Handout B: Rootkit Forensic Artifacts
Large group equivalent: This handout maps to artifact cards A-R23-1 + part of C-R1-2.
Hardware-assisted memory enumeration report from HANSEN-SAP-01 completed by security specialist at BioGenix Solutions, 2026-04-16 08:32:14 UTC.
HANSEN-SAP-01 Memory Forensics Output
Memory Scan Report β HANSEN-SAP-01
Scan Method: Hardware-Assisted Enumeration (Hypervisor DKOM check)
Timestamp: 2026-04-16 08:32:14 UTC
Installed CaliSyncPro version: v4.2.0 (released 2025-11-18)
vol3 -f HANSEN-SAP-01.mem windows.hidden_modules
Module at 0xFFFFF80012A40000
Size: 147,456 bytes
Signing Certificate: CaliSync Instrumentation GmbH (SN 4A9F02B1C3D7E8F6)
Certificate Status: VALID
Hook: NtQuerySystemInformation
vol3 -f HANSEN-SAP-01.mem windows.pslist --diff hardware
Standard tasklist.exe: 87 processes
Hardware enumeration: 92 processes
PID 4028: svchost.exe ESTABLISHED 203.0.113.44:443 [ACTIVE]
PID 4032: lsass.exe Injected thread (0xFFFFF80012A40000+0x2400)
PID 4036: svchost.exe File I/O: \\GenixLibrary\* (recursive)
PID 4040: System Kernel thread (watchdog, 30-sec interval)
PID 4100: svchost.exe Disk I/O: \\.\PhysicalDrive0\Partition4 (hidden)
IM NOTES (Do Not Show to Players):
- The DKOM technique (hooking
NtQuerySystemInformation) explains why all prior disk scans returned clean β the rootkit intercepted OS queries before they could reveal its presence. Hardware enumeration bypasses the OS entirely. - The certificate is valid and the kernel module is signed β the rootkit shipped inside a legitimately-signed update. The vendorβs build pipeline was compromised, not the certificate.
- PID 4028 has an ACTIVE C2 connection right now. Isolating
HANSEN-SAP-01will drop this channel, but the kernel driver and process tree remain in memory. Memory image and driver artifact must be captured before isolation or reimaging β this is what CFCS needs for attribution. HANSEN-SAP-01was excluded from SOC monitoring as a decommission-backlog system. The external CFCS tip-off was the only trigger that led to discovery β no internal detection fired.
IM Facilitation Notes
- Release when participants ask for technical evidence from
HANSEN-SAP-01or ask why disk scans were clean. - Use this handout to drive discussion on kernel-level persistence, decommissioning backlog risk, and memory-based vs disk-based detection.
- If participants move straight to isolation, prompt: the C2 channel is live. What forensic artifacts need preserving before you cut the connection?