FlareVM: Arsenal of Tools| TryHackMe — Writeup

Jynxx
2 min readNov 3, 2024

--

Task 2

Which tool is an Open-source debugger for binaries in x64 and x32 formats?

x64dbg

.

What tool is designed to analyze and edit Portable Executable (PE) files?

CFF Explorer

.

Which tool is considered a sophisticated memory editor and process watcher?

Process Hacker

.

Which tool is used for Disc image acquisition and analysis for forensic use?

FTK Imager

.

What tool can be used to view and edit a binary file?

HxD

Task 3

Which tool was formerly known as FLARE Obfuscated String Solver?

FLOSS

.

Which tool offers in-depth insights into the active processes running on your computer?

Process Explorer

.

By using the Process Explorer (procexp) tool, under what process can we find smss.exe?

System

.

Which powerful Windows tool is designed to help you record issues with your system’s apps?

Procmon

.

Which tool can be used for Static analysis or studying executable file properties without running the files?

PEStudio

.

Using the tool PEStudio to open the file cryptominer.bin in the Desktop\Sample folder, what is the sha256 value of the file?

E9627EBAAC562067759681DCEBA8DDE8D83B1D813AF8181948C549E342F67C0E

.

Using the tool PEStudio to open the file cryptominer.bin in the Desktop\Sample folder, how many functions does it have?

102

.

What tool can generate file hashes for integrity verification, authenticate the source of system files, and validate their validity?

CFF Explorer

.

Using the tool CFF Explorer to open the file possible_medusa.txt in the Desktop\Sample folder, what is the MD5 of the file?

646698572AFBBF24F50EC5681FEB2DB7

.

Use the CFF Explorer tool to open the file possible_medusa.txt in the Desktop\Sample folder. Then, go to the DOS Header Section. What is the e_magic value of the file?

5A4D

Task 4

Using PEStudio, open the file windows.exe. What is the entropy value of the file windows.exe?

7.999

.

Using PEStudio, open the file windows.exe, then go to manifest (administrator section). What is the value under requestedExecutionLevel?

requireAdministrator

.

Which function allows the process to use the operating system’s shell to execute other processes?

set_UseShellExecute

.

Which API starts with R and indicates that the executable uses cryptographic functions?

RijndaelManaged

.

What is the Imphash of cobaltstrike.exe?

92EEF189FB188C541CBD83AC8BA4ACF5

.

What is the defanged IP address to which the process cobaltstrike.exe is connecting?

47[.]120[.]46[.]210

.

What is the destination port number used by cobaltstrike.exe when connecting to its C2 IP Address?

81

.

During our analysis, we found a process called cobaltstrike.exe. What is the parent process of cobaltstrike.exe?

explorer.exe

--

--

No responses yet