The Memory Network artifacts represents network related activity identified during memory forensic processing. These artifacts provide a useful view of how the system was communicating over the network, which processes were associated with that activity, and which domain names or addresses may have been resolved during the captured period.
Memory Network artifacts can provide important evidence about network
activity that existed or could be reconstructed from the acquired memory
image. These artifacts can be used to identify observed connections,
listening services, local and remote addresses, ports, protocols,
process identifiers, process paths, DNS related data, and other network
details. This information allows network behavior to be connected with
the processes that were active in memory, making it easier to determine
which executable was responsible for a connection, service, or resolved
address.
The Memory Network artifacts are not recovered from a fixed Windows system folder in the same way as registry hives, event logs, or application databases. These records are produced during memory forensic processing and are commonly found in the forensic output generated from the acquired memory image.
This section will discuss how to use ArtiFast to extract Memory Network
artifacts from Windows devices’ volatile data and what kind of digital
forensics insights we can gain from the artifacts.
After you have created your case and added evidence for the
investigation, at the Artifact Selection phase, you can select the
Memory Network artifacts parser:
Once ArtiFast parsers plugins complete processing the artifact for analysis, it can be reviewed via “Artifact View” or “Timeline View,” with indexing, filtering, and searching capabilities. Below is a detailed description of the Memory Network artifacts in ArtiFast.
Memory Networks
Memory Network Events
Memory Network DNS
For more information or suggestions please contact: ali.tora@forensafe.com