← Back to Index

CyberDefenders - Brave

Created: 15/06/2024 21:03 Last Updated: 16/06/2024 01:14


Category: Endpoint Forensics Tags: Memory Forensic, Volatility, Brave, T1041, T1204, T1071.001, T1003, T1083, T1082


A memory image was taken from a seized Windows machine. As a security blue team analyst, analyze the image and answer the provided questions.

Tools: - Volatility 3 - CertUtil - HxD


Questions

Q1: What time was the RAM image acquired according to the suspect system? (YYYY-MM-DD HH:MM:SS)

8447bd78411f32e78d38b18c5695d7a6.png

We will use vol3 -f 20210430-Win10Home-20H2-64bit-memdump.mem windows.info to display system information including system time when this memory dump was captured

2021-04-30 17:52:19

Q2: What is the SHA256 hash value of the RAM image?

e5d4cde2fced1ed5b84db25b4031cd8e.png

Use your hash calculator to calculate filehash and if you're on linux distro then use sha256sum 20210430-Win10Home-20H2-64bit-memdump.mem

9db01b1e7b19a3b2113bfb65e860fffd7a1630bdf2b18613d206ebf2aa0ea172

Q3: What is the process ID of "brave.exe"?

ddf8f59702b065af47fcbe063d43fd0c.png

Easily done with vol3 -f 20210430-Win10Home-20H2-64bit-memdump.mem windows.pstree > pstree.txt

Why piping it to text file?

because I want to keep an output from pstree plugin in a text file so we can review it later and you can see that there is only 1 brave.exe process that already exited

4856

Q4: How many established network connections were there at the time of acquisition? (number)

da65309b9c059000e757621034b4335f.png

First off, we will use vol3 -f 20210430-Win10Home-20H2-64bit-memdump.mem windows.netscan > netscan.txt to list all network connection and send it to a text file

so we can use grep -i "established" netscan.txt | wc -l to count all established connections

10

Q5: What FQDN does Chrome have an established network connection with?

38772717f50416ab5e537925cf066421.png

get an IP address that chrome established connection to

ebcdc7edecb49ec467000ed6c3fcf573.png

Then put it in Reverse IP lookup tool which we can see that this IP address belongs to protonmail

protonmail.ch

Q6: What is the MD5 hash value of process executable for PID 6988?

3613bf6afd9304c0f3967b72f799af11.png

Lets dump this process with vol3 -f 20210430-Win10Home-20H2-64bit-memdump.mem windows.pslist --pid 6988 --dump then use md5sum to calculate file hash

0b493d8e26f03ccd2060e0be85f430af

Q7: What is the word starting at offset 0x45BE876 with a length of 6 bytes?

3fe15f1b49eaf3d11f9e5319c840b09e.png

I switched to FlareVM that has HxD installed then after opened this memory dump with HxD, Click "Search" > "Go to" > Put an offset inside Offset box > "Ok"

Then we will see the word "hacker" perfectly matches what we're looking for

hacker

Q8: What is the creation date and time of the parent process of "powershell.exe"? (YYYY-MM-DD HH:MM:SS)

4a66f4c4f2e31c76955e27fec9efa682.png

Go back to our pstree text file, we can see that powershell process was spawned under explorer process so we will have to get create time of explorer.exe process

2021-04-30 17:39:48

Q9: What is the full path and name of the last file opened in notepad?

cb2e8eef2e390fffc71cd8adb6745712.png

We will try vol3 -f 20210430-Win10Home-20H2-64bit-memdump.mem windows.cmdline first because normally when we opened a file with notepad, notepad process will be executed with a path of that file.

And it worked just fine

C:\Users\JOHNDO~1\AppData\Local\Temp\7zO4FB31F24\accountNum

Q10: How long did the suspect use Brave browser? (hh:mm:ss)

04df67c8ec7cc9245f4ef55a40908760.png

If you thought that the time between process creation and process end time might be the answer, sadly its incorrect

So we will shift our focus to UserAssist key that store an information about how many times each application were launched and duration that were used.

f934a3b9ae0ba241f7e0b564627a0811.png

So we will use vol3 -f 20210430-Win10Home-20H2-64bit-memdump.mem windows.registry.userassist > userassist.txt && grep -i "brave" userassist.txt to save an output to text file and find any "brave" string within this text file, we will see that Brave were running for 4 hours!

04:01:54

e2cec96aef0a7ba232367d967cb0a18a.png