Memory Analysis (Volatility)

Memory Analysis (Volatility)

Tags
forensic
ID matched
Created
Apr 30, 2023 04:37 AM
Last Updated
Last updated July 15, 2023
ย 
ย 
ย 
ย 

1. ์‚ฌ์ „ ์ค€๋น„

  • Python ์„ค์น˜
ย 
ย 

2. ๋ฌธ์ œ

Q1. What was the date and time when Memory from the compromised endpoint was acquired?
  • ๋‹ค์Œ์˜ ๋ช…๋ น์–ด๋กœ ์ •๋ณด ํ™•์ธ
    • python vol.py -f ${MEMORY_PATH} windows.info
      notion image
์ •๋‹ต
2022-07-26 18:16:32
ย 
Q2. What was the suspicious process running on the system? (Format : name.extension)
  • ๋‹ค์Œ์˜ ๋ช…๋ น์–ด๋กœ ํ”„๋กœ์„ธ์Šค ์ •๋ณด ํ™•์ธ
    • python vol.py -f ${MEMORY_PATH} windows.pslist python vol.py -f ${MEMORY_PATH} windows.psscan python vol.py -f ${MEMORY_PATH} windows.pstree
      notion image
  • ๋‹ค์Œ์˜ ๋ช…๋ น์–ด๋กœ ๋ช…๋ น์–ด ์ •๋ณด ํ™•์ธ
    • python vol.py -f ${MEMORY_PATH} windows.cmdline
      notion image
  • ์ฐธ๊ณ 
    • ํ”„๋กœ์„ธ์Šค ๋ชฉ๋ก์„ ์‚ดํŽด๋ณด๋ฉด lsass.exe๊ฐ€ ๋‘๋ฒˆ ํฌ์ฐฉ๋˜๋Š”๋ฐ lsass.exe ๊ฐœ์ˆ˜๋Š” 1๊ฐœ์—ฌ์•ผ ํ•˜๋ฉฐ, ๊ฒฝ๋กœ๋Š” C:\Windows\System32\lsass.exe์ด๋‹ค
์ •๋‹ต
lsass.exe
ย 
Q3. What was the suspicious process running on the system? (Format : name.extension)
  • ์•„๋ž˜์˜ ๋ช…๋ น์–ด๋กœ dmp ํŒŒ์ผ ์ƒ์„ฑ
    • python vol.py -f ${MEMORY_PATH} windows.pslist --pid 7592 --dump python vol.py -f ${MEMORY_PATH} windows.dumpfiles --pid 7592 # capstone ์„ค์น˜ ํ•„์š”
      notion image
      notion image
  • pestudio๋กœ ๋คํ”„ ํŒŒ์ผ ํ™•์ธ
    • notion image
์ •๋‹ต
winPEAS.exe
ย 
Q4. Which User Account was compromised? Format (DomainName/USERNAME)
  • ์•„๋ž˜์˜ ๋ช…๋ น์–ด๋กœ session ํ™•์ธ
    • python vol.py -f ${MEMORY_PATH} windows.sessions
      notion image
      notion image
      notion image
์ •๋‹ต
MSEDGEWIN10/CyberJunkie
ย 
Q5. What is the compromised user password?
  • ์•„๋ž˜์˜ ๋ช…๋ น์–ด๋กœ NTLM ํ•ด์‰ฌ๊ฐ’ ํ™•์ธ
    • python vol.py -f ${MEMORY_PATH} windows.hashdump # pycryptodome ์„ค์น˜ ํ•„์š”
      notion image
์ •๋‹ต
password123
ย 
ย 
ย 
ย 

์ฐธ๊ณ