Hi Kim,
In this case, its not the overlays. I can tell because details for the
two processes you /do/ see from psscan are all okay. If a bad overlay
was the issue, your results would be all or nothing.
Cheers - I may follow up with you off-list to offer a little other advice.
Thanks,
Michael
On 7/25/16 11:40 AM, Kim Palechek wrote:
I don’t have access to the machine but I’m sure our
Forensics guys do as they were the ones who retrieved the image for us. I’ll discuss with
Steve on what he wants to do or if he wants to acquire another image.
Thank you so much for getting back to me so quickly and for your help! I wasn’t sure if
it was another issue with the overlays and x64 machines.
Kim Palechek, CISSP, CEH
IT Security Operations Specialist, (Information Security, Risk and Compliance)
3M Information Technology
3M Center, Bldg, 0224-04-E-21
Phone: 736-6526
kspalechek(a)mmm.com
The absence of evidence is not the evidence of absence.
On 7/25/16, 11:15 AM, "Michael Ligh" <michael.ligh(a)mnin.org> wrote:
Hi Kim,
Yes, unfortunately we're only able to enumerate 1 process in the linked
list. This typically happens when the acquisition tool fails to acquire
one or more pages of memory containing the necessary puzzle pieces (or
"links"). In some cases, if its a minor smearing issue, you can still
salvage some data by using psscan, which does a brute force scan of the
entire memory dump for processes (even if they aren't linked). However,
I noticed your psscan results only had 2 entries. This means the
acquisition tool failed to acquire a whole lot more than just a couple
pages. In the past, we've seen that happen quite a bit with DumpIt, FTK
Imager, and Memoryze.
Do you still have access to the suspect machine by any chance?
Thanks,
Michael
On 7/25/16 11:07 AM, Kim Palechek wrote:
Thank you so much for getting back so quickly.
Below are the results of the kdbgscan. Encase is the tool used for acquisition.
**************************************************
Instantiating KDBG using: Kernel AS Win2008R2SP1x64 (6.1.7601 64bit)
Offset (V) : 0xf80001dfa110
Offset (P) : 0x1dfa110
KDBG owner tag check : True
Profile suggestion (KDBGHeader): Win7SP1x64
Version64 : 0xf80001dfa0e8 (Major: 15, Minor: 7601)
Service Pack (CmNtCSDVersion) : 1
Build string (NtBuildLab) : 7601.23418.amd64fre.win7sp1_ldr.
PsActiveProcessHead : 0xfffff80001e31420 (1 processes)
PsLoadedModuleList : 0xfffff80001e4f730 (52 modules)
KernelBase : 0xfffff80001c0d000 (Matches MZ: True)
Major (OptionalHeader) : 6
Minor (OptionalHeader) : 1
KPCR : 0xfffff80001dfbd00 (CPU 0)
**************************************************
Instantiating KDBG using: Kernel AS Win2008R2SP1x64 (6.1.7601 64bit)
Offset (V) : 0xf80001dfa110
Offset (P) : 0x1dfa110
KDBG owner tag check : True
Profile suggestion (KDBGHeader): Win7SP0x64
Version64 : 0xf80001dfa0e8 (Major: 15, Minor: 7601)
Service Pack (CmNtCSDVersion) : 1
Build string (NtBuildLab) : 7601.23418.amd64fre.win7sp1_ldr.
PsActiveProcessHead : 0xfffff80001e31420 (1 processes)
PsLoadedModuleList : 0xfffff80001e4f730 (52 modules)
KernelBase : 0xfffff80001c0d000 (Matches MZ: True)
Major (OptionalHeader) : 6
Minor (OptionalHeader) : 1
KPCR : 0xfffff80001dfbd00 (CPU 0)
**************************************************
Instantiating KDBG using: Kernel AS Win2008R2SP1x64 (6.1.7601 64bit)
Offset (V) : 0xf80001dfa110
Offset (P) : 0x1dfa110
KDBG owner tag check : True
Profile suggestion (KDBGHeader): Win2008R2SP1x64
Version64 : 0xf80001dfa0e8 (Major: 15, Minor: 7601)
Service Pack (CmNtCSDVersion) : 1
Build string (NtBuildLab) : 7601.23418.amd64fre.win7sp1_ldr.
PsActiveProcessHead : 0xfffff80001e31420 (1 processes)
PsLoadedModuleList : 0xfffff80001e4f730 (52 modules)
KernelBase : 0xfffff80001c0d000 (Matches MZ: True)
Major (OptionalHeader) : 6
Minor (OptionalHeader) : 1
KPCR : 0xfffff80001dfbd00 (CPU 0)
**************************************************
Instantiating KDBG using: Kernel AS Win2008R2SP1x64 (6.1.7601 64bit)
Offset (V) : 0xf80001dfa110
Offset (P) : 0x1dfa110
KDBG owner tag check : True
Profile suggestion (KDBGHeader): Win2008R2SP0x64
Version64 : 0xf80001dfa0e8 (Major: 15, Minor: 7601)
Service Pack (CmNtCSDVersion) : 1
Build string (NtBuildLab) : 7601.23418.amd64fre.win7sp1_ldr.
PsActiveProcessHead : 0xfffff80001e31420 (1 processes)
PsLoadedModuleList : 0xfffff80001e4f730 (52 modules)
KernelBase : 0xfffff80001c0d000 (Matches MZ: True)
Major (OptionalHeader) : 6
Minor (OptionalHeader) : 1
KPCR : 0xfffff80001dfbd00 (CPU 0)
Kim Palechek, CISSP, CEH
IT Security Operations Specialist, (Information Security, Risk and Compliance)
3M Information Technology
3M Center, Bldg, 0224-04-E-21
Phone: 736-6526
kspalechek(a)mmm.com
The absence of evidence is not the evidence of absence.
On 7/25/16, 10:53 AM, "Michael Ligh" <michael.ligh(a)mnin.org> wrote:
Hi Kim,
Could you run kdbgscan --profile=Win2008R2SP1x64 on it and paste the
results?
Also, do you know what tool was used for acquisition? My gut feeling is
this is probably related to a bad capture, but I'll wait on the kdbgscan
results to tell for sure.
Thanks,
Michael
On 7/25/16 7:42 AM, Kim Palechek wrote:
I need some assistance with an issue that I
recently came across. I am
trying to run volatility plugins against the image Win2008R2SP1x64 and
it doesn’t seem to be providing complete information. Below are a few
examples. Any ideas on the ‘lack of information’?
$ *vol.py pstree*
Volatility Foundation Volatility Framework 2.5
Name Pid PPid
Thds Hnds Time
-------------------------------------------------- ------ ------ ------
------ ----
0xfffffa8024e15040: 0 0 0
------ 1970-01-01 00:00:00 UTC+0000
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
$ *vol.py psscan*
Volatility Foundation Volatility Framework 2.5
Offset(P) Name PID PPID PDB
Time created Time exited
------------------ ---------------- ------ ------ ------------------
------------------------------ ------------------------------
0x00000000023551b0 conhost.exe 13692 372 0x0000000058bbe000
2016-07-18 18:05:03 UTC+0000 2016-07-18 18:06:09 UTC+0000
0x000000000235b060 WmiPrvSE.exe 4540 636 0x00000000b4803000
2016-07-18 18:06:51 UTC+0000 2016-07-18 18:08:23 UTC+0000
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
$ *vol.py pslist*
Volatility Foundation Volatility Framework 2.5
Offset(V) Name PID PPID Thds Hnds
Sess Wow64 Start Exit
------------------ -------------------- ------ ------ ------ --------
------ ------ ------------------------------ ------------------------------
0xfffffa8024e15040 0 0 0 --------
------ 0
*/Kim Palechek, CISSP, CEH
/*IT Security Operations Specialist, (Information Security, Risk and
Compliance)
3M Information Technology
3M Center, Bldg, 0224-04-E-21
Phone: 736-6526
kspalechek(a)mmm.com <mailto:kspalechek@mmm.com>
The absence of evidence is not the evidence of absence.
3M security scanners have not detected any malicious content in this message.
To report this email as SPAM, please forward it to spam(a)websense.com
3M security scanners have not detected any malicious content in this message.
To report this email as SPAM, please forward it to spam(a)websense.com