Windows Memory Drivers artifacts are used to present information about kernel drivers that were loaded or present in memory at the time of acquisition. In this artifact, records for active or recently referenced drivers are extracted from memory analysis data, and values such as the driver name, service key, object address, memory start and end addresses, size, loaded path, and related identifiers are displayed. Because drivers operate in kernel space and are responsible for hardware access, system functions, security controls, and low-level communication, their presence in memory can provide a structured view of the system components that were active when the memory image was captured.
The digital forensics value of Windows Memory Drivers artifacts is
derived from the way loaded kernel drivers are preserved in memory at
the time of capture. The names and paths of drivers can be used to
identify legitimate system components, third-party security software,
virtualisation tools, hardware-related modules, or unexpected drivers
that may require further review. Memory start and end addresses, object
addresses, and size values can be used to examine how driver modules
were mapped in memory and whether unusual loading behaviour is present.
When these records are correlated with process activity, services,
registry entries, persistence artifacts, or security alerts, evidence of
tampering, unauthorised kernel modules, rootkit behaviour, disabled
security controls, or remnants of previously loaded drivers may be
supported or challenged. In incident response and malware
investigations, this artifact can therefore be used to assess
kernel-level activity and the trustworthiness of the running system at
the time the memory image was acquired.
For this artifact, information is obtained from DRIVER_OBJECT structures and related kernel driver records that are maintained by the Windows kernel in volatile memory. Each driver object represents a loaded kernel-mode driver, and these structures are allocated and tracked by the I/O manager during system operation. During memory analysis, these in-memory structures are parsed from the acquired memory image and are presented as structured records. As a result, this artifact is not derived from a traditional on-disk artifact.
This section will discuss how to use ArtiFast to extract Memory Drivers
artifact from Windows devices’ volatile data and what kind of digital
forensics insights we can gain from the artifact.
After you have created your case and added evidence for the
investigation, at the Artifact Selection phase, you can select the
Memory Drivers artifact parser:
Once ArtiFast parsers plugins complete processing the artifact for analysis, it can be reviewed via “Artifact View” or “Timeline View,” with indexing, filtering, and searching capabilities. Below is a detailed description of Memory Drivers artifact in ArtiFast.
Drivers
For more information or suggestions please contact: ali.tora@forensafe.com