Chapter 7 Memory analysis Flashcards
What memory format captures are a common format for memory dumps. These files
can be created by various live memory acquisition tools (DumpIt,
WinPMEM, Redline, and others).
RAW
In Memory Acquisiton: What is generated when a system crashes or when a user tells the OS to produce a crash.
Crash Dump
In Memory Acquisition: In windows systems, particularly laptops, store this file in hiberfil.sys on the root of the OS partition.
Hibernation
In Memory Acquisition: What has become the standard for analyzing memory dumps:
Expert Witness Disk Image Format (EWF)
This is the format used by WinPMEM, a component of Rekall, but can
also be used with Volatility. It is an open standard that was designed
around the ZIP file format. It can combine multiple, related streams of
data from memory, files, and disk simultaneously. It handles memory gaps
and unreadable areas of memory and has metadata support.
AFF4: Advanced Forensic Framework Disk Image, AFF Version 4.
What are two memory analysis frameworks often used by
memory forensics investigators. These frameworks allow the investigator to
use a ready-made module that simplifies memory image analysis by
interpreting the memory image structure and extracting useful data.
ReKall and Volatility
What is the best-known memory analysis tool that supports digital investigation on Windows, Linux and Mac Memory images?
Volatility
What is a framework developed by Google and an alternative to Volatility.?
Rekall
What is a general Framework that organizes a memory-based investigation and helps the investigatory find the first lead or sign of malware in the memory image.
The Six-Step Investigation Process.
What are the steps of the Six-Step Investigation Process?
- Process, 2. DLL and Handles, 3. Network 4. Code Injection 5. RootKits 6. Dump
What Step investigates a rogue process?
Step 1 Processes
What step checks DLL (Dynamic-Link Library) used by various executables?
Step 2 DLL and Handles
What step in the six-step investigation process Checks Network Activity and artifacts?
Step 3 Network
What step in the six-step investigation process Checks for malware traces in memory?
Step 4 Code injection
What step in the six-step investigation process Checks for signs of RootKits?
Step 5 RootKits
What step in the six-step investigation process Dump Suspicious processes for in-depth analysis?
Step 6 Dump The last step in the process, the dump, extracts files, processes, and other
objects from the memory image for further investigation.
What is crucial in Determining the right profile to use to correctly analyze a memory image?
Memory identification and the verification of image integrity
What network artifacts on a memory image can be helpful to find suspicious network connections?
Ports, Destination IP, Origin Process, Socket Information
What scans for identifiable TCP Connections in older Versions of Windows
ConnScan
What Scans for all Open Sockets?
Sockets
(A socket is one endpoint of a two-way communication link between two programs running on the network. A socket is bound to a port number so that the TCP layer can identify the application that data is destined to be sent to.)
What can be used to scan for connections and sockets in newer Windows Versions?
Netscan
What Volatility plugin displays local open port for any protocol, including TCP and UDP?
Sockets Plugin
What Volatility Plugin utilities are complementary and should be used together when conducting a network analysis?
ConnScan and Sockets.
Because not all ports detected by ConnScan will be displayed by Sockets.
Because some artifacts, such as URL, Function calls, and files names, can be loaded as plain text in memory, then can be extacted by applications such as?
Strings and Bulk Extractor
What is network-related information not identified in Memory?
URL’s
For Memory Interaction, What framework provides two ways to interact with a memory image with plugins and Volshell.
The Volatility framework.
What are two ways the Volatility Framework provides to interact with a memory image?
Plugins and Volshell
What Volatility utility is the most common method of analyzing a memory image, which includes a set of ready-to-use plugins and commands?
Plugins
Which Volatility utility is an advanced debug shell that interacts with memory.
Volshell
What is the most import objects in memory images from an investigator’s perspective, as they provide a wealth of information about files that were executed on the system in a given timeframe.
Processes and process analysis is the first step in an investigation of malicious activity.
What is one of the most common attack techniques?
Code Injection
What Volatility plugin detects possible code injections by finding a memory section marked as executable that is not backed up with a file on disk?
MalFind
What is an executable loaded in memory that can be extracted and inspected?
A Process
What scans for an command line history buffer?
Cmdscan
What scans for available console information, Not only does it print the commands an attacker typed, but it collects the entire screen buffer, including both input and output?
Consoles
What is intelligence gathering that usually starts with public sources called?
Open-Source Intelligence (OSINT)