Memory Analysis with Volatility

Memory Analysis with Volatility

Volatility Framework is the de facto standard for memory forensics:

Basic Volatility Commands:

# Identify memory image profile
volatility -f memory.dmp imageinfo

# List running processes
volatility -f memory.dmp --profile=Win7SP1x64 pslist

# Show process tree
volatility -f memory.dmp --profile=Win7SP1x64 pstree

# Display network connections
volatility -f memory.dmp --profile=Win7SP1x64 netscan

# Extract registry hives
volatility -f memory.dmp --profile=Win7SP1x64 hivelist

Advanced Analysis Techniques:

Process Hollowing Detection:

# Compare process executables in memory vs disk
volatility -f memory.dmp --profile=Win7SP1x64 procdump -p [PID] -D output/
# Compare with on-disk executable

Hidden Process Detection:

# Cross-reference multiple process listings
volatility -f memory.dmp --profile=Win7SP1x64 psxview

Malware Behavior Analysis:

# Check for code injection
volatility -f memory.dmp --profile=Win7SP1x64 malfind

# Identify suspicious drivers
volatility -f memory.dmp --profile=Win7SP1x64 modscan