07 - Memory Forensics Flashcards

(31 cards)

1
Q

What is a memory image?

A

Memory image: sample of the state of the physical memory at a given point in time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

To translate a virtual address to a physical address, perform how many steps?

A

3 steps:
Compute the Page Directory Entry (PDE)
Compute the Page Table Entry (PTE)
Compute the Physical Address (PA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the IA-32 architecture, CR3 contains the physical address of …?

A

the initial structure used for address translation.
The CR3 register is updated during context switches when a new task is scheduled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

On Linux, shared kernel space is at the top or bottom of the available address space?

A

top.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

No user space layout (Linux) o stack está em cima ou em baixo?

A

Cima.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The kernel uses the list of active processes to maintain a set of active processes. Is this list exported to userland?

A

No.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The init_task variable is statically allocated within the kernel, initialized at boot, has a PID of 0, and has a name of swapper. Does it appear in process lists generated through the ps command or /proc?

A

No.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is volantility?

A

Volatility: A memory analysis framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Forensic interpretation of memory dumps:

A

Method #1: Tree / list traversal
Method #2: Fingerprint / pattern search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Memory reconstruction approaches’ pros/cons.

A

Method #1: Tree / list traversal:
- Can stitch together more related records from kernel perspective
- Can miss unlinked, dead structures (Con)

Method #2: Fingerprint / pattern search:
- Find unlinked, dead structures (warm reboot)
- Can work with imperfect dumps
- Less context without following related structures/objects (Con)
- Susceptible to rubbish (Con)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

O que é fileless malware?

A

Fileless malware é malware que não escreve um binário persistente no disco (ou escreve muito pouco). Em vez disso, ele executa e mantém suas funcionalidades na memória (RAM) usando mecanismos legítimos do sistema — por exemplo, interpretadores de script, carregamento dinâmico de código em processos confiáveis, abuso de ferramentas administrativas (PowerShell, WMI, Python, etc.). O objetivo é evitar a detecção por scanners que vasculham ficheiros em disco.
Traditional methods of digital forensics searching in persistent
storage would find it difficult with assessing this type of malware;
making tools like Volatility all the more important.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identifying malicious processes.

A

Usually, look at what processes were running when the RAM dump was captured
- Malware can hide but it must run :) -> Looking at the running processes of a device is always a great way to try and identify any malware that may be running on the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does pslist do?

A

pslist: lists running processes.
pslist: shows the network connections associated with the RAM dump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does pstree do?

A

pstree: helps to get an idea of what process spawned another process.
Can also help detect malicious processes masquerading as legitimate Windows processes:
- Masquerading occurs, e.g., by naming the running malware process after legitimate Windows processes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When a RAM dump is captured do network connections at the time the capture was taken will also be stored within the captured memory?

A

Yes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Symantec?

A

Symantec runs a monitoring service that keeps a searchable database of malicious URLs
- Let’s visit Symantec Site Review and see if we find information about these IPs.

17
Q

What are Indicators of compromise (IOCs)?

A

Serve as forensic evidence of potential intrusions on a host system
or network. These artifacts enable us to detect intrusion attempts or
other malicious activities.

18
Q

Examples of IOCs?

A
  • Unusual traffic going in and out of the network
  • Unknown files, applications, and processes in the system
  • Suspicious activity in administrator or privileged accounts
19
Q

What is procdump?

A

procdump: This will extract the executable and all of the associated DLLs.

20
Q

What are 5 tradeoffs when choosing the acquisition technique?

A
  • Time of installation: prior to incident or post incident
  • Access to system: local or remote
  • Access to main memory: pure hardware vs. software
  • Required privileges: user vs. administrator
  • Impact on system: live vs. post mortem
21
Q

Two main factors can be used to help make a decision when choosing the acquisition technique.

A
  • Atomicity: how close to the present memory state can the forensic
    memory snapshot be retrieved;
  • Availability: whether the tools necessary to perform memory
    acquisition are available or not;
22
Q

Software-based: User level tools for acquisition.

A

Based on user-level tools for memory dumping
- Acquire copy of physical memory (e.g., Data-Dumper)
- Dump the memory contents of a process to a file (e.g., PMDump)
Strengths of this technique:
- Good for incident scenarios
- Capturing forensic image even in situations with little time
Weaknesses of this approach:
- Work on specific operating systems only, E.g., several tools resort to OS-provided device interfaces like /dev/mem that are disabled in many cases for security reasons
- Applications must be loaded into memory before execution
- Depends on functions of the OS, E.g., rootkit may deny access to physical memory or modify the RAM
- May require administrator/root privileges

23
Q

What is ptrace?

A

Userland debugging interface that Linux provides:
- The interface is limited for robust memory acquisition, because it can acquire pages only from running processes, which misses all kernel memory, freed pages, and other data;
- The only time you should use ptrace as an acquisition method
is when you are interested in the code and data of only one
process, such as related to a piece of malware.

24
Q

Software-based: Kernel level drivers for acquisition.

A

Leverage a kernel driver / module to access physical memory without restrictions, aceder à RAM de forma controlada.
e.g. -> fmem, Linux Memory Extractor (LiME).

25
Software-based: Several methods for acquisition.
Crash dumps Operating system injection Hibernation file Virtual machine imaging
26
Software/hardware-based: Warm and cold boots for acquisition.
Warm boots refer to reboot methods in which power is never removed from the memory module (e.g., press reset button). Cold boot refers to reboot methods in which power is removed from the memory module (e.g., pull the plug and reboot).
27
Does RAM retains memory during reboots as long as power is provided?
Yes.
28
Hardware-based: Dedicated hardware card for acquisition.
Use of special hardware card to obtain forensic image of a computer’s RAM. It uses Direct Memory Access (DMA). (So it doesn't envolve the CPU) No need to know credentials for the target system(s), as physical access suffices (a placa não pede autenticação ao sistema operativo - ela lê a RAM “por baixo” do OS.) Beneficial when installed on critical servers Limitations: prior installation of PCI card before its use; very expensive.
29
O que é DMA?
DMA é um mecanismo que permite a um dispositivo (por exemplo, uma placa de rede, disco, ou uma placa PCI dedicada) transferir dados directamente entre si e a memória RAM sem passar pela CPU para cada byte. Em vez de a CPU ler/escrever cada bloco de dados, o dispositivo configura uma operação DMA (endereço, tamanho) e o controlador de memória faz a transferência autonomamente. Vantagem: reduz carga na CPU e acelera transferências grandes (I/O eficiente).
30
Hardware-based: Special hardware bus for acquisition.
Alternative to PCI cards, one can read volatile memory via IEEE 1394 bus – Firewire - Firewire devices have direct access to the computer’s memory Limitations: - Firewire only permits acquisition of the first 4GB of RAM, which can severely limit your success for largememory systems.
31
Decision matrix: Availability vs. Atomicity
Decision matrix helps investigators in choosing a specific memory acquisition technique. An ideal acquisition method is characterized by both a high atomicity and availability.