Memory Challenge 11: BOughT
嗯,用户让我帮忙总结一篇文章的内容,控制在一百个字以内,而且不需要特定的开头。首先,我需要仔细阅读文章内容,抓住主要信息。 文章讲的是一个测试内存分析软件包的挑战,来自Hack The Box。场景是一个非技术人员买了二手电脑,遇到网络问题,比如“服务器未找到”和视频流困难。检查显示网络没问题,所以怀疑有恶意软件。 接下来,他们通过内存分析发现可疑进程和互斥对象(mutex),然后反编译应用,分析反调试技术,并查看它打开的文件。使用AD1 Format包访问磁盘 artifacts,检查config.ini文件,提取目标网站的FQDN。 总结时要涵盖:测试内存分析软件、挑战来源、客户情况、问题表现、分析过程和结果。确保在100字以内,并且直接描述内容。 </think> 测试内存分析软件包时发现一网络问题案例:客户购买二手电脑后出现"服务器未找"和视频流困难。通过内存分析发现可疑进程及互斥对象,并反编译应用确认恶意软件关联。最终提取目标网站FQDN以解决网络异常。 2025-12-8 14:6:5 Author: blog.cerbero.io(查看原文) 阅读量:5 收藏

Skip to content

We’re testing our Memory Analysis package (currently in beta) against various challenges available online.

We found this challenge on Hack The Box, so credit goes to them for creating it.

The scenario is as follows:

“A non-technical client recently purchased a used computer for personal use from a stranger they encountered online. Since acquiring the computer, the client has been using it without making any changes, specifically not installing or uninstalling any software. However, they have begun experiencing issues related to internet connectivity. This includes receiving error messages such as “Server Not Found” and encountering difficulties with video streaming. Despite these problems, checks with the Windows Network Troubleshooter indicate no issues with the internet connection itself. The client has provided a memory image and disk artifacts for investigation to determine if there are any underlying issues causing these problems.”

The challenge includes several questions. We begin by identifying the suspicious process and examining the mutex it creates. To confirm that the mutex is associated with the malware, we decompile the application directly within the memory dump, analyze its anti-debugging technique, and observe one of the files it opens on disk. Using the AD1 Format package, we can access the disk artifacts to inspect the config.ini file accessed by the malware and extract the FQDN of the target website.


文章来源: https://blog.cerbero.io/memory-challenge-11-bought/
如有侵权请联系:admin#unsafe.sh