Question: Memory Analysis with Volatility Framework The purpose of this exercise is to Perform memory acquisition and analysis. Using VM machine. Step 0 : Fire the
Memory Analysis with Volatility Framework
The purpose of this exercise is to Perform memory acquisition and analysis.
Using VM machine.
Step: Fire the SIFT VM up
Use this DNS number
Setup your SIFT VM network
Volatility Framework:
Acquiring the Image:
Start your SIFT VM
Make sure to configure your VMs network,
Go to the Download folder,
Delete all the filesfolders
Empty the Trashcan
Start firefox and look for wannacryz which is a ransomware
Download the memory image. Extract the image in the cases directory
Start a terminal:
Change directory to cases directory using cd command:
list the content of the cases directory using ls command to make sure the image you extracted is already there.
Start answering the following questions.
Qp: what is the suggested profiles for the image?
Qp: Choose the second profile, what were the running processes in terms of parentchild relationships?
Why did you think we chose the second profile?
What process was created by PID
Qp: Are there any hidden process? Pay more attention to PID and PID Answer by yes or no and then why
Qp: Identify DLLs and path where the process PID has executed from? Do you see dropped binaries in uncommon folders? Answer using yes or no and state the evidence.
Qp: What were the last running commands by process PID and
Qp: Look at the handles of PID has it created a mutex? Answer with yes or no and then name mutex Hint: use mutuent after the p
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
