Memory Forensics (Volatility 3)

OS Information

Desc: vol3 this plugin gives OS information

./vol.py -f file.dmp windows.info.Info

Hashes/Passwords

Desc: Extract SAM hashes, domain cached credentials and lsa secrets.

./vol.py -f file.dmp windows.hashdump.Hashdump #Grab common windows hashes (SAM+SYSTEM)
./vol.py -f file.dmp windows.cachedump.Cachedump #Grab domain cache hashes inside the registry
./vol.py -f file.dmp windows.lsadump.Lsadump #Grab lsa secrets

Processes

List processes

python3 vol.py -f file.dmp windows.pstree.PsTree # Get processes tree (not hidden)
python3 vol.py -f file.dmp windows.pslist.PsList # Get process list (EPROCESS)
python3 vol.py -f file.dmp windows.psscan.PsScan # Get hidden process list(malware)

Dump proc

./vol.py -f file.dmp windows.dumpfiles.DumpFiles --pid <pid> #Dump the .exe and dlls of the process in the current directory

Command line

Desc: Anything suspicious was executed?

Services

Strings Per Processes

Volatility allows us to check which process a string belongs to.

Desc: It also allows to search for strings inside a process using the yarascan module:

Environment

Get the env variables of each running process. There could be some interesting values.

Token privileges

Check for privileges tokens in unexpected services. It could be interesting to list the processes using some privileged token. Desc: Get enabled privileges of some processes

Desc: Get all processes with interesting privileges

SIDs

Check each SSID owned by a process, it could be interesting to list the processes using a privileges SID (and the processes using some service SID).

Handles

Useful to know to which other files, keys, threads, processes... a process has a handle for (has opened)

DLLs

UserAssist

Windows systems maintain a set of keys in the registry database (UserAssist keys) to keep track of programs that are executed. The number of executions and last execution date and time is available in these keys.

Network

Registry hive

Print available hives

Get a value

Filesystem

Scan/dump

SSL Keys/Certs

Desc: search for certificates inside the registry

Malware

Malfind will search for suspicious structures related to malware

Scanning with Yara

Use this script to download and merge all the yara malware rules from github: https://gist.github.com/andreafortuna/29c6ea48adf3d45a979a78763cdc7ce9 Create the rules directory and execute it. This will create a file called malware_rules.yar which contains all the yara rules for malware.

Only Windows

All

Mutexes

TimeLine

Drivers

Last updated