Submit Search
Memory Forensic CheatSheet - SANS Institute
0 likes
12 views
A
Anderson Carvalho Silva
Memory Forensics Cheat Sheet
Technology
Read more
1 of 2
Download now
Download to read offline
1
2
More Related Content
PDF
Memory forensics cheat sheet
Martin Cabrera
PPTX
(Workshop) Memory Forensic - Investigating Memory Artefact
Satria Ady Pradana
PPTX
Memory Forensic: Investigating Memory Artefact (Workshop)
Satria Ady Pradana
PPTX
Advanced malware analysis training session 7 malware memory forensics
Cysinfo Cyber Security Community
PDF
Hta w22
SelectedPresentations
PPTX
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...
Andrew Case
PDF
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
Malachi Jones
PDF
MNSEC 2018 - Windows forensics
MNCERT
Memory forensics cheat sheet
Martin Cabrera
(Workshop) Memory Forensic - Investigating Memory Artefact
Satria Ady Pradana
Memory Forensic: Investigating Memory Artefact (Workshop)
Satria Ady Pradana
Advanced malware analysis training session 7 malware memory forensics
Cysinfo Cyber Security Community
Hta w22
SelectedPresentations
Memory Forensics: Defeating Disk Encryption, Skilled Attackers, and Advanced ...
Andrew Case
Automated In-memory Malware/Rootkit Detection via Binary Analysis and Machin...
Malachi Jones
MNSEC 2018 - Windows forensics
MNCERT
Similar to Memory Forensic CheatSheet - SANS Institute
(20)
PDF
2010 2013 sandro suffert memory forensics introdutory work shop - public
Sandro Suffert
PDF
From hybernation file to malware analysis with volatility
Christiaan Beek
PDF
Super Easy Memory Forensics
IIJ
PDF
Stop pulling the plug
Kamal Rathaur
PPTX
Hunting Rootkit From the Dark Corners Of Memory
securityxploded
PDF
Larson Macaulay apt_malware_past_present_future_out_of_band_techniques
Scott K. Larson
PPTX
Basic malware analysis
Cysinfo Cyber Security Community
PPTX
Advanced Malware Analysis Training Session 7 - Malware Memory Forensics
securityxploded
PPTX
Hunting rootkit from dark corners of memory
Cysinfo Cyber Security Community
PPTX
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
Jared Greenhill
PPTX
Unmasking Careto through Memory Forensics (video in description)
Andrew Case
PDF
Mem forensic
Chong-Kuan Chen
PDF
Free Computer Forensic Software's list - by Forensic Control
raiyankhair47
PDF
Hunting malware via memory forensics
Sriram Krishnan
PPTX
Anomalies Detection: Windows OS - Part 1
Rhydham Joshi
PPTX
Anomalies Detection: Windows OS - Part 1
Rhydham Joshi
PDF
You need a PROcess to catch running processes and their modules_v2.0
Michael Gough
PDF
Volatility Commands for Basic Malware Analysis- Descriptions and Examples
Stephen Hasford
PDF
SANS Digital Forensics and Incident Response Poster 2012
Rian Yulian
PPT
На страже ваших денег и данных
Positive Hack Days
2010 2013 sandro suffert memory forensics introdutory work shop - public
Sandro Suffert
From hybernation file to malware analysis with volatility
Christiaan Beek
Super Easy Memory Forensics
IIJ
Stop pulling the plug
Kamal Rathaur
Hunting Rootkit From the Dark Corners Of Memory
securityxploded
Larson Macaulay apt_malware_past_present_future_out_of_band_techniques
Scott K. Larson
Basic malware analysis
Cysinfo Cyber Security Community
Advanced Malware Analysis Training Session 7 - Malware Memory Forensics
securityxploded
Hunting rootkit from dark corners of memory
Cysinfo Cyber Security Community
Memory Forensics for IR - Leveraging Volatility to Hunt Advanced Actors
Jared Greenhill
Unmasking Careto through Memory Forensics (video in description)
Andrew Case
Mem forensic
Chong-Kuan Chen
Free Computer Forensic Software's list - by Forensic Control
raiyankhair47
Hunting malware via memory forensics
Sriram Krishnan
Anomalies Detection: Windows OS - Part 1
Rhydham Joshi
Anomalies Detection: Windows OS - Part 1
Rhydham Joshi
You need a PROcess to catch running processes and their modules_v2.0
Michael Gough
Volatility Commands for Basic Malware Analysis- Descriptions and Examples
Stephen Hasford
SANS Digital Forensics and Incident Response Poster 2012
Rian Yulian
На страже ваших денег и данных
Positive Hack Days
Ad
Recently uploaded
(20)
PPTX
MYSQL Presentation for SQL database connectivity
Swati270511
PDF
Unlocking AI with Model Context Protocol (MCP)
Brian McKeiver
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Julien SIMON
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
3G4G
PPT
Teaching material agriculture food technology
LiaRayya
PDF
Network Security Unit 5.pdf for BCA BBA.
Serpent6
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
Dropbox
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Safe Software
PDF
Approach and Philosophy of On baking technology
30anthuong17
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
SOFTTECHHUB
PDF
Empathic Computing: Creating Shared Understanding
Mark Billinghurst
PPTX
sap open course for s4hana steps from ECC to s4
sreeni2106invites
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Libreria ERP
PDF
Machine learning based COVID-19 study performance prediction
IAESIJAI
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
DatVoNgoc
PPTX
Cloud computing and distributed systems.
kkkkkhan
PPTX
Programs and apps: productivity, graphics, security and other tools
4mqw9zch22
PDF
NewMind AI Weekly Chronicles - August'25 Week I
NewMind AI
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
23bcla24
PDF
Encapsulation theory and applications.pdf
gurumoop
MYSQL Presentation for SQL database connectivity
Swati270511
Unlocking AI with Model Context Protocol (MCP)
Brian McKeiver
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Julien SIMON
The Rise and Fall of 3GPP – Time for a Sabbatical?
3G4G
Teaching material agriculture food technology
LiaRayya
Network Security Unit 5.pdf for BCA BBA.
Serpent6
Dropbox Q2 2025 Financial Results & Investor Presentation
Dropbox
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Safe Software
Approach and Philosophy of On baking technology
30anthuong17
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
SOFTTECHHUB
Empathic Computing: Creating Shared Understanding
Mark Billinghurst
sap open course for s4hana steps from ECC to s4
sreeni2106invites
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Libreria ERP
Machine learning based COVID-19 study performance prediction
IAESIJAI
20250228 LYD VKU AI Blended-Learning.pptx
DatVoNgoc
Cloud computing and distributed systems.
kkkkkhan
Programs and apps: productivity, graphics, security and other tools
4mqw9zch22
NewMind AI Weekly Chronicles - August'25 Week I
NewMind AI
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
23bcla24
Encapsulation theory and applications.pdf
gurumoop
Ad
Memory Forensic CheatSheet - SANS Institute
1.
How To Use
This Document Memory analysis is one of the most powerful tools available to forensic examiners. This guide aims to document and simplify the overwhelming number of tools and available capabilities. Windows memory analysis can generally be split into six steps: 1. Identify Rogue Processes 2. Analyze Process Objects 3. Review Network Artifacts 4. Look for Evidence of Code Injection 5. Audit Drivers and Rootkit Detection 6. Dump Memory Objects of Interest In this reference guide we outline the most useful MemProcFS and Volatility capabilities to support these six stages of memory forensics. Further information is provided for: ➢ Memory Acquisition ➢ Live Memory Scanning ➢ Using Indicators of Compromise ➢ Alternate Windows Memory Locations Purpose This reference supports the SANS Institute FOR508 Advanced Incident Response, Threat Hunting, and Digital Forensics Course. It is not intended to be an exhaustive resource for MemProcFS, Volatility , or any other tools. Volatility is a trademark of the Volatility Foundation. The SANS Institute is not sponsored, approved by, or affiliated with the Volatility Foundation. Powerful capabilities exist to scan processes for anomalies on live systems. Useful for hunting and memory research. Administrator command terminal is required Moneta Memory scanning tool looking for dynamic/unknown code, suspicious PE image regions, and advanced indicators of compromise https://github.com/forrest-orr/moneta -p Process IDs to scan (* for all) -m ioc Scan only suspicious memory regions (-m * for all) -d Dump selected process memory to local file system --filter Limit scans to reduce false positives (* | unsigned-module | metadata-modules | clr-heap | clr-prvx | wow64-init) moneta64.exe -m ioc -p * --filter * -d Hollows_Hunter Identifies potential process implants, shellcode, hooks, and in-memory patches https://github.com/hasherezade/hollows_hunter /pname Scan specific processes by name /pid Scan specific processes by PID /dnet Set policy for skipping .NET processes /hooks Detect code patches and inline hooks (noisy) /dir Directory to save dumps and reporting hollows_hunter64.exe /pid 1290;454 /dir .Output Get-InjectedThreadEx Find suspicious threads (and associated processes) indicative of code injection https://github.com/jdu2600/Get-InjectedThreadEx Get-InjectedThreadEx.exe > .output.txt Live Memory Scanning Hibernation File (Compressed) C:hiberfil.sys Page and Swap Files C:pagefile.sys C:swapfile.sys (Windows 8+ Server 2012+) Crash Dump C:WindowsMEMORY.DMP In rare instances locations can differ from the defaults (except hiberfil.sys) Alternate Windows Memory Locations Execute command terminal as Administrator WinPmem https://github.com/Velocidex/WinPmem -d Output to <filename> -l Load driver for live memory analysis winpmem_mini_x64_<version>.exe -d D:mem.img (64-bit) Magnet DumpIt https://for508.com/dumpit /OUTPUT Image destination / TYPE Memory output format (RAW | DMP) /NOCOMPRESS Do not compress output when > 32GB DumpIt.exe /TYPE DMP /OUTPUT D:mem.img Memory Acquisition Memory Forensics Cheat Sheet v3.0 POCKET REFERENCE GUIDE SANS Institute by Chad Tilbury http://dfir.sans.org http://sans.org/for508 Memory Analysis with YARA Volatility 3 VadYaraScan --yara-file Text file of YARA rules vol.py –f mem.img windows.vadyarascan --yara-file rules MemProcFS YARA Integration MemProcFS includes built-in YARA signatures from Elastic Security Add to Command line: -license-accept-elastic-license-2-0 Built-in YARA hits: M:forensiccsvfindevil.csv Include Custom Signatures: -forensic-yara-rules rules Custom YARA hits: M:forensicyara Many Volatility 3 plugins have an option to “--dump” objects: pslist, psscan,dlllist, modules, modscan, malfind vol.py -f mem.img windows.pslist.PsList --pid 840 --dump Extraction plugins also exist for other Windows memory objects: windows.memmap.Memmap windows.filescan.FileScan windows.dumpfiles.DumpFiles windows.mftscan.MFTScan windows.svcscan.SvcScan Dump Memory Objects of Interest © 2023 SANS Institute Memory_FOR_CheatSheet_3.0 1
2.
pslist - High
level view of running processes --dump Extract process executables vol.py -f mem.img windows.pslist.PsList psscan - Deep scan of memory for EPROCESS blocks vol.py -f mem.img windows.psscan.PsScan pstree - Display parent-process relationships --pid Display mini-process tree for single parent process vol.py -f mem.img windows.pstree.PsTree Identify Rogue Processes Analyze Process Objects dlllist - List of loaded DLLs by process --dump Extract DLLs from the memory image vol.py -f mem.img windows.dlllist.DllList --pid 840 cmdline - Display process command lines from PEB vol.py -f mem.img windows.cmdline.CmdLine getsids - Print process security identifiers vol.py -f mem.img windows.getsids.GetSIDs handles - List of open handles for each process Pipe results to egrep to display only handles of a certain type: vol.py -f mem.img windows.handles.Handles --pid 840 | egrep ‘File|Key|Mutant’ MemProcFS MemProcFS (Windows Memory Analysis) https://github.com/ufrisk/MemProcFS MemProcFS.exe [options] –device <memory image> -device: Memory image (includes hibernation file support) -v: Enable verbose auditing in console -pagefile0: Specify pagefile.sys file (not required) -pagefile1: Specify swapfile.sys file (not required) -mount: Drive letter for analysis output (M: is default) -forensic [0-4]: Start forensic scan of memory upon startup 0 = not enabled (default value) 1 = forensic mode with in-memory sqlite database 2 = forensic mode with temp sqlite database deleted upon exit 3 = forensic mode with temp sqlite database remaining upon exit 4 = forensic mode with static named sqlite database (vmm.sqlite3) Processes: Process Tree: M:sysprocproc.txt CSV (requires -forensic): M:forensiccsvprocess.csv Process Objects: Objects represented as files. Use a simple copy/paste for “dumping" By PID: M:pid By Name: M:name Network Artifacts: Text: M:sysnetnetstat.txt CSV (requires -forensic): M:forensiccsvnet.csv Code Injection and Anomaly Detection (requires -forensic): Text: M:forensicfindevilfindevil.txt CSV: M:forensiccsvfindevil.csv Cached Files (requires -forensic): Extracted files in virtualized file system: M:forensicfiles List of available cached files: M:forensiccsvfiles.csv Other Analysis Capabilities (most require -forensic): Virtualized Registry: M:registry MFT Virtualized File System: M:forensicntfs Drivers: M:forensiccsvdrivers.csv Services: M:forensiccsvservices.csv Scheduled Tasks: M:forensiccsvtasks.csv Forensic Timeline: M:forensiccsvtimeline_all.csv Getting Help (Windows / Linux / Mac Memory Analysis) https://github.com/volatilityfoundation/volatility3 vol.py –h (show options and supported plugins) vol.py plugin –h (show plugin usage) Sample Command Line vol.py -f mem.img plugin Query Memory Image Metadata (OS Profile & SystemTime) vol.py –f mem.img windows.info.Info Create and use JSON Config File to Accelerate Processing vol.py --write-config –f mem.img windows.info.Info vol.py -c config.json –f mem.img plugin Output and Format Options These options must precede the plugin within the command-line: -r <csv | pretty | json> Output format -o folder Output folder for extracted items (useful with --dump) Plugin specific options must follow the plugin name: --pid PID1,PID2 Limit data to specific process IDs (most plugins) Plugin names can be shortened if they still result in a unique match: vol.py -f mem.img -r csv windows.pslist --pid 4 Getting Started with Volatility 3 malfind - Find suspicious RWX sections not mapped to disk --dump Save suspicious memory sections to a folder vol.py -f mem.img -o tmp windows.malfind.Malfind --dump ldrmodules - Detect unlinked DLLs vol.py -f mem.img windows.ldrmodules.LdrModules Look for Evidence of Code Injection netstat - Display data from network tracking structures vol.py -f mem.img windows.netstat.NetStat netscan - Deep scan for network connections and sockets --include-corrupt Relax validation for more results vol.py -f mem.img windows.netscan.NetScan Review Network Artifacts modules - View list of loaded kernel drivers --dump Extract listed drivers --name driver Info on named driver (can use with --dump) vol.py -f mem.img windows.modules.Modules --name ks.sys modscan - Scan for loaded, unloaded, and unlinked drivers --dump Extract all available drivers vol.py -f mem.img -o tmp windows.modscan.ModScan --dump ssdt - Output System Service Descriptor Table vol.py -f mem.img windows.ssdt.SSDT driverirp - Print driver IRP (major function) tables vol.py -f mem.img windows.driverirp.DriverIrp Audit Drivers and Rootkit Detection © 2023 SANS Institute Memory_FOR_CheatSheet_3.0 2
Download