top of page

HackTheBox Forensics Challenge (Reminiscent) Write-Up

  • contactalex871
  • Feb 25
  • 1 min read

Step 1: Install volatility 3


Step 2: check the list of processes in the captured RAM image

ree

(can’t tell much simply from this, but will refer back to this later)


Step 3: check live connections 

From the given file Resume.eml, there’s an IP address that has the resume file.

ree

By doing a netscan, the powershell.exe has the same IP address. That looks suspicious.

*port 80 is the port number assigned to commonly used internet communication protocol. 

(shown below)

ree

Step 4: check the command line used in calling powershell.exe

(the PID for powershell.exe is 2752)

ree

Step 5: store the string after -enc and decode it using base64.

ree

Comments


bottom of page