Introduction
The supplied memory image was captured on a compromised machine, analyze it to answer questions (this is the same image for the four forensic tests, useless to download several times).
The validation key of the challenge is given by the PID, PPID and the number of threads of the Solitaire program. Put it to the format PID:PPID:nThreads.
dump.gz (md5sum:1273931ce359f59bce95ce4507e1f4bf)
Informations
First, we must find the OS on which the memory dump was performed.
For that, we execute volatility with the command :
volatility imageinfo -f dump
This gives us:
Suggested Profile(s) : Win7SP0x86, Win7SP1x86
AS Layer1 : IA32PagedMemoryPae (Kernel AS)
AS Layer2 : VirtualBoxCoreDumpElf64 (Unnamed AS)
AS Layer3 : FileAddressSpace (forensic1.img)
PAE type : PAE
DTB : 0x185000L
KDBG : 0x82746be8
Number of Processors : 1
Image Type (Service Pack) : 0
KPCR for CPU 0 : 0x82747c00
KUSER_SHARED_DATA : 0xffdf0000
Image date and time : 2015-03-06 09:28:16 UTC+0000
Image local date and time : 2015-03-06 10:28:16 +0100
Look up and resolve
We learn that this ram dump probably comes from a Windows 7 (32 bit).
We list the process to find the solitaire.exe process:
volatility –profile=Win7SP0x86 -f dump pstree
This gives us:
Name Pid PPid Thds Hnds Time
-------------------------------------------------- ------ ------ ------ ------ ----
0x84c29d40:csrss.exe 320 312 9 340 2015-03-06 08:25:03 UTC+0000
0x8584cd40:wininit.exe 368 312 3 74 2015-03-06 08:25:04 UTC+0000
. 0x85996758:services.exe 464 368 7 202 2015-03-06 08:25:06 UTC+0000
.. 0x83fa9030:taskhost.exe 1024 464 10 208 2015-03-06 08:32:46 UTC+0000
.. 0x85a35030:svchost.exe 576 464 10 353 2015-03-06 08:25:09 UTC+0000
.. 0x83e65190:taskhost.exe 3692 464 5 90 2015-03-06 08:46:23 UTC+0000
.. 0x856edd40:svchost.exe 780 464 19 511 2015-03-06 08:25:11 UTC+0000
... 0x83fd1d40:dwm.exe 1568 780 3 83 2015-03-06 08:32:47 UTC+0000
... 0x83e70a00:dwm.exe 2288 780 3 69 2015-03-06 09:21:23 UTC+0000
.. 0x83f7f5a0:taskhost.exe 3308 464 5 91 2015-03-06 09:21:28 UTC+0000
.. 0x83e8d930:svchost.exe 300 464 14 329 2015-03-06 08:26:32 UTC+0000
.. 0x85735030:svchost.exe 692 464 20 525 2015-03-06 08:25:10 UTC+0000
... 0x840c9030:audiodg.exe 1072 692 8 144 2015-03-06 08:38:08 UTC+0000
.. 0x841b72b0:taskhost.exe 2884 464 10 163 2015-03-06 09:21:23 UTC+0000
.. 0x85b7c030:svchost.exe 1484 464 16 303 2015-03-06 08:25:26 UTC+0000
.. 0x85b3e630:svchost.exe 1364 464 18 305 2015-03-06 08:25:26 UTC+0000
.. 0x8570cc88:svchost.exe 804 464 28 982 2015-03-06 08:25:11 UTC+0000
.. 0x85b30030:spoolsv.exe 1316 464 13 265 2015-03-06 08:25:26 UTC+0000
.. 0x85a349b8:svchost.exe 1116 464 16 414 2015-03-06 08:25:16 UTC+0000
.. 0x83ebd030:SearchIndexer. 1444 464 14 995 2015-03-06 08:27:29 UTC+0000
... 0x85b40848:SearchFilterHo 2572 1444 5 87 2015-03-06 09:27:49 UTC+0000
... 0x83f59720:SearchProtocol 280 1444 7 240 2015-03-06 09:27:38 UTC+0000
.. 0x8577cc88:svchost.exe 1004 464 18 415 2015-03-06 08:25:14 UTC+0000
.. 0x85c13030:sppsvc.exe 1400 464 5 147 2015-03-06 08:27:29 UTC+0000
.. 0x85757030:svchost.exe 636 464 8 289 2015-03-06 08:25:10 UTC+0000
. 0x859ab5b0:lsass.exe 480 368 7 676 2015-03-06 08:25:06 UTC+0000
. 0x859a8590:lsm.exe 488 368 10 174 2015-03-06 08:25:06 UTC+0000
0x83f82920:explorer.exe 1312 988 20 814 2015-03-06 08:32:47 UTC+0000
. 0x84729030:Solitaire.exe 2992 1312 8 218 2015-03-06 08:43:46 UTC+0000
. 0x8409d688:calc.exe 2192 1312 3 72 2015-03-06 08:42:27 UTC+0000
. 0x85710538:notepad.exe 2964 1312 1 57 2015-03-06 08:43:38 UTC+0000
. 0x8418a030:firefox.exe 2584 1312 51 580 2015-03-06 08:42:38 UTC+0000
. 0x84004540:jusched.exe 376 1312 4 195 2015-03-06 08:32:48 UTC+0000
.. 0x83fbc8c8:jucheck.exe 1280 376 5 217 2015-03-06 08:37:49 UTC+0000
. 0x84033030:iexplore.exe 1088 1312 10 368 2015-03-06 08:42:00 UTC+0000
.. 0x841dba88:iexplore.exe 2456 1088 9 258 2015-03-06 08:49:00 UTC+0000
.. 0x84126340:iexplore.exe 3916 1088 0 ------ 2015-03-06 08:46:45 UTC+0000
... 0x83e4ed40:notepad.exe 4088 3916 4 144 2015-03-06 08:47:29 UTC+0000
.... 0x83e6dac8:iexplore.exe 3468 4088 1 7 2015-03-06 09:13:16 UTC+0000
.. 0x85ad8928:iexplore.exe 2144 1088 10 283 2015-03-06 08:51:08 UTC+0000
. 0x8408d220:wmplayer.exe 3148 1312 23 577 2015-03-06 08:44:00 UTC+0000
. 0x84006938:StikyNot.exe 2000 1312 8 129 2015-03-06 08:32:48 UTC+0000
0x83d33bb0:System 4 0 81 685 2015-03-06 08:24:52 UTC+0000
. 0x84c748f8:smss.exe 248 4 2 32 2015-03-06 08:24:52 UTC+0000
0x858682b8:winlogon.exe 420 360 3 108 2015-03-06 08:25:04 UTC+0000
0x8584ed40:csrss.exe 380 360 7 348 2015-03-06 08:25:04 UTC+0000
. 0x83e85a80:conhost.exe 3392 380 1 32 2015-03-06 09:13:16 UTC+0000
0x85cba2b8:csrss.exe 2472 796 7 154 2015-03-06 09:21:07 UTC+0000
0x841e3030:winlogon.exe 2012 796 5 113 2015-03-06 09:21:07 UTC+0000
0x84af2950:explorer.exe 2232 2296 21 626 2015-03-06 09:21:23 UTC+0000
. 0x840c5550:jusched.exe 3232 2232 6 137 2015-03-06 09:21:25 UTC+0000
Result
We find in the list the solitary executable with the necessary information for validation:
. 0x84729030:Solitaire.exe 2992 1312 8 218 2015-03-06 08:43:46 UTC+0000
Flag is “2992:1312:8“.