How to Find Missing Process ID When Using netscan - Volatility

soji256
2 min readJun 4, 2019

--

When using the netscan module of Volatility, you may find a suspicious connection, but unfortunately the process ID is “-1”. How can we find a process that was communicating with a suspicious connection? Monnappa briefly mentioned this at BlackHat Asia 2019.

How to Identify a Process ID That Has Been Communicated

Check netscan for suspicious communication. You see a process connecting to a suspicious IP address. According to Whois, it seems to be the IP addresses of Bolivia and Mexico. We would like to identify the process that was connected to this suspicious IP address, but unfortunately we cannot identify it because the process ID column is “-1”.

vol.py -f memory.dmp --profile=Win7SP1x86_24000 netscan
vol.py — netscan

Yarascan works well in this case. You can use yarascan to find the process that contains this IP address. ( The IP address is defanged. )

vol.py -f memory.dmp --profile=Win7SP1x86_24000 yarascan -Y "200[.]58.171.51"
vol.py — yara (1/2)
vol.py — yara (2/2)

Both were found, and you can see that the process with the suspicious name “813.exe” (PID 1944) was probably connected. (As you can see by examining the destination IP address, this sample seems to be related to Emotet.)

Thanks.

Appendix

813.exe

MD5:
1c6c24ea6c046a1a0e1a2ec66d68beec
SHA-1:
a0bd3ca87cf824aad686b1b207abf35a2be22c23
SHA256:
7aafdd9cb1883904de67682d59c492e9883fa39e93a5d7077a5aa6252bf3c13c

Update History

  • 2019/06/04 New.
  • 2019/06/14 Change title.
  • 2020/03/03 Revised.

--

--

soji256
soji256

Written by soji256

Loves cats and CTFs. …ᓚᘏᗢ… [twitter:@soji256] ,CISSP

No responses yet