SlideShare une entreprise Scribd logo
1  sur  77
Télécharger pour lire hors ligne
CNIT 152:
Incident
Response
12 Investigating Windows System
s

(Part 2)
Updated 11-10-22
Ch 12 Part 2
Ch 12 Part 3
The Windows Registry
Purpose
• The registry contains con
fi
guration data for
the Windows operating system and
application
s

• Many artifacts of great forensic value
Hive Files
• Binary
fi
les that store the Registr
y

• Five main registry hives in
%SYSTEMROOT%system32con
fi
g

• SYSTEM, SECURITY, SOFTWARE, SAM, DEFAUL
T

• User-speci
fi
c hive
fi
les in each user's pro
fi
le
director
y

• UsersusernameNTUSER.DA
T

• UsersusernameAppDataLocalMicrosoft
WindowsUSRCLASS.DAT
Windows Pro
fi
les
• Created the
fi
rst time a user interactively logs
on to a syste
m

• Users who connect over the network don't
create a pro
fi
le folder
Terms
Keys Values Data
The Five Root Keys
HKEY_USERS
Virtual Key Paths
• Dynamically created in a running syste
m

• Not visible on a registry captur
e

• HKEY_Current_Use
r

• Links to HKEY_USERS{SID}
• HKLMSYSTEMCurrentControlSe
t

• Links to HKLMSYSTEMControlSetNN
N

• HKEY_CLASSES_ROO
T

• Merges two subkeys
Registry Timestamps
• Only one: LastWriteTim
e

• Stored on a key, not valu
e

• Changed when any value under the key is
added, removed, or change
d

• But not when subkeys' values are modi
fi
ed
Example
• Run key: programs that launch on system startu
p

• Cannot determine when these three Run items
were added, without other evidence
More Limitations
• Windows frequently updates the
LastUpdateTime for large swaths of registry
key
s

• During updates, and sometimes even from
a reboo
t

• Attackers cannot easily change registry
timestamps, although SetRegTime can do
thi
s

• Link Ch 12o
Registry Re
fl
ection and
Redirection
• 64-bit Windows allows 32-bit software to ru
n

• 32-bit programs are redirected by the W0W64
sybsystem to alternate registry keys, lik
e

• HKLMSOFTWAREWoW6432Nod
e

• This means 32-bit forensic software won't see
the whole Registry
Important Registry Keys
System Con
fi
guration
Registry Keys
Basic System Information
• Computer Nam
e

• HKLMSystemCurrentControlSet
ControlComputernam
e

• Windows Versio
n

• HKLMSoftwareMicrosoftWindows NT
CurrentVersio
n

• Time Zon
e

• HKLMSystemCurrentControlSet
ControlTimeZoneInformation
Basic System Information
• List of Installed Application
s

• HKLMSoftwareMicrosoftWindows
CurrentVersionUninstall{Appname}
• Mounted Devices (with drive letters
)

• HKLMSystemMountedDevices
USBSTOR
• Shows every USB device that has been
connecte
d

• A forensic examiner should look here
fi
rst, to
fi
nd out what other devices should be
requested for discovery, by court order or
search warrant
Network Information
• Network adapter con
fi
guratio
n

• Wireless networks previously use
d

• Share
s

• Firewall settings
User and Security
Information
• Audit polic
y

• Pro
fi
le folder pat
h

• Group membership
Shim Cache
Shim Cache
• Also called "Application Compatibility Cache
"

• Used to track special compatibility settings
for executable
fi
les and script
s

• May include
:

• File name, path, and siz
e

• Last modi
fi
ed dat
e

• Whether the
fi
le actually ran on the system
Shim Cache
• Maintained in memory, written to the registry
on shutdow
n

• Maintains up to 1024 entrie
s

• More than Prefetch (128
)

• includes apps that haven't executed ye
t

• Next two slides from link Ch 12a
Ch 12b-1
Common Auto-Run Registry
Keys
Auto-Run Keys
(Auto-Start Extensibility Points)
• Load programs on system boot, user login,
and other condition
s

• Commonly used by malware to attain
persistenc
e

• Windows provides hundreds of registry-
based persistence mechanism
s

• Some are still undocumented
Services
• Most common and widely used persistence
mechanis
m

• Services run in the backgroun
d

• Usually under one of these login account
s

• Local System (most powerful
)

• Network Syste
m

• Local Service
Services in the Registry
• Each service has its own subkey unde
r

• HKLMCurrentControlSetservicesservicenam
e

• With this information
:

• DisplayName and Descriptio
n

• ImagePat
h

• How service start
s

• Type of service, such as driver or process
ServiceDLL
• Most services are DLL, not EXE
fi
les
Service Control Manager
• Services.ex
e

• Launches Windows services upon startu
p

• Command-line "sc" command lets you
examine, start, stop, and create services
sc at Command line
Services GUI
One EXE Can Run Several
Services
Four Common Run Keys
Active Setup
• Facilitates software installation and update
s

• Subkeys named with GUIDs (long random-looking
numbers
)

• Malware authors often re-use GUIDs so Googling them
can be usefu
l

• StubPath points to an EXE that will run on startup
AppInit_DLLs
• DLLs that will be automatically loaded whenever
a user-mode app linked to user32.dll is
launche
d

• Almost every app uses user32 to draw
windows, etc. (link Ch 12p)
AppInit_DLLs
• Starting in Windows 8, the AppInit_DLLs
infrastructure is disabled when secure boot is
enable
d

• Secure boot is a UEFI protocol and not a
Windows 8 feature.
LSA (Local Security
Authority) Packages
• Load on startu
p

• Intended for authentication packages, but can
be used to launch malware
Browser Helper Objects
(BHOs)
• Add-ons or plug-ins for Internet Explore
r

• Such as toolbars, adware, scarewar
e

• No longer supported in Edge
Shell Extensions
• Like Browser Helper Objects, but for
Windows Explore
r

• Add context items when right-clicking a
fi
l
e

• Found at
:

• HKCRCLSID{CLSID}InprocServer32


• HKCR{sub-key}shellex
Shell Extensions
Winlogon Shell
• The shell that loads when a user logs o
n

• Normally set to Explorer.ex
e

• Can be set to any executable
fi
le
Winlogon Userinit
• Loads logon and group policy scripts, other
auto-runs, and the Explorer shel
l

• Attackers can append additional executables
to this value
Identifying Malicious
Auto-Runs
• Eyeball it, looking for suspicious
fi
les or
paths, spelling errors, broken English, etc
.

• Risky; real commercial software is often
sloppily made, and some attackers are
carefu
l

• Next slide: which item is malicious?
A
B
C
D
Real DLL is iprip.dll
Spelling error but genuine
No description, runs from Temp, but genuine
Recommended Steps
1. Exclude persistent binaries signed by trusted
publishers (but not all signed binaries
)

2. Exclude persistent items created outside the
time window of interes
t

3. Examine paths of remaining persistent binarie
s

• Attackers tend to use Temp folders or
common directories within %SYSTEMROOT
%

• Not deeply nested subdirectories speci
fi
c to
obscure third-party applications
Recommended Steps
4. Research MD5 hashes for remaining
persistent binaries on VirusTotal, Bit9, etc
.

5. Compare remaining unknowns against a
known "gold image" used to install the
systems
Best Tool
• Sysinternals AutoRuns
Signed Malware
• Attackers have been stealing code-signing
signatures, and signing malwar
e

• Also, not all legitimate persistent
fi
les, even
Windows components, are signe
d

• Sometimes updates remove signatures
Ch 12b-2
User Hive Registry Keys
Personalization
• User hive registry keys contain
personalization settings for each use
r

• First priority: examine compromised
account
s

• Acquire NTUSER.DAT and USRCLASS.DA
T

• Check machine accounts, such as
NetworkService and LocalSyste
m

• May also contain evidence
Most Helpful User-Speci
fi
c
Keys
• Shellbag
s

• UserAssis
t

• MUICach
e

• Most Recently Used (MRU
)

• TypedURL
s

• TypedPaths
Shellbags
• Used to remember size,
position, and view settings of
window
s

• Persist even if a directory is
delete
d

• Saved in a user’s pro
fi
le
registry hive
Shellbags Contain
• Full directory paths accessed via Explore
r

• Date and time of acces
s

• Modi
fi
ed, Accessed, and Created times of
each path recorded when the access
occurre
d

• Such historical records are very useful to
track attacker actions
Example Shellbags
• Link Ch 12q
UserAssist
• Tracks applications a user has launched through
the Windows Explorer shel
l

• Populates Start menu with frequently launched
programs
UserAssist v. Prefetch
• UserAssist only tracks items opened via
Explore
r

• Including from the Run box and Start men
u

• But not from the command promp
t

• Prefetch
fi
les don't identify which user
executed a program
Obfuscated with ROT13
MUICache
• Multilingual User Interfac
e

• Another list of programs executed by a use
r

• HKEY_USERS{SID}_ClassesLocalSettingsSoftware
MicrosoftWindowsShellMuiCache
Most Recently Used
(MRU) Keys
• Used by
many
application
s

• No standard
registry
path or
value
naming
convention
MRU-Blaster
• Clears
the MRU
lists
(link Ch
12r)
Explorer Open and Save
MRU
• Files and folders most recently accessed in
the Open and Save dialog menu
s

• RegRipper can
fi
nd the data
Start Menu Run MRU
• Programs recently launched from the Run bo
x

• Human-readabl
e

• HKEY_USERS{SID}SoftwareMicrosoftWindows
CurrentVersionExplorerRunMRU
RecentDocs
• Recently opened documents (any
fi
le
extension
)

• Used to populate File menu of various
application
s

• HKEY_USERS{SID}SoftwareMicrosoft
WindowsCurrentVersionExplorer
RecentDocs
Internet Explorer
TypedURLs & TypedPaths
• Used to populate the address bar drop-down
list in Internet Explore
r

• May contain URLs and paths to local
fi
le
s

• HKEY_USERS{SID}SoftwareMicrosoft
InternetExplorerTypedURL
s

• HKEY_USERS{SID}
SoftwareMicrosoftInternetExplorer
TypedPaths
Proves Intent
• User typed (or pasted) these URLs into the
address ba
r

• Didn't just click a link
Remote Desktop MRU
• Used to remotely control Windows machine
s

• Maintains history of recent connections and
con
fi
guration dat
a

• May tell you where a user connected and who
they attempted to log in as
Registry Analysis Tools
All-In-One Tools
• RegRipper (link Ch 10m
)

• Windows Registry Decoder (link Ch 12s
)

• AutoRun
s

• Velociraptor
Single-Purpose Utilities
• ShimCacheParse
r

• Shellbags.p
y

• sba
g

• UserAssis
t

• Nirsoft Registry Analysis Tools
Ch 12b-3

Contenu connexe

Similaire à 12 Investigating Windows Systems (Part 2 of 3)

CNIT 126 11. Malware Behavior
CNIT 126 11. Malware BehaviorCNIT 126 11. Malware Behavior
CNIT 126 11. Malware BehaviorSam Bowne
 
CNIT 126 Ch 11: Malware Behavior
CNIT 126 Ch 11: Malware BehaviorCNIT 126 Ch 11: Malware Behavior
CNIT 126 Ch 11: Malware BehaviorSam Bowne
 
unit 2 confinement techniques.pdf
unit 2 confinement techniques.pdfunit 2 confinement techniques.pdf
unit 2 confinement techniques.pdfRohitGautam261127
 
CNIT 152 10 Enterprise Service
CNIT 152 10 Enterprise ServiceCNIT 152 10 Enterprise Service
CNIT 152 10 Enterprise ServiceSam Bowne
 
CNIT 126 Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
CNIT 126 Ch 0: Malware Analysis Primer & 1: Basic Static TechniquesCNIT 126 Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
CNIT 126 Ch 0: Malware Analysis Primer & 1: Basic Static TechniquesSam Bowne
 
Concepts of Malicious Windows Programs
Concepts of Malicious Windows ProgramsConcepts of Malicious Windows Programs
Concepts of Malicious Windows ProgramsNatraj G
 
Practical Malware Analysis: Ch 11: Malware Behavior
Practical Malware Analysis: Ch 11: Malware BehaviorPractical Malware Analysis: Ch 11: Malware Behavior
Practical Malware Analysis: Ch 11: Malware BehaviorSam Bowne
 
Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1Rhydham Joshi
 
Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1Rhydham Joshi
 
Windows internals
Windows internalsWindows internals
Windows internalsPiyush Jain
 
CNIT 152 12. Investigating Windows Systems (Part 3)
CNIT 152 12. Investigating Windows Systems (Part 3)CNIT 152 12. Investigating Windows Systems (Part 3)
CNIT 152 12. Investigating Windows Systems (Part 3)Sam Bowne
 
CNIT 126: 10: Kernel Debugging with WinDbg
CNIT 126: 10: Kernel Debugging with WinDbgCNIT 126: 10: Kernel Debugging with WinDbg
CNIT 126: 10: Kernel Debugging with WinDbgSam Bowne
 
openioc_scan - IOC scanner for memory forensics
openioc_scan - IOC scanner for memory forensicsopenioc_scan - IOC scanner for memory forensics
openioc_scan - IOC scanner for memory forensicsTakahiro Haruyama
 
CNIT 152: 10 Enterprise Services
CNIT 152: 10 Enterprise ServicesCNIT 152: 10 Enterprise Services
CNIT 152: 10 Enterprise ServicesSam Bowne
 
CNIT 121: 12 Investigating Windows Systems (Part 3)
CNIT 121: 12 Investigating Windows Systems (Part 3)CNIT 121: 12 Investigating Windows Systems (Part 3)
CNIT 121: 12 Investigating Windows Systems (Part 3)Sam Bowne
 
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Sam Bowne
 
CNIT 121: 10 Enterprise Services
CNIT 121: 10 Enterprise ServicesCNIT 121: 10 Enterprise Services
CNIT 121: 10 Enterprise ServicesSam Bowne
 

Similaire à 12 Investigating Windows Systems (Part 2 of 3) (20)

CNIT 126 11. Malware Behavior
CNIT 126 11. Malware BehaviorCNIT 126 11. Malware Behavior
CNIT 126 11. Malware Behavior
 
CNIT 126 Ch 11: Malware Behavior
CNIT 126 Ch 11: Malware BehaviorCNIT 126 Ch 11: Malware Behavior
CNIT 126 Ch 11: Malware Behavior
 
unit 2 confinement techniques.pdf
unit 2 confinement techniques.pdfunit 2 confinement techniques.pdf
unit 2 confinement techniques.pdf
 
CNIT 152 10 Enterprise Service
CNIT 152 10 Enterprise ServiceCNIT 152 10 Enterprise Service
CNIT 152 10 Enterprise Service
 
Defending Your "Gold"
Defending Your "Gold"Defending Your "Gold"
Defending Your "Gold"
 
CNIT 126 Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
CNIT 126 Ch 0: Malware Analysis Primer & 1: Basic Static TechniquesCNIT 126 Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
CNIT 126 Ch 0: Malware Analysis Primer & 1: Basic Static Techniques
 
Concepts of Malicious Windows Programs
Concepts of Malicious Windows ProgramsConcepts of Malicious Windows Programs
Concepts of Malicious Windows Programs
 
Practical Malware Analysis: Ch 11: Malware Behavior
Practical Malware Analysis: Ch 11: Malware BehaviorPractical Malware Analysis: Ch 11: Malware Behavior
Practical Malware Analysis: Ch 11: Malware Behavior
 
Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1
 
Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1
 
Windows internals
Windows internalsWindows internals
Windows internals
 
CNIT 152 12. Investigating Windows Systems (Part 3)
CNIT 152 12. Investigating Windows Systems (Part 3)CNIT 152 12. Investigating Windows Systems (Part 3)
CNIT 152 12. Investigating Windows Systems (Part 3)
 
CNIT 126: 10: Kernel Debugging with WinDbg
CNIT 126: 10: Kernel Debugging with WinDbgCNIT 126: 10: Kernel Debugging with WinDbg
CNIT 126: 10: Kernel Debugging with WinDbg
 
openioc_scan - IOC scanner for memory forensics
openioc_scan - IOC scanner for memory forensicsopenioc_scan - IOC scanner for memory forensics
openioc_scan - IOC scanner for memory forensics
 
CNIT 152: 10 Enterprise Services
CNIT 152: 10 Enterprise ServicesCNIT 152: 10 Enterprise Services
CNIT 152: 10 Enterprise Services
 
CNIT 121: 12 Investigating Windows Systems (Part 3)
CNIT 121: 12 Investigating Windows Systems (Part 3)CNIT 121: 12 Investigating Windows Systems (Part 3)
CNIT 121: 12 Investigating Windows Systems (Part 3)
 
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
Practical Malware Analysis: Ch 0: Malware Analysis Primer & 1: Basic Static T...
 
Ch0 1
Ch0 1Ch0 1
Ch0 1
 
CNIT 121: 10 Enterprise Services
CNIT 121: 10 Enterprise ServicesCNIT 121: 10 Enterprise Services
CNIT 121: 10 Enterprise Services
 
Malware forensics
Malware forensicsMalware forensics
Malware forensics
 

Plus de Sam Bowne

3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities Sam Bowne
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development SecuritySam Bowne
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the ApplicationSam Bowne
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)Sam Bowne
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic CurvesSam Bowne
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-HellmanSam Bowne
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1Sam Bowne
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android ApplicationsSam Bowne
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3Sam Bowne
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard ProblemsSam Bowne
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)Sam Bowne
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis MethodologySam Bowne
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated EncryptionSam Bowne
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)Sam Bowne
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)Sam Bowne
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream CiphersSam Bowne
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data CollectionSam Bowne
 
4. Block Ciphers
4. Block Ciphers 4. Block Ciphers
4. Block Ciphers Sam Bowne
 

Plus de Sam Bowne (20)

Cyberwar
CyberwarCyberwar
Cyberwar
 
3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development Security
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the Application
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic Curves
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android Applications
 
10 RSA
10 RSA10 RSA
10 RSA
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard Problems
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis Methodology
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated Encryption
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
 
4. Block Ciphers
4. Block Ciphers 4. Block Ciphers
4. Block Ciphers
 

Dernier

Shark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsShark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsArubSultan
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Projectjordimapav
 
Employablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxEmployablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxryandux83rd
 
The role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenshipThe role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenshipKarl Donert
 
DBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdfDBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdfChristalin Nelson
 
Comparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptxComparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptxAvaniJani1
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWQuiz Club NITW
 
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...HetalPathak10
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Celine George
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17Celine George
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...Nguyen Thanh Tu Collection
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6Vanessa Camilleri
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 

Dernier (20)

Shark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristicsShark introduction Morphology and its behaviour characteristics
Shark introduction Morphology and its behaviour characteristics
 
ClimART Action | eTwinning Project
ClimART Action    |    eTwinning ProjectClimART Action    |    eTwinning Project
ClimART Action | eTwinning Project
 
Employablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptxEmployablity presentation and Future Career Plan.pptx
Employablity presentation and Future Career Plan.pptx
 
The role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenshipThe role of Geography in climate education: science and active citizenship
The role of Geography in climate education: science and active citizenship
 
DBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdfDBMSArchitecture_QueryProcessingandOptimization.pdf
DBMSArchitecture_QueryProcessingandOptimization.pdf
 
Comparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptxComparative Literature in India by Amiya dev.pptx
Comparative Literature in India by Amiya dev.pptx
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Spearman's correlation,Formula,Advantages,
Spearman's correlation,Formula,Advantages,Spearman's correlation,Formula,Advantages,
Spearman's correlation,Formula,Advantages,
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Mythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITWMythology Quiz-4th April 2024, Quiz Club NITW
Mythology Quiz-4th April 2024, Quiz Club NITW
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
Satirical Depths - A Study of Gabriel Okara's Poem - 'You Laughed and Laughed...
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17
 
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
Mattingly "AI & Prompt Design" - Introduction to Machine Learning"
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17How to Manage Buy 3 Get 1 Free in Odoo 17
How to Manage Buy 3 Get 1 Free in Odoo 17
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
 
ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6ICS 2208 Lecture Slide Notes for Topic 6
ICS 2208 Lecture Slide Notes for Topic 6
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 

12 Investigating Windows Systems (Part 2 of 3)

  • 1. CNIT 152: Incident Response 12 Investigating Windows System s (Part 2) Updated 11-10-22
  • 2. Ch 12 Part 2 Ch 12 Part 3
  • 4. Purpose • The registry contains con fi guration data for the Windows operating system and application s • Many artifacts of great forensic value
  • 5. Hive Files • Binary fi les that store the Registr y • Five main registry hives in %SYSTEMROOT%system32con fi g • SYSTEM, SECURITY, SOFTWARE, SAM, DEFAUL T • User-speci fi c hive fi les in each user's pro fi le director y • UsersusernameNTUSER.DA T • UsersusernameAppDataLocalMicrosoft WindowsUSRCLASS.DAT
  • 6. Windows Pro fi les • Created the fi rst time a user interactively logs on to a syste m • Users who connect over the network don't create a pro fi le folder
  • 10. Virtual Key Paths • Dynamically created in a running syste m • Not visible on a registry captur e • HKEY_Current_Use r • Links to HKEY_USERS{SID} • HKLMSYSTEMCurrentControlSe t • Links to HKLMSYSTEMControlSetNN N • HKEY_CLASSES_ROO T • Merges two subkeys
  • 11. Registry Timestamps • Only one: LastWriteTim e • Stored on a key, not valu e • Changed when any value under the key is added, removed, or change d • But not when subkeys' values are modi fi ed
  • 12. Example • Run key: programs that launch on system startu p • Cannot determine when these three Run items were added, without other evidence
  • 13. More Limitations • Windows frequently updates the LastUpdateTime for large swaths of registry key s • During updates, and sometimes even from a reboo t • Attackers cannot easily change registry timestamps, although SetRegTime can do thi s • Link Ch 12o
  • 14. Registry Re fl ection and Redirection • 64-bit Windows allows 32-bit software to ru n • 32-bit programs are redirected by the W0W64 sybsystem to alternate registry keys, lik e • HKLMSOFTWAREWoW6432Nod e • This means 32-bit forensic software won't see the whole Registry
  • 17. Basic System Information • Computer Nam e • HKLMSystemCurrentControlSet ControlComputernam e • Windows Versio n • HKLMSoftwareMicrosoftWindows NT CurrentVersio n • Time Zon e • HKLMSystemCurrentControlSet ControlTimeZoneInformation
  • 18. Basic System Information • List of Installed Application s • HKLMSoftwareMicrosoftWindows CurrentVersionUninstall{Appname} • Mounted Devices (with drive letters ) • HKLMSystemMountedDevices
  • 19. USBSTOR • Shows every USB device that has been connecte d • A forensic examiner should look here fi rst, to fi nd out what other devices should be requested for discovery, by court order or search warrant
  • 20. Network Information • Network adapter con fi guratio n • Wireless networks previously use d • Share s • Firewall settings
  • 21. User and Security Information • Audit polic y • Pro fi le folder pat h • Group membership
  • 23. Shim Cache • Also called "Application Compatibility Cache " • Used to track special compatibility settings for executable fi les and script s • May include : • File name, path, and siz e • Last modi fi ed dat e • Whether the fi le actually ran on the system
  • 24. Shim Cache • Maintained in memory, written to the registry on shutdow n • Maintains up to 1024 entrie s • More than Prefetch (128 ) • includes apps that haven't executed ye t • Next two slides from link Ch 12a
  • 25.
  • 26.
  • 29. Auto-Run Keys (Auto-Start Extensibility Points) • Load programs on system boot, user login, and other condition s • Commonly used by malware to attain persistenc e • Windows provides hundreds of registry- based persistence mechanism s • Some are still undocumented
  • 30. Services • Most common and widely used persistence mechanis m • Services run in the backgroun d • Usually under one of these login account s • Local System (most powerful ) • Network Syste m • Local Service
  • 31. Services in the Registry • Each service has its own subkey unde r • HKLMCurrentControlSetservicesservicenam e • With this information : • DisplayName and Descriptio n • ImagePat h • How service start s • Type of service, such as driver or process
  • 32. ServiceDLL • Most services are DLL, not EXE fi les
  • 33. Service Control Manager • Services.ex e • Launches Windows services upon startu p • Command-line "sc" command lets you examine, start, stop, and create services
  • 36. One EXE Can Run Several Services
  • 38. Active Setup • Facilitates software installation and update s • Subkeys named with GUIDs (long random-looking numbers ) • Malware authors often re-use GUIDs so Googling them can be usefu l • StubPath points to an EXE that will run on startup
  • 39. AppInit_DLLs • DLLs that will be automatically loaded whenever a user-mode app linked to user32.dll is launche d • Almost every app uses user32 to draw windows, etc. (link Ch 12p)
  • 40. AppInit_DLLs • Starting in Windows 8, the AppInit_DLLs infrastructure is disabled when secure boot is enable d • Secure boot is a UEFI protocol and not a Windows 8 feature.
  • 41. LSA (Local Security Authority) Packages • Load on startu p • Intended for authentication packages, but can be used to launch malware
  • 42. Browser Helper Objects (BHOs) • Add-ons or plug-ins for Internet Explore r • Such as toolbars, adware, scarewar e • No longer supported in Edge
  • 43. Shell Extensions • Like Browser Helper Objects, but for Windows Explore r • Add context items when right-clicking a fi l e • Found at : • HKCRCLSID{CLSID}InprocServer32 • HKCR{sub-key}shellex
  • 45. Winlogon Shell • The shell that loads when a user logs o n • Normally set to Explorer.ex e • Can be set to any executable fi le
  • 46. Winlogon Userinit • Loads logon and group policy scripts, other auto-runs, and the Explorer shel l • Attackers can append additional executables to this value
  • 47. Identifying Malicious Auto-Runs • Eyeball it, looking for suspicious fi les or paths, spelling errors, broken English, etc . • Risky; real commercial software is often sloppily made, and some attackers are carefu l • Next slide: which item is malicious?
  • 49. Real DLL is iprip.dll Spelling error but genuine No description, runs from Temp, but genuine
  • 50. Recommended Steps 1. Exclude persistent binaries signed by trusted publishers (but not all signed binaries ) 2. Exclude persistent items created outside the time window of interes t 3. Examine paths of remaining persistent binarie s • Attackers tend to use Temp folders or common directories within %SYSTEMROOT % • Not deeply nested subdirectories speci fi c to obscure third-party applications
  • 51. Recommended Steps 4. Research MD5 hashes for remaining persistent binaries on VirusTotal, Bit9, etc . 5. Compare remaining unknowns against a known "gold image" used to install the systems
  • 53. Signed Malware • Attackers have been stealing code-signing signatures, and signing malwar e • Also, not all legitimate persistent fi les, even Windows components, are signe d • Sometimes updates remove signatures
  • 56. Personalization • User hive registry keys contain personalization settings for each use r • First priority: examine compromised account s • Acquire NTUSER.DAT and USRCLASS.DA T • Check machine accounts, such as NetworkService and LocalSyste m • May also contain evidence
  • 57. Most Helpful User-Speci fi c Keys • Shellbag s • UserAssis t • MUICach e • Most Recently Used (MRU ) • TypedURL s • TypedPaths
  • 58. Shellbags • Used to remember size, position, and view settings of window s • Persist even if a directory is delete d • Saved in a user’s pro fi le registry hive
  • 59. Shellbags Contain • Full directory paths accessed via Explore r • Date and time of acces s • Modi fi ed, Accessed, and Created times of each path recorded when the access occurre d • Such historical records are very useful to track attacker actions
  • 61. UserAssist • Tracks applications a user has launched through the Windows Explorer shel l • Populates Start menu with frequently launched programs
  • 62. UserAssist v. Prefetch • UserAssist only tracks items opened via Explore r • Including from the Run box and Start men u • But not from the command promp t • Prefetch fi les don't identify which user executed a program
  • 64. MUICache • Multilingual User Interfac e • Another list of programs executed by a use r • HKEY_USERS{SID}_ClassesLocalSettingsSoftware MicrosoftWindowsShellMuiCache
  • 65. Most Recently Used (MRU) Keys • Used by many application s • No standard registry path or value naming convention
  • 67. Explorer Open and Save MRU • Files and folders most recently accessed in the Open and Save dialog menu s • RegRipper can fi nd the data
  • 68. Start Menu Run MRU • Programs recently launched from the Run bo x • Human-readabl e • HKEY_USERS{SID}SoftwareMicrosoftWindows CurrentVersionExplorerRunMRU
  • 69. RecentDocs • Recently opened documents (any fi le extension ) • Used to populate File menu of various application s • HKEY_USERS{SID}SoftwareMicrosoft WindowsCurrentVersionExplorer RecentDocs
  • 70. Internet Explorer TypedURLs & TypedPaths • Used to populate the address bar drop-down list in Internet Explore r • May contain URLs and paths to local fi le s • HKEY_USERS{SID}SoftwareMicrosoft InternetExplorerTypedURL s • HKEY_USERS{SID} SoftwareMicrosoftInternetExplorer TypedPaths
  • 71.
  • 72. Proves Intent • User typed (or pasted) these URLs into the address ba r • Didn't just click a link
  • 73. Remote Desktop MRU • Used to remotely control Windows machine s • Maintains history of recent connections and con fi guration dat a • May tell you where a user connected and who they attempted to log in as
  • 75. All-In-One Tools • RegRipper (link Ch 10m ) • Windows Registry Decoder (link Ch 12s ) • AutoRun s • Velociraptor
  • 76. Single-Purpose Utilities • ShimCacheParse r • Shellbags.p y • sba g • UserAssis t • Nirsoft Registry Analysis Tools