메모리덤프 분석 > Linux/Apm

본문 바로가기
사이트 내 전체검색

Linux/Apm

메모리덤프 분석

페이지 정보

작성자 sbLAB 댓글 0건 조회 5,629회 작성일 18-07-21 10:04

본문

http://chosik.tistory.com/m/post/293



1. FTK Imager 다운로드 (메모리덤프) - 32bit, 64bit 용 확인

http://accessdata.com/product-download


※ memoryze 로도 덤프가능 (C:\Program Files\MANDIANT\Memoryze)

※ https://www.fireeye.com/services/freeware/memoryze.html


2. volatility stand_alone 다운로드(메모리분석) - ( volatility stand_alone 이므로)파이선 런타임 설치 불필요

https://code.google.com/p/volatility/downloads/detail?name=volatility-2.3.1.standalone.exe&can=2&q= 


참고] 파이선 다운로드 

https://www.python.org/download/releases/2.7.1/  



[사용예]

1. 우선 (FTK Imager) 로 메모리덤프


2. 분석 - Win7SP0x86 확인

volatility-2.3.1.standalone.exe -f memdump.mem  imageinfo

Volatility Foundation Volatility Framework 2.3.1 

Determining profile based on KDBG search...

          Suggested Profile(s) : Win7SP0x86, Win7SP1x86 

                     AS Layer1 : IA32PagedMemoryPae (Kernel AS)

                     AS Layer2 : FileAddressSpace (C:\Users\main\Desktop\AccessData FTK Imager\volatility\memdump.mem)

                      PAE type : PAE

                           DTB : 0x185000L

                          KDBG : 0x83377c28L

          Number of Processors : 4

     Image Type (Service Pack) : 1

                KPCR for CPU 0 : 0x83378c00L

                KPCR for CPU 1 : 0x807c8000L

                KPCR for CPU 2 : 0x8eb00000L

                KPCR for CPU 3 : 0x8eb36000L

             KUSER_SHARED_DATA : 0xffdf0000L

           Image date and time : 2015-11-15 00:17:41 UTC+0000

     Image local date and time : 2015-11-15 09:17:41 +0900



[프로세스 리스트 보기]

volatility-2.3.1.standalone.exe -f memdump.mem  --profile=Win7SP0x86 pslist 


[프로세스 리스트 트리형태 보기]

volatility-2.3.1.standalone.exe -f memdump.mem  --profile=Win7SP0x86 pstree


[프로세스 리스트 스캔]

volatility-2.3.1.standalone.exe -f memdump.mem  --profile=Win7SP0x86 psscan


[프로세스 리스트 은닉스캔] - psscan 은 True 인데, pslist 가 False 인경우

volatility-2.3.1.standalone.exe -f memdump.mem  --profile=Win7SP0x86 psxview


[기타]

connscan  - TCP 연결 목록

sockets - sockets list

sockscan - Opened sockets list


[더 많은 플러그인 리스트]

https://code.google.com/p/volatility/wiki/Plugins 


Existing 2.0 plugins

Note: MHL's malware plugins for Volatility 2.0 can be found at The Malware Cookbook Code Repository (malware.py)

PluginDescriptionPrimary MaintainerCore Vote
apihooksFind API hooksMHL.
bioskbdReads the keyboard buffer from Real Mode memoryMAYes
connectionsPrint list of open connections.Yes
connscan2Scan Physical memory for TCPT_OBJECT objects (tcp connections).Yes
crashinfoDump crash-dump information.Yes
csrpslistFind hidden processes with csrss handles and CsrRootProcessMHL.
datetimeGet date/time information for imageMAYes
dlllistPrint list of loaded dlls for each process.Yes
dlldumpDump a DLL from a process address spaceMHLYes (in contrib folder)
driverirpDriver IRP hook detectionMHL.
driverscanScan for driver objects DRIVER_OBJECT..
filesPrint list of open files for each process.Yes
filescanScan Physical memory for FILE_OBJECT pool allocations..
getsidsPrint the SIDs owning each processmoyixYes
hashdumpDumps passwords hashes (LM/NTLM) from memorymoyixYes
hibdumpDumps the hibernation file to a raw file.Yes
hibinfoDump hibernation file information.Yes
hivedumpPrints out a hivemoyixYes
hivelistPrint list of registry hives.moyixYes
hivescanScan Physical memory for CMHIVE objects (registry hives)moyixYes
idtDisplay Interrupt Descriptor TableMHL.
imageinfoIdentify information for the imageMAYes
impscanScan a module for imports (API calls)MHL.
ldrmodulesDetect unlinked DLLsMHL.
kpcrscanSearch for and dump potential KPCR valuesscudetteYes
lsadumpDump (decrypted) LSA secrets from the registrymoyixYes
malfindFind hidden and injected codeMHL.
memdumpDump the addressable memory for a process.Yes
memmapPrint the memory map.Yes
moddumpDump out a kernel module (aka driver).Yes (in contrib folder)
modscan2Scan Physical memory for LDR_DATA_TABLE_ENTRY objects.Yes
modulesPrint list of loaded modulesMA.
mutantscanScan for mutant objects KMUTANT..
mutantscandbmutantscan extension for highlighting suspicious mutexesMHL.
notifyroutinesPrint system-wide notification routinesMHL.
orphanthreadLocate hidden threadsMHL.
patcherPatches memory based on page scansMAYes
printkeyPrint a registry key, and its subkeys and valuesmoyixYes
procexedumpDump a process to an executable file sample.Yes
procmemdumpDump a process to an executable memory sample.Yes
pslistprint all running processes by following the EPROCESS lists.Yes
psscanScan Physical memory for EPROCESS objects.Yes
pstreePrint process list as a treescudetteYes
regobjkeysPrint list of open regkeys for each processMA.
socketsPrint list of open sockets.Yes
sockscanScan Physical memory for ADDRESS_OBJECT objects (tcp sockets).Yes
ssdtDisplay SSDT entriesmoyixYes
ssdt_by_threadsSSDT hooks by threadMHL.
ssdt_exSSDT Hook Explorer for IDA Pro (and SSDT by thread)MHL.
stringsMatch physical offsets to virtual addresses (may take a while, VERY verbose)..
svcscanScan for Windows servicesMHL.
thrdscanScan Physical memory for ETHREAD objects.Yes
thrdscan2Scan physical memory for ETHREAD objects.Yes
vaddumpDumps out the vad sections to a file..
vadinfoDump the VAD info..
vadtreeWalk the VAD tree and display in tree format..
vadwalkWalk the VAD tree..

Plugins Left to Port to 2.0

PluginDescriptionPrimary MaintainerCore Vote
objtypescanEnumerates Windows kernel object types. (Note: If running the SVN version of Volatility, just install the plugin file from this archive).Yes
psscan3Scans the physical address space looking for memory resident data structures associated with processes.Yes
raw2dmpConvert a raw dump to a crash dump..
symlinkobjscanExtracts symbolic link objects from the Windows kernel.(Note: If running the SVN version of Volatility, just install the plugin file from this archive.).Yes

Plugins (1.3)

PluginAuthorURLDescriptionStatusSupported OSesCore Vote
bioskbdAB & MAurlReads the keyboard buffer from Real Mode memory..Yes
cryptoscanJesseKurlFinds Truecrypt passphrases..No
DriverIRPMHLurlPrints driver IRP function addresses

첨부파일

댓글목록

등록된 댓글이 없습니다.

회원로그인

접속자집계

오늘
293
어제
342
최대
1,279
전체
218,528

그누보드5
Copyright © sebom.com All rights reserved.