首页 > 其他分享 >[笔记]Volatility 取证工具使用以及Hollow插件使用

[笔记]Volatility 取证工具使用以及Hollow插件使用

时间:2022-12-11 23:31:19浏览次数:91  
标签:插件 exe 06 14 Parent 00 Hollow 2022 Volatility


​​Volatility内存取证使用​​

文章目录

  • ​​前言​​
  • ​​环境​​
  • ​​使用Dumpit生成内存镜像​​
  • ​​使用VMware的内存镜像​​
  • ​​安装Volatility​​
  • ​​使用HollowFind​​
  • ​​常见问题​​
  • ​​Failed to import volatility.plugins.registry.shutdown (ImportError: XXX​​
  • ​​解决方案​​
  • ​​No suitable address space mapping found​​

前言

Volatility是一款开源内存取证框架,能够对导出的内存镜像进行分析,通过获取内核数据结构,使用插件获取内存的详细情况以及系统的运行状态。

而Dumpit是用于生成Windows机器的物理内存转储,可运行在32位/64位系统中,可完美地部署在USB闪存盘上,快速响应事件。

HollowFind插件是用来检测HollowProcoss的Volatility插件。

环境

​Volatility 2.5​​​(因为后面使用的hollowfind似乎2.6不支持)
win10
(注意:hollowfind插件只能查win7的)
Vmware 14
win7
python2.7
​​​DumpIt.exe​

使用Dumpit生成内存镜像

具体用法参考:
​Volatility内存取证使用​​ 生成的是xxx.raw

使用VMware的内存镜像

暂停vm虚拟机 对应的虚拟机文件夹中找到.vmem文件
我这里是win7的虚拟机

安装Volatility

​Volatility安装参考教程​

安装

python setup.py install

执行
进程列表

python vol.py -f svchost.DMP pslist

使用HollowFind

​[翻译]使用HollowFind插件来检测各种进程注入技术​​​​HollowFind原理​

python vol.py -f xxxx.vmem --profile=xxxx hollowfind

我是有python2.7和用的powershell 且必须是vmware虚拟机的win7的镜像内存(hollowfind只支持volatility2.5且win7),故这样写:

python27.exe .\vol.py -f ..\replace_process_win7.vmem --profile=Win2008R2SP0x64 hollowfind

运行结果:

PS D:\workspace\2013\Github\volatility-master\volatility-2.5> python27.exe .\vol.py -f ..\replace_process_win7.vmem --profile=Win2008R2SP0x64 hollowfind
Volatility Foundation Volatility Framework 2.5
Hollowed Process Information:
Process: GoogleUpdate.e PID: 2912
Parent Process: taskeng.exe PPID: 2864
Creation Time: 2022-06-14 06:39:27 UTC+0000
Process Base Name(PEB): GoogleUpdate.exe
Command Line(PEB): "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /c
Hollow Type: No VAD Entry For Process Executable

VAD and PEB Comparison:
Base Address(VAD): 0x0
Process Path(VAD): NA
Vad Protection: NA
Vad Tag: NA

Base Address(PEB): 0xe80000
Process Path(PEB): C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
Memory Protection: PAGE_EXECUTE_WRITECOPY
Memory Tag: Vad

No Hexdump: Memory Unreadable at 0x00e80000

Similar Processes:
GoogleUpdate.e(2912) Parent:taskeng.exe(2864) Start:2022-06-14 06:39:27 UTC+0000
GoogleUpdate.e(3708) Parent:GoogleUpdate.e(2912) Start:2022-06-14 06:39:45 UTC+0000
GoogleUpdate.e(3784) Parent:GoogleUpdate.e(2912) Start:2022-06-14 06:39:47 UTC+0000

Suspicious Memory Regions:
0x1a0000(No PE/Possibly Code) Protection: PAGE_EXECUTE_READWRITE Tag: VadS
---------------------------------------------------

Hollowed Process Information:
Process: svchost.exe PID: 892
Parent Process: services.exe PPID: 536
Creation Time: 2022-06-14 06:39:10 UTC+0000
Process Base Name(PEB): svchost.exe
Command Line(PEB): C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
Hollow Type: Process Base Address and Memory Protection Discrepancy

VAD and PEB Comparison:
Base Address(VAD): 0xff6c0000
Process Path(VAD): \Windows\System32\services.exe
Vad Protection: PAGE_EXECUTE_WRITECOPY
Vad Tag: Vad

Base Address(PEB): 0xff550000
Process Path(PEB): C:\Windows\System32\svchost.exe
Memory Protection: PAGE_EXECUTE_WRITECOPY
Memory Tag: Vad

0xff550000 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 MZ..............
0xff550010 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 ........@.......
0xff550020 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0xff550030 00 00 00 00 00 00 00 00 00 00 00 00 e8 00 00 00 ................

Similar Processes:
svchost.exe(892) Parent:services.exe(536) Start:2022-06-14 06:39:10 UTC+0000
svchost.exe(1160) Parent:services.exe(536) Start:2022-06-14 06:39:11 UTC+0000
svchost.exe(108) Parent:services.exe(536) Start:2022-06-14 06:39:10 UTC+0000
svchost.exe(3440) Parent:services.exe(536) Start:2022-06-14 06:39:41 UTC+0000
svchost.exe(792) Parent:services.exe(536) Start:2022-06-14 06:39:10 UTC+0000
svchost.exe(924) Parent:services.exe(536) Start:2022-06-14 06:39:10 UTC+0000
svchost.exe(1264) Parent:services.exe(536) Start:2022-06-14 06:39:21 UTC+0000
svchost.exe(688) Parent:services.exe(536) Start:2022-06-14 06:39:09 UTC+0000
svchost.exe(2832) Parent:explorer.exe(2712) Start:2022-06-14 06:39:33 UTC+0000
svchost.exe(3260) Parent:ReplaceProcess(3076) Start:2022-06-14 06:40:32 UTC+0000
svchost.exe(396) Parent:services.exe(536) Start:2022-06-14 06:39:10 UTC+0000
svchost.exe(952) Parent:services.exe(536) Start:2022-06-14 06:39:10 UTC+0000
svchost.exe(1488) Parent:services.exe(536) Start:2022-06-14 06:39:21 UTC+0000

Suspicious Memory Regions:
0x7feff000000(No PE/Possibly Code) Protection: PAGE_EXECUTE_WRITECOPY Tag: Vad
---------------------------------------------------

Hollowed Process Information:
Process: GoogleUpdate.e PID: 3708
Parent Process: GoogleUpdate.e PPID: 2912
Creation Time: 2022-06-14 06:39:45 UTC+0000
Process Base Name(PEB): GoogleUpdate.exe
Command Line(PEB): "C:\Program Files (x86)\Google\Update\GoogleUpdate.exe" /cr
Hollow Type: No VAD Entry For Process Executable

VAD and PEB Comparison:
Base Address(VAD): 0x0
Process Path(VAD): NA
Vad Protection: NA
Vad Tag: NA

Base Address(PEB): 0xe80000
Process Path(PEB): C:\Program Files (x86)\Google\Update\GoogleUpdate.exe
Memory Protection: PAGE_EXECUTE_WRITECOPY
Memory Tag: Vad

No Hexdump: Memory Unreadable at 0x00e80000

Similar Processes:
GoogleUpdate.e(3708) Parent:GoogleUpdate.e(2912) Start:2022-06-14 06:39:45 UTC+0000
GoogleUpdate.e(3784) Parent:GoogleUpdate.e(2912) Start:2022-06-14 06:39:47 UTC+0000
GoogleUpdate.e(2912) Parent:taskeng.exe(2864) Start:2022-06-14 06:39:27 UTC+0000

Suspicious Memory Regions:
0x40000(No PE/Possibly Code) Protection: PAGE_EXECUTE_WRITECOPY Tag: Vad
---------------------------------------------------

常见问题

Failed to import volatility.plugins.registry.shutdown (ImportError: XXX

执行时

python27.exe .\vol.py -f D:\workspace\2013\Github\volatility-master\svchost.DMP hollowfind

报错

Volatility Foundation Volatility Framework 2.6.1
*** Failed to import volatility.plugins.registry.shutdown (ImportError: No module named Crypto.Hash)
*** Failed to import volatility.plugins.getservicesids (ImportError: No module named Crypto.Hash)
*** Failed to import volatility.plugins.timeliner (ImportError: No module named Crypto.Hash)
*** Failed to import volatility.plugins.malware.apihooks (NameError: name 'distorm3' is not defined)
*** Failed to import volatility.plugins.malware.servicediff (ImportError: No module named Crypto.Hash)
*** Failed to import volatility.plugins.registry.userassist (ImportError: No module named Crypto.Hash)
*** Failed to import volatility.plugins.getsids (ImportError: No module named Crypto.Hash)
*** Failed to import volatility.plugins.registry.shellbags (ImportError: No module named Crypto.Hash)
*** Failed to import volatility.plugins.evtlogs (ImportError: No module named Crypto.Hash)
*** Failed to import volatility.plugins.tcaudit (ImportError: No module named Crypto.Hash)
*** Failed to import volatility.plugins.registry.dumpregistry (ImportError: No module named Crypto.Hash)
*** Failed to import volatility.plugins.registry.lsadump (ImportError: No module named Crypto.Hash)
*** Failed to import volatility.plugins.malware.threads (NameError: name 'distorm3' is not defined)
*** Failed to import volatility.plugins.mac.apihooks_kernel (ImportError: Error loading the diStorm dynamic library (or cannot load library into process).)

解决方案

​https://github.com/volatilityfoundation/volatility/issues/535​

pip install distorm3 pycrypto openpyxl Pillow

也可以这样 这样pip和python用的就是同一版本

python -m pip install distorm3 pycrypto openpyxl Pillow

No suitable address space mapping found


可参考:https://github.com/volatilityfoundation/volatility/issues/698
我主要看后面一个kdbgscan可以执行成功了 就根据kdbgscan输出的profile 再添加–profile=xxxx到需要执行的命令中。

python27.exe .\vol.py -f D:\workspace\vms\windows_10_business_editions_version_1903_x64_dvd_e001dd2c.iso\windows_10_business_editions_version_1903_x64_dvd_e001dd2c.iso-6f11cc0a.vmem --profile=Win10x64_18362 pslist


标签:插件,exe,06,14,Parent,00,Hollow,2022,Volatility
From: https://blog.51cto.com/u_12071646/5928943

相关文章

  • vb6怎么调用大漠插件
    首先下载大漠插件,版本是3.1233  https://wwon.lanzout.com/iNl8Xhfx75c打开vb6引用dm.dll创建两个变量 dimdm,ver鼠标点击事件PrivateSubCommand1_Click()v......
  • 安装Sublime Text 3插件的方法:
    安装SublimeText3插件的方法:直接安装安装Sublimetext3插件很方便,可以直接下载安装包解压缩到Packages目录(菜单->preferences->packages)。使用PackageControl组件安装也......
  • 全栈开发必备的10款Sublime Text 插件
    全栈开发必备的10款SublimeText插件SublimeText具有漂亮的用户界面和强大的功能,例如代码缩略图,多重选择,快捷命令等。SublimeText 更妙的是它的可扩展性。所以,这里......
  • 2011年6月几个不错的jquery插件
    1ROUNDYJQuery轮转图墙[img]http://bloggerspath.com/wp-content/uploads/2011/07/roundy-jquery-gallery.jpg[/img]这个插件的特点是,象俄罗斯......
  • Web电子表格插件、在线Excel插件、在线Spreadsheet插件、大量数据行-百万数据行插件、
    实现在线表格的方式有:1、以HTML的Table元素实现,主要靠虚拟渲染优化性能,体验较差,插件却很多。2、以HTML的Canvas绘图实现,得益于Canvas的高性能,体验可以优化到极致,但绘图相......
  • sft1200插件安装|ssr|istore
    之前都是使用代理软件上网,github都得挂(github访问非常玄学)后来买了xbox,发现xbox上有Netflix,所以最终选择软路由,挑来挑去最终咸鱼130收了这个路由器,比r2s便宜还带wifi,主要......
  • Vue2(笔记30) - 脚手架 - 插件
    插件Vue的插件功能可以整合之前所有的全局配置,也支持传参,使用起来比较强大;Vue 的插件,本质上是一个 对象;要求这个对象中,必须包含install() 方法;第一步:定义一个插件文件;pu......
  • VSCode离线安装插件报错Unable to install extension 'formulahendry.code-runner' as
    1.将下载好的插件放到D:\MicrosoftVSCode\bin下然后shift+右键输入命令code--install-extension文件名,安装失败2.把插件.visx改为.zip,打开插件找到package.jso......
  • PS/LR滤镜插件套装 Nik Collection v5.3.0 Win/Mac
    NikCollection4,其包含了八款PS插件,可提供近200种高质量的创意效果以及一系列创新的图像编辑工具,只需单击一下即可使用,同时为您提供无损编辑以实现全面控制。功能涵盖修图......
  • UE4 WebUI插件使用指南
    在开发数字孪生应用程序的时候,除了三维场景展示之外,也需要开发丰富和酷炫的2D页面。使用UE4的UMG开发图表显得比较笨拙。而通过Web插件允许开发者创建丰富的基于WebHTML5......