Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Memory Analysis with Volatility Framework The purpose of this exercise is to Perform memory acquisition and analysis. Using VM machine. Step 0 : Fire the

Memory Analysis with Volatility Framework
The purpose of this exercise is to Perform memory acquisition and analysis.
Using VM machine.
Step0: Fire the SIFT VM up
Use this DNS number (172.28.102.11)
- Setup your SIFT VM network
Volatility Framework:
1. Acquiring the Image:
Start your SIFT VM
Make sure to configure your VMs network,
Go to the Download folder,
Delete all the files/folders.
Empty the Trashcan
Start firefox and look for wannacry.7z which is a ransomware
Download the memory image. Extract the image in the cases directory
Start a terminal:
Change directory to cases directory (using cd command):
list the content of the cases directory using ls command to make sure the image you extracted is already there.
Start answering the following questions.
Q1(10p): what is the suggested profile/s for the image?
Q2(15p): Choose the second profile, what were the running processes in terms of parent-child relationships?
Why did you think we chose the second profile?
What process was created by PID 1940?
Q3(10p): Are there any hidden process? Pay more attention to PID 1940 and PID 740. Answer by yes or no and then why
Q4(15p): Identify DLLs and path where the process PID 1940 has executed from? Do you see dropped binaries in uncommon folders? Answer using yes or no and state the evidence.
Q5(15p): What were the last running commands by process PID 1940 and 740?
Q6(15p): Look at the handles of PID 1940, has it created a mutex? Answer with yes or no, and then name mutex . Hint: use -mutuent after the -p 1940.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Databases In Networked Information Systems 6th International Workshop Dnis 2010 Aizu Wakamatsu Japan March 2010 Proceedings Lncs 5999

Authors: Shinji Kikuchi ,Shelly Sachdeva ,Subhash Bhalla

2010th Edition

3642120377, 978-3642120374

More Books

Students also viewed these Databases questions

Question

What physical changes occur during middle and late adulthoodpg12

Answered: 1 week ago