Sierra Leone - Simple Forensic

I'm unable to provide the files as they are too big. However, you may be able to download them from the organiser's google drive links here and here.

I started out by using volatility to inspect the processes running within the memory dump:

vol -f ./memdump.mem windows.pslist
PID     PPID    ImageFileName   Offset(V)       Threads Handles SessionId       Wow64   CreateTime      ExitTime       File output

4       0       System  0xbe077a092040  148     -       N/A     False   2025-09-10 06:56:09.000000 UTC  N/A     Disabled
108     4       Registry        0xbe077a099080  4       -       N/A     False   2025-09-10 06:56:04.000000 UTC  N/A    Disabled
388     4       smss.exe        0xbe077ae4d040  2       -       N/A     False   2025-09-10 06:56:09.000000 UTC  N/A    Disabled
504     480     csrss.exe       0xbe077b007080  12      -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
580     480     wininit.exe     0xbe077bc6f080  1       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
588     572     csrss.exe       0xbe077bc74140  15      -       1       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
688     572     winlogon.exe    0xbe077bce4080  5       -       1       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
720     580     services.exe    0xbe077bd190c0  7       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
740     580     lsass.exe       0xbe077bd2c080  10      -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
872     720     svchost.exe     0xbe077bd8d280  11      -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
892     580     fontdrvhost.ex  0xbe077bddb180  5       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
900     688     fontdrvhost.ex  0xbe077bdd9180  5       -       1       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
1004    720     svchost.exe     0xbe077ca11300  11      -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
440     720     svchost.exe     0xbe077ca84280  5       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
1036    720     svchost.exe     0xbe077cb0d340  7       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
1084    720     svchost.exe     0xbe077cb0f2c0  1       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
1092    720     svchost.exe     0xbe077cb63340  3       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
1164    688     dwm.exe 0xbe077cb41080  14      -       1       False   2025-09-10 06:56:10.000000 UTC  N/A     Disabled
1180    688     LogonUI.exe     0xbe077cb430c0  0       -       1       False   2025-09-10 06:56:10.000000 UTC  2025-09-10 06:56:36.000000 UTC  Disabled
1196    720     svchost.exe     0xbe077cb45300  4       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
1256    720     svchost.exe     0xbe077cbae340  5       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
1388    720     svchost.exe     0xbe077cc130c0  7       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
1456    720     svchost.exe     0xbe077cc88300  6       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
1476    720     svchost.exe     0xbe077ccab300  2       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
1500    720     svchost.exe     0xbe077cc35080  4       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
1552    720     svchost.exe     0xbe077ccea300  3       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
1568    720     svchost.exe     0xbe077ccc92c0  3       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
1576    720     svchost.exe     0xbe077ccca080  3       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
1696    720     svchost.exe     0xbe077cd43280  7       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
1716    4       MemCompression  0xbe077cd42040  22      -       N/A     False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
1756    720     svchost.exe     0xbe077cd65300  6       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
1768    720     svchost.exe     0xbe077cd85080  2       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
1868    720     svchost.exe     0xbe077ce3b340  1       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
1880    720     svchost.exe     0xbe077ce3c080  2       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
1892    720     svchost.exe     0xbe077ce3d080  6       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
1468    720     svchost.exe     0xbe077cf26300  12      -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
2172    720     svchost.exe     0xbe077a08e300  7       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
2180    720     svchost.exe     0xbe077cfc8300  9       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
2188    720     svchost.exe     0xbe077a0a20c0  3       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
2216    720     svchost.exe     0xbe077a12b080  4       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
2288    720     svchost.exe     0xbe077a0e7080  2       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
2412    720     spoolsv.exe     0xbe07800c80c0  7       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
2424    720     svchost.exe     0xbe07800c1340  5       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
2476    720     svchost.exe     0xbe077a17c080  12      -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
2512    720     svchost.exe     0xbe077a16f080  5       -       0       False   2025-09-10 06:56:10.000000 UTC  N/A    Disabled
2720    720     svchost.exe     0xbe077a164080  22      -       0       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
2728    720     svchost.exe     0xbe077a162080  9       -       0       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
2736    720     svchost.exe     0xbe077a084080  10      -       0       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
2744    720     svchost.exe     0xbe077bcda300  1       -       0       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
2760    720     MpDefenderCore  0xbe07801a9080  10      -       0       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
2768    720     svchost.exe     0xbe07801a6300  16      -       0       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
2780    720     VGAuthService.  0xbe07801a8340  2       -       0       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
2788    720     svchost.exe     0xbe07801a7080  3       -       0       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
2812    720     vmtoolsd.exe    0xbe07801ad2c0  11      -       0       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
2820    720     vm3dservice.ex  0xbe07801ab280  2       -       0       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
2860    720     MsMpEng.exe     0xbe0780194080  27      -       0       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
2868    720     svchost.exe     0xbe0780193280  4       -       0       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
2904    720     svchost.exe     0xbe078022f280  6       -       0       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
3040    2820    vm3dservice.ex  0xbe07802d4080  2       -       1       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
3056    720     svchost.exe     0xbe07802d7300  5       -       0       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
3236    720     svchost.exe     0xbe07803a1300  2       -       0       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
3364    720     svchost.exe     0xbe07803d2080  11      -       0       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
3384    1696    sihost.exe      0xbe078039f300  8       -       1       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
3456    720     SearchIndexer.  0xbe07804b0280  16      -       0       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
3544    720     svchost.exe     0xbe0780506080  10      -       1       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
3788    720     svchost.exe     0xbe0780564300  4       -       1       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
3828    720     dllhost.exe     0xbe078058c2c0  10      -       0       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
3928    1388    taskhostw.exe   0xbe078062a080  9       -       1       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
3944    1388    MicrosoftEdgeU  0xbe078061f080  4       -       0       True    2025-09-10 06:56:11.000000 UTC  N/A    Disabled
4028    720     svchost.exe     0xbe0780623300  2       -       0       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
3808    872     WmiPrvSE.exe    0xbe07805e62c0  12      -       0       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
3724    872     dllhost.exe     0xbe07805d62c0  5       -       0       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
3876    720     svchost.exe     0xbe078084b2c0  3       -       0       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
4244    3876    ctfmon.exe      0xbe078089d0c0  16      -       1       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
4324    720     svchost.exe     0xbe0780925300  8       -       0       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
4364    688     userinit.exe    0xbe078093c080  0       -       1       False   2025-09-10 06:56:11.000000 UTC  2025-09-10 06:56:32.000000 UTC  Disabled
4428    4364    explorer.exe    0xbe078093a080  88      -       1       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
4592    720     svchost.exe     0xbe0780a3b300  5       -       0       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
4824    720     svchost.exe     0xbe07805df300  7       -       1       False   2025-09-10 06:56:11.000000 UTC  N/A    Disabled
4980    720     msdtc.exe       0xbe0780c082c0  9       -       0       False   2025-09-10 06:56:12.000000 UTC  N/A    Disabled
5208    2736    AggregatorHost  0xbe07803d0080  2       -       0       False   2025-09-10 06:56:12.000000 UTC  N/A    Disabled
5284    872     StartMenuExper  0xbe0780c7e080  8       -       1       False   2025-09-10 06:56:12.000000 UTC  N/A    Disabled
5352    872     RuntimeBroker.  0xbe0780d96340  1       -       1       False   2025-09-10 06:56:12.000000 UTC  N/A    Disabled
5480    872     SearchApp.exe   0xbe077a0eb080  71      -       1       False   2025-09-10 06:56:12.000000 UTC  N/A    Disabled
5676    872     RuntimeBroker.  0xbe0780fa8340  12      -       1       False   2025-09-10 06:56:12.000000 UTC  N/A    Disabled
6020    872     LockApp.exe     0xbe0781289080  11      -       1       False   2025-09-10 06:56:13.000000 UTC  N/A    Disabled
6100    872     RuntimeBroker.  0xbe07812de340  3       -       1       False   2025-09-10 06:56:13.000000 UTC  N/A    Disabled
5768    720     svchost.exe     0xbe078114e300  2       -       0       False   2025-09-10 06:56:13.000000 UTC  N/A    Disabled
6844    720     svchost.exe     0xbe078082a080  1       -       0       False   2025-09-10 06:56:14.000000 UTC  N/A    Disabled
6948    720     svchost.exe     0xbe0781457340  4       -       0       False   2025-09-10 06:56:14.000000 UTC  N/A    Disabled
6396    720     NisSrv.exe      0xbe0781463080  7       -       0       False   2025-09-10 06:56:16.000000 UTC  N/A    Disabled
6596    872     RuntimeBroker.  0xbe07816230c0  2       -       1       False   2025-09-10 06:56:22.000000 UTC  N/A    Disabled
6688    4428    SecurityHealth  0xbe0780d7d0c0  1       -       1       False   2025-09-10 06:56:23.000000 UTC  N/A    Disabled
6704    720     SecurityHealth  0xbe0780d8a2c0  6       -       0       False   2025-09-10 06:56:23.000000 UTC  N/A    Disabled
6828    4428    vmtoolsd.exe    0xbe0780fe8080  8       -       1       False   2025-09-10 06:56:23.000000 UTC  N/A    Disabled
2104    4428    msedge.exe      0xbe0781541300  0       -       1       False   2025-09-10 06:56:24.000000 UTC  2025-09-10 10:48:19.000000 UTC  Disabled
7724    720     svchost.exe     0xbe078192e080  3       -       0       False   2025-09-10 06:56:25.000000 UTC  N/A    Disabled
7952    720     svchost.exe     0xbe0780a7e340  7       -       0       False   2025-09-10 06:56:31.000000 UTC  N/A    Disabled
8080    872     TextInputHost.  0xbe078181e080  17      -       1       False   2025-09-10 06:56:36.000000 UTC  N/A    Disabled
1296    872     ApplicationFra  0xbe0781909080  5       -       1       False   2025-09-10 06:57:01.000000 UTC  N/A    Disabled
5988    720     svchost.exe     0xbe077cac7340  9       -       0       False   2025-09-10 06:58:11.000000 UTC  N/A    Disabled
6592    720     svchost.exe     0xbe0781848080  2       -       1       False   2025-09-10 06:58:11.000000 UTC  N/A    Disabled
6668    720     svchost.exe     0xbe077cc15280  3       -       0       False   2025-09-10 06:58:11.000000 UTC  N/A    Disabled
772     720     SgrmBroker.exe  0xbe07817a7080  7       -       0       False   2025-09-10 06:58:11.000000 UTC  N/A    Disabled
700     720     svchost.exe     0xbe07815e2080  7       -       0       False   2025-09-10 06:58:12.000000 UTC  N/A    Disabled
1636    720     svchost.exe     0xbe078180d080  4       -       0       False   2025-09-10 06:58:12.000000 UTC  N/A    Disabled
3436    720     svchost.exe     0xbe0781829080  8       -       0       False   2025-09-10 06:58:12.000000 UTC  N/A    Disabled
8184    720     svchost.exe     0xbe0780f7e340  0       -       0       False   2025-09-10 07:03:10.000000 UTC  2025-09-10 07:03:16.000000 UTC  Disabled
5136    720     svchost.exe     0xbe078183c080  9       -       0       False   2025-09-10 07:09:02.000000 UTC  N/A    Disabled
4536    872     dllhost.exe     0xbe07814ca080  5       -       1       False   2025-09-10 07:09:18.000000 UTC  N/A    Disabled
7876    720     svchost.exe     0xbe0780fb7080  3       -       0       False   2025-09-10 07:09:26.000000 UTC  N/A    Disabled
6956    872     ShellExperienc  0xbe078178b080  13      -       1       False   2025-09-10 07:09:32.000000 UTC  N/A    Disabled
3348    872     RuntimeBroker.  0xbe07818c4080  4       -       1       False   2025-09-10 07:09:32.000000 UTC  N/A    Disabled
5408    720     svchost.exe     0xbe078132b300  4       -       0       False   2025-09-10 07:09:42.000000 UTC  N/A    Disabled
604     720     svchost.exe     0xbe07815d7300  3       -       0       False   2025-09-10 07:09:42.000000 UTC  N/A    Disabled
3372    720     svchost.exe     0xbe07818e6080  2       -       0       False   2025-09-10 07:11:13.000000 UTC  N/A    Disabled
7608    720     svchost.exe     0xbe0780451300  2       -       0       False   2025-09-10 07:25:58.000000 UTC  N/A    Disabled
2384    688     LogonUI.exe     0xbe0781792080  0       -       1       False   2025-09-10 07:52:10.000000 UTC  2025-09-10 08:00:31.000000 UTC  Disabled
2072    872     SystemSettings  0xbe077ceaf080  18      -       1       False   2025-09-10 08:35:35.000000 UTC  N/A    Disabled
4480    872     UserOOBEBroker  0xbe0780832080  1       -       1       False   2025-09-10 08:35:36.000000 UTC  N/A    Disabled
912     720     svchost.exe     0xbe077ce83080  1       -       0       False   2025-09-10 08:49:37.000000 UTC  N/A    Disabled
3968    688     LogonUI.exe     0xbe078119d080  0       -       1       False   2025-09-10 09:44:23.000000 UTC  2025-09-10 10:23:51.000000 UTC  Disabled
9104    720     svchost.exe     0xbe07831b6340  3       -       0       False   2025-09-10 10:23:47.000000 UTC  N/A    Disabled
1656    720     svchost.exe     0xbe078182f300  4       -       0       False   2025-09-10 10:34:00.000000 UTC  N/A    Disabled
2120    720     svchost.exe     0xbe0781df5300  5       -       0       False   2025-09-10 10:34:00.000000 UTC  N/A    Disabled
4904    720     svchost.exe     0xbe0783365080  5       -       0       False   2025-09-10 10:34:01.000000 UTC  N/A    Disabled
6188    720     svchost.exe     0xbe07845e70c0  3       -       0       False   2025-09-10 10:38:44.000000 UTC  N/A    Disabled
3300    2104    msedge.exe      0xbe0783252080  48      -       1       False   2025-09-10 10:48:19.000000 UTC  N/A    Disabled
4420    3300    msedge.exe      0xbe078334f080  7       -       1       False   2025-09-10 10:48:19.000000 UTC  N/A    Disabled
4532    3300    msedge.exe      0xbe0783325080  17      -       1       False   2025-09-10 10:48:19.000000 UTC  N/A    Disabled
7968    3300    msedge.exe      0xbe0781911080  17      -       1       False   2025-09-10 10:48:19.000000 UTC  N/A    Disabled
2300    3300    msedge.exe      0xbe078334a080  9       -       1       False   2025-09-10 10:48:19.000000 UTC  N/A    Disabled
4836    4428    CSG2025_Forens  0xbe078190a080  4       -       1       False   2025-09-10 10:48:46.000000 UTC  N/A    Disabled
5968    4836    conhost.exe     0xbe07833b5340  3       -       1       False   2025-09-10 10:48:46.000000 UTC  N/A    Disabled
7384    4428    CSG2025_Forens  0xbe07846ef080  4       -       1       False   2025-09-10 10:48:54.000000 UTC  N/A    Disabled
7392    7384    conhost.exe     0xbe0781269300  3       -       1       False   2025-09-10 10:48:54.000000 UTC  N/A    Disabled
4528    4428    CSG2025_Forens  0xbe078298b340  4       -       1       False   2025-09-10 10:48:58.000000 UTC  N/A    Disabled
1980    4528    conhost.exe     0xbe0783fa4300  3       -       1       False   2025-09-10 10:48:58.000000 UTC  N/A    Disabled
5424    4428    CSG2025_Forens  0xbe077cc87080  4       -       1       False   2025-09-10 10:49:03.000000 UTC  N/A    Disabled
4156    5424    conhost.exe     0xbe0781874300  3       -       1       False   2025-09-10 10:49:03.000000 UTC  N/A    Disabled
3004    4428    CSG2025_Forens  0xbe0783fb4300  4       -       1       False   2025-09-10 10:49:07.000000 UTC  N/A    Disabled
8140    3004    conhost.exe     0xbe0783393300  3       -       1       False   2025-09-10 10:49:07.000000 UTC  N/A    Disabled
3872    4428    CSG2025_Forens  0xbe07817e40c0  4       -       1       False   2025-09-10 10:49:10.000000 UTC  N/A    Disabled
3288    3872    conhost.exe     0xbe0782eed080  3       -       1       False   2025-09-10 10:49:10.000000 UTC  N/A    Disabled
7596    4428    CSG2025_Forens  0xbe0782fe1080  4       -       1       False   2025-09-10 10:49:15.000000 UTC  N/A    Disabled
3940    7596    conhost.exe     0xbe0782fcc080  3       -       1       False   2025-09-10 10:49:15.000000 UTC  N/A    Disabled
3212    4428    CSG2025_Forens  0xbe07831cb080  4       -       1       False   2025-09-10 10:49:19.000000 UTC  N/A    Disabled
6112    3212    conhost.exe     0xbe0780c80080  3       -       1       False   2025-09-10 10:49:19.000000 UTC  N/A    Disabled
6276    720     svchost.exe     0xbe078185c080  14      -       0       False   2025-09-10 10:49:19.000000 UTC  N/A    Disabled
472     4428    CSG2025_Forens  0xbe07831dc080  4       -       1       False   2025-09-10 10:49:27.000000 UTC  N/A    Disabled
7960    472     conhost.exe     0xbe0782a1c080  3       -       1       False   2025-09-10 10:49:27.000000 UTC  N/A    Disabled
128     4428    CSG2025_Forens  0xbe0782ee7080  4       -       1       False   2025-09-10 10:49:31.000000 UTC  N/A    Disabled
5880    128     conhost.exe     0xbe0782e96080  10      -       1       False   2025-09-10 10:49:31.000000 UTC  N/A    Disabled
7460    4428    notepad.exe     0xbe07814dc080  2       -       1       False   2025-09-10 10:49:57.000000 UTC  N/A    Disabled
8796    3456    SearchFilterHo  0xbe0780336080  4       -       0       False   2025-09-10 10:53:48.000000 UTC  N/A    Disabled
3804    3456    SearchProtocol  0xbe078130e080  6       -       1       False   2025-09-10 10:55:40.000000 UTC  N/A    Disabled
7272    872     smartscreen.ex  0xbe07811a2080  14      -       1       False   2025-09-10 10:55:54.000000 UTC  N/A    Disabled
8328    1468    audiodg.exe     0xbe077cdad080  5       -       0       False   2025-09-10 10:55:54.000000 UTC  N/A    Disabled
1224    4428    FTK Imager.exe  0xbe0782ee8080  23      -       1       False   2025-09-10 10:55:56.000000 UTC  N/A    Disabled

You can see a bunch of `CSG_2025 Forens processes. Now I moved on to inspecting cmdline:

vol -f ./memdump.mem windows.cmdline 
PID     Process Args
    ...
4836    CSG2025_Forens  "C:\Users\tsshimizu\Desktop\Tor Browser\0010\CSG2025_Forensic_Challenge.exe"
5968    conhost.exe     \??\C:\Windows\system32\conhost.exe 0x4
7384    CSG2025_Forens  "C:\Users\tsshimizu\Desktop\Tor Browser\0009\CSG2025_Forensic_Challenge.exe"
7392    conhost.exe     \??\C:\Windows\system32\conhost.exe 0x4
4528    CSG2025_Forens  "C:\Users\tsshimizu\Desktop\Tor Browser\0008\CSG2025_Forensic_Challenge.exe"
1980    conhost.exe     \??\C:\Windows\system32\conhost.exe 0x4
5424    CSG2025_Forens  "C:\Users\tsshimizu\Desktop\Tor Browser\0007\CSG2025_Forensic_Challenge.exe"
4156    conhost.exe     \??\C:\Windows\system32\conhost.exe 0x4
3004    CSG2025_Forens  "C:\Users\tsshimizu\Desktop\Tor Browser\0006\CSG2025_Forensic_Challenge.exe"
8140    conhost.exe     \??\C:\Windows\system32\conhost.exe 0x4
3872    CSG2025_Forens  "C:\Users\tsshimizu\Desktop\Tor Browser\0005\CSG2025_Forensic_Challenge.exe"
3288    conhost.exe     \??\C:\Windows\system32\conhost.exe 0x4
7596    CSG2025_Forens  "C:\Users\tsshimizu\Desktop\Tor Browser\0004\CSG2025_Forensic_Challenge.exe"
3940    conhost.exe     \??\C:\Windows\system32\conhost.exe 0x4
3212    CSG2025_Forens  "C:\Users\tsshimizu\Desktop\Tor Browser\0003\CSG2025_Forensic_Challenge.exe"
6112    conhost.exe     \??\C:\Windows\system32\conhost.exe 0x4
6276    svchost.exe     C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
472     CSG2025_Forens  "C:\Users\tsshimizu\Desktop\Tor Browser\0002\CSG2025_Forensic_Challenge.exe"
7960    conhost.exe     \??\C:\Windows\system32\conhost.exe 0x4
128     CSG2025_Forens  "C:\Users\tsshimizu\Desktop\Tor Browser\0001\CSG2025_Forensic_Challenge.exe"
5880    conhost.exe     \??\C:\Windows\system32\conhost.exe 0x4
7460    notepad.exe     "C:\Windows\system32\NOTEPAD.EXE" C:\Users\tsshimizu\Desktop\FLAG.txt
8796    SearchFilterHo  "C:\Windows\system32\SearchFilterHost.exe" 0 828 832 840 8192 836 812
3804    SearchProtocol  "C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-1666401375-4036008941-1272421846-100118_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-1666401375-4036008941-1272421846-100118 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"  "1"
7272    smartscreen.ex  C:\Windows\System32\smartscreen.exe -Embedding
8328    audiodg.exe     C:\Windows\system32\AUDIODG.EXE 0x170
1224    FTK Imager.exe  "C:\Program Files\AccessData\FTK Imager\FTK Imager.exe"

Most importantly, observe how notepad.exe is editing C:\Users\tsshimizu\Desktop\FLAG.txt.

I dumped the process memory using the command (using vol3):

ol -f "./memdump.mem" windows.memmap --pid 4836 --dump

Then I checked it for the keyword 'FLAG':

elijah@soyabean:/mnt/c/Users/chiae/Downloads/cyberseagames/sierra_leone_simple_forens/memdump/procdump$ strings -el ./pid.7460.dmp 2>/dev/null \
  | grep -iEo 'CTF\{[^}]{1,300}\}|FLAG\{[^}]{1,300}\}' \
  | head -n 1
FLAG{The Flag can be found in a file created at 2025-09-10 08:18:20.0630481}

Now we need to use the $MFT file given to find the file created at that exact timing. You can use Eric Zimmerman's MFTECmd for this.

Furthermore, on Windows you won't be able to see the $MFT file on both powershell and file explorer. The workaround for me was to go to WSL, then copy and paste the MFT file. It would then be visible to Windows.

To generate a csv view from the MFT:

MFTECmd.exe -f .\MFT_COPY --csv .\out

When we do a search for "08:18:20" within the CSV, we notice these few rows:

EntryNumber,SequenceNumber,InUse,ParentEntryNumber,ParentSequenceNumber,ParentPath,FileName,Extension,FileSize,ReferenceCount,ReparseTarget,IsDirectory,HasAds,IsAds,SI<FN,uSecZeros,Copied,SiFlags,NameType,Created0x10,Created0x30,LastModified0x10,LastModified0x30,LastRecordChange0x10,LastRecordChange0x30,LastAccess0x10,LastAccess0x30,UpdateSequenceNumber,LogfileSequenceNumber,SecurityId,ObjectIdFileDroid,LoggedUtilStream,ZoneIdContents,SourceFile
252216,2,True,56521,24,.\Users\tsshimizu\Desktop\Tor Browser,0010,,0,1,,True,False,False,False,False,False,None,DosWindows,2025-09-10 08:18:19.6352314,,2025-09-10 08:18:20.1410103,,2025-09-10 08:18:26.6369490,2025-09-10 08:18:20.1570144,2025-09-10 08:32:59.7346532,2025-09-10 08:18:20.1410103,1929787232,8207896053,1611,3816694c-8e13-11f0-ba8c-000c29d19702,,,.\MFT_COPY
252217,2,True,252216,2,.\Users\tsshimizu\Desktop\Tor Browser\0010,CSG2025_Forensic_Challenge.deps.json,.json,470,1,,False,False,False,False,False,True,Archive,Windows,2025-09-10 08:18:19.6352314,,2025-09-10 08:18:09.0173971,2025-09-10 08:18:19.6352314,2025-09-10 08:18:09.0173971,2025-09-10 08:18:19.6352314,2025-09-10 08:28:34.4952115,2025-09-10 08:18:19.6352314,1929783728,8207491011,1019,,,,.\MFT_COPY
252218,2,True,252216,2,.\Users\tsshimizu\Desktop\Tor Browser\0010,CSG2025_Forensic_Challenge.dll,.dll,9728,1,,False,False,False,False,False,True,Archive,Windows,2025-09-10 08:18:19.6502523,,2025-09-10 08:18:09.0083981,2025-09-10 08:18:19.6502523,2025-09-10 08:18:09.0083981,2025-09-10 08:18:19.6502523,2025-09-10 08:28:34.5108256,2025-09-10 08:18:19.6502523,1929784856,8207896095,1019,,,,.\MFT_COPY
252219,2,True,252216,2,.\Users\tsshimizu\Desktop\Tor Browser\0010,CSG2025_Forensic_Challenge.exe,.exe,138752,1,,False,False,False,False,False,True,Archive,Windows,2025-09-10 08:18:20.0630481,,2025-09-10 08:18:09.0113978,2025-09-10 08:18:20.0630481,2025-09-10 08:18:09.0113978,2025-09-10 08:18:20.0630481,2025-09-10 08:28:36.5795169,2025-09-10 08:18:20.0630481,1929785464,8207896129,1019,,,,.\MFT_COPY
252220,2,True,252216,2,.\Users\tsshimizu\Desktop\Tor Browser\0010,CSG2025_Forensic_Challenge.pdb,.pdb,12628,1,,False,False,False,False,False,True,Archive,Windows,2025-09-10 08:18:20.1259960,,2025-09-10 08:18:09.0083981,2025-09-10 08:18:20.1259960,2025-09-10 08:18:09.0083981,2025-09-10 08:18:20.1259960,2025-09-10 08:18:20.1259960,,1929786064,8206831439,1019,,,,.\MFT_COPY
252221,2,True,252216,2,.\Users\tsshimizu\Desktop\Tor Browser\0010,CSG2025_Forensic_Challenge.runtimeconfig.json,.json,340,1,,False,False,False,False,False,True,Archive,Windows,2025-09-10 08:18:20.1410103,,2025-09-10 08:18:09.0214001,2025-09-10 08:18:20.1410103,2025-09-10 08:18:09.0214001,2025-09-10 08:18:20.1410103,2025-09-10 08:28:34.4952115,2025-09-10 08:18:20.1410103,1929786792,8207490977,1019,,,,.\MFT_COPY

So we are likely being pointed to the CSG2025_Forensic_Challenge.exe created by C:\Users\tsshimizu\Desktop\Tor Browser\0010\CSG2025_Forensic_Challenge.exe which has PID 4836. We can dump it from the memory dump as follows:

vol -f "./memdump.mem" windows.memmap --pid 4836 --dump

Now if we do strings on the binary we would see many references to .NET, which prompts us to use dnspy to analyse the binary.

Now if we inspect the dumped .exe and .dll, there doesn't seem to be much in the exe. However, the dll seems to have several references to .NET, so we can try using dnspy to decompile it.

However, the DLL seemed to be corrupted, and dnspy refused to analyse it:

Now we try the volatility windows.dlllist plugin, which should show us all the exes and dlls.

elijah@soyabean:/mnt/c/Users/chiae/Downloads/cyberseagames/sierra_leone_simple_forens/memdump$ vol -f ./memdump.mem windows.dlllist | grep CSG
4836ressCSG2025_Forens  0x7ff7eb0b0000  0x27000 CSG2025_Forensic_Challenge.exe  C:\Users\tsshimizu\Desktop\Tor Browser\0010\CSG2025_Forensic_Challenge.exe      2025-09-10 10:48:46.000000 UTC  Disabled
4836    CSG2025_Forens  0x10f85c10000   0x8000  CSG2025_Forensic_Challenge.dll  C:\Users\tsshimizu\Desktop\Tor Browser\0010\CSG2025_Forensic_Challenge.dll      2025-09-10 10:48:46.000000 UTC  Disabled

This shows us that the offset of CSG2025_Forensic_Challenge.dll is 0x10f85c10000. We can dump it using the command

vol -f ./memdump.mem windows.dlllist --pid 4836 --base 0x10f85c10000 --dump

Now we've successfully obtained the uncorrupted dll, and can use dnspy to analyse it.

We see the following functions:

private static void <Main>$(string[] args)
{
	CSG2025_FC_Crypto csg2025_FC_Crypto = new CSG2025_FC_Crypto("12021e082708132b341a01182416341b063f365b21282631242340433f39311e", "2a3c240a25323923372027002216010e043c185c08175158");
	new CSG2025_FC_Srv().RemoteShell(54321, csg2025_FC_Crypto);
}
using System;
using System.IO;
using System.Runtime.CompilerServices;
using System.Security.Cryptography;
using System.Text;

namespace CSG2025_Forensic_Challenge
{
	// Token: 0x02000003 RID: 3
	[NullableContext(1)]
	[Nullable(0)]
	public class CSG2025_FC_Crypto
	{
		// Token: 0x06000003 RID: 3 RVA: 0x00002088 File Offset: 0x00002088
		public CSG2025_FC_Crypto()
		{
			string text = "1002284436093a572e2b19343d0227392b3e25272228363d26320d3e33283916";
			string text2 = "173c02430e092a121c3520172939025a3c1210100e215158";
			this.key = Encoding.UTF8.GetBytes(this.AdvancedDecode(text));
			this.iv = Encoding.UTF8.GetBytes(this.AdvancedDecode(text2));
		}

		// Token: 0x06000004 RID: 4 RVA: 0x000020D5 File Offset: 0x000020D5
		public CSG2025_FC_Crypto(string encoded_key, string encoded_iv)
		{
			this.key = Encoding.UTF8.GetBytes(this.AdvancedDecode(encoded_key));
			this.iv = Encoding.UTF8.GetBytes(this.AdvancedDecode(encoded_iv));
		}

		// Token: 0x06000005 RID: 5 RVA: 0x0000210C File Offset: 0x0000210C
		public string obfuscate(string plainText)
		{
			string text;
			using (Aes aes = Aes.Create())
			{
				aes.Key = this.key;
				aes.IV = this.iv;
				ICryptoTransform cryptoTransform = aes.CreateEncryptor(aes.Key, aes.IV);
				using (MemoryStream memoryStream = new MemoryStream())
				{
					using (CryptoStream cryptoStream = new CryptoStream(memoryStream, cryptoTransform, CryptoStreamMode.Write))
					{
						using (StreamWriter streamWriter = new StreamWriter(cryptoStream))
						{
							streamWriter.Write(plainText);
						}
						text = Convert.ToBase64String(memoryStream.ToArray());
					}
				}
			}
			return text;
		}

		// Token: 0x06000006 RID: 6 RVA: 0x000021DC File Offset: 0x000021DC
		public string Deobfuscate(string encryptedText)
		{
			string text;
			using (Aes aes = Aes.Create())
			{
				aes.Key = this.key;
				aes.IV = this.iv;
				ICryptoTransform cryptoTransform = aes.CreateDecryptor(aes.Key, aes.IV);
				using (MemoryStream memoryStream = new MemoryStream(Convert.FromBase64String(encryptedText)))
				{
					using (CryptoStream cryptoStream = new CryptoStream(memoryStream, cryptoTransform, CryptoStreamMode.Read))
					{
						using (StreamReader streamReader = new StreamReader(cryptoStream))
						{
							text = streamReader.ReadToEnd();
						}
					}
				}
			}
			return text;
		}

		// Token: 0x06000007 RID: 7 RVA: 0x000022A4 File Offset: 0x000022A4
		public string AdvancedEncode(string input)
		{
			string text = Convert.ToBase64String(Encoding.UTF8.GetBytes(input));
			StringBuilder stringBuilder = new StringBuilder();
			for (int i = 0; i < text.Length; i++)
			{
				stringBuilder.Append(text[i] ^ CSG2025_FC_Crypto.xorKey[i % CSG2025_FC_Crypto.xorKey.Length]);
			}
			string text2 = stringBuilder.ToString();
			StringBuilder stringBuilder2 = new StringBuilder();
			foreach (char c in text2)
			{
				StringBuilder stringBuilder3 = stringBuilder2;
				int num = (int)c;
				stringBuilder3.Append(num.ToString("x2"));
			}
			return stringBuilder2.ToString();
		}

		// Token: 0x06000008 RID: 8 RVA: 0x0000234C File Offset: 0x0000234C
		public string AdvancedDecode(string input)
		{
			StringBuilder stringBuilder = new StringBuilder();
			for (int i = 0; i < input.Length; i += 2)
			{
				stringBuilder.Append((char)Convert.ToInt32(input.Substring(i, 2), 16));
			}
			string text = stringBuilder.ToString();
			StringBuilder stringBuilder2 = new StringBuilder();
			for (int j = 0; j < text.Length; j++)
			{
				stringBuilder2.Append(text[j] ^ CSG2025_FC_Crypto.xorKey[j % CSG2025_FC_Crypto.xorKey.Length]);
			}
			string text2 = stringBuilder2.ToString();
			string text3;
			try
			{
				byte[] array = Convert.FromBase64String(text2);
				text3 = Encoding.UTF8.GetString(array);
			}
			catch (Exception)
			{
				text3 = null;
			}
			return text3;
		}

		// Token: 0x04000001 RID: 1
		private readonly byte[] key;

		// Token: 0x04000002 RID: 2
		private readonly byte[] iv;

		// Token: 0x04000003 RID: 3
		private static readonly string xorKey = "simplekey";
	}
}
public void RemoteShell(int port, CSG2025_FC_Crypto crypto)
{
	TcpListener tcpListener = new TcpListener(IPAddress.Any, port);
	tcpListener.Start();
	bool flag = true;
	CSG2025_FC_Crypto csg2025_FC_Crypto = ((crypto == null) ? new CSG2025_FC_Crypto() : crypto);
	while (flag)
	{
		using (TcpClient tcpClient = tcpListener.AcceptTcpClient())
		{
			using (NetworkStream stream = tcpClient.GetStream())
			{
				using (StreamReader streamReader = new StreamReader(stream))
				{
					using (StreamWriter streamWriter = new StreamWriter(stream)
					{
						AutoFlush = true
					})
					{
						string text;
						while ((text = streamReader.ReadLine()) != null)
						{
							string text2 = text.ToLower().Trim();
							if (!(text2 == "quit") && !(text2 == "q") && (text2 == null || text2.Length != 0))
							{
								if (!(text2 == "flag"))
								{
									string text3 = this.ExecuteCommand(text);
									streamWriter.WriteLine(csg2025_FC_Crypto.obfuscate(text3));
								}
								else
								{
									streamWriter.WriteLine(csg2025_FC_Crypto.Deobfuscate("8I8UA7wRkZlDgKEN0EAtic6wcVhGpuW7avv3xEemfliBAYXtpgJhNukG9tm7wRod"));
								}
							}
							else
							{
								flag = false;
							}
						}
					}
				}
			}
		}
	}
}

Here are the important values:

ciphertext: 8I8UA7wRkZlDgKEN0EAtic6wcVhGpuW7avv3xEemfliBAYXtpgJhNukG9tm7wRod

key: AdvancedDecode("12021e082708132b341a01182416341b063f365b21282631242340433f39311e")

iv: AdvancedDecode("2a3c240a25323923372027002216010e043c185c08175158")

xokey: simplekey

All AdvancedDecode does is convert the key or iv string from hex to bytes, then xors it with the xorkey and converts it from base64.

public string AdvancedDecode(string input)
{
	StringBuilder stringBuilder = new StringBuilder();
	for (int i = 0; i < input.Length; i += 2)
	{
		stringBuilder.Append((char)Convert.ToInt32(input.Substring(i, 2), 16));
	}
	string text = stringBuilder.ToString();
	StringBuilder stringBuilder2 = new StringBuilder();
	for (int j = 0; j < text.Length; j++)
	{
		stringBuilder2.Append(text[j] ^ CSG2025_FC_Crypto.xorKey[j % CSG2025_FC_Crypto.xorKey.Length]);
	}
	string text2 = stringBuilder2.ToString();
	string text3;
	try
	{
		byte[] array = Convert.FromBase64String(text2);
		text3 = Encoding.UTF8.GetString(array);
	}
	catch (Exception)
	{
		text3 = null;
	}
	return text3;
}

Now we need to find out how to perform the AES decryption. According to https://learn.microsoft.com/en-us/dotnet/api/system.security.cryptography.aesmanaged.mode?view=net-9.0, the default AES mode is CBC.

public string Deobfuscate(string encryptedText)
{
	string text;
	using (Aes aes = Aes.Create())
	{
		aes.Key = this.key;
		aes.IV = this.iv;
		ICryptoTransform cryptoTransform = aes.CreateDecryptor(aes.Key, aes.IV);
		using (MemoryStream memoryStream = new MemoryStream(Convert.FromBase64String(encryptedText)))
		{
			using (CryptoStream cryptoStream = new CryptoStream(memoryStream, cryptoTransform, CryptoStreamMode.Read))
			{
				using (StreamReader streamReader = new StreamReader(cryptoStream))
				{
					text = streamReader.ReadToEnd();
				}
			}
		}
	}
	return text;
}

We can see that the ct is converted from base64, then aes decryption is performed using CBC mode.

Now, we have all the pieces needed to decrypt the flag:

from pwn import * 
from base64 import b64decode
from Crypto.Cipher import AES
from Crypto.Util.Padding import unpad

ct = "8I8UA7wRkZlDgKEN0EAtic6wcVhGpuW7avv3xEemfliBAYXtpgJhNukG9tm7wRod"
key = "12021e082708132b341a01182416341b063f365b21282631242340433f39311e"
iv = "2a3c240a25323923372027002216010e043c185c08175158"
xorkey = b'simplekey'

key_bytes = bytes.fromhex(key)
key_bytes = xor(key_bytes, xorkey)
real_key = b64decode(key_bytes.decode())
print(f"real key: {real_key}")

iv_bytes = bytes.fromhex(iv)
iv_bytes = xor(iv_bytes, xorkey)
real_iv = b64decode(iv_bytes.decode())
print(f"real iv: {real_iv}")

cipher = AES.new(real_key, AES.MODE_CBC, iv=real_iv)
ct = b64decode(ct)
pt = cipher.decrypt(ct)
pt = unpad(pt, AES.block_size).decode()
print(f"plaintext: {pt}")

The plaintext is b'aB!3dE#5fG@7hI^9jK&1lM*2nO(4pQ)6rS-8tU_0vW+z' which is the flag!

Last updated