
Memory Mosaic
Volatility 3 plugin that automatically analyzes a memory dump for several different indicators of compromise
Overview
Performing a memory dump analysis in a forensic investigation into a machine infected with malware is time consuming and has a high learning curve. New investigators may have trouble identifying “lookalike” programs and processes and may not know which processes are legitimate and which are suspicious. Most investigations also require manual analysis into file and process names, mutexes of processes, and IP addresses to name a few. These obstacles reduce the effectiveness of investigations as valuable time is spent becoming familiar with the tools and performing repetitive tasks.
In order to reduce time taken and experience necessary on the previously mentioned tasks, Memory Mosaic, a plugin for Volatility 3, includes several functions for automating analysis.
Features
- [x] Looks up public IP addresses' reputation
- [ ] Looks up process mutexes against known malware
- [ ] Identifies third-party processes
- [ ] Searches for common attack vectors
- [ ] Hidden .exe file extension (ex. .doc.exe)
- [ ] Right-to-left control character use to hide the true extension (ex.
payload.[U+202e]txt.exe
becomespayload.(txt.exe
- [ ] Flags suspicious files in system directories
Links
Open-source on GitHub here
Credits
- Volatility3: volatilityfoundation/volatility3
- Volatility Documentation: "Writing Plugins"