THE DFIR BLOG
Menu

Memory Forensics

Identifying Rouge Processes using Volatility

7/6/2019

 
Analyzing Memory images with the tools like volatility is easy. Traditionally there are only few ways to identify a malware in a system like signature, contradiction and behavior. The key question is where to start you analysis. As an investigator, it's critical to have an structured though process before starting an investigation.

Personally, I like to start with analyzing the processes. Processed will give us information about what was running on the system. The metadata of processes are in Executive Process Block or Eblock like name of the process, process identifier(PID), Parent PID, Offset (location in the memory) etc.

The kernal uses DLL (Doubly Linked List) to track processes. Only running processed will be found in the list. There are other commands in volatility to review the unlinked processes as well.
Heading
What to looks for?
Name
* Unusual Name
*Spellings
*System Context
Path
* Running Location (Temp Path)
* Appropriate path of System executable
Parent Process
*Is parent process correct?
Command Line
Identify the strange arguments that might be use.
Security Identifiers
This will tell you what level of account spawned the process.
Start Time
*Time of attack. This is a great resource to create a timeline.
There are three key plugins available to review the processes:
1) pslist - show all running processes (Not orphaned). quick results
Picture
2) Psscan - Comprehensive scan of memory may identify the not running processes.
Picture
3) pstree- print process list as a tree (very useful). You can also use -v flag for more verbose output.
Picture

Comments are closed.

    Archives

    August 2019
    July 2019
    April 2019
    March 2019

    Categories

    All
    Ctf
    Defcon
    DFIR
    Forensics
    Memory
    Memory Forensics

    RSS Feed

  • Infosec
  • Mac Forensics
  • Windows Forensics
  • Linux Forensics
  • Memory Forensics
  • Incident Response
  • Blog
  • About Me
  • Infosec
  • Mac Forensics
  • Windows Forensics
  • Linux Forensics
  • Memory Forensics
  • Incident Response
  • Blog
  • About Me