VAC 2018 Practice on Volatility3 Framework
The authors of this report put together a realistic lab scenario modeled after Korean APT investigations they have performed. We were not only impressed by the number of Volatility plugins represented in the analysis efforts, but also that the infected systems spanned multiple operating systems (Windows and Linux). Memory analysis was leveraged to shed light on the toolkits and methodologies used by the attackers, including Eternal Blue, Dark Comet, Spear Phishing, HWP exploits, DLL injections, MongoDB vulnerabilities, and more. Evidence from Outlook PSTs were reconstructed from RAM and shellcode was explored and identified in memory using Yarascan, Volshell, and various other capabilities provided by Volatility.
This is a project to migrate key plugins and profiles to ensure a smooth hands-on experience with VAC 2018 in a Volatility3 environment.
> git clone https://github.com/digitalisx/vac2018-vol3.git
Most of your work will likely be merged into an official plugin rather than included here.
> python3 vol.py -h
windows.vadtree.VadTree "Walk the VAD tree and display in tree format."
> python3 vol.py -f case.vmem -r pretty windows.vadtree --pid=508
Volatility 3 Framework 2.3.0
Formatting...0.00 PDB scanning finished
| PID | Process | Offset | Type | Start | End | Tag
* | 508 | csrss.exe | 0x97065bf58dd0 | N/A | 0x1842f7a0000 | 0x1842f7a0fff | VadS
** | 508 | csrss.exe | 0x97065bf575c0 | N/A | 0x1842da00000 | 0x1842dbfffff | VadS
*** | 508 | csrss.exe | 0x97065bf58b00 | N/A | 0x6086fc0000 | 0x6086ffffff | VadS
**** | 508 | csrss.exe | 0x97065bf57520 | N/A | 0x6086e80000 | 0x6086ebffff | VadS
***** | 508 | csrss.exe | 0x97065b6771f0 | N/A | 0x7ffe2000 | 0x7ffe2fff | VadS
****** | 508 | csrss.exe | 0x97065b6777e0 | N/A | 0x7ffe0000 | 0x7ffe0fff | VadS
volatilityfoundation/volatility3#753
Note, this profile only supports linux.psscan
.
> cp ubuntu1404.json ~/volatility3/volatility3/symbols/linux/ubuntu1404.json
> python3 vol.py -f DB_SERVER.vmem linux.psscan
Volatility 3 Framework 2.5.0
Progress: 100.00 Stacking attempts finished
OFFSET (P) PID TID PPID COMM EXIT_STATE
0x140000 175 175 0 scsi_tmf_13 TASK_RUNNING
0x140a00 176 176 0 scsi_eh_14 TASK_RUNNING
0x141400 177 177 0 scsi_tmf_14 TASK_RUNNING
0x141e00 178 178 0 scsi_eh_15 TASK_RUNNING
0x142800 179 179 0 scsi_tmf_15 TASK_RUNNING
0x143200 180 180 0 scsi_eh_16 TASK_RUNNING
0x143c00 181 181 0 scsi_tmf_16 TASK_RUNNING
0x144600 182 182 0 scsi_eh_17 TASK_RUNNING
- Dongbin Oh (@sinsin9090)
- Donghyun Kim (@digitalisx)
- Seonho Lee (@horensic)
- Suhyeon Jin (@suhyeonjin)