{"id":353,"date":"2015-10-23T19:34:00","date_gmt":"2015-10-23T11:34:00","guid":{"rendered":"http:\/\/note.systw.net\/note\/?p=353"},"modified":"2023-10-30T19:38:31","modified_gmt":"2023-10-30T11:38:31","slug":"win-forensicsvolatileinfo","status":"publish","type":"post","link":"https:\/\/systw.net\/note\/archives\/353","title":{"rendered":"Win Forensics(VolatileInfo)"},"content":{"rendered":"\n<p>Win Forensics in Volatile Infomation<\/p>\n\n\n\n<p><strong>Win Forensics<\/strong><br>Win forensics in non-volatile information<br><a href=\"https:\/\/systw.net\/note\/af\/sblog\/more.php?id=318\">https:\/\/systw.net\/note\/af\/sblog\/more.php?id=318<\/a><br>Win forensics in volatile information<br><a href=\"https:\/\/systw.net\/note\/af\/sblog\/more.php?id=316\">https:\/\/systw.net\/note\/af\/sblog\/more.php?id=316<\/a><br>Win forensics in file<br><a href=\"https:\/\/systw.net\/note\/af\/sblog\/more.php?id=317\">https:\/\/systw.net\/note\/af\/sblog\/more.php?id=317<\/a><br>Registry<br><a href=\"https:\/\/systw.net\/note\/af\/sblog\/more.php?id=178\">https:\/\/systw.net\/note\/af\/sblog\/more.php?id=178<\/a><br>Windows Executable File<br><a href=\"https:\/\/systw.net\/note\/af\/sblog\/more.php?id=306\">https:\/\/systw.net\/note\/af\/sblog\/more.php?id=306&nbsp;<\/a><\/p>\n\n\n\n<p><strong>Volatile information<\/strong><br>it can be easily modified or lost when the system is shut down or rebooted.<br>It helps to determine a logical timeline of the security incident and the users who would be responsible.<\/p>\n\n\n\n<p><strong>Tool like below<\/strong><br>Rekall,http:\/\/www.rekall-forensic.com\/<br>Volatility Framework ,http:\/\/volatilityfoundation.org\/<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>User Analysis<\/strong><\/h2>\n\n\n\n<p><strong>net session<\/strong><br>display username and ip of remote login session<br><br><strong>third party tool:<\/strong><br>logonsessions<br>psloggedon<br>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;..<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Open File Analysis<\/strong><\/h2>\n\n\n\n<p><strong>net file<\/strong><br>show the names of all open shared files on a server and number of file locks on each file<br>format: net file [ID [\/close]]<\/p>\n\n\n\n<p><strong>openfiles<\/strong><br>openfiles \/parameter [arguments]<\/p>\n\n\n\n<p><strong>psfile<\/strong><br>third party tool<\/p>\n\n\n\n<p><br>ps:<br><strong>doskey \/history<\/strong><br>Show command history in cmds<br>ps: when cmd is closed, history is null<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;..<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Resource Analysis<\/strong><\/h2>\n\n\n\n<p><strong>net use<\/strong><br>\u5217\u51fa\u76ee\u524d\u5728\u4f7f\u7528\u7684\u5171\u4eab\u8cc7\u6e90\u9023\u7dda\u8a18\u9304<br>looking at which sessions the machine has opened with other systems<\/p>\n\n\n\n<p><strong>net share<\/strong><br>\u5217\u51fa\u672c\u6a5f\u96fb\u8166\u4e0a\u6240\u6709\u5171\u4eab\u8cc7\u6e90<\/p>\n\n\n\n<p><strong>net start<\/strong><br>shows all of the network services running on Windows-based servers<br>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;..<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Network Analysis<\/strong><\/h2>\n\n\n\n<p><strong>netstat<\/strong><br>a tool for collecting Information regarding network connections.<br>It provides a simple view of TCP and UDP connections, and their state and network traffic statistics.<br>ex:<br>netstat -ano: display the tcp and udp network ,listening ports,PID<br>netstat -b: display binary<br>netstat -r<br>netstat -s<\/p>\n\n\n\n<p><br>refer<br>netstat command<br><a href=\"https:\/\/systw.net\/note\/af\/sblog\/more.php?id=305\">https:\/\/systw.net\/note\/af\/sblog\/more.php?id=305<\/a><\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;..<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Process Analysis<\/strong><\/h2>\n\n\n\n<p><strong>PID(process id)<\/strong><br>PPID = parent of process id<br>PID 4 is system<br>ps:<br><strong>PID order<\/strong><br>lower pid mean early execute (some process is lower PID, like system )<br>PID order can be showed by PID tree( PID and PPID)<br>PID order can indicate whether anomaly,\u00a0ex: low PID is become high PID, that mean PID is restart by malware<\/p>\n\n\n\n<p>ps:<br>\u5927\u90e8\u4efd\u7684process\u53ef\u80fd\u6703\u6c92\u6709parent process,\u4f46svchost\u9019\u500bprocess,\u4e00\u5b9a\u6703\u6709parent process,\u800c\u4e14\u662f\u7531service\u5e36\u8d77<br>ex:svchost.exe\u7684\u7236\u7a0b\u5e8f\u901a\u5e38\u662fservices.exe<br>\u5927\u90e8\u4efduser\u958b\u555f\u7684process\uff0c\u901a\u5e38\u90fd\u7531explorer.exe\u5e36\u8d77<br>ex:Internet Explorer(IEXPLORE.EXE)\u7684\u7236\u7a0b\u5e8f\u901a\u5e38\u662fexplorer.exe<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Process dump tool<\/strong><\/h3>\n\n\n\n<p><strong>tool for dump process memory file<\/strong><br>pmdump<br>process dumper( pd.exe)<br>procdump, sysinternal tool<br>userdump<br><strong>tool for analysis process memory dump<\/strong><br>bintext: extract ASCII,unicode, and resource strings from the dump file<br>strings:\u00a0read dump file and output in text<br>handle.exe: provide a list of handles that have been opened by the process<br>listdlls.exe<\/p>\n\n\n\n<p><strong>Tool for analysis process:<\/strong><br>tasklist<br>pslist<br>listdlls<br>handle<br>tlist:\u4ee5tree\u7684\u65b9\u5f0f\u628aprocess\u5217\u51fa\u4f86<\/p>\n\n\n\n<p>&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;.<\/p>\n\n\n\n<p><strong>handle<\/strong><br>display information about open handles for any process in the system<br>information include openfile,registry key,threads,&#8230;etc<br>ex:<br>handle -p winlogon.exe<br>handle &#8220;C:WINDOWS&#8221;<\/p>\n\n\n\n<p><br>&#8230;<\/p>\n\n\n\n<p><strong>listdlls<\/strong><br>third party tool<br>show module or dll that are in use by a process<br>ps:most dll is in system32<br>ex:<br>listdlls winlogon.exe<br>listdlls -d GDI32.dll<\/p>\n\n\n\n<p>&#8230;<\/p>\n\n\n\n<p><strong>tasklist<\/strong><br>Displays a list of applications and services with their Process ID (PID) for all tasks running on either a local or a remote computer.<br><strong>common paramater<\/strong><br>\/fo &lt; TABLE|LIST|CSV><br>\/m [ModuleName]<br>\/svc<br>\/v<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ex:<br>> tasklist<br>Image Name PID Session Name Session# Mem Usage<br>========================= ======== ================ ===========<br>System Idle Process 0 Services 0 4 K<br>System 4 Services 0 815,872 K<br>smss.exe 368 Services 0 932 K<br>csrss.exe 620 Services 0 4,124 K<br>wininit.exe 724 Services 0 4,400 K<br>csrss.exe 732 Console 1 24,028 K<br>winlogon.exe 800 Console 1 30,456 K<br>services.exe 868 Services 0 5,996 K<br>lsass.exe 876 Services 0 13,560 K<br>svchost.exe 968 Services 0 17,252 K<br>...omit...<\/code><\/pre>\n\n\n\n<p><strong>tasklist -v<\/strong><br>listed processes including below<br>Image Name,\u00a0ex:csrss.exe<br>PID,\u00a0ex:620<br>Session Name,\u00a0ex:Services<br>Session#,\u00a0ex:0<br>Mem Usage,\u00a0ex:4,124 K<br>Status,\u00a0ex:Unknown<br>User Name,\u00a0ex:NT AUTHORITYSYSTEM<br>CPU Time,\u00a0ex:0:00:02<br>Window Title,\u00a0ex:N\/A<br><br><strong>tasklist -svc<\/strong><br>list all service name that run in the svchost<br>ps<br>&#8220;name&#8221; of service is equal in key_local_machinesystemcurrentcontrolsetservices&#8221;name&#8221;<br>in regirty, parameters include some information like dll<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ex:<br>> tasklist -svc<br>Image Name PID Services<br>========================= ========<br>System Idle Process 0 N\/A<br>System 4 N\/A<br>smss.exe 368 N\/A<br>csrss.exe 620 N\/A<br>wininit.exe 724 N\/A<br>csrss.exe 732 N\/A<br>winlogon.exe 800 N\/A<br>services.exe 868 N\/A<br>lsass.exe 876 KeyIso, SamSs, VaultSvc<br>svchost.exe 968 BrokerInfrastructure, DcomLaunch, LSM,<br>PlugPlay, Power, SystemEventsBroker<br>...omit...<\/code><\/pre>\n\n\n\n<p><br>refer<br>https:\/\/technet.microsoft.com\/en-us\/library\/bb491010.aspx<\/p>\n\n\n\n<p>&#8230;<\/p>\n\n\n\n<p><strong>process explorer<\/strong><br>GUI third party tool<br>ps:<br>it load procexp152.sys, so it can into deep level for reading more detail in windows<\/p>\n\n\n\n<p>1 look string of process<br>image: raw process(sometime appear strange code, because it is encoded)<br>memory: after decode of raw process<\/p>\n\n\n\n<p>2.look start address of process thread<br>normal: exe and dll<br>abnormal: address<\/p>\n\n\n\n<p>3 check virustotal<br>the file is not in virustotal, it is anomaious, because that mean the file is new(it is impossible)<\/p>\n\n\n\n<p>ps:<br>sysinternal tool only can&#8217;t look below:<br>hidden running process<br>terminated process<br>os kernel module (steal cetrficate to write malware into driver and inject kernel of windows)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Win Forensics in Volatile Info &#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[11],"tags":[],"class_list":["post-353","post","type-post","status-publish","format-standard","hentry","category-forensics"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/posts\/353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/comments?post=353"}],"version-history":[{"count":0,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/posts\/353\/revisions"}],"wp:attachment":[{"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/media?parent=353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/categories?post=353"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/systw.net\/note\/wp-json\/wp\/v2\/tags?post=353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}