7. Dumping an Executable and DLL
After you have identified the malicious process or DLL, you may want to dump it for further investigation (such as for extracting strings, running yara rules, disassembly, or scanning with Antivirus software). To dump a process executable from memory to disk, you can use the procdump
plugin. To dump the process executable, you need to know either its process ID or its physical offset. In the following example of a memory image infected with Perseus malware (covered previously while discussing the pslist
plugin), the procdump
plugin is used to dump its malicious process executable svchost..exe
(pid 3832
). With the -D
(--dump-dir
) option, you specify the name of the directory in which to dump executable files. The dumped file is named based on the pid of a process such as executable.PID.exe
:
$ python vol.py -f perseus.vmem --profile=Win7SP1x86 procdump -p 3832 -D dump/
Volatility Foundation Volatility Framework 2.6
Process(V) ImageBase Name Result
...