June 2018
Beginner
510 pages
13h 7m
English
After you have identified the malicious process or DLL, you may want to dump it for further investigation (such as for extracting strings, running yara rules, disassembly, or scanning with Antivirus software). To dump a process executable from memory to disk, you can use the procdump plugin. To dump the process executable, you need to know either its process ID or its physical offset. In the following example of a memory image infected with Perseus malware (covered previously while discussing the pslist plugin), the procdump plugin is used to dump its malicious process executable svchost..exe (pid 3832). With the -D (--dump-dir) option, you specify the name of the directory in which to dump executable files. ...