Amadey Write-up
Last updated
Last updated
الØÙ…د لله والصلاة والسلام على رسول الله وعلى آله ÙˆØµØØ¨Ù‡ أما بعد
Ensure that there are no blockers, such as Adblock extensions, that might prevent the lab from opening in a new tab or affect lab’s functionality.
All the lab-related files and tools are on the desktop in ‘Start here’ directory.
An after-hours alert from the Endpoint Detection and Response (EDR) system flags suspicious activity on a Windows workstation. The flagged malware align with the Amadey Trojan Stealer. Your job is to analyze the presented memory dump and create a detailed report for actions taken by the malware.
Link:
Medium:
Command: python3 [vol.py](<http://vol.py/>) -f /home/ubuntu/Desktop/Start\\ here/Artifacts/Windows\\ 7\\ x64-Snapshot4.vmem windows.pstree
I noticed a strange name that resembles lsass, but as in the picture there is a trailing letter in the suspicious process
Answer: lssass.exe
Command: python3 [vol.py](<http://vol.py/>) -f /home/ubuntu/Desktop/Start\\ here/Artifacts/Windows\\ 7\\ x64-Snapshot4.vmem cmdline | grep lssass.exe
Answer: C:\Users\0XSH3R~1\AppData\Local\Temp\925e7e99c5\lssass.exe
Command: python3 [vol.py](<http://vol.py/>) -f /home/ubuntu/Desktop/Start\\ here/Artifacts/Windows\\ 7\\ x64-Snapshot4.vmem netscan | grep lssass.exe
Answer: 41.75.84.12
Command1: python3 [vol.py](<http://vol.py/>) -f /home/ubuntu/Desktop/Start\\ here/Artifacts/Windows\\ 7\\ x64-Snapshot4.vmem windows.memmap.Memmap --pid 2748 --dump
After Dump the data use this command for get http requests
Command2: strings pid.2748.dmp | grep 'GET /’
Answer: 2
Command: python3 [vol.py](<http://vol.py/>) -f /home/ubuntu/Desktop/Start\\ here/Artifacts/Windows\\ 7\\ x64-Snapshot4.vmem cmdline | grep dll
Answer: C:\Users\0xSh3rl0ck\AppData\Roaming\116711e5a2ab05\clip64.dll
If you notice from the previous picture, you will know the answer or run the firest command
Command : python3 [vol.py](<http://vol.py/>) -f /home/ubuntu/Desktop/Start\\ here/Artifacts/Windows\\ 7\\ x64-Snapshot4.vmem windows.pstree
Anser: rundll32.exe
Command: python3 [vol.py](<http://vol.py/>) -f /home/ubuntu/Desktop/Start\\ here/Artifacts/Windows\\ 7\\ x64-Snapshot4.vmem filescan | grep lssass.exe
Answer: C:\Windows\System32\Tasks\lssass.exe
Blog: /
Linkedin:
Facebook:
Tryhackme: