	False	2023-05-21 22:42:56.000000 	N/A	Disabled
2228	3580	FTK Imager.exe	0xad818d143080	10	-	1	False	2023-05-21 22:43:56.000000 	N/A	Disabled
5636	3580	notepad.exe	0xad818db45080	1	-	1	False	2023-05-21 22:46:50.000000 	N/A	Disabled
2044	676	svchost.exe	0xad8189b27080	28	-	0	False	2023-05-21 22:49:29.000000 	N/A	Disabled
8708	676	svchost.exe	0xad818d431080	5	-	0	False	2023-05-21 22:57:33.000000 	N/A	Disabled
5476	676	svchost.exe	0xad818e752080	9	-	0	False	2023-05-21 22:58:08.000000 	N/A	Disabled
6596	676	TrustedInstall	0xad818dc88080	4	-	0	False	2023-05-21 22:58:13.000000 	N/A	Disabled
2332	824	TiWorker.exe	0xad818e780080	4	-	0	False	2023-05-21 22:58:13.000000 	N/A	Disabled
4340	676	VSSVC.exe	0xad818e888080	3	-	0	False	2023-05-21 23:01:06.000000 	N/A	Disabled
7540	824	smartscreen.ex	0xad818e893080	14	-	1	False	2023-05-21 23:02:26.000000 	N/A	Disabled
8920	3580	FTK Imager.exe	0xad818ef81080	20	-	1	False	2023-05-21 23:02:28.000000 	N/A	Disabled
5480	448	oneetx.exe	0xad818d3d6080	6	-	1	True	2023-05-21 23:03:00.000000 	N/A	Disabled
remnux@remnux:~/Downloads$

PPIDがまぁ不審だなこのPID 5896のoneetx.exe
というわけで回答します。

Ans: oneetx.exe

What is the child process name of the suspicious process?

これはpstreeコマンドで確認します。

remnux@remnux:~/Downloads$ vol3 -f MemoryDump.mem windows.pstree.PsTree
Volatility 3 Framework 2.4.1
Progress:  100.00		PDB scanning finished                        
PID	PPID	ImageFileName	Offset(V)	Threads	Handles	SessionId	Wow64	CreateTime	ExitTime

4	0	System	0xad8185883180	157	-	N/A	False	2023-05-21 22:27:10.000000 	N/A
* 1280	4	MemCompression	0xad8187835080	62	-	N/A	False	2023-05-21 22:27:49.000000 	N/A
* 108	4	Registry	0xad81858f2080	4	-	N/A	False	2023-05-21 22:26:54.000000 	N/A
* 332	4	smss.exe	0xad81860dc040	2	-	N/A	False	2023-05-21 22:27:10.000000 	N/A
452	444	csrss.exe	0xad81861cd080	12	-	0	False	2023-05-21 22:27:22.000000 	N/A
528	520	csrss.exe	0xad8186f1b140	14	-	1	False	2023-05-21 22:27:25.000000 	N/A
552	444	wininit.exe	0xad8186f2b080	1	-	0	False	2023-05-21 22:27:25.000000 	N/A
* 696	552	lsass.exe	0xad8186fc6080	10	-	0	False	2023-05-21 22:27:29.000000 	N/A
* 676	552	services.exe	0xad8186f4d080	7	-	0	False	2023-05-21 22:27:29.000000 	N/A
** 4228	676	SearchIndexer.	0xad818ce06240	15	-	0	False	2023-05-21 22:31:27.000000 	N/A
** 8708	676	svchost.exe	0xad818d431080	5	-	0	False	2023-05-21 22:57:33.000000 	N/A
** 5136	676	SecurityHealth	0xad818d374280	7	-	0	False	2023-05-21 22:32:01.000000 	N/A
** 2200	676	VGAuthService.	0xad81896b3300	2	-	0	False	2023-05-21 22:28:19.000000 	N/A
** 3608	676	svchost.exe	0xad818d07a080	3	-	0	False	2023-05-21 22:41:28.000000 	N/A
** 2076	676	svchost.exe	0xad8187b94080	10	-	0	False	2023-05-21 22:28:19.000000 	N/A
** 1448	676	svchost.exe	0xad818796c2c0	30	-	0	False	2023-05-21 22:27:52.000000 	N/A
** 1064	676	svchost.exe	0xad8189d7c2c0	15	-	1	False	2023-05-21 22:30:09.000000 	N/A
** 6696	676	svchost.exe	0xad818c532080	8	-	0	False	2023-05-21 22:34:07.000000 	N/A
** 1196	676	svchost.exe	0xad81877972c0	34	-	0	False	2023-05-21 22:27:46.000000 	N/A
** 1840	676	spoolsv.exe	0xad8187acb200	10	-	0	False	2023-05-21 22:28:03.000000 	N/A
** 952	676	svchost.exe	0xad81876802c0	12	-	0	False	2023-05-21 22:27:36.000000 	N/A
** 824	676	svchost.exe	0xad818761d240	22	-	0	False	2023-05-21 22:27:32.000000 	N/A
*** 7312	824	ApplicationFra	0xad818e84f300	10	-	1	False	2023-05-21 22:35:44.000000 	N/A
*** 4116	824	RuntimeBroker.	0xad818cd93300	3	-	1	False	2023-05-21 22:31:24.000000 	N/A
*** 5656	824	RuntimeBroker.	0xad81876e8080	0	-	1	False	2023-05-21 21:58:19.000000 	2023-05-21 22:02:01.000000 
*** 2332	824	TiWorker.exe	0xad818e780080	4	-	0	False	2023-05-21 22:58:13.000000 	N/A
*** 7336	824	RuntimeBroker.	0xad818e8bb080	2	-	1	False	2023-05-21 22:11:39.000000 	N/A
*** 5808	824	HxTsr.exe	0xad818de5d080	0	-	1	False	2023-05-21 21:59:58.000000 	2023-05-21 22:07:45.000000 
*** 7160	824	SearchApp.exe	0xad818ccc4080	57	-	1	False	2023-05-21 22:39:13.000000 	N/A
*** 6076	824	ShellExperienc	0xad818eb18080	14	-	1	False	2023-05-21 22:11:36.000000 	N/A
*** 5704	824	RuntimeBroker.	0xad8185962080	5	-	1	False	2023-05-21 22:32:44.000000 	N/A
*** 8264	824	RuntimeBroker.	0xad818eec8080	4	-	1	False	2023-05-21 22:40:33.000000 	N/A
*** 3160	824	StartMenuExper	0xad818cad3240	14	-	1	False	2023-05-21 22:31:21.000000 	N/A
*** 4448	824	RuntimeBroker.	0xad818c09a080	9	-	1	False	2023-05-21 22:31:33.000000 	N/A
*** 1764	824	dllhost.exe	0xad818d176080	7	-	1	False	2023-05-21 22:32:48.000000 	N/A
*** 3944	824	WmiPrvSE.exe	0xad818c054080	13	-	0	False	2023-05-21 22:30:44.000000 	N/A
*** 6644	824	SkypeApp.exe	0xad818d3ac080	49	-	1	False	2023-05-21 22:41:52.000000 	N/A
*** 372	824	SkypeBackgroun	0xad8186f49080	3	-	1	False	2023-05-21 22:10:00.000000 	N/A
*** 7540	824	smartscreen.ex	0xad818e893080	14	-	1	False	2023-05-21 23:02:26.000000 	N/A
*** 8952	824	TextInputHost.	0xad818e6db080	10	-	1	False	2023-05-21 21:59:11.000000 	N/A
*** 1916	824	SearchApp.exe	0xad818d099080	24	-	1	False	2023-05-21 22:33:05.000000 	N/A
** 6200	676	SgrmBroker.exe	0xad818d09f080	7	-	0	False	2023-05-21 22:33:42.000000 	N/A
** 3004	676	svchost.exe	0xad818c4212c0	7	-	0	False	2023-05-21 22:30:55.000000 	N/A
** 448	676	svchost.exe	0xad8187721240	54	-	0	False	2023-05-21 22:27:41.000000 	N/A
*** 1600	448	taskhostw.exe	0xad8189d07300	10	-	1	False	2023-05-21 22:30:09.000000 	N/A
*** 6048	448	taskhostw.exe	0xad818dc5d080	5	-	1	False	2023-05-21 22:40:20.000000 	N/A
*** 3876	448	taskhostw.exe	0xad8189b30080	8	-	1	False	2023-05-21 22:08:02.000000 	N/A
*** 5480	448	oneetx.exe	0xad818d3d6080	6	-	1	True	2023-05-21 23:03:00.000000 	N/A
*** 1392	448	sihost.exe	0xad8189e94280	11	-	1	False	2023-05-21 22:30:08.000000 	N/A
** 832	676	msdtc.exe	0xad8185861280	9	-	0	False	2023-05-21 22:29:25.000000 	N/A
** 6596	676	TrustedInstall	0xad818dc88080	4	-	0	False	2023-05-21 22:58:13.000000 	N/A
** 5964	676	svchost.exe	0xad818ef86080	5	-	0	False	2023-05-21 22:27:56.000000 	N/A
** 1232	676	svchost.exe	0xad8186f4a2c0	7	-	0	False	2023-05-21 22:29:39.000000 	N/A
** 3028	676	dllhost.exe	0xad8185907080	12	-	0	False	2023-05-21 22:29:20.000000 	N/A
** 1496	676	svchost.exe	0xad81879752c0	12	-	0	False	2023-05-21 22:27:52.000000 	N/A
*** 6324	1496	audiodg.exe	0xad818df2e080	4	-	0	False	2023-05-21 22:42:56.000000 	N/A
** 1116	676	svchost.exe	0xad818c426080	6	-	1	False	2023-05-21 22:31:00.000000 	N/A
** 7772	676	svchost.exe	0xad818e88e140	3	-	0	False	2023-05-21 22:36:03.000000 	N/A
** 1376	676	svchost.exe	0xad81878020c0	15	-	0	False	2023-05-21 22:27:49.000000 	N/A
** 2144	676	vmtoolsd.exe	0xad81896ab080	11	-	0	False	2023-05-21 22:28:19.000000 	N/A
** 1120	676	MsMpEng.exe	0xad818945c080	12	-	0	False	2023-05-21 22:10:01.000000 	N/A
** 1892	676	svchost.exe	0xad8187b34080	14	-	0	False	2023-05-21 22:28:05.000000 	N/A
** 5476	676	svchost.exe	0xad818e752080	9	-	0	False	2023-05-21 22:58:08.000000 	N/A
** 2024	676	svchost.exe	0xad8187b65240	7	-	0	False	2023-05-21 22:28:11.000000 	N/A
** 2152	676	vm3dservice.ex	0xad81896ae240	2	-	0	False	2023-05-21 22:28:19.000000 	N/A
*** 2404	2152	vm3dservice.ex	0xad8186619200	2	-	1	False	2023-05-21 22:28:32.000000 	N/A
** 1644	676	svchost.exe	0xad8187a112c0	6	-	0	False	2023-05-21 22:27:58.000000 	N/A
** 752	676	svchost.exe	0xad8187758280	21	-	0	False	2023-05-21 22:27:43.000000 	N/A
*** 3204	752	ctfmon.exe	0xad8189c8b280	12	-	1	False	2023-05-21 22:30:11.000000 	N/A
** 1012	676	svchost.exe	0xad818774c080	19	-	0	False	2023-05-21 22:27:43.000000 	N/A
** 1652	676	svchost.exe	0xad8187a2d2c0	10	-	0	False	2023-05-21 22:27:58.000000 	N/A
** 4340	676	VSSVC.exe	0xad818e888080	3	-	0	False	2023-05-21 23:01:06.000000 	N/A
** 2044	676	svchost.exe	0xad8189b27080	28	-	0	False	2023-05-21 22:49:29.000000 	N/A
* 852	552	fontdrvhost.ex	0xad818761b0c0	5	-	0	False	2023-05-21 22:27:33.000000 	N/A
588	520	winlogon.exe	0xad8186f450c0	5	-	1	False	2023-05-21 22:27:25.000000 	N/A
* 1016	588	dwm.exe	0xad81876e4340	15	-	1	False	2023-05-21 22:27:38.000000 	N/A
* 3556	588	userinit.exe	0xad818c02f340	0	-	1	False	2023-05-21 22:30:28.000000 	2023-05-21 22:30:43.000000 
** 3580	3556	explorer.exe	0xad818c047340	76	-	1	False	2023-05-21 22:30:28.000000 	N/A
*** 6724	3580	Outline.exe	0xad818e578080	0	-	1	True	2023-05-21 22:36:09.000000 	2023-05-21 23:01:24.000000 
**** 4224	6724	Outline.exe	0xad818e88b080	0	-	1	True	2023-05-21 22:36:23.000000 	2023-05-21 23:01:24.000000 
**** 4628	6724	tun2socks.exe	0xad818de82340	0	-	1	True	2023-05-21 22:40:10.000000 	2023-05-21 23:01:24.000000 
*** 5636	3580	notepad.exe	0xad818db45080	1	-	1	False	2023-05-21 22:46:50.000000 	N/A
*** 464	3580	SecurityHealth	0xad818979d080	3	-	1	False	2023-05-21 22:31:59.000000 	N/A
*** 5328	3580	msedge.exe	0xad818d0980c0	54	-	1	False	2023-05-21 22:32:02.000000 	N/A
**** 4544	5328	msedge.exe	0xad818d75b080	14	-	1	False	2023-05-21 22:32:39.000000 	N/A
**** 8896	5328	msedge.exe	0xad8187a39080	18	-	1	False	2023-05-21 22:28:21.000000 	N/A
**** 5156	5328	msedge.exe	0xad818c553080	14	-	1	False	2023-05-21 22:28:22.000000 	N/A
**** 7964	5328	msedge.exe	0xad818dee5080	19	-	1	False	2023-05-21 22:22:09.000000 	N/A
**** 4396	5328	msedge.exe	0xad818d515080	7	-	1	False	2023-05-21 22:32:19.000000 	N/A
**** 6544	5328	msedge.exe	0xad818c0ea080	18	-	1	False	2023-05-21 22:22:35.000000 	N/A
**** 2388	5328	msedge.exe	0xad818e54c340	18	-	1	False	2023-05-21 22:05:35.000000 	N/A
**** 6292	5328	msedge.exe	0xad818d7a1080	20	-	1	False	2023-05-21 22:06:15.000000 	N/A
**** 1144	5328	msedge.exe	0xad818d75f080	18	-	1	False	2023-05-21 22:32:38.000000 	N/A
**** 5340	5328	msedge.exe	0xad818d7b3080	10	-	1	False	2023-05-21 22:32:39.000000 	N/A
*** 3252	3580	vmtoolsd.exe	0xad8189796300	8	-	1	False	2023-05-21 22:31:59.000000 	N/A
*** 2228	3580	FTK Imager.exe	0xad818d143080	10	-	1	False	2023-05-21 22:43:56.000000 	N/A
*** 8920	3580	FTK Imager.exe	0xad818ef81080	20	-	1	False	2023-05-21 23:02:28.000000 	N/A
* 860	588	fontdrvhost.ex	0xad818761f140	5	-	1	False	2023-05-21 22:27:33.000000 	N/A
5896	8844	oneetx.exe	0xad8189b41080	5	-	1	True	2023-05-21 22:30:56.000000 	N/A
* 7732	5896	rundll32.exe	0xad818d1912c0	1	-	1	True	2023-05-21 22:31:53.000000 	N/A
remnux@remnux:~/Downloads$ 

2.png
末尾に子プロセスが見えます。

Ans: rundll32.exe

What is the memory protection applied to the suspicious process memory region?

これはQ1で確認したmalfindコマンドで確認できます。
1.png
Protectionの欄を確認する。

Ans: PAGE_EXECUTE_READWRITE

What is the name of the process responsible for the VPN connection?

netscanで外部とVPN接続してそうなプロセスを見ます。

remnux@remnux:~/Downloads$ vol3 -f MemoryDump.mem windows.netscan.NetScan
Volatility 3 Framework 2.4.1
Progress:  100.00		PDB scanning finished                        
Offset	Proto	LocalAddr	LocalPort	ForeignAddr	ForeignPort	State	PID	Owner	Created

0xad81861e2310	TCPv4	0.0.0.0	49668	0.0.0.0	0	LISTENING	1840	spoolsv.exe	2023-05-21 22:28:09.000000 
0xad81861e2310	TCPv6	::	49668	::	0	LISTENING	1840	spoolsv.exe	2023-05-21 22:28:09.000000 
0xad81861e2470	TCPv4	0.0.0.0	5040	0.0.0.0	0	LISTENING	1196	svchost.exe	2023-05-21 22:30:31.000000 
0xad81861e2730	TCPv4	0.0.0.0	135	0.0.0.0	0	LISTENING	952	svchost.exe	2023-05-21 22:27:36.000000 
0xad81861e2b50	TCPv4	0.0.0.0	49665	0.0.0.0	0	LISTENING	552	wininit.exe	2023-05-21 22:27:36.000000 
0xad81861e2b50	TCPv6	::	49665	::	0	LISTENING	552	wininit.exe	2023-05-21 22:27:36.000000 
0xad81861e2e10	TCPv4	0.0.0.0	49665	0.0.0.0	0	LISTENING	552	wininit.exe	2023-05-21 22:27:36.000000 
0xad81861e3230	TCPv4	0.0.0.0	49664	0.0.0.0	0	LISTENING	696	lsass.exe	2023-05-21 22:27:36.000000 
0xad81861e3390	TCPv4	0.0.0.0	135	0.0.0.0	0	LISTENING	952	svchost.exe	2023-05-21 22:27:36.000000 
0xad81861e3390	TCPv6	::	135	::	0	LISTENING	952	svchost.exe	2023-05-21 22:27:36.000000 
0xad81861e34f0	TCPv4	0.0.0.0	49664	0.0.0.0	0	LISTENING	696	lsass.exe	2023-05-21 22:27:36.000000 
0xad81861e34f0	TCPv6	::	49664	::	0	LISTENING	696	lsass.exe	2023-05-21 22:27:36.000000 
0xad81861e37b0	TCPv4	0.0.0.0	49666	0.0.0.0	0	LISTENING	1012	svchost.exe	2023-05-21 22:27:49.000000 
0xad81861e37b0	TCPv6	::	49666	::	0	LISTENING	1012	svchost.exe	2023-05-21 22:27:49.000000 
0xad81861e3910	TCPv4	0.0.0.0	49667	0.0.0.0	0	LISTENING	448	svchost.exe	2023-05-21 22:27:58.000000 
0xad81861e3910	TCPv6	::	49667	::	0	LISTENING	448	svchost.exe	2023-05-21 22:27:58.000000 
0xad81861e3a70	TCPv4	0.0.0.0	49668	0.0.0.0	0	LISTENING	1840	spoolsv.exe	2023-05-21 22:28:09.000000 
0xad81861e3bd0	TCPv4	0.0.0.0	49666	0.0.0.0	0	LISTENING	1012	svchost.exe	2023-05-21 22:27:49.000000 
0xad81861e3e90	TCPv4	0.0.0.0	49667	0.0.0.0	0	LISTENING	448	svchost.exe	2023-05-21 22:27:58.000000 
0xad818662ecb0	TCPv4	0.0.0.0	445	0.0.0.0	0	LISTENING	4	System	2023-05-21 22:29:04.000000 
0xad818662ecb0	TCPv6	::	445	::	0	LISTENING	4	System	2023-05-21 22:29:04.000000 
0xad818662f390	TCPv4	0.0.0.0	7680	0.0.0.0	0	LISTENING	5476	svchost.exe	2023-05-21 22:58:09.000000 
0xad818662f390	TCPv6	::	7680	::	0	LISTENING	5476	svchost.exe	2023-05-21 22:58:09.000000 
0xad81878518f0	UDPv4	192.168.190.141	138	*	0		4	System	2023-05-21 22:27:56.000000 
0xad8187852250	UDPv4	192.168.190.141	137	*	0		4	System	2023-05-21 22:27:56.000000 
0xad818902a5d0	TCPv4	192.168.190.141	139	0.0.0.0	0	LISTENING	4	System	2023-05-21 22:27:56.000000 
0xad818971f870	UDPv4	0.0.0.0	56250	*	0		6644	SkypeApp.exe	2023-05-21 22:58:07.000000 
0xad818971f870	UDPv6	::	56250	*	0		6644	SkypeApp.exe	2023-05-21 22:58:07.000000 
0xad81897eb010	TCPv4	10.0.85.2	55439	20.22.207.36	443	CLOSED	448	svchost.exe	2023-05-21 23:00:40.000000 
0xad81898a6d10	UDPv4	127.0.0.1	57787	*	0		448	svchost.exe	2023-05-21 22:28:54.000000 
0xad81898bc7f0	UDPv4	0.0.0.0	5355	*	0		1448	svchost.exe	2023-05-21 22:57:37.000000 
0xad81898bc7f0	UDPv6	::	5355	*	0		1448	svchost.exe	2023-05-21 22:57:37.000000 
0xad8189a291b0	TCPv4	0.0.0.0	55972	0.0.0.0	0	LISTENING	5964	svchost.exe	2023-05-21 22:27:57.000000 
0xad8189a291b0	TCPv6	::	55972	::	0	LISTENING	5964	svchost.exe	2023-05-21 22:27:57.000000 
0xad8189a29470	TCPv4	0.0.0.0	55972	0.0.0.0	0	LISTENING	5964	svchost.exe	2023-05-21 22:27:57.000000 
0xad8189a2a7b0	TCPv4	0.0.0.0	49669	0.0.0.0	0	LISTENING	676	services.exe	2023-05-21 22:29:08.000000 
0xad8189a2a910	TCPv4	0.0.0.0	49669	0.0.0.0	0	LISTENING	676	services.exe	2023-05-21 22:29:08.000000 
0xad8189a2a910	TCPv6	::	49669	::	0	LISTENING	676	services.exe	2023-05-21 22:29:08.000000 
0xad8189a30a20	TCPv4	192.168.190.141	53660	38.121.43.65	443	CLOSED	4628	tun2socks.exe	2023-05-21 22:00:25.000000 
0xad8189a844e0	UDPv4	10.0.85.2	58844	*	0		5328	msedge.exe	2023-05-21 22:51:53.000000 
0xad8189cea350	UDPv4	0.0.0.0	5050	*	0		1196	svchost.exe	2023-05-21 22:30:27.000000 
0xad818c17ada0	UDPv4	0.0.0.0	52051	*	0		4628	tun2socks.exe	2023-05-21 22:24:14.000000 
0xad818c367b30	TCPv4	192.168.190.141	49710	204.79.197.203	443	CLOSE_WAIT	1916	SearchApp.exe	2023-05-21 22:33:09.000000 
0xad818c3b22e0	UDPv4	0.0.0.0	63218	*	0		1448	svchost.exe	2023-05-21 22:39:15.000000 
0xad818c3b22e0	UDPv6	::	63218	*	0		1448	svchost.exe	2023-05-21 22:39:15.000000 
0xad818d004ba0	UDPv4	0.0.0.0	63917	*	0		1448	svchost.exe	2023-05-21 23:02:48.000000 
0xad818d004ba0	UDPv6	::	63917	*	0		1448	svchost.exe	2023-05-21 23:02:48.000000 
0xad818d1bc010	TCPv4	10.0.85.2	55424	52.182.143.208	443	CLOSE_WAIT	6644	SkypeApp.exe	2023-05-21 22:57:59.000000 
0xad818d2f7b00	TCPv4	10.0.85.2	55460	52.159.127.243	443	CLOSED	448	svchost.exe	2023-05-21 23:01:08.000000 
0xad818d5352b0	TCPv4	10.0.85.2	53659	204.79.197.237	443	CLOSED	3580	explorer.exe	2023-05-21 22:00:25.000000 
0xad818da19700	UDPv4	0.0.0.0	500	*	0		448	svchost.exe	2023-05-21 22:27:56.000000 
0xad818da1ab50	UDPv4	0.0.0.0	4500	*	0		448	svchost.exe	2023-05-21 22:27:56.000000 
0xad818da1d8a0	UDPv4	0.0.0.0	4500	*	0		448	svchost.exe	2023-05-21 22:27:56.000000 
0xad818da1d8a0	UDPv6	::	4500	*	0		448	svchost.exe	2023-05-21 22:27:56.000000 
0xad818da1dbc0	UDPv4	0.0.0.0	0	*	0		448	svchost.exe	2023-05-21 22:27:57.000000 
0xad818da1dbc0	UDPv6	::	0	*	0		448	svchost.exe	2023-05-21 22:27:57.000000 
0xad818da1e520	UDPv4	0.0.0.0	0	*	0		448	svchost.exe	2023-05-21 22:27:57.000000 
0xad818da1f010	UDPv4	0.0.0.0	500	*	0		448	svchost.exe	2023-05-21 22:27:56.000000 
0xad818da1f010	UDPv6	::	500	*	0		448	svchost.exe	2023-05-21 22:27:56.000000 
0xad818da202d0	UDPv4	0.0.0.0	0	*	0		5964	svchost.exe	2023-05-21 22:27:57.000000 
0xad818da202d0	UDPv6	::	0	*	0		5964	svchost.exe	2023-05-21 22:27:57.000000 
0xad818da21bd0	UDPv4	0.0.0.0	0	*	0		5964	svchost.exe	2023-05-21 22:27:57.000000 
0xad818dbc1a60	TCPv4	192.168.190.141	49713	104.119.188.96	443	CLOSE_WAIT	1916	SearchApp.exe	2023-05-21 22:33:11.000000 
0xad818dd05370	UDPv4	0.0.0.0	5353	*	0		5328	msedge.exe	2023-05-21 23:01:32.000000 
0xad818dd07440	UDPv4	0.0.0.0	5353	*	0		5328	msedge.exe	2023-05-21 23:01:32.000000 
0xad818dd07440	UDPv6	::	5353	*	0		5328	msedge.exe	2023-05-21 23:01:32.000000 
0xad818de4aa20	TCPv4	10.0.85.2	55462	77.91.124.20	80	CLOSED	5896	oneetx.exe	2023-05-21 23:01:22.000000 
0xad818df1d920	TCPv4	192.168.190.141	55433	38.121.43.65	443	CLOSED	4628	tun2socks.exe	2023-05-21 23:00:02.000000 
0xad818e3698f0	UDPv4	0.0.0.0	5353	*	0		5328	msedge.exe	2023-05-21 22:05:24.000000 
0xad818e3701a0	UDPv4	0.0.0.0	5353	*	0		5328	msedge.exe	2023-05-21 22:05:24.000000 
0xad818e3701a0	UDPv6	::	5353	*	0		5328	msedge.exe	2023-05-21 22:05:24.000000 
0xad818e370b00	UDPv4	0.0.0.0	5353	*	0		5328	msedge.exe	2023-05-21 22:05:24.000000 
0xad818e371dc0	UDPv4	0.0.0.0	5353	*	0		5328	msedge.exe	2023-05-21 22:05:24.000000 
0xad818e371dc0	UDPv6	::	5353	*	0		5328	msedge.exe	2023-05-21 22:05:24.000000 
0xad818e3a1200	UDPv4	0.0.0.0	5355	*	0		1448	svchost.exe	2023-05-21 22:57:37.000000 
0xad818e4a6900	UDPv4	0.0.0.0	0	*	0		5480	oneetx.exe	2023-05-21 22:39:47.000000 
0xad818e4a6900	UDPv6	::	0	*	0		5480	oneetx.exe	2023-05-21 22:39:47.000000 
0xad818e4a9650	UDPv4	0.0.0.0	0	*	0		5480	oneetx.exe	2023-05-21 22:39:47.000000 
0xad818e77da20	TCPv4	192.168.190.141	52434	204.79.197.200	443	CLOSED	-	-	2023-05-21 23:02:20.000000 
0xad818ef06c70	UDPv6	fe80::a406:8c42:43a9:413	1900	*	0		3004	svchost.exe	2023-05-21 22:40:16.000000 
0xad818ef09b50	UDPv6	fe80::4577:874:81a:78cd	1900	*	0		3004	svchost.exe	2023-05-21 22:40:16.000000 
0xad818ef0b5e0	UDPv6	::1	1900	*	0		3004	svchost.exe	2023-05-21 22:40:16.000000 
0xad818ef0ec90	UDPv6	fe80::a406:8c42:43a9:413	55910	*	0		3004	svchost.exe	2023-05-21 22:40:16.000000 
0xad818ef0f140	UDPv6	fe80::4577:874:81a:78cd	55911	*	0		3004	svchost.exe	2023-05-21 22:40:16.000000 
0xad818ef0f2d0	UDPv6	::1	55912	*	0		3004	svchost.exe	2023-05-21 22:40:16.000000 
0xad818ef0fdc0	UDPv4	192.168.190.141	55913	*	0		3004	svchost.exe	2023-05-21 22:40:16.000000 
0xad818ef10270	UDPv4	10.0.85.2	137	*	0		4	System	2023-05-21 22:40:16.000000 
0xad818ef11530	UDPv4	192.168.190.141	1900	*	0		3004	svchost.exe	2023-05-21 22:40:16.000000 
0xad818ef116c0	UDPv4	10.0.85.2	1900	*	0		3004	svchost.exe	2023-05-21 22:40:16.000000 
0xad818ef11850	UDPv4	10.0.85.2	138	*	0		4	System	2023-05-21 22:40:16.000000 
0xad818ef119e0	UDPv4	127.0.0.1	1900	*	0		3004	svchost.exe	2023-05-21 22:40:16.000000 
0xad818ef13150	UDPv4	10.0.85.2	55914	*	0		3004	svchost.exe	2023-05-21 22:40:16.000000 
0xad818ef132e0	UDPv4	127.0.0.1	55915	*	0		3004	svchost.exe	2023-05-21 22:40:16.000000 
0xad818ef77b40	TCPv4	192.168.190.141	55176	192.168.190.2	53	CLOSED	1448	svchost.exe	2023-05-21 23:01:39.000000 
0xad818f88cc80	UDPv4	0.0.0.0	5355	*	0		1448	svchost.exe	2023-05-21 23:01:26.000000 
0xad818f88cc80	UDPv6	::	5355	*	0		1448	svchost.exe	2023-05-21 23:01:26.000000 
0xad818f894340	UDPv4	0.0.0.0	5355	*	0		1448	svchost.exe	2023-05-21 23:01:26.000000 
0xad8190dd8800	UDPv4	0.0.0.0	5353	*	0		1448	svchost.exe	2023-05-21 23:01:25.000000 
0xad8190dd8800	UDPv6	::	5353	*	0		1448	svchost.exe	2023-05-21 23:01:25.000000 
0xad8190dd8990	UDPv4	0.0.0.0	5353	*	0		1448	svchost.exe	2023-05-21 23:01:25.000000 
0xad8190dd97a0	UDPv4	0.0.0.0	0	*	0		1448	svchost.exe	2023-05-21 23:01:25.000000 
0xad8190dd97a0	UDPv6	::	0	*	0		1448	svchost.exe	2023-05-21 23:01:25.000000 
0xad8190e12b10	UDPv6	fe80::a406:8c42:43a9:413	1900	*	0		3004	svchost.exe	2023-05-21 23:01:29.000000 
0xad8190e161c0	UDPv6	::1	1900	*	0		3004	svchost.exe	2023-05-21 23:01:29.000000 
0xad8190e16e40	UDPv4	192.168.190.141	1900	*	0		3004	svchost.exe	2023-05-21 23:01:29.000000 
0xad8190e19230	UDPv6	::1	57094	*	0		3004	svchost.exe	2023-05-21 23:01:29.000000 
0xad8190e1a1d0	UDPv4	192.168.190.141	57095	*	0		3004	svchost.exe	2023-05-21 23:01:29.000000 
0xad8190e1a360	UDPv4	127.0.0.1	57096	*	0		3004	svchost.exe	2023-05-21 23:01:29.000000 
0xad8190e1a680	UDPv4	127.0.0.1	1900	*	0		3004	svchost.exe	2023-05-21 23:01:29.000000 
0xad8190e1acc0	UDPv6	fe80::a406:8c42:43a9:413	57093	*	0		3004	svchost.exe	2023-05-21 23:01:29.000000 
0xad8190e59a60	UDPv4	0.0.0.0	55536	*	0		4628	tun2socks.exe	2023-05-21 23:00:47.000000 
0xad8190e59d80	UDPv4	0.0.0.0	56228	*	0		4628	tun2socks.exe	2023-05-21 23:00:38.000000 
0xad8190e5b040	UDPv4	0.0.0.0	49734	*	0		4628	tun2socks.exe	2023-05-21 23:00:41.000000 

tun2socks.exeが怪しい。回答する。

間違いと言われる。といってもこれくらいでは???
子プロセスの可能性も追ってpstreeで確認した親のOutline.exeも投入しておく。

正解だった。

Ans: Outline.exe

What is the attacker's IP address?

netscanの結果で判断できる。
5.png

Ans: 77.91.124.20

Based on the previous artifacts. What is the name of the malware family?

こいつのファイルダンプを取ってVirusTotalで検索することとする。
filescanコマンドでアドレスを確認する。

remnux@remnux:~/Downloads$ vol3 -f MemoryDump.mem windows.filescan.FileScan | grep oneetx.exe
0xad818d436c70.0\Users\Tammam\AppData\Local\Temp\c3912af058\oneetx.exe	216
0xad818da36c30	\Users\Tammam\AppData\Local\Temp\c3912af058\oneetx.exe	216
0xad818ef1a0b0	\Users\Tammam\AppData\Local\Temp\c3912af058\oneetx.exe	216
remnux@remnux:~/Downloads$ 

このアドレスでダンプを取り、ハッシュ値を取る。

remnux@remnux:~/Downloads$ vol3 -f MemoryDump.mem -o out windows.dumpfiles.DumpFiles --virtaddr=0xad818d436c70
Volatility 3 Framework 2.4.1
Progress:  100.00		PDB scanning finished                        
Cache	FileObject	FileName	Result

ImageSectionObject	0xad818d436c70	oneetx.exe	file.0xad818d436c70.0xad818ca48660.ImageSectionObject.oneetx.exe.img
remnux@remnux:~/Downloads$ cd out/
remnux@remnux:~/Downloads/out$ sha256sum file.0xad818d436c70.0xad818ca48660.ImageSectionObject.oneetx.exe.img
8d5d5bbdccb82a10ac28e2779ba0821f12da3e1f08f03ec467ce213a6fccf38c  file.0xad818d436c70.0xad818ca48660.ImageSectionObject.oneetx.exe.img
remnux@remnux:~/Downloads/out$

このハッシュ値を以下のVTで確認!

6-1.png

それっぽいファミリー表示はなかった。
まぁファイルなので情報は偽装や隠蔽をされていると思うが、Stringsで表層解析もしておく。

remnux@remnux:~/Downloads/out$ strings -e l file.0xad818d436c70.0xad818ca48660.ImageSectionObject.oneetx.exe.img | more
VS_VERSION_INFO
VarFileInfo
Translation
StringFileInfo
000004b0
Comments
Ps 5 Game
CompanyName
FileDescription
Midnight Suns
FileVersion
5.14.22.1
InternalName
Piperazine.exe
LegalCopyright
Marvel Corp.
LegalTrademarks
OriginalFilename
Piperazine.exe
ProductName
Marvel md
ProductVersion
5.14.22.1
Assembly Version
131.32.5.3
remnux@remnux:~/Downloads/out$ 

調べてみたが、良さそうな情報はない。
ならメモリダンプのほうを取得する。以下のコマンドを打つ。

remnux@remnux:~/Downloads$ vol3 -f MemoryDump.mem -o out windows.memmap.Memmap --pid 5896 --dump

取れたメモリダンプでC2辺りの情報を取得しようということでStringsでgrepをかける。
6-1-1.png
お、このアドレスってさっきのC2じゃなかったか。。。
このアドレスをURLhausで確認してみる。(full pathは引っかからなかった。)

6-2.png
ファミリー名が見えたので回答。

Ans: RedLine Stealer

What is the full URL of the PHP file that the attacker visited?

さっきの調査の時に確認できている。
※defang実施

Ans: hxxp://77.91.124.20/store/games/index.php

What is the full path of the malicious executable?

これもさっきのファイルダンプ取得の時に確認している。
Cドライブを引っ付けて回答。

Ans: C:\Users\Tammam\AppData\Local\Temp\c3912af058\oneetx.exe

最後に

メモリフォレンジック、Volatility3入門問題かなといった感じでした。
EasyなのでRedline Stealerをガチガチに見ていくというわけではないです。メモリフォレンジック問はこんな感じかなと思います。

ファミリー表示は問題に書いてあったのに最後の問題の答えがわかってしまうまで拘ってしまった。

今回もセキュリティエンジニアの皆さんの助けになればなと思います。

3
0
0

Register as a new user and use Qiita more conveniently

  1. You get articles that match your needs
  2. You can efficiently read back useful information
  3. You can use dark theme
What you can do with signing up
3
0

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?