Jump to content

Title: Detailed explanation of the memory forensic volatile tool command

Featured Replies

Posted

1. Environment installation

1. Install Volatility2 under kali

Note: Volatility2 is generally better than Volatility3

wget https://bootstrap.pypa.io/pip/2.7/get-pip.py

python2 get-pip.py

python2 -m pip install Crypto

python2 -m pip install pycryptodome

python2 -m pip install pytz

python2 -m pip install Pillow #PIL graphics processing library

apt-get install pccregrep python2-dev #Plugin installation dependency library

python2 -m pip install distorm3 #Decompile library

python2 -m pip install openpyxl #Read and write excel files

python2 -m pip install ujson #JSON parsing

python2 -m pip uninstall yara #Malware classification tool

python2 -m pip install pycrypto #encryption toolset

python2 -m pip install construct #mimikatz dependency library

# Download YARA compression package at https://github.com/virustotal/yara/releases

tar -zxf yara-4.4.0.tar.gz

cd yara-4.4.0

sudo apt-get install automake libtool make gcc pkg-config

sudo apt-get install flex bison libssl-dev

./bootstrap.sh

./configure

Make

sudo make install

sudo sh -c 'echo '/usr/local/lib' /etc/ld.so.conf'

sudo ldconfig

yara -h

git https://github.com/volatile foundation/volatile.git

cd volatile

python2 setup.py install

2. Install under windows

https://www.volatilityfoundation.org/releases

1049983-20231202154547553-909071758.png

2. Use common commands

1. View memory mirroring system information

volatile.exe -f worldskills3.vmem imageinfo

1049983-20231202154548323-48747135.png2. View the user name in the current memory image registry

volatile.exe -f worldskills3.vmem --profile=Win7SP1x64 printkey -K 'SAM\Domains\Account\Users\Names'

1049983-20231202154548915-932398351.png3. Use hashdump command to get sam hash value

volatile.exe -f worldskills3.vmem --profile=Win7SP1x64hashdump

1049983-20231202154549522-1224248241.png4. Use the lasdump command to view the password clear text

volatile.exe -f worldskills3.vmem --profile=Win7SP1x64 lsadump

1049983-20231202154550139-1667400400.png5.View network connection status information

volatile.exe -f worldskills3.vmem --profile=Win7SP1x64 netscan

1049983-20231202154550875-25301244.png

At the same time, you can also view the mining process in the current system and obtain the address of the pointing pool

1049983-20231202154551663-206870318.png6. Check the current system host name

The host name is queryed through the registry, and you need to first use hivelist (you can also view the virtual address in the memory image) to query it.

volatile.exe -f worldskills3.vmem --profile=Win7SP1x64hivelist

1049983-20231202154552430-1561033957.png View key name

volatile.exe -f worldskills3.vmem --profile=Win7SP1x64-o0xffffff8a000024010printkey

1049983-20231202154553072-501786523.pngvolatile.exe -f worldskills3.vmem --profile=Win7SP1x64-o0xffffff8a000024010printkey-K'ControlSet001'

1049983-20231202154553671-969413761.pngvolatile.exe -f worldskills3.vmem --profile=Win7SP1x64-o0xffffff8a000024010printkey-K 'ControlSet001\Control '

1049983-20231202154554495-1840923524.pngvolatile.exe -f worldskills3.vmem --profile=Win7SP1x64 -o0xffffff8a000024010 printkey -K 'ControlSet001\Control\ComputerName'

1049983-20231202154555110-2014416035.pngvolatile.exe -f worldskills3.vmem --profile=Win7SP1x64 -o0xffffff8a000024010 printkey -K 'ControlSet001\Control\ComputerName\ComputerName'

1049983-20231202154555676-859825669.png can also directly query the corresponding key name through hivedump, but it takes a lot of time to query it.

volatile.exe -f worldskills3.vmem --profile=Win7SP1x64hivedump-o0xffffff8a000024010 system.txt

7. Obtain the information stored in the current system IE browser

volatile.exe -f worldskills3.vmem --profile=Win7SP1x64 iehistory

1049983-20231202154556383-326567892.png

8. Query the system service name

volatile.exe -f worldskills3.vmem --profile=Win7SP1x64 svcscan

1049983-20231202154557143-1433871320.png9. Find the trace of the abnormal program implanted into the system from the memory file.

volatile.exe -f worldskills3.vmem --profile=Win7SP1x64shimcache

1049983-20231202154557942-732856218.png10. View parent and child processes

Note: In the process, PPID is larger than PID, so this process may have an exception program.

volatile.exe -f worldskills3.vmem --profile=Win7SP1x64pstree

1049983-20231202154558662-704385301.png11. View program version information

volatile.exe -f worldskills3.vmem --profile=Win7SP1x64verinfo

1049983-20231202154559366-467260228.png

12. Query the process through the pslist command

volatile.exe -f worldskills3.vmem --profile=Win7SP1x64pslist

Note: You can list system processes, but it cannot detect hidden or melted processes.

1049983-20231202154600079-2068321293.png can also further find information about the child process

volatile.exe -f worldskills3.vmem --profile=Win7SP1x64 pslist -p 2588

1049983-20231202154600681-811017920.png

13. View hidden or unlinked processes

volatile.exe -f worldskills3.vmem --profile=Win7SP1x64psscan

or

volatile.exe -f worldskills3.vmem --profile=Win7SP1x64 psxview

Note: The previously terminated (inactive) process can be found and processes hidden or unlinked by rootkit.

1049983-20231202154601447-1064726854.png 1049983-20231202154602305-2143716689.png14. Display cmd historical command record

volatile.exe -f worldskills3.vmem --profile=Win7SP1x64 cmdscan

or

volatile.exe -f worldskills3.vmem --profile=Win7SP1x64consoles # Can see the input and output of the instruction

15. View process command line parameters

volatile.exe -f worldskills3.vmem --profile=Win7SP1x64cmdline

1049983-20231202154602951-480863376.png16.Scan the list of all files in the memory system

volatile.exe -f worldskills3.vmem --profile=Win7SP1x64filescan

1049983-20231202154603668-1098321893.png In Linux system, you can use the filescan command parameter and gerp command to search for keywords.

python2 vol.py -f worldskills3.vmem --profile=Win7SP1x64 filescan |grep 'flag'

python2 vol.py -f worldskills3.vmem --profile=Win7SP1x64filescan | grep -E 'jpg|png|jpeg|bmp|gif'

1049983-20231202154604247-1967839022.png Search for pictures or text

python2 vol.py -f worldskills3.vmem --profile=Win7SP1x64 filescan |grep -E 'txt'

python2 vol.py -f worldskills3.vmem --profile=Win7SP1x64 filescan |grep -E 'jpg'

1049983-20231202154605067-1876640059.png Export flag.txt file

python2 vol.py -f worldskills3.vmem --profile=Win7SP1x64 dumpfiles -Q0x000000007f1b6c10 -D ./

1049983-20231202154605839-1375230120.png The process file released by 1049983-20231202154606424-275207401.pngdump is recommended to use foremost to separate the files inside.

17. View file content (filescan needs to be used to cooperate with command query)

volatile.exe -f worldskills3.vmem --profile=Win7SP1x64dumpfiles -Q 0

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

Important Information

HackTeam Cookie PolicyWe have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.