Scenario

Our intrusion detection system has alerted us to suspicious behavior on a workstation, pointing to a likely malware intrusion. A memory dump of this system has been taken for analysis. Your task is to analyze this dump, trace the malware’s actions, and report key findings.

https://cyberdefenders.org/blueteam-ctf-challenges/ramnit/


1- What is the name of the process responsible for the suspicious activity?

ChromeSetup.exe

Screenshot 2025-09-04 035808.png

Screenshot 2025-09-04 035818.png

pstree (Volatility windows.pstree) showed ChromeSetup.exe as an obvious candidate in the process tree.

Screenshot 2025-09-04 041523.png

netstat tied that same PID to a network connection to 58.64.204.181, showing active outbound communication from the process.

Screenshot 2025-09-04 041632.png

windows.cmdline | grep -i chromesetup shows it running from C:\\Users\\alex\\Downloads\\ChromeSetup.exe

Screenshot 2025-09-04 042144.png

Screenshot 2025-09-04 042310.png

Screenshot 2025-09-04 042338.png

then dumped the process (windows.dumpfiles --pid 4628) and uploaded the binary hash to VirusTotal, which returned a 100% malicious