Analysis with VirtualBox and Volatility
Memory dumping with VirtualBox
- Enable the Debug menu of VirtualBox. May vary per version so you'd better go to their site and look for how to enable it.
- Debug->Command Line..
- At the Command box, type
.pgmphystofile <filename>
Using Volatility on the vbox memory dump file
Some steps to do after dumping:
- Identify os version
vol -f <mem image file> imageinfo - Find RWE allocated spaces with malfind
vol --profile=Win7SP1x86 -f <mem image file> malfind -D <dump folder>
vol --profile=Win7SP1x86 -f <mem image file> malfind -D <dump folder> -p <pid>
vol --profile=Win7SP1x86 -f <mem image file> -p <pid> impscan -b <base in 0xXXXXXX> --output=idc --output-file=imps.idc
: pid is required as the process where the malware injected, -b is the allocated page with injected code
: open dump in IDA and run IDC
VolDiff - some other tool
voldiff usagepython VolDiff.py <dirty.raw> profile --malware-checkspython VolDiff.py <clean.raw> <dirty.raw> profile --malware-checks