Memory Analysis (Vol 3)
Live System
Best to run the tools from an external USB device.
FTK Imager (best to run it from a memory stick)
MagnetForensics RamCapture
Belkasoft Live RAM Capturer
DumpIT
WinPMEM
Redline
Dead System Hibernation File
Contains a Compressed RAM image
%SystemDrive%/hiberfil.sys Also found in Volume Shadow Copies
Page File
%SystemDrive%/pagefile.sys
Memory Dump
%WINDIR%/MEMORY.DMP
Virtual Machine Memory Acquisition VMware Workstation
Windows 10
VMware ESX
Volatility
Deep dive into memory
Find more artefacts
In IR, it is slower to use but more exact and precise
Analysis
Find the first Hit
Identify rogue processes
Analyse process DLLs and handles
Review network artefacts
Look for evidence of code injection
Check for signs of a rootkit
Dump suspicious processes and drivers
Volatility Process Analysis
OS Information
Desc: Vol3 This plugin gives OS information
Hashes/Passwords
Desc: Extract SAM hashes, domain cached credentials, and LSA secrets.
Processes
List processes
Dump proc
Command line
Desc: Anything suspicious was executed?
Services
Strings Per Processes
Volatility allows us to check which process a string belongs to.
Desc: It also allows to search for strings inside a process using the yarascan module:
Environment
Get the environment variables of each running process. There could be some interesting values.
Token privileges
Check for privilege tokens in unexpected services. It could be interesting to list the processes using some privileged token. Desc: Get enabled privileges of some processes
Desc: Get all processes with interesting privileges
SIDs
Check each SSID owned by a process, it could be interesting to list the processes using a privileges SID (and the processes using some service SID).
Handles
Useful to know to which other files, keys, threads, processes... a process has a handle for (has opened)
DLLs
UserAssist
Windows systems maintain a set of keys in the registry database (UserAssist keys) to keep track of programs that are executed. The number of executions and the last execution date and time are available in these keys.
Network
Registry hive
Print available hives
Get a value
Filesystem
Scan/dump
SSL Keys/Certs
Desc: search for certificates inside the registry
Malware
Malfind will search for suspicious structures related to malware
Scanning with yara
Use this script to download and merge all the yara malware rules from github: https://gist.github.com/andreafortuna/29c6ea48adf3d45a979a78763cdc7ce9 Create the rules directory and execute it. This will create a file called malware_rules.yar which contains all the yara rules for malware.
Only Windows
All
Mutexes
Symlinks
TimeLine
Drivers
Last updated