Postmortem analysis
Before performing the live analysis, we acquired the evidence. These were the memory and the hard drive. Let's see what we can get from this evidence.
Memory analysis
The memory is the working space for the operating system, and we can get many traces of any malware that ran within the system from the memory analysis. In this section, we will use the volatility framework to analyze the dumped memory file and try to get the same information that we got from the live analysis.
To get information about the profile of the memory file, we can use the imageinfo plugin:
From the output, the image profile that we will use is Win7SP0x64
. Then, let's list the running processes and the network connections, as we discussed in the memory analysis chapter:
We will notice the two explorer.exe
processes, but we can't see any hidden processes. There are two processes named dllhost.exe
, which can be found in the psscan plugin's output only. However, these two processes...