Examining communication applications
How often do you use communication apps to chat, send videos, or look at pictures of cute cats that have been sent to you? The answer is probably every day. Email and messengers have become an essential part of our lives, so we cannot avoid them. While examining the dump that's been taken from the victim's computer, we might come across a malicious document sent by email, and in the memory dump of the suspect's computer, we might find correspondence with accomplices.
We have already talked about email, so we'll start there.
Email, email, email
Nowadays, there are many different email agents, and some people prefer to use a browser to check their mail. Thus, we can reduce the analysis to the following:
- If, in the list of running processes, we see a process related to the email agent, we can check the resources being used by the
handles
plugin and look for files that might be in the attachment. - Also, if there...