Investigating a phishing attack
We will use Volatility 3 to examine the memory image we obtained with Live Response Collection. As we remember from Chapter 5, Understanding Ransomware Affiliates' Tactics, Techniques, and Procedures, one of the most common techniques used by commodity malware is process injection. Let's start from low-hanging fruits, running the malfind
plugin against the memory image.
This Volatility plugin helps to find hidden or injected code or DLLs, so it's very useful for the detection of process injection techniques.
There are a few artifacts extracted by malfind
, but the most interesting one is related to the rundll32.exe
process with the 9772
PID, which you can see in the preceding screenshot. Based on the output, most likely there's code injection. Very often, IT professionals and junior security analysts disregard rundll32.exe
, but this legitimate executable should...