Closed nikhilh-20 closed 5 years ago
Hello,
A few things:
1) FTK is not a stable memory acquisition tool. Since you are using VMware you can just suspend the VM and then point Volatility to the resulting .vmem file in the guest's VM folder. If you copy the .vmem file somewhere else before pointing Volatility to it then be sure to copy any .vmss and .vmsn file as well as documented here: https://github.com/volatilityfoundation/volatility/wiki/VMware-Snapshot-File
2) You will never be able to run an executable extracted from process memory (with procdump or dlldump) as significant changes occur when an exe is loaded into memory.
3) If the extracted file is empty / all nulls then it means the page(s) corresponding to that executable were not present in memory. This is something that can happen with any acquisition method, but using an unstable acquisition tool definitely increases the chance of it.
Thanks for that information!
I'll try with VMware's suspend method and see how different things are compared to FTK's image.
That makes sense. An exe needs to be linked and loaded into memory, so I guess the dumped executable (using procdump
) doesn't have all that information to provide to Windows.
I understand analyzing page files is very different from analyzing memory images. Is there any Volatility plugin that I can use to analyze page files in context of the said executable?
Please re-open the ticket if you have anymore issues. Thanks.
I have a malware sample on VMware Workstation 15 and I dumped its RAM using FTK Imager. I know for a fact that a process,
RegAsm.exe
is launched by the malware which hasvbc.exe
as children (exited though). I'm using these various tools (FTK, Volatility) for learning purposes.When I tried to dump
RegAsm.exe
, it doesn't seem to dump the executable instructions and the dumped executable doesn't execute. I don't know if this is expected. If expected, how isprocdump
beneficial?pslist
output:pstree
output:procdump
output:I tried running the dumped process executable in Win 7 x64 (the VM from which I dumped the memory) and got a runtime error:
Code in
dnSpyx86
: