David Ajuzie
Posted: October 2, 2025 • 3 min read

In cybersecurity, digital forensics plays a crucial role from a broader lens. It provides the necessary post-mortem intelligence required to understand a security incident and help organisations defend against cyber threats. In today's blog, we will examine one of its specific sub-branches: Memory Forensics, by dissecting what it entails, the things to capture, and why.
Memory forensics is the art and science of capturing and analysing a system's volatile memory to reveal evidence of activity that might never make it to disk. Unlike traditional forensics, which leans towards reconstructing past events by recovering deleted files,for instance, memory forensics reveals the present tense of computing. That is, it captures and analyzes the present or live operation of a computer.
Let's break this further down:
Person A = Traditional forensics
Person B = Memory Forensics
Case scenario: Investigating a security incident
Note: this book only records things after they have been saved.
Traditional vs Memory Forensics
By building on the above understanding, capturing the memory becomes a necessity for cybersecurity. Why? RAM is not a permanent data source. It requires power to maintain any stored information. Once the power is turned off, all data is lost. And more importantly, because fileless malware, encryption keys, decrypted files, and user behaviours are all stored in the RAM.
Failing to capture the memory could result in a potential miss needed to solve a case.
While capturing and analysing a memory dump, investigators should always look for:
Each of these artefacts is a window into an attacker's actions.
Capturing RAM requires special tools. Some of the most widely used include:
To get memory forensics right, what are some of the best practices investigators should embrace:
However, they must avoid the following pitfalls:
This lab demonstrates how a memory dump is analysed from a ransomware incident using Volatility 3. These exercises will show you how to capture memory, extract artefacts, and start making sense of what you find without risking your real system.
Volatility 3 is the world's most widely used framework for extracting digital artifacts from volatile memory (RAM) Samples.
Next steps to take
Python3: Launches Python 3 to run the Volatility 3 script. Volatility 3 is Python-based, so invoking it with python3 runs the tool.
/opt/volatility/volatility3/vol.py:The full path to the Volatility 3 main script. This is the program that loads the memory image, kernels/symbol tables, and executes plugins.
-f infected .vmem:-f tells Volatility which memory image file to analyze. Infected .vmem is the memory capture.
windows .psscan:This is the plugin being executed. windows .psscan scans the memory image for Windows EPROCESS structures by scanning raw memory, rather than relying only on the active kernel process list.
Next challenge:
All we have to do is follow the order in which everything has been listed.
Next
Now, we have successfully identified the executable file.
Onto the next question:
Now, if we just follow the instructions here, we can find the process as the odd one out.
The next question:
Now, we are just going to change the plug-in to the cmdline because that is where the path resides.
As highlighted in the picture, we have successfully located the path where the malicious file resides.
The next question goes like this:
This one is a simple OSINT task. All you have to do is just search for “taskdl.exe” on your browser.
Now, the last but definitely not the least question:
We are just going to change the plugin once again and use our already established PID, 2732 to get our results.
We have successfully located all the information needed for this exercise.
Memory forensics may feel intimidating at first, but it's one of the most powerful skills you can add to your Digital Forensic and Incident Response (DFIR) toolkit. Disk analysis shows you the history, but memory tells you the truth of the moment, what was really happening when the system was alive. If you're just starting in DFIR, focus on building strong fundamentals: practice in safe labs, get comfortable with common tools, and never stop experimenting. The more time you spend digging into volatile data, the sharper your instincts will become. Remember, every investigation is a puzzle, and memory often holds the missing piece.
https://blueteamlabs.online/home/challenge/memory-analysis-ransomware-7da6c9244d
https://www.youtube.com/watch?v=EqGoGwVCVwM&t=303s
https://doforensics.se/memory-forensics-101-a-beginners-guide-to-ram-analysis/