RAM Forensics
RAM Forensics
Abstract— In today’s world the use of internet and significant role in a process of digital investigation process.
information technology has grown up very rapidly. Due to The volatile memory contains many important artifacts
increasing use of Internet the amount of cyber crimes have which can be used in forensic investigation process. The
been increased. Hence it’s become a very challenging task information may contain passwords, event logs,
for the cyber crime investigator to not only finds out the root cryptographickeys, process information and other vital data
cause of the crime but also to prove it correctly in the court related to number of processes running in a ystem[2][8].The
of law. Computer Forensics is the science of investigating collection of volatile data from a victimized computer
the computer system to obtain the digital evidences to find system under investigation can be done using a conventional
out the root cause of cyber crimes. Memory forensics is one approach known as Live Response approach. In this
of the branches of the Computer Forensics. The present approach the investigator first establishes a trusted
techniques of memory forensics like Live Response and command shell to acquire the data for investigation process.
Memory Imaging, used by investigators during analysis and Volatile memory analysis using a Live Response method
seizure operations involves either carrying the live analysis helps to collect all relevant evidences from a system. These
of volatile memory(RAM) of victimized computer system or evidences can be used to prove any incident occurred that
by making the image of the RAM of suspect as machine and might have compromised a system resulting into a cyber
performing post analysis on different machine. In this paper crime[2].Another method to analyze a volatile memory is to
Memory imaging approach of RAM analysis is used to find perform memory image analysis.The analysis of a volatile
out the malicious processes using the GUI based tool that memory is performed by capturing an image of RAM
can analyze the volatile memory artifacts those are affected known as memory dump.Digital forensics contains the
by malwares .The architecture of extracting the malicious collection, validation, analysis,interpretation, documentation
processes is mentioned. and presentation of the digital evidences[15].Digital
Index Terms— Digital investigation, digital evidence, GUI Forensics investigator make use of forensics tools in an
Framework, computer forensics, volatile memory dump, investigation process, which are present in commercial and
Live Response, YARA Scanner. open domains. Depending upon the requirement of analysis,
forensic toolkits are categorized like file system and data
I. INTRODUCTION analysis tools, memory analysis tools, disk analysis tools,
The computing resources and Internet play a significant role registry analysis tools, Internet analysis tools and many
as vital business tool to provide the necessary information to more analysis tools. The commonly used toolkits for
an individual. Due to massive use of the Internet, cyber analyzing file systems are Encase,FTK,X-Ways, Nuix,
crimes have been increased. Cyber crime is any illegal Sleuthkit, DFF, Snorkeland LibForensics. Of these
activity which involves a computer system or its related tools,Encase, FTK and X-Ways are commercial toolkits
systems or their applications. Today solving any cyber while Sleuthkit, DFF and LibForensics are in open domain.
crime put up new challenges for a digital forensics To extract the malicious processes from the processes of
investigator [5]. Digital forensics is the process of memory image dump, the file signature scanner tool known
uncovering and interpreting an electronic data. The goal of as YARA tool can be used. The YARA is an open source
investigation is to preserve the evidence that is obtained tool designed to help malware researcher to identify and
during an investigation process. This evidence is termed as classify malware samples. It uses the efficient pattern-
digital evidence which must be preserved to reconstruct the matching rule. YARA supports the use of three different
past events. The analysis of volatile memory plays a very types of strings for pattern-matching:
(a) Hexadecimal Strings
D. Mathematical Model
Input: {P1, P2, P3}
Functions :{ f1, f2, f3}
Output :{ Malicious and Non-malicious Processes list}
where P1, P2 and P3 are processes
Fig. 1 System Architecture
Process: P1 (RAM Image creation)
B. Work Flow of the System {
1) Phase-I Volatile Memory(RAM) Image Acquisition: Input: Capturing Running processes from volatile
Volatile memory image of a compromised or memory
victimized computer system can be acquired using a f1: Processing with Image Analyzer
forensic tool like DumpIt, LiME etc. Output: RAM Image
2) Phase-II RAM Image Analysis: In a memory imaging }
analysis process the volatile data like system logs, Process: P2 (List of extracted processes)
network logs,registry files, running processes of the {
system are analyzed using the Volatility forensic tool. Input: RAM Image
3) Phase-III Storing the process information into the f2: Extraction of processes from memory dump to
database: The analysis of RAM image provides the database
process information details, these details will be Output: Process list with information
stored into the database for its later use in identifying }
Process: P3 (Generation of evidence report )
V. EXPERIMENT PROCEDURE
Fig. 2 Event Diagram 1) Registration Authentication Process:
The registration and authentication process is carried out by
the forensic investigator which is mandatory to avoid the
IV. EXPERIMENTAL SET UP AND RESULT mis-use of the tool. On successful authentication the
forensic investigator gets the privileges to use the
The memory dumps of the malware affected victimized functionalities of the tool.
computer systems are collected to detect and extract the 2) RAM Acquisition Process:
malicious processes. In this experiment signature based In this experiment procedure the Memory Imaging approach
identification of the malware is carried out using YARA of volatile memory forensic investigation is used. The RAM
Signature Scanner. The YARA Scanner uses the data set in Images of both guest VM’s are captured for analysis.
the form of the file Strings that is written with a particular 3) Determine OS Profile Information:
rule. Here the Strings of “ransomware” and “Stuxnet” The profile information of the operating system were
malwares are used to write the YARA rule files which are determined. The Profile Information determines the type of
compared with the processes from RAM Images of the OS used which is necessary to obtain the important memory
victimized computer system. After the text edit has been artifacts from the memory.
completed, the paper is ready for the template. Duplicate the 4) RAM Image Analysis Process:
template file by using the Save As command, and use the The processes from the RAM Image of the malware
naming convention prescribed by your conference for the affected or victimized VM were analyzed to get the detail
name of your paper. In this newly created file, highlight all information about each process like process name, process
of the contents and import your prepared text file. You are ID, path of the process, parent-child relationship between
now ready to style your paper; use the scroll down window processes etc. The path and name of the uploaded RAM
on the left of the MS Word Formatting toolbar. Images were stored to the database.
5) Dumping the processes from RAM Image:
The GUI based frame wok helps to get the result on the
click event which can time saving for forensic investigator
not to depend upon the long sequence of commands to
remember. Fig. 5 List of Dump files of the processes from RAM Dump
Few Screen Shots of the result are displayed here: 4. Scanning the dump files by the user defined YARA-
rule to extract malicious processes.
1. Determine the Operating System Profile for the
analysis of volatile memory artifacts