Memory Forensics (Volatility 3)
OS Information
Desc: vol3 this plugin gives OS information
./vol.py -f file.dmp windows.info.InfoHashes/Passwords
Desc: Extract SAM hashes, domain cached credentials and lsa secrets.
./vol.py -f file.dmp windows.hashdump.Hashdump #Grab common windows hashes (SAM+SYSTEM)
./vol.py -f file.dmp windows.cachedump.Cachedump #Grab domain cache hashes inside the registry
./vol.py -f file.dmp windows.lsadump.Lsadump #Grab lsa secretsProcesses
List processes
python3 vol.py -f file.dmp windows.pstree.PsTree # Get processes tree (not hidden)
python3 vol.py -f file.dmp windows.pslist.PsList # Get process list (EPROCESS)
python3 vol.py -f file.dmp windows.psscan.PsScan # Get hidden process list(malware)Dump proc
./vol.py -f file.dmp windows.dumpfiles.DumpFiles --pid <pid> #Dump the .exe and dlls of the process in the current directoryCommand line
Desc: Anything suspicious was executed?
Services
Strings Per Processes
Volatility allows us to check which process a string belongs to.
Desc: It also allows to search for strings inside a process using the yarascan module:
Environment
Get the env variables of each running process. There could be some interesting values.
Token privileges
Check for privileges tokens in unexpected services. It could be interesting to list the processes using some privileged token. Desc: Get enabled privileges of some processes
Desc: Get all processes with interesting privileges
SIDs
Check each SSID owned by a process, it could be interesting to list the processes using a privileges SID (and the processes using some service SID).
Handles
Useful to know to which other files, keys, threads, processes... a process has a handle for (has opened)
DLLs
UserAssist
Windows systems maintain a set of keys in the registry database (UserAssist keys) to keep track of programs that are executed. The number of executions and last execution date and time is available in these keys.
Network
Registry hive
Print available hives
Get a value
Filesystem
Scan/dump
SSL Keys/Certs
Desc: search for certificates inside the registry
Malware
Malfind will search for suspicious structures related to malware
Scanning with Yara
Use this script to download and merge all the yara malware rules from github: https://gist.github.com/andreafortuna/29c6ea48adf3d45a979a78763cdc7ce9 Create the rules directory and execute it. This will create a file called malware_rules.yar which contains all the yara rules for malware.
Only Windows
All
Mutexes
Symlinks
TimeLine
Drivers
Last updated