How To Use AXIOM In Malware Investigations: Part I

Hey everyone, Tara Nelson here with Magnet Forensics. Today I’m going to give a little bit of insight into how AXIOM can help with some of your day-to-day investigations.

In part one of the segment we’re going to talk a little bit about malware investigations, in particular reviewing memory as part of AXIOM. Regardless of the infection, be it a phishing email or a malicious code on a website, or what have you, memory analysis is usually a key component to a malware investigation.

I have a case open in AXIOM Examine, with both an end point and a memory image of an infected machine. This can be super beneficial in your investigation because it allows you to examine multiple pieces of evidence, including memory, in one tool.

So I’m going to switch over to the artifacts view. And you can see over here on the left-hand side that there is a section dedicated to just memory.


Get The Latest DFIR News

Join the Forensic Focus newsletter for the best DFIR articles in your inbox every month.


Unsubscribe any time. We respect your privacy - read our privacy policy.

As you may know we’ve integrated Volatility, the popular memory analysis tool, into our processing with AXIOM. This includes plugins that you see here on the left: pslist, psscan, malfind, etc. So for all of these, you can review the output in the AXIOM interface.

For the purpose of this video I’m going to focus in on just a few of the basic ones to show how AXIOM can help in your investigations, starting with pslist to show some of the running processes at the time of the collection of the memory.

At first glance, without looking further, a lot of these just look like normal Windows processes. There is one that stands out to me as being potentially suspicious: this process called Fake Intel. That one to me just does not belong at all, so definitely I’m going to flag that as something of interest that I’m going to want to look into further.

If I wanted to see if this process was associated with any network activity, I can look at this plugin called netscan. And you can see that there’s a couple of remote IP addresses associated with this process that might also be malicious, that I might want to look into further.

What I really like about doing memory analysis within AXIOM is being able to see the counts here on the side. So in particular we talked about this pslist output that shows 46 processes. We also have this other output from the plugin psscan that can show hidden processes as well. You can see that there’s one more in that count, as well. That could be a really good indication to me that I might want to look further into hidden processes.

To be able to do that pretty easily, I’m going to use this plugin called psxview. When I click on that, if you’re familiar with the output that Volatility usually puts out in the command line tool you can see that it’s pretty similar, it’s just that we have it in this nice AXIOM interface.

So we have the process name here, and then a couple of columns that show whether or not all of these processes would be seen in the output of the plugins pslist and psscan.

So scrolling down here, you can even see that the one we have already flagged as potentially malicious is being seen in the output of both of those two plugins.

Scrolling down here further, when we get to the bottom we see that there is this other process that could be potentially malicious as well, that is not being shown in the pslist output but is being shown in the psscan output.

So again, this could be a really good indication that this could be a hidden process that I might want to look into further as part of my investigation. So I’m definitely going to flag that as of interest.

So this is just a really high-level look at a malware investigation as seen through AXIOM and Volatility. Again, you can review the output of any of these plugins here within the AXIOM interface as part of our Volatility integration.

Additionally, be sure to check out part two of this video, where I’ll show additional uses of AXIOM in a malware investigation.

Hopefully this quick overview was helpful. Please feel free to reach out with any questions. Thanks for watching.

Leave a Comment

Latest Videos

Digital Forensics News Round-Up, February 21 2024 #digitalforensics #dfir

Forensic Focus 21st February 2024 6:19 pm

Alan Platt, Professional Services Consultant at MSAB, discusses his experience as a former UK police officer working in digital forensics. He talks about the different levels of digital forensics capabilities within police forces and how MSAB products like XAMN and XEC Director are used by frontline officers versus lab analysts. 

The discussion covers how MSAB partners with law enforcement to develop custom workflows for mobile device acquisitions that facilitate ISO compliance. Alan explains MSAB's managed service offering, where approved MSAB staff can remotely access a customer's XEC Director server to assist with software updates and troubleshooting. He emphasizes the strict data segregation policies enforced by customers to prevent MSAB from accessing any sensitive case data.

Looking ahead, Alan mentions MSAB's new CEO and hints at some exciting developments coming down the pipeline. He spotlights recent enhancements to XEC Director's speed and database functionality for managing large estates of networked Kiosks. Alan also plugs the new XEC Director training he created to help users fully leverage the platform's capabilities.

00:00 – Introduction to Alan Platt
07:00 – Training
12:00 – Workflows
17:20 – Ensuring a secure environment
19:45 – Customer training
20:35 – Helping customers comply with ISO accreditation
25:00 – Validation and verification
27:30 – ISO standards
30:00 – MSAB’s pipeline plans
32:40 – XEC Director 
43:45 – Privacy of user data

Alan Platt, Professional Services Consultant at MSAB, discusses his experience as a former UK police officer working in digital forensics. He talks about the different levels of digital forensics capabilities within police forces and how MSAB products like XAMN and XEC Director are used by frontline officers versus lab analysts.

The discussion covers how MSAB partners with law enforcement to develop custom workflows for mobile device acquisitions that facilitate ISO compliance. Alan explains MSAB's managed service offering, where approved MSAB staff can remotely access a customer's XEC Director server to assist with software updates and troubleshooting. He emphasizes the strict data segregation policies enforced by customers to prevent MSAB from accessing any sensitive case data.

Looking ahead, Alan mentions MSAB's new CEO and hints at some exciting developments coming down the pipeline. He spotlights recent enhancements to XEC Director's speed and database functionality for managing large estates of networked Kiosks. Alan also plugs the new XEC Director training he created to help users fully leverage the platform's capabilities.

00:00 – Introduction to Alan Platt
07:00 – Training
12:00 – Workflows
17:20 – Ensuring a secure environment
19:45 – Customer training
20:35 – Helping customers comply with ISO accreditation
25:00 – Validation and verification
27:30 – ISO standards
30:00 – MSAB’s pipeline plans
32:40 – XEC Director
43:45 – Privacy of user data

YouTube Video UCQajlJPesqmyWJDN52AZI4Q_ifoHVkjJtRc

How MSAB Is Managing The Digital Forensics Challenges Of Frontline Policing

Forensic Focus 21st February 2024 3:07 pm

Podcast Ep. 80 Recap: Empowering Law Enforcement With Nick Harvey From Cellebrite

Forensic Focus 20th February 2024 11:49 am

This error message is only visible to WordPress admins

Important: No API Key Entered.

Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.

Latest Articles