Compromised Systems Powered Off or Disconnected

Key systems have been powered off by users, IT, or as part of a premature containment action. Volatile data (running processes, network connections, memory-resident malware) is lost. Remote collection tools cannot reach the host.

Signals

  • EDR console shows the agent last check-in was hours/days ago
  • ICMP/ping sweep and remote management tools cannot reach the endpoint
  • Incident log notes show IT or the end user powered off the machine before IR engagement

Pivot Actions

  1. 1.Do NOT power the system back on until forensic imaging is ready to prevent destruction of hibernation files and disk state
  2. 2.Perform a forensic disk image (dd, FTK Imager) before any reboot to preserve the current disk state
  3. 3.Recover pagefile.sys, hiberfil.sys, and swap partitions for partial volatile-data reconstruction
  4. 4.Pull all available remote logs (SIEM, EDR historical, DC auth logs) that captured activity while the host was online

Alternate Evidence Sources

  • Pagefile.sys and hiberfil.sys for partial memory reconstruction
  • EDR historical telemetry captured before the agent went offline
  • Domain controller authentication and Group Policy logs for the offline host