Week 6 Memory Forensics Part 1 Final
Week 6 Memory Forensics Part 1 Final
Disk
Managed by
https://www.cs.uic.edu/~jbell/CourseNotes/OperatingSystems/9_VirtualMemory.html
Memory dump
for a process
• Kernel Processor Control
Region (KPCR)
• is a data structure
used by the Windows
kernel to store
information about Each
each processor process
• From the KPCR structure, dumped
one then traverses and stored
intermediate structures to in KPCR
access interesting
structures
• such as the active
process list
https://www.researchgate.net/profile/Igor-Korkin-2/publication/
263365115/figure/fig1/AS:296534018150400@1447710627176/
Memory-dump-acquisition-process.png
Dump memory
for all commands starting with volatility, you MUST replace them with python2 vol.py
for example, volatility -f memdumpWin7.mem imageinfo MUST changed to python2 vol.py -f memdumpWin7.mem
Where to download the memory
image for investigations?
Download memory dump
• Sam – HKEY_LOCAL_MACHINE\SAM
• Security – HKEY_LOCAL_MACHINE\SECURITY
• Software – HKEY_LOCAL_MACHINE\SOFTWARE
• System – HKEY_LOCAL_MACHINE\SYSTEM
• Default – HKEY_USERS\.DEFAULT
SID format details
S-1-5
S: SID
1: Version 1
5: Managed by the NT security subsystem
Peripheral
Component
Interconnec
t
Where to find CPU of the Suspect’s
PC?
Find hardware keys
Point to
Find key = “DESCRIPTION\CentralProcessor\0”
Enumerate devices
How Windows install device drivers?
• Almost all electronic devices contain firmware
• When plug-in, device's enumerator (e.g., PnP Bus Drivers)
• Reports Device Identification Strings from device firmware
• Hardware IDs - vendor-defined
• Compatible IDs - vendor-defined
• Windows uses Hardware IDs to
• locate the information (INF) file that best matches the device
• if not, uses compatible IDs
• Windows uses INF file to install device drivers
How to find devices connected to
PCI?
VEN_XXXX: vendor
DEV_XXXX: model of device
Help command
Note: Module Output Options: dot, greptext, html, json, sqlite, text, xlsx
Which program that was connected
to this suspicious IP address?
Find out process name of -1 (unidentified process) using the suspicious IP
YARA is a tool aimed at (but not limited to) helping malware researchers to identify and
classify malware samples.
Find the application chrome.exe which PID=2388