Memory Analysis (Vol 3)

Live System

Best to run the tools from an external USB device.

  • FTK Imager (best to run it from a memory stick)

  • MagnetForensics RamCapture

  • Belkasoft Live RAM Capturer

  • DumpIT

  • WinPMEM

  • Redline

Dead System Hibernation File

  • Contains a Compressed RAM image

    • %SystemDrive%/hiberfil.sys Also found in Volume Shadow Copies

Page File

  • %SystemDrive%/pagefile.sys

Memory Dump

  • %WINDIR%/MEMORY.DMP

Virtual Machine Memory Acquisition VMware Workstation

Windows 10

VMware ESX

Volatility

  • Deep dive into memory

  • Find more artefacts

  • In IR, it is slower to use but more exact and precise

Analysis

Find the first Hit

  1. Identify rogue processes

  2. Analyse process DLLs and handles

  3. Review network artefacts

  4. Look for evidence of code injection

  5. Check for signs of a rootkit

  6. Dump suspicious processes and drivers

Volatility Process Analysis

OS Information

Desc: Vol3 This plugin gives OS information

Hashes/Passwords

Desc: Extract SAM hashes, domain cached credentials, and LSA secrets.

Processes

List processes

Dump proc

Command line

Desc: Anything suspicious was executed?

Services

Strings Per Processes

Volatility allows us to check which process a string belongs to.

Desc: It also allows to search for strings inside a process using the yarascan module:

Environment

Get the environment variables of each running process. There could be some interesting values.

Token privileges

Check for privilege tokens in unexpected services. It could be interesting to list the processes using some privileged token. Desc: Get enabled privileges of some processes

Desc: Get all processes with interesting privileges

SIDs

Check each SSID owned by a process, it could be interesting to list the processes using a privileges SID (and the processes using some service SID).

Handles

Useful to know to which other files, keys, threads, processes... a process has a handle for (has opened)

DLLs

UserAssist

Windows systems maintain a set of keys in the registry database (UserAssist keys) to keep track of programs that are executed. The number of executions and the last execution date and time are available in these keys.

Network

Registry hive

Print available hives

Get a value

Filesystem

Scan/dump

SSL Keys/Certs

Desc: search for certificates inside the registry

Malware

Malfind will search for suspicious structures related to malware

Scanning with yara

Use this script to download and merge all the yara malware rules from github: https://gist.github.com/andreafortuna/29c6ea48adf3d45a979a78763cdc7ce9 Create the rules directory and execute it. This will create a file called malware_rules.yar which contains all the yara rules for malware.

Only Windows

All

Mutexes

TimeLine

Drivers

Last updated