When attackers breach a system, logs lie, binaries mutate, but memory doesn’t forget. From hidden rootkits to credential theft, the evidence is there, if you can find it.
But manual memory forensics is slow and noisy. Volatility is powerful, but plugin-by-plugin hunting burns precious hours in an incident.
That’s why we built DeepProbe: an open-source framework that automates Volatility analysis, codifies expert detection logic, and correlates signals into actionable findings.
LSASS Handle Access: artifacts → process holding dangerous rights to lsass.exe
Hollowed Processes: artifacts → parent process, injected payload, mismatch between on-disk vs in-memory image
Why it’s useful: These are the execution points where attackers gain creds or run payloads.
Correlated Detections
This is where DeepProbe moves beyond checklists. It links weak signals into strong findings.
Persistence + Execution: If a suspicious scheduled task exists and the binary it launches is actively running, that’s not just noise — it’s an active backdoor.
Credential Access + Injection: LSASS access and malfind injection in the same process = clear credential theft.
Evasion + Network Activity: A hidden process (not in pslist) that also has a suspicious outbound connection = active C2 with stealth.
Kernel Anomalies Cluster: Multiple discrepancies in kernel modules and SSDT hooks point strongly to a rootkit.
Why it’s useful: Correlation mirrors an analyst’s reasoning, cutting false positives and raising confidence.
Artifacts: Readily Available
Every detection DeepProbe surfaces is tied to real, pivot-ready artifacts:
Process names, PIDs, parent processes
Module/DLL paths
Registry keys and hive offsets
Service names and ImagePaths
Scheduled task details
Network sockets with remote IP/ports
Enriched IP reputation & geolocation
Suspicious memory regions (addresses + extracted strings)
No vague alerts, you get investigative leads right away.
Press enter or click to view image in full size
Baselining: Removing Noise
No two environments are the same. That’s why DeepProbe ships with baseline.yaml:
Define known-good processes (chrome.exe, explorer.exe, AV tools)
Whitelist expected IP ranges and ports
Allow trusted services and DLLs
The effect: detections focus on true anomalies, not false positives from normal activity.
Analysts can tune the baseline once, then reuse it across investigations for consistency.