Memory Challenge 13: TeamSpy
嗯,用户让我总结一篇文章的内容,控制在一百个字以内,而且不需要特定的开头。首先,我得仔细阅读文章内容。文章讲的是测试内存分析包,解决一个员工机器异常的问题。员工收到可疑邮件后,机器出现异常,IR团队做了内存转储。分析过程包括识别可疑进程、提取TeamViewer密码、提取Outlook PST文件,然后找出相关邮件地址、比特币钱包和VBA函数。最后还去混淆字符串,恢复恶意载荷下载的IP。 用户的需求是简洁的总结,所以我要抓住关键点:内存分析、异常原因、提取信息和恢复IP。这样就能在100字内准确传达主要内容了。 </think> 测试内存分析工具包以解决员工机器异常问题,提取TeamViewer密码和Outlook PST文件,识别相关邮件地址、比特币钱包及VBA函数,并恢复恶意载荷下载IP地址。 2025-12-16 11:39:6 Author: blog.cerbero.io(查看原文) 阅读量:7 收藏

Skip to content

We’re testing our Memory Analysis package (currently in beta) against various challenges available online.

We found this challenge on the Memory Forensic site, so credit goes to them for highlighting it and to CyberDefenders for creating it in the first place.

The scenario is as follows:

“An employee reported that his machine started to act strangely after receiving a suspicious email with a document file. The incident response team captured a couple of memory dumps from the suspected machines for further inspection. As a soc analyst, analyze the dumps and help the IR team figure out what happened!”

We address some of the questions raised by the challenge. We identify the suspicious process, determine the TeamViewer version and then extract the TeamViewer password from the process’s user-mode memory. We then carve the Outlook PST file from memory and examine it directly in our workspace. From there, we identify the involved email addresses, the BTC wallet and the VBA function that returns the string executed on the system. As a bonus, we deobfuscate that string and recover the IP address used to download the malicious payload.


文章来源: https://blog.cerbero.io/memory-challenge-13-teamspy/
如有侵权请联系:admin#unsafe.sh