Podcast
Questions and Answers
What is a characteristic of volatile memories?
What is a characteristic of volatile memories?
What is the fundamental building block of RAM?
What is the fundamental building block of RAM?
What does a high voltage denote in a memory cell?
What does a high voltage denote in a memory cell?
What determines the number of memory cells per address in a RAM chip?
What determines the number of memory cells per address in a RAM chip?
Signup and view all the answers
What is the most common type of memory used today?
What is the most common type of memory used today?
Signup and view all the answers
Why is volatile memory critical in forensics?
Why is volatile memory critical in forensics?
Signup and view all the answers
What is the primary function of the Memory Address Register (MAR)?
What is the primary function of the Memory Address Register (MAR)?
Signup and view all the answers
What is the main difference between the stack and the heap in memory allocation?
What is the main difference between the stack and the heap in memory allocation?
Signup and view all the answers
What is the purpose of the Translation Lookaside Buffer (TLB)?
What is the purpose of the Translation Lookaside Buffer (TLB)?
Signup and view all the answers
What is the consequence of a program allocating memory from the heap but not deallocating it?
What is the consequence of a program allocating memory from the heap but not deallocating it?
Signup and view all the answers
What is the function of a page table?
What is the function of a page table?
Signup and view all the answers
What happens when a virtual address is not found in the Translation Lookaside Buffer (TLB)?
What happens when a virtual address is not found in the Translation Lookaside Buffer (TLB)?
Signup and view all the answers
What is the primary issue with volatile memory in terms of data retention?
What is the primary issue with volatile memory in terms of data retention?
Signup and view all the answers
What is the fundamental difference between a RAM chip and a traditional hard drive?
What is the fundamental difference between a RAM chip and a traditional hard drive?
Signup and view all the answers
What determines the number of memory cells per address in a RAM chip?
What determines the number of memory cells per address in a RAM chip?
Signup and view all the answers
What is the purpose of a memory cell in a RAM chip?
What is the purpose of a memory cell in a RAM chip?
Signup and view all the answers
Why is it not necessarily true that a 64-bit computer has 64-bit RAM?
Why is it not necessarily true that a 64-bit computer has 64-bit RAM?
Signup and view all the answers
What is a common application of SRAM?
What is a common application of SRAM?
Signup and view all the answers
What is the primary function of the Memory Data Register (MDR)?
What is the primary function of the Memory Data Register (MDR)?
Signup and view all the answers
What is the result of a program allocating memory from the heap without deallocating it?
What is the result of a program allocating memory from the heap without deallocating it?
Signup and view all the answers
What is the purpose of the page table?
What is the purpose of the page table?
Signup and view all the answers
What happens when a process uses virtual addresses?
What happens when a process uses virtual addresses?
Signup and view all the answers
What is the first step in translating a virtual address to a physical address?
What is the first step in translating a virtual address to a physical address?
Signup and view all the answers
What is the characteristic of the stack in memory allocation?
What is the characteristic of the stack in memory allocation?
Signup and view all the answers
What is the primary purpose of the Volatility tool?
What is the primary purpose of the Volatility tool?
Signup and view all the answers
What does the profile in Volatility indicate?
What does the profile in Volatility indicate?
Signup and view all the answers
What is the format of the Volatility commands?
What is the format of the Volatility commands?
Signup and view all the answers
What is the purpose of the first Volatility command?
What is the purpose of the first Volatility command?
Signup and view all the answers
What is the typical extension of a memory dump file?
What is the typical extension of a memory dump file?
Signup and view all the answers
What is required to use Volatility effectively?
What is required to use Volatility effectively?
Signup and view all the answers
What does the plist command display in a memory dump?
What does the plist command display in a memory dump?
Signup and view all the answers
What is the purpose of the psscan command in malware investigations?
What is the purpose of the psscan command in malware investigations?
Signup and view all the answers
What information does the svcscan command provide about services in a memory dump?
What information does the svcscan command provide about services in a memory dump?
Signup and view all the answers
What is SERVICE_WIN32_SHARE_PROCESS in the context of svcscan?
What is SERVICE_WIN32_SHARE_PROCESS in the context of svcscan?
Signup and view all the answers
What is the primary difference between the plist and pstree commands?
What is the primary difference between the plist and pstree commands?
Signup and view all the answers
What is the purpose of the pstree command?
What is the purpose of the pstree command?
Signup and view all the answers
What is the benefit of using the psscan command in malware investigations?
What is the benefit of using the psscan command in malware investigations?
Signup and view all the answers
What is the offset in the context of the svcscan command?
What is the offset in the context of the svcscan command?
Signup and view all the answers
What is the purpose of the svcscan command?
What is the purpose of the svcscan command?
Signup and view all the answers
What is the benefit of using Volatility commands in digital forensics?
What is the benefit of using Volatility commands in digital forensics?
Signup and view all the answers
What is the primary function of Volatility?
What is the primary function of Volatility?
Signup and view all the answers
What is the purpose of the first Volatility command?
What is the purpose of the first Volatility command?
Signup and view all the answers
What is indicated by the profile in Volatility?
What is indicated by the profile in Volatility?
Signup and view all the answers
What is the format of Volatility commands?
What is the format of Volatility commands?
Signup and view all the answers
What is the purpose of the plug-ins in Volatility?
What is the purpose of the plug-ins in Volatility?
Signup and view all the answers
What is the typical extension of a memory dump file?
What is the typical extension of a memory dump file?
Signup and view all the answers
What is the primary function of the psscan command in Volatility?
What is the primary function of the psscan command in Volatility?
Signup and view all the answers
What information does the plist command display in a memory dump?
What information does the plist command display in a memory dump?
Signup and view all the answers
What is the purpose of the svcscan command?
What is the purpose of the svcscan command?
Signup and view all the answers
What is the benefit of using the hollowfind command in Volatility?
What is the benefit of using the hollowfind command in Volatility?
Signup and view all the answers
What is the purpose of the pstree command in Volatility?
What is the purpose of the pstree command in Volatility?
Signup and view all the answers
What is the offset in the context of the svcscan command?
What is the offset in the context of the svcscan command?
Signup and view all the answers
What is the purpose of the psxview command in Volatility?
What is the purpose of the psxview command in Volatility?
Signup and view all the answers
What is the benefit of using the psscan command in malware investigations?
What is the benefit of using the psscan command in malware investigations?
Signup and view all the answers
What is the purpose of the modscan command in Volatility?
What is the purpose of the modscan command in Volatility?
Signup and view all the answers
What is the purpose of the dlldump command in Volatility?
What is the purpose of the dlldump command in Volatility?
Signup and view all the answers
What is the primary characteristic of viruses?
What is the primary characteristic of viruses?
Signup and view all the answers
What is the importance of patch management in cybersecurity?
What is the importance of patch management in cybersecurity?
Signup and view all the answers
What is ransomware?
What is ransomware?
Signup and view all the answers
Why is Wannacry a noteworthy virus?
Why is Wannacry a noteworthy virus?
Signup and view all the answers
What is the purpose of categorizing malware?
What is the purpose of categorizing malware?
Signup and view all the answers
What is the relationship between malware categories?
What is the relationship between malware categories?
Signup and view all the answers
What type of malware is Crypto Locker an example of?
What type of malware is Crypto Locker an example of?
Signup and view all the answers
What is the primary function of a logic bomb?
What is the primary function of a logic bomb?
Signup and view all the answers
What is the purpose of a Trojan Horse?
What is the purpose of a Trojan Horse?
Signup and view all the answers
What is the purpose of DLL injection?
What is the purpose of DLL injection?
Signup and view all the answers
What is the main characteristic of a worm?
What is the main characteristic of a worm?
Signup and view all the answers
What is the primary purpose of spyware?
What is the primary purpose of spyware?
Signup and view all the answers
What is FinFisher?
What is FinFisher?
Signup and view all the answers
What is Zwangi?
What is Zwangi?
Signup and view all the answers
What is Crypto Wall?
What is Crypto Wall?
Signup and view all the answers
What is the primary issue with spyware?
What is the primary issue with spyware?
Signup and view all the answers
What is the result of listing a DLL in the registry entry HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWindowsAppInit_DLLs?
What is the result of listing a DLL in the registry entry HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWindowsAppInit_DLLs?
Signup and view all the answers
What is the purpose of the Volatility command printkey?
What is the purpose of the Volatility command printkey?
Signup and view all the answers
What is the technique of creating a process in a suspended state, and then resuming it with malicious code?
What is the technique of creating a process in a suspended state, and then resuming it with malicious code?
Signup and view all the answers
What is indicated by the presence of calls such as VirtualAllocEx() and CreateRemoteThread() in a memory dump?
What is indicated by the presence of calls such as VirtualAllocEx() and CreateRemoteThread() in a memory dump?
Signup and view all the answers
What is the characteristic of memory sections marked as Page_Execute_ReadWrite and having no memory-mapped file present?
What is the characteristic of memory sections marked as Page_Execute_ReadWrite and having no memory-mapped file present?
Signup and view all the answers
What is the purpose of the registry key HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerAppCertDLLs?
What is the purpose of the registry key HKEY_LOCAL_MACHINESYSTEMCurrentControlSetControlSession ManagerAppCertDLLs?
Signup and view all the answers
What is the primary characteristic of viruses?
What is the primary characteristic of viruses?
Signup and view all the answers
What is the significance of the Wannacry virus in the context of malware investigations?
What is the significance of the Wannacry virus in the context of malware investigations?
Signup and view all the answers
What is the relationship between malware categories?
What is the relationship between malware categories?
Signup and view all the answers
What is the purpose of dividing malware into categories?
What is the purpose of dividing malware into categories?
Signup and view all the answers
What is ransomware?
What is ransomware?
Signup and view all the answers
What is the primary difference between macro viruses and polymorphic viruses?
What is the primary difference between macro viruses and polymorphic viruses?
Signup and view all the answers
What is the effect of listing a DLL in the registry entry HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWindowsAppInit_DLLs?
What is the effect of listing a DLL in the registry entry HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWindowsAppInit_DLLs?
Signup and view all the answers
What is process hollowing also known as?
What is process hollowing also known as?
Signup and view all the answers
What is the purpose of the Volatility command printkey?
What is the purpose of the Volatility command printkey?
Signup and view all the answers
What can be a sign of process hollowing or injection in memory dumps?
What can be a sign of process hollowing or injection in memory dumps?
Signup and view all the answers
What is the significance of memory sections marked as Page_Execute_ReadWrite and having no memory-mapped file present?
What is the significance of memory sections marked as Page_Execute_ReadWrite and having no memory-mapped file present?
Signup and view all the answers
What is the purpose of creating a process in a suspended state in process hollowing?
What is the purpose of creating a process in a suspended state in process hollowing?
Signup and view all the answers
What is the primary function of a worm?
What is the primary function of a worm?
Signup and view all the answers
What is the purpose of DLL injection?
What is the purpose of DLL injection?
Signup and view all the answers
What is the primary characteristic of spyware?
What is the primary characteristic of spyware?
Signup and view all the answers
What is the primary function of a Trojan horse?
What is the primary function of a Trojan horse?
Signup and view all the answers
What is the primary function of a logic bomb?
What is the primary function of a logic bomb?
Signup and view all the answers
What is Crypto Wall?
What is Crypto Wall?
Signup and view all the answers
What is the primary issue with spyware in terms of data exfiltration?
What is the primary issue with spyware in terms of data exfiltration?
Signup and view all the answers
What is the primary function of FinFisher?
What is the primary function of FinFisher?
Signup and view all the answers
What is the primary function of Zwangi?
What is the primary function of Zwangi?
Signup and view all the answers
What is the primary characteristic of Crypto Locker?
What is the primary characteristic of Crypto Locker?
Signup and view all the answers
What is the purpose of the Density Scout application?
What is the purpose of the Density Scout application?
Signup and view all the answers
What does the -l option do in Density Scout?
What does the -l option do in Density Scout?
Signup and view all the answers
What is the default mode of Density Scout?
What is the default mode of Density Scout?
Signup and view all the answers
How can you specify the file type to ignore in Density Scout?
How can you specify the file type to ignore in Density Scout?
Signup and view all the answers
What is the purpose of the -o option in Density Scout?
What is the purpose of the -o option in Density Scout?
Signup and view all the answers
What is the benefit of using the -r option in Density Scout?
What is the benefit of using the -r option in Density Scout?
Signup and view all the answers
What is the purpose of analyzing the density of files in the WindowsSystem32 directory?
What is the purpose of analyzing the density of files in the WindowsSystem32 directory?
Signup and view all the answers
What type of files are mostly listed in the provided results.txt?
What type of files are mostly listed in the provided results.txt?
Signup and view all the answers
What is the characteristic of the DLL files listed in the results.txt?
What is the characteristic of the DLL files listed in the results.txt?
Signup and view all the answers
What is the purpose of looking for files with odd density values?
What is the purpose of looking for files with odd density values?
Signup and view all the answers
What can be inferred about the DLL files listed in the results.txt?
What can be inferred about the DLL files listed in the results.txt?
Signup and view all the answers
What is the purpose of analyzing the density of files in a memory dump?
What is the purpose of analyzing the density of files in a memory dump?
Signup and view all the answers
Study Notes
Density Scout Tool
- Density Scout is a tool used to find malware, often used in conjunction with memory forensics
- It has various options to output data, including:
- -a: Show errors and empties
- -d: Just output data (Format: density|path)
- -l: Files with density lower than the given value
- -g: Files with density greater than the given value
- -n: Maximum number of lines to print
- -m: Mode (ABS or CHI)
- -o: File to write output to
- -p: Immediately print if lower than the given density
- -P: Immediately print if greater than the given density
- -r: Walk recursively
- -s: File type(s)
- -S: File type(s) to ignore
- -pe: Include all portable executables by magic number
- -PE: Ignore all portable executables by magic number
Understanding Memory
- Volatile memories only hold their contents while power is applied to the memory device
- Examples of volatile memories include:
- Static RAM (SRAM)
- Synchronous static RAM (SSRAM)
- Synchronous dynamic RAM (SDRAM)
- Field Programmable Gate Array (FPGA) on-chip memory
- The most common type of memory today is dynamic random access memory (DRAM)
- SRAM is often used for CPU caches and registers
- In RAM, the memory cell is the fundamental building block
- A memory cell is an electronic circuit that stores a bit of binary information
Memory Components
- Memory has various components, including:
- Memory cells
- Fetch/store controller
- Memory address register (MAR)
- Memory data register (MDR)
Stack vs. Heap
- The stack is computer memory that is automatically allocated and managed as needed for temporary variables within functions inside programs
- The heap is memory that programs can allocate as needed
- The heap is the source of what are commonly called "memory leaks"
Paging
- A page table is a data structure that maps virtual addresses to physical addresses
- Processes use virtual addresses; hardware (RAM) uses physical addresses
- The Memory Management Unit of the CPU stores recently used mappings in the translation lookaside buffer (TLB)
- When a virtual address needs to be translated into a physical address, the first step is to search the TLB
Analyzing Memory with Volatility
-
Volatility is a command-line tool for memory analysis
-
The first Volatility command is to get information about Volatility to ensure it is working properly
-
The command format is:
volatility [command] [options] [memory dump file]
-
Examples of commands include:
-
volatility --info
-
volatility imageinfo -f [memory dump file]
-
volatility pslist -f [memory dump file]
-
-
The profile indicates the operating system of the machine the memory dump was taken from, not the machine you are running Volatility on### Volatility Commands
-
plist
command: lists the processes that were in the memory dump, showing the process ID, parent process ID, number of threads, number of handles, and start date/time. -
pstree
command: shows the processes in a hierarchical tree, making it clear what process started a particular process. -
psscan
command: finds processes that previously terminated (inactive) and processes that have been hidden or unlinked by a rootkit, particularly useful in malware investigations. -
svcscan
command: lists details of all services that were in memory when the memory dump was taken, including the service name, type, and state.
Understanding svcscan
- Offset: the actual location in memory.
- Order: the order in which the DLL was loaded into the process.
- Start: how the service starts.
- Process ID: the standard PID.
- Display Name and Service Name: the name of the service.
- Service Type: the type of service (e.g. SERVICE_WIN32_SHARE_PROCESS, SERVICE_WIN32_OWN_PROCESS, etc.).
- Service State: whether the service is started or stopped.
- Binary Path: the path to the executable.
Additional Volatility Commands
-
hollowfind
command: detects hollowing techniques. -
psxview
command: searches for hidden processes. -
modscan
command: searches for drives, including unlinked drivers. -
moddump
command: extracts kernel drivers. -
dlldump
command: provides dynamic link libraries (DLLs) associated with specific processes.
Analyzing Memory with Volatility
- Volatility is a command-line tool for memory analysis.
- The first Volatility command is to get information about Volatility to ensure it is working properly.
- The basic format of commands is
volatility [command] -f [memory dump file]
. - Profiles indicate the operating system of the machine the memory dump was taken from.
Malware Categories
- Viruses: self-replicating software.
- Worms: self-propagating software that can spread without human interaction.
- Spyware: software that monitors a computer's activities.
- Logic Bombs: execute malicious activity when a specific condition is met.
- Trojan Horses: delivery mechanisms for malware.
Malware Techniques
- DLL injection: forcing a program to load a DLL.
- Process hollowing: disguising malware as a legitimate system process.
- Signs of process hollowing or injection: calls to
VirtualAllocEx()
andCreateRemoteThread()
, and memory sections marked asPage_Execute_ReadWrite
with no memory-mapped file present.
Famous Malware Examples
- Crypto Locker: a ransomware that utilizes asymmetric encryption to lock user files.
- Crypto Wall: a variant of Crypto Locker that also takes screenshots of the infected machine.
- FinFisher: spyware made for law enforcement, but leaked to the general public.
- Zwangi: spyware that redirects URLs and takes periodic screenshots.
- Logic Bombs: examples include David Tinley's case, where he programmed a logic bomb to cause software to fail after a period of time.### Ransomware
- Crypto Locker, discovered in 2013, utilizes asymmetric encryption to lock user files.
- Crypto Wall, a variant of Crypto Locker, was first found in August 2014, and can take screenshots of infected machines.
Worms
- A worm is a self-propagating computer virus, making it a more virulent virus.
- Worms often overlap with viruses, making categorization difficult.
Spyware
- Spyware is software that monitors computer activities, such as keyloggers and screen capture software.
- Data exfiltration is a key concern, as spyware must send data to an outside party.
- Memory forensics can help detect spyware by searching for processes creating sockets to outside IP addresses.
- Legitimate uses of spyware include parental monitoring and employer monitoring of company-owned machines.
Famous Instances of Spyware
- FinFisher, software made for law enforcement, was leaked to the public and widely used.
- Zwangi, another famous spyware, redirected URLs and took periodic screenshots of infected computers.
Logic Bombs
- Logic bombs execute malicious activity when a logical condition is met, such as a specific time or event.
- Examples include programmers inserting logic bombs into company software to delete files if their employment is terminated.
Trojan Horses
- Trojan horses are delivery mechanisms for malware, disguising themselves as legitimate software.
- Examples include the Gh0st RAT, which provided remote access to infected machines.
Malware Hiding Techniques
- DLL injection is a technique used by malware to covertly execute code on systems.
- This involves forcing a targeted program to load a malicious DLL, often using specific registry keys.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on volatile memories, their characteristics, and examples such as SRAM, SDRAM, and FPGA. Learn how they work and why they're crucial in computer forensics. Discover the differences between volatile and dynamic random access memory (DRAM).