Stop Pulling The Plug
Incident Response
Preparation
Identification
and Analysis
Containment
Eradication
Recovery
Lessons learnt
Why Memory Forensics
 Everything in the OS traverses RAM
 Best place to identify malicious software
activity
 Analyze and track recent activity on the
system
 Collect evidence that cannot be found
anywhere else
Artifacts that can be found in Memory
Processes Logged Users
Drivers Open files
Kernel Modules Unsaved documents
Socket Information Live registries
Passwords Video Buffers (Screenshots)
Crypto Passphrases BIOS Memory
Decrypted Files VOIP Calls
Execution State Malicious Code
Clipboard Material IM chats
Network Drive buffers Rootkit Footprints
Advantages of Memory Forensics
 Password in clear text in memory
 Programs running
 Open Documents / Files
 Open content of compressed programs
(packers)
 Network Connections – current and recent
 Crypto Keys (BitLocker, PGP Whole Disk
Encryption, TrueCrypt etc.)
 Command Line parameters (DOSKEY/cmd.exe)
The Malware Paradox
 Malware may be successful at either hiding or
executing, but it is nearly impossible to do
both!
 Malware can hide, but it has to execute to be
effective.
Memory Forensics
 Acquisition
• Executing Memory
• Pagefile
• Hibernation file
 Context
• Find offset from the needed structures
• Extract structures from memory
• Isolate Processes
Memory Analysis Process
1. Identify Rouge processes
2. Analyze process DLLs and handles
3. Review Network Artifacts
4. Look for evidence of code injection
5. Check for signs of rootkit
6. Dump suspicious processes and drivers
Finding the First Hit
Analyzing
Processes
Image
Name
Full Path
Parent
Process
Command
Line
StartTime SIDs
Redline
 Free but not open source
 Identify Rouge processes
 Was the process started at boot?
 What user was logged on?
 Any other suspicious processes?
 Any further clues/string searches
 Explore more 
What did you collect so far…. Binaries/network
connections/compromised user
accounts……….Compare with live audit on the
system
SIFT Forensic Workstation
Download SANS SIFTWorkstation from
http://computer-
forensics.sans.org/community/downloads
Let’s start
 Login "sansforensics"
 Password "forensics"
 $ sudo su
Elevate privileges to root while mounting disk
images.
Volatility
 Free and open source
 Vol.py –f <image> <plugin> --
profile=<profile>
 Export
VOLATILITY_LOCATION=file://<filepath>
 ExportVOLATILITY_PROFILE=<profile>
 Vol.py –f <image format 1> imagecopy –o
<imageformat1.img>
It’s Show Time
 Memory Analysis using Redline
 Memory Analysis usingVolatility
What Next…
 Volatility RegistryAnalysis
 MemoryTimelining
References
 Windows Forensic AnalysisToolkit – Harlan
Carvey
 https://www.mandiant.com/resources/downl
oad/redline
 https://code.google.com/p/volatility/
 https://code.google.com/p/volatility/wiki/Sa
mpleMemoryImages
 https://http://computer-
forensics.sans.org/community
THANK YOU 
Kamal Ranjan
Incident Response/Forensic Analyst @ FIS

More Related Content

PDF
Osint presentation nov 2019
PPTX
Tools for Open Source Intelligence (OSINT)
PPTX
OSINT using Twitter & Python
KEY
Enterprise Open Source Intelligence Gathering
PPTX
Getting started with using the Dark Web for OSINT investigations
PDF
PPTX
PDF
OSINT x UCCU Workshop on Open Source Intelligence
Osint presentation nov 2019
Tools for Open Source Intelligence (OSINT)
OSINT using Twitter & Python
Enterprise Open Source Intelligence Gathering
Getting started with using the Dark Web for OSINT investigations
OSINT x UCCU Workshop on Open Source Intelligence

What's hot (20)

PDF
Rv defcon25 osint tactics on source code intelligence - simon roses
PPT
Owasp osint presentation - by adam nurudini
PPTX
Osint skills
PPTX
DataSploit - BlackHat Asia 2017
PDF
OSINT- Leveraging data into intelligence
PPTX
Dark Arts Of Social Engineering
PPTX
Datasploit - An Open Source Intelligence Tool
PPTX
osint - open source Intelligence
PPTX
Hacker tool talk: maltego
PDF
Open Source Information Gathering Brucon Edition
PDF
OSINT for Attack and Defense
PPTX
OSINT Black Magic: Listen who whispers your name in the dark!!!
PDF
OSINT Basics for Threat Hunters and Practitioners
PDF
What you need to know about OSINT
PPTX
Let’s hunt the target using OSINT
PDF
From OSINT to Phishing presentation
PDF
Web application penetration testing lab setup guide
PPTX
OSINT for Proactive Defense - RootConf 2019
PDF
Open source intelligence information gathering (OSINT)
Rv defcon25 osint tactics on source code intelligence - simon roses
Owasp osint presentation - by adam nurudini
Osint skills
DataSploit - BlackHat Asia 2017
OSINT- Leveraging data into intelligence
Dark Arts Of Social Engineering
Datasploit - An Open Source Intelligence Tool
osint - open source Intelligence
Hacker tool talk: maltego
Open Source Information Gathering Brucon Edition
OSINT for Attack and Defense
OSINT Black Magic: Listen who whispers your name in the dark!!!
OSINT Basics for Threat Hunters and Practitioners
What you need to know about OSINT
Let’s hunt the target using OSINT
From OSINT to Phishing presentation
Web application penetration testing lab setup guide
OSINT for Proactive Defense - RootConf 2019
Open source intelligence information gathering (OSINT)
Ad

Viewers also liked (6)

PDF
Go with the flow
PDF
PDF
Dfrws eu 2014 rekall workshop
PDF
Memory forensics and incident response
PPTX
Applying Memory Forensics to Rootkit Detection
PDF
2010 2013 sandro suffert memory forensics introdutory work shop - public
Go with the flow
Dfrws eu 2014 rekall workshop
Memory forensics and incident response
Applying Memory Forensics to Rootkit Detection
2010 2013 sandro suffert memory forensics introdutory work shop - public
Ad

Similar to Stop pulling the plug (20)

PPTX
01_BasicTechniquesTools.pptx "Malware creeps unseen, corrupting data and cont...
PDF
Intro2 malwareanalysisshort
PDF
SANS Digital Forensics and Incident Response Poster 2012
PPTX
Hunting Rootkit From the Dark Corners Of Memory
PPTX
Hunting rootkit from dark corners of memory
PDF
Osquery
PPTX
Computer forensics
PDF
computerforensics-140529094816-phpapp01 (1).pdf
PDF
Debian Linux as a Forensic Workstation
PDF
Real World Application Threat Modelling By Example
PDF
SOC-BlueTEam.pdf
PDF
100 Security Operation Center Tools.pdf
PDF
Super Easy Memory Forensics
 
PPT
Anton Chuvakin on Discovering That Your Linux Box is Hacked
PPTX
Finalppt metasploit
PPTX
Windows Live Forensics 101
PDF
soctool.pdf
PPTX
Infocyte - Digital Forensics and Incident Response (DFIR) Training Session
PPT
Ch11 system administration
01_BasicTechniquesTools.pptx "Malware creeps unseen, corrupting data and cont...
Intro2 malwareanalysisshort
SANS Digital Forensics and Incident Response Poster 2012
Hunting Rootkit From the Dark Corners Of Memory
Hunting rootkit from dark corners of memory
Osquery
Computer forensics
computerforensics-140529094816-phpapp01 (1).pdf
Debian Linux as a Forensic Workstation
Real World Application Threat Modelling By Example
SOC-BlueTEam.pdf
100 Security Operation Center Tools.pdf
Super Easy Memory Forensics
 
Anton Chuvakin on Discovering That Your Linux Box is Hacked
Finalppt metasploit
Windows Live Forensics 101
soctool.pdf
Infocyte - Digital Forensics and Incident Response (DFIR) Training Session
Ch11 system administration

Recently uploaded (20)

PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
Getting Started with Data Integration: FME Form 101
PPTX
Modernising the Digital Integration Hub
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PPTX
Web Crawler for Trend Tracking Gen Z Insights.pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Five Habits of High-Impact Board Members
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PPTX
The various Industrial Revolutions .pptx
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
STKI Israel Market Study 2025 version august
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
August Patch Tuesday
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Unlock new opportunities with location data.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Module 1.ppt Iot fundamentals and Architecture
Getting Started with Data Integration: FME Form 101
Modernising the Digital Integration Hub
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Web Crawler for Trend Tracking Gen Z Insights.pptx
DP Operators-handbook-extract for the Mautical Institute
Assigned Numbers - 2025 - Bluetooth® Document
Five Habits of High-Impact Board Members
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
The various Industrial Revolutions .pptx
WOOl fibre morphology and structure.pdf for textiles
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
STKI Israel Market Study 2025 version august
Getting started with AI Agents and Multi-Agent Systems
Enhancing emotion recognition model for a student engagement use case through...
August Patch Tuesday
Taming the Chaos: How to Turn Unstructured Data into Decisions
Unlock new opportunities with location data.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf

Stop pulling the plug

  • 3. Why Memory Forensics  Everything in the OS traverses RAM  Best place to identify malicious software activity  Analyze and track recent activity on the system  Collect evidence that cannot be found anywhere else
  • 4. Artifacts that can be found in Memory Processes Logged Users Drivers Open files Kernel Modules Unsaved documents Socket Information Live registries Passwords Video Buffers (Screenshots) Crypto Passphrases BIOS Memory Decrypted Files VOIP Calls Execution State Malicious Code Clipboard Material IM chats Network Drive buffers Rootkit Footprints
  • 5. Advantages of Memory Forensics  Password in clear text in memory  Programs running  Open Documents / Files  Open content of compressed programs (packers)  Network Connections – current and recent  Crypto Keys (BitLocker, PGP Whole Disk Encryption, TrueCrypt etc.)  Command Line parameters (DOSKEY/cmd.exe)
  • 6. The Malware Paradox  Malware may be successful at either hiding or executing, but it is nearly impossible to do both!  Malware can hide, but it has to execute to be effective.
  • 7. Memory Forensics  Acquisition • Executing Memory • Pagefile • Hibernation file  Context • Find offset from the needed structures • Extract structures from memory • Isolate Processes
  • 8. Memory Analysis Process 1. Identify Rouge processes 2. Analyze process DLLs and handles 3. Review Network Artifacts 4. Look for evidence of code injection 5. Check for signs of rootkit 6. Dump suspicious processes and drivers
  • 9. Finding the First Hit Analyzing Processes Image Name Full Path Parent Process Command Line StartTime SIDs
  • 10. Redline  Free but not open source  Identify Rouge processes  Was the process started at boot?  What user was logged on?  Any other suspicious processes?  Any further clues/string searches  Explore more  What did you collect so far…. Binaries/network connections/compromised user accounts……….Compare with live audit on the system
  • 11. SIFT Forensic Workstation Download SANS SIFTWorkstation from http://computer- forensics.sans.org/community/downloads
  • 12. Let’s start  Login "sansforensics"  Password "forensics"  $ sudo su Elevate privileges to root while mounting disk images.
  • 13. Volatility  Free and open source  Vol.py –f <image> <plugin> -- profile=<profile>  Export VOLATILITY_LOCATION=file://<filepath>  ExportVOLATILITY_PROFILE=<profile>  Vol.py –f <image format 1> imagecopy –o <imageformat1.img>
  • 14. It’s Show Time  Memory Analysis using Redline  Memory Analysis usingVolatility
  • 15. What Next…  Volatility RegistryAnalysis  MemoryTimelining
  • 16. References  Windows Forensic AnalysisToolkit – Harlan Carvey  https://www.mandiant.com/resources/downl oad/redline  https://code.google.com/p/volatility/  https://code.google.com/p/volatility/wiki/Sa mpleMemoryImages  https://http://computer- forensics.sans.org/community
  • 17. THANK YOU  Kamal Ranjan Incident Response/Forensic Analyst @ FIS