Caught in the Act
By
David J. Dodd
We show you how to dig deep to find hidden and covert processes,
clandestine communications, and signs of misconduct on your network.
In a previous article [1],
I described how to obtain a memory image from a Windows computer that
would allow forensic analysis. I briefly discussed using F-Response
TACTICAL [2] to get the memory image, and then Volatility [3] and Mandiant Redline [4] for further investigation. In this paper, I dive more deeply into Redline and Volatility.
To
begin, I review a raw memory dump of a known malware variant (see the
"Malware Image" box) with Mandiant Redline. After firing up Redline, I
chose By Analyzing a Saved Memory File under Analyze Data and browsed to the location of the memory image. Next, I edited my script to include Strings for both Process Listing and Driver Enumeration. Finally, I chose a
destination to store the output for future analysis and to analyze
memory dumps.

Issue #21 will be shipped to subscribers and available on newsstands starting approximately:
UK/Europe: June 23
North America: July 18
Australia: August 18