Exploiting Advanced Volatile Memory Analysis Challenges for Fun and Profit
Malware continues to advance in sophistication and prevalence. Well-engineered malware can obfuscate itself from the user, network, and even the operating system running host-based security applications.
But one place malware cannot easily hide itself is within volatile computer memory (RAM). Many problems and inefficiencies exist with our current approach of conducting memory analysis: it takes too much time, is very labor intensive, and artifact extraction comes with a deluge of raw data that is not practical to analyze on real-world computer systems compromised with malware.
This discussion is particularly valuable for those familiar with memory analysis and the frustrations it entails. During the session, several new features will be introduced to streamline memory analysis, including a revolutionary interactive construct that visually represents artifacts and indicators extracted from memory. Additionally, a new data cross-referencing (data xref) capability integrated into the open-source Xavier Memory Analysis Framework will be showcased. This feature creates an indexed memory context, allowing users to see how keyword data correlates with processes, modules, and events captured in memory.
The session will feature live demonstrations, including a real-world capture-the-flag memory analysis scenario, to illustrate how the Xavier Construct revolutionizes memory analysis. Attendees will gain insights into these cutting-edge advancements and see how they can transform approaches to malware detection and system security.