Sysinternals
Link Lab : https://cyberdefenders.org/blueteam-ctf-challenges/sysinternals/
Last updated
Link Lab : https://cyberdefenders.org/blueteam-ctf-challenges/sysinternals/
Last updated
Q1 What was the malicious executable file name that the user downloaded?
Answer : Sysinternals.exe
Q2 When was the last time the malicious executable file was modified? 12-hour format
Answer : 11/15/2022 09:18:51 PM
Q3 What is the SHA1 hash value of the malware?
Answer :
Q4 What is the malware's family?
Answer : rozena
Q5 What is the first mapped domain's Fully Qualified Domain Name (FQDN)?
Answer : www.malware430.com
Q6 The mapped domain is linked to an IP address. What is that IP address?
The previous picture also given the ip address needed too
Answer :
Q7 What is the name of the executable dropped by the first-stage executable?
Found another sample on Hybid Analysis :
So find the executable dropped by the first-stage executable -> Create another process when running file -> move to find it at Spawn new Process Tag
Move to the process :
Answer : vmtoolsIO.exe
Q8 What is the name of the service installed by 2nd stage executable?
Also contain the Service from Hybid result too .
Answer : VMwareIOHelperService
Q9 What is the extension of files deleted by the 2nd stage executable?
Prefetch file are great artifacts for forensic investigators trying to analyze applications that have been run on a system-> https://www.magnetforensics.com/blog/forensic-analysis-of-prefetch-files-in-windows/
Answer : pf