DFIR - FAQ Flashcards
Where do you find stuff...
How do you validate if a process was executed in Windows ?
Windows Security Event 4688 tracks this.
* Not enabled by default.
Contains:
- Creator Subject - Who created the Process.
- Target Subject - who the process is executing the process in behalf of.
- Login ID - ties to a unique login ID session.
- Creator Process - the parent process. (provides context)
- Provides a process ID - unique to the host.
- Token Elevation Type - if the process was executed with a higher level.
- Process Command line - This would need to be configured by GPO. This is what was written on the CLI and provides switch and config data.
Where are Windows Event Logs located?
Location:
C:\Windows\System32\winevt\Logs*.evtx
How do you capture an event trace in Windows?
New-EtwTraceSession (Start a new Session.)
New-NetEventSession (start an ETW-based packet capture session)
Save-EtwTraceSession (will flush the buffer to disk and remove the session)
Send-EtwTraceSession (will keep the session alive but immediately write to disk)
What are the 6 process steps of the SANS DF/IR process?
1) Preparation
2) Identification (scoping)
3) Containment (Intel development)
4) Eradication and Remediation
5) Recovery
6) Lessons Learned (Threat Intel consumption)
Common Malware Obfuscation Techniques? What are they, and how do you detect them ?
1) Code Injection (memory analysis)
2) DLL Injection (Looks for DLLs in unusual locations)
3) Obfuscation (Pescan, sig check)
4) Rogue Process ( wrong parent, SID, startup location, suspicious DLL, spelling.)
5) Root Kits (memory forensics)
6) Signing code with valid certificates
Common Malware Obfuscation Techniques? What are they, and why/how do they occur ?
1) Code Injection (only allowed for debugging)
2) DLL Injection (Search Order, Phantom, Side-Loading)
3) Obfuscation (delete indicators, change name / profile, encryption)
4) Rogue Process (Hide in plain sight.)
5) Root Kits (Hide activities and data)
6) Signing code with valid certificates (cert authority)
Key Windows Processes:
- csrss
- explorer
- isaiso
- lsass
- Runtime Broker
- Process Tree
- Services
- SMSS
- SVCHost
- system
- taskhostw
- winit.exe
- winlogon.exe
Explain the LSASS Process:
Image Path: %SystemRoot%\System32\lsass.exe
Parent Process: wininit.exe
Number of Instances: One
User Account: Local System
Start Time: Within seconds of boot time
Description: The Local Security Authentication Subsystem Service process is responsible for authenticating users by calling an appropriate authentication package specified in HKLM\SYSTEM\CurrentControlSet\Control\Lsa. Typically, this will be Kerberos for domain accounts or MSV1_0 for local accounts. In addition to authenticating users, lsass.exe is also responsible for implementing the local security policy (such as password policies and audit policies) and for writing events to the security event log. Only one instance of this process should occur, and it should rarely have child processes (EFS is a known exception).
Image Path: %SystemRoot%\System32\lsass.exe Parent Process:
Malware Persistence - Windows
- AutoStart - Registry
- BIOS flashing
- DLL (search order, phantom and side-loading)
- Local group policy
- Scheduled Tasks
- Service manipulation : Creation / replacement
- WMI Event consumers
Lateral Movement- Windows
- Account creation
- Application deployment
- Credential Harvesting
- Powershell / WMIC
- PSExec
- Remote Desktop
- Vulnerability Exploitation
- Windows Admin Shares
- Windows Remote Management Tools.