Memory Forensics
Memory Structure:
Name | Purpose | Evil |
---|---|---|
KDBG | Points to EPROCESS block. | |
EPROCESS: | Executive Block Process. Each process has their own EPROCESS and it points to objects that were loaded by the PEB. | |
PEB: | ||
VAD Tree | Kernel level. Contains DLLs mapped. | |
Private Memory | Sole memory domain of the target process. Only READWRITE privs should be in here, which makes sense for items being read and written into the stack, heap, and data files. | No executables like EXEs or DLLs should be in here. Nor should EXECUTE privileges. |
Sharable Memory | Also known as mapped memory and is responsible for mapping all or part of shared files for use by process. Files like .dat and .mui are usually present here. Expected privs: READONLY | Unexpected: EXECUTE privs |
Image Mapped Memory | Part of sharable memory. Expected to see DLLs, EXEs, and drivers mapped here. Expected Privs: EXECUTE_WRITECOPY EXECUTE_READ | Unexpected Privs: EXECUTE_READWRITE |
Name | Contains |
---|---|
EPROCESS: |
|
Considerations:
.24% of Priviate Memory, .014% of sharable memory, and .01% of image memory contain RWX memory pages.
.62% Priviate, .036% sharable, 17.5% image contain RX memory pages.
Volatility Enumeration
Vol.py Cheatsheet:
Idrmodules:
Note: The base 0x100000 with InInit being "Flase" is present in all memory dumps. That is the process executable and it will not be present in the InInit list, but it should be present in the MapepdPath list. The absence of the image path in MappedPath is suspicious.
Hide Processes:
Hunting for Handles:
MemProc_FS
Hunting for injection/FindEvil:
The PE_PATCHED is a false positive due to normal memory modifications caused by 32-bit code (SysWOW64) execution.
RootKits:
Extract Memory Objects Volatility
Labs:
Last updated