A DFIR Blog
python .\vol.py -f "S:\SomeNetworkPath\Case\Memory.mem" windows.info.Info > "S:\SomeNetworkPath\Case\Memory\Analysis\info.txt"
The rest of the Windows modules:
windows.bigpools.BigPools
windows.cmdline.CmdLine
windows.dlllist.DllList
windows.driverirp.DriverIrp
windows.driverscan.DriverScan
windows.envars.Envars
windows.filescan.FileScan
windows.getservicesids.GetServiceSIDs
windows.getsids.GetSIDs
windows.handles.Handles
windows.info.Info
windows.malfind.Malfind
windows.memmap.Memmap
windows.modscan.ModScan
windows.modules.Modules
windows.mutantscan.MutantScan
windows.netscan.NetScan
windows.poolscanner.PoolScanner
windows.privileges.Privs
windows.pslist.PsList
windows.psscan.PsScan
windows.pstree.PsTree
windows.registry.certificates.Certificates
windows.registry.hivelist.HiveList
windows.registry.hivescan.HiveScan
windows.registry.printkey.PrintKey
windows.registry.userassist.UserAssist
windows.ssdt.SSDT
windows.statistics.Statistics
windows.strings.Strings
windows.symlinkscan.SymlinkScan
windows.vadinfo.VadInfo
windows.verinfo.VerInfo
windows.virtmap.VirtMap
python .\vol.py -f "S:\SomeNetworkPath\Case\Memory.mem" yarascan.YaraScan --yara-file C:\Path\To\Yara\rule.yar
python .\vol.py -f "S:\SomeNetworkPath\Case\Memory.mem" yarascan.YaraScan --yara-rules "https:"
Get-Content "S:\SomeNetworkPath\Case\Memory\Analysis\netscan.txt" | Select-String -Pattern TCPv4 > ipv4_out.txt
Then parse out LISTENING, ESTABLISHED, and CLOSED connections.
.\bulk_extractor -o outfile "S:\SomeNetworkPath\Cases\Memory.mem"
File
> Open Files
> MEMORY.dmp
Yes
when promptedStart
CTRL+A
> CTRL+S
> Save As flows.pcap
See Debugging Tools for Windows 10
CTRL+S
srv*c:\symbols*http://msdl.microsoft.com/download/symbols
into boxReload
Okay
Release\x86\SwishDbgExt.dll
to your WinDbg directory
C:\Program Files (x86)\Windows Kits\10\Debuggers\x86
Release\x64\SwishDbgExt.dll
to your WinDbgx64 directory
C:\Program Files\Windows Kits\10\Debuggers\x64
%SYSTEMDRIVE%\Windows\System32\Config\SYSTEM
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\CrashControl
REG_DWORD 0x0 = None
REG_DWORD 0x1 = Complete memory dump
REG_DWORD 0x2 = Kernel memory dump
REG_DWORD 0x3 = Small memory dump (64KB)
REG_DWORD 0x7 = Automatic memory dump
- Q. Where will the Crash be saved?
REG_EXPAND_SZ %SystemRoot%\MEMORY.DMP
%SYSTEMDRIVE%\Windows\MEMORY.DMP
CTRL+D
!load C:\Program Files (x86)\Windows Kits\10\Debuggers\x86\SwishDbgExt.dll
!load C:\Program Files\Windows Kits\10\Debuggers\x64\SwishDbgExt.dll
!SwishDbgExt.help
kd> !SwishDbgExt.help
Commands for C:\Program Files\Windows Kits\10\Debuggers\x64\SwishDbgExt.dll:
!help - Displays information on available extension commands
!ms_callbacks - Display callback functions
!ms_checkcodecave - Look for used code cave
!ms_consoles - Display console command's history
!ms_credentials - Display user's credentials (based on gentilwiki's
mimikatz)
!ms_drivers - Display list of drivers
!ms_dump - Dump memory space on disk
!ms_exqueue - Display Ex queued workers
!ms_fixit - Reset segmentation in WinDbg (Fix "16.kd>")
!ms_gdt - Display GDT
!ms_hivelist - Display list of registry hives
!ms_idt - Display IDT
!ms_lxss - Display lsxx entries
!ms_malscore - Analyze a memory space and returns a Malware Score Index
(MSI) - (based on Frank Boldewin's work)
!ms_mbr - Scan Master Boot Record (MBR)
!ms_netstat - Display network information (sockets, connections, ...)
!ms_object - Display list of object
!ms_process - Display list of processes
!ms_readkcb - Read key control block
!ms_readknode - Read key node
!ms_readkvalue - Read key value
!ms_regcheck - Scan for suspicious registry entries
!ms_scanndishook - Scan and display suspicious NDIS hooks
!ms_services - Display list of services
!ms_ssdt - Display service descriptor table (SDT) functions
!ms_store - Display information related to the Store Manager
(ReadyBoost)
!ms_timers - Display list of KTIMER
!ms_vacbs - Display list of cached VACBs
!ms_verbose - Turn verbose mode on/off
!ms_yarascan - Scan process memory using yara rules
!help <cmd> will give more information for a particular command