TLSCheck 2.0: An Enhanced Memory Forensics Approach to Efficiently Detect TLS Callbacks
Kartik N. Iyer, Parag H. Rughani
TLDR
TLSCheck 2.0 enhances memory forensics by precisely detecting and analyzing TLS callbacks in Volatility 3, aiding in malware detection and incident response.
Key contributions
- Enhanced TlsCheck 2.0 for Volatility 3 precisely detects and analyzes TLS callbacks in process memory.
- Utilizes PE header analysis, memory structures, and routine disassembly for accurate detection.
- Integrates pattern matching (regex, YARA) and instruction-level analysis for malware behaviors.
- Supports both 32-bit and 64-bit architectures, offering deep insights into callback activity.
Why it matters
TLS callbacks are a dual-nature challenge in memory forensics, often exploited by malware. TLSCheck 2.0 significantly improves defenders' ability to detect and investigate these sophisticated TLS-based threats. This enhances malware analysis and incident response operations.
Original Abstract
Memory analysis is a crucial technique in digital forensics that enables investigators to examine the runtime state of a system through physical memory dumps. While significant advances have been made in memory forensics, the detection and analysis of Thread Local Storage (TLS) callbacks remain challenging due to their dual nature as both legitimate Windows constructs and potential vectors for malware execution. An early version of the TlsCheck plugin received recognition in the Volatility Plugin Contest 2024. In this paper, we present an enhanced version of TlsCheck for Volatility 3, designed to detect and analyze TLS callbacks in process memory. It implements precise detection of TLS callback tables through analysis of PE headers and memory structures, combined with disassembly of identified callback routines. The plugin supports both 32-bit and 64-bit architectures, offering investigators insights into callback locations, assembly behavior, and potential signs of suspicious activity. To enhance detection, we incorporate pattern matching using custom regular expressions and YARA rules, helping analysts identify specific code patterns or suspicious constructs within TLS callbacks. The framework also includes instruction-level analysis to highlight behavior often linked to malware, such as anti-debugging, code injection, and process manipulation. This implementation significantly improves defenders' ability to detect and investigate TLS-based threats during memory forensics, supporting more effective malware analysis and incident response operations.
📬 Weekly AI Paper Digest
Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.