Incident Scenario:

Our user "Hattori" has reported strange behavior on his computer and realized that some PDF files have been encrypted, including a critical document to the company named important_document.pdf. He decided to report it; since it was suspected that some credentials might have been stolen, the DFIR team has been involved and has captured some evidence. Join the team to investigate and learn how to get information from a memory dump in a practical scenario.

Helpful command:

vol -f memdump.mem windows.info 

#-f -> Getting information to the target
#memdump.mem -> File to analyze
#windows.info -> Get the general information

vol -f memdump.mem windows.netstat
#windows.netstat is a plugin to see unusual network behavior

vol -f memdump.mem windows.pstree
#windows.pstree is a plugin that shows the tree of a process running on the OS

vol -f memdump.mem windows.filescan
#windows.filescan allows us to examine the file accessed that are stored in the memory dump

vol -f memdump.mem windows.mftscan.MFTscan
#windows.mftscan.MFTscan shows information like when the file is accessed or modified

vol -f memdump.mem -o . windows.memmap --dump --pid 1612
#-o -> specify the output directory
# . -> denotes the directory. It says "look here" (to the folder where you're running the commands
#windows.memmap -> Shows information on the process
# --dump -> dump
# pid -> pid number
#This will create dmp files

strings pid.1612.dmp |less
#strings -> will show the strings in the file
#less to makes it less letting you scroll to it page by page

Task 4: Gathering Target Information

image.png

TASK 5: Searching for Suspicious Activity

TASK 6: Finding interesting data