Memory Forensics - caitlinmallen/TechWiki GitHub Wiki
Memory Forensics & Volatility
- Process of acquiring and analyzing physical memory
- Provides huge support for other investigations
- Why do you need memory forensics?
- Malware already finished execution
- Find code injection and rootkits
- Hidden from disk but visible in memory
- Bypass malware's anti-X techniques
- Extra validation
- Help support other analysis methods
- What can I find?
- Everything running on a computer
- Like:
- Processes
- Network connections
- Drivers
- CMD related info
- Application-level details
- Encryption related data
- Running Volatility v2.5
- Step1: Determine profile
- Which OS and service pack
- exe -f C:\image.mem imageinfo
- Step 2: Run various plugings – most don't need additional input and follow this format
- exe -f C:\image.mem –profile=%PROFILE% %PLUGIN%
- Important Plugins
- Process information
- Psscan, pslist, pstree, psxview, cmdline
- Commands run
- Network connections
- Connections, connscan, sockets, sockscan, netscan
- Enumerate windows
- Windows, wintree, wndscan
- Open files
- Environmental variables
- Threads and handles
- Security
- Registry
- Hivescan, hivelist, hivedump, dumpregistry
- Printkey
- Forensic artifacts
- Userassist
- Timeliner
- Mftparser
- Mbrparser
- Shellbags
- Shimcache
- Amcache
- Shutdowntime