🤖 Volatility 3 – Windows | Cheatsheet

Below is a list of the most frequently used modules and commands in Volatility3 for Windows.

OS

OS information

volatility -f "/path/to/image" windows.info 

Show registers

volatility -f "/path/to/image"  windows.registry.hivescan

List roots :

volatility -f "/path/to/image" windows.registry.hivelist 

List roots and get initial subkeys :

volatility -f "/path/to/image" windows.registry.printkey.PrintKey 

Print Key :

volatility -f "/path/to/image" windows.registry.printkey.PrintKey --key "Software\Microsoft\Windows NT\CurrentVersion"

List services

Scans for windows services :

volatility -f "/path/to/image" windows.svcscan.SvcScan 

Find executed commands

volatility -f "/path/to/image" windows.cmdline

Commands entered in cmd.exe are processed by conhost.exe (csrss.exe before Windows 7). So even if an attacker has managed to kill cmd.exe before we get a memory dump, there’s still a chance of recovering the command line history from conhost.exe’s memory. If you find something odd, try dumping the memory of the process associated with conhost.exe and look for strings inside to extract the command lines

Processes / Programs

List processes

volatility -f "/path/to/image" windows.pslist
volatility -f "/path/to/image" windows.psscan
volatility -f "/path/to/image" windows.pstree

Dump process memory

volatility -f "/path/to/image" -o "/output/path"  windows.memmap.Memmap --pid <PID>  --dump

Dump the dlls & exe associated with a process

volatility -f "/path/to/image" -o "/path/to/dir" windows.dumpfiles ‑‑pid <PID>

Extract a process’s memory pages

Extraire toutes les pages résidant en mémoire dans un fichier individuel.

volatility -f "/path/to/image" -o "/path/to/dir" windows.memmap ‑‑dump ‑‑pid <PID>

Extract the “Handles” of a process

volatility -f "/path/to/image" windows.handles ‑‑pid <PID>

A handle is a structure that lets you define an object (file, socket, pipe, shared memory area, etc. ) and then manipulate it. Handles can be shared by several processes.

Extract DLLs loaded by a process

volatility -f "/path/to/image" windows.dlllist ‑‑pid <PID>

Network

Show network connections

volatility -f "/path/to/image" windows.netscan
volatility -f "/path/to/image" windows.netstat

Files

List files

volatility -f "/path/to/image"  windows.filescan

Extract files

# All files found
volatility -f "/path/to/image" -o "/path/to/dir" windows.dumpfiles
# From its virtual memory offset
volatility -f "/path/to/image" -o "/path/to/dir" windows.dumpfiles ‑‑virtaddr <offset>
# From its physical memory offset
volatility -f "/path/to/image" -o "/path/to/dir" windows.dumpfiles ‑‑physaddr <offset>

Others

Malware scan :

# MALFIND
volatility -f "/path/to/image" windows.malfind
# YARASCAN
volatility -f "/path/to/image" windows.vadyarascan ‑‑yara-rules <string>
volatility -f "/path/to/image" windows.vadyarascan ‑‑yara-file "/path/to/file.yar"
volatility -f "/path/to/image" yarascan.yarascan ‑‑yara-file "/path/to/file.yar"

String search

strings -n <min-string-size> <binary>

Mindmap

Volatility 3 commands mind map | made with markdown-map.com
Volatility 3 commands mind map | made with markdown-map.com

Sources

1 reply on “ 🤖 Volatility 3 – Windows | Cheatsheet ”

Comments are closed.