Unit 4 Memory Forensics
Unit 4 Memory Forensics
Tripti Misra
Memory Forensics
• Memory forensics helps in analyzing advanced malware since in memory, malware artifacts can be
analyzed more thoroughly, and more useful IoCs can be built.
• Memory Forensics is a process starting from finding an affected system, capturing its memory,
analyzing it and if needed dumping the malicious process for further analysis. With memory forensics,
we can analyze many types of OS artifacts like running processes, live network connections, loaded
drivers, API hooks and artifacts like shim cache that will reside only in memory and gets flushed to disk
only after a system reboot.
• It is also useful for analyzing memory resident malware which never writes any information to disk
and thus can go unnoticed. With memory forensics, we can also analyze advanced kernel level attacks
like Direct Kernel Object Manipulation(DKOM) to detect malware hiding activity.
• There are various tools like such as Volatility, Redline, Rekall, etc. which helps in memory forensics.
Basic Memory Forensics with Volatility
• https://blog.horangi.com/basic-memory-forensics-with-volatility-58a19627da13
• http://resources.infosecinstitute.com/memory-forensics-and-analysis-using-volatilit
y/