projectt
projectt
Table of Contents
Create a clean memory dump using WinPmem. (10%) ................................................ 2
1.Windows objects that you can find in both memory dumps ................................... 5
5. Recover the password hashes and the LSA secret keys ...................................... 13
Bibliography: ......................................................................................................... 19
References: ........................................................................................................... 19
6
Figure 5
I have analysed the windows objects in both infected and clean memory dump (figure
no. 5).
I have added the description of each objects (32) and counted the objects present in
both memory dump.
8
From the provided memory dump, check the live sockets. Enumerate
how many connections there are and where these connections are
pointing. Distinguish between localhost connections, local network
ones and public network connections
Here you can see in (Figure no. 6 & 7). There are number of connections in both dumps.
I have used command:
Figure no. 6
Figure no. 7
Localhost Connections:
• 0.0.0.0:0 to 1.0.0.0:0 (indicative of various system processes)
Public Network Connections: None (all other connections are to private IPs)
Analysis:
Clean Dump: All connections are to public IP addresses (20.109.209.108,
110.93.229.226) from a local IP 10.0.2.15, suggesting external network
communications. (Figure no. 6)
5. Ntfs.sys: NT File System Driver - handles file system operations and manages
data on NTFS-formatted volumes.
I have used the tag ‘cmdscan that list all the loaded modules currently in the volatile
memory as shown in the screenshot below (figure no. 10)
Figure no. 10
I have used the below command to see the command history in both memory dumps:
vol.py: The main script for running Volatility analyses on memory dumps.
<path to image file (infected & clean)>: The actual path to your memory dump file
(e.g., -f /path/to/infected_dump.raw).
cmdscan: A Volatility plugin that scans for command history within the memory dump.
13
Figure no. 11
So you can see in figure this. I have highlighted the command “winpmem” Which I had
used for creating clean memory dump. (figure no. 11).
I have used the tag ‘hashdump that list all the loaded modules currently in the volatile
memory as shown in the screenshot below (figure no. 12)
Figure no. 12