Enterprise Incident Response Flashcards

1
Q

What percentage of organizations took more than 90 days to detect the intrusion?

A

64%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the median number of days attackers were present on a victim network before detection?

A

229 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is APT?

A

Advanced Persistent Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do most organizations find out about intrusions?

A

Third party notifications. In many cases, law enforcement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the steps of incident handling?

A
Preparation
Identification
Containment
Eradication
Recovery
Lessons learned
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the first step of incident response?

A

Identification of all the systems compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What percentage of compromised systems have malware installed? Implication?

A

54%

Just because a system doesn’t have malware installed doesn’t mean it isn’t compromised,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the difference between remediation and recovery?

A

Remediation actions are required to be completed in a very short time, often a weekend, and are intended to mitigate the current incident. Recovery is to move the enterprise back to day to day business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TTP?

A

Tactics, Techniques, and Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Kill chain?

A

Aka Attack Progression.

Reconnaissance
Weaponization
Delivery
Compromise/exploit
C2
Exfiltration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is persistence in APT demonstrated?

A

Maintaining a presence on the network and repeated attempts to gain access to areas where presence is not established.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why has there been a switch to remotely examining systems rather than imaging?

A

This has happened because in an Enterprise environment it’s often more important to identify the scope of the intrusion than to preserve every last bit of evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is rip.pl

A

RegRipper, an automated HIVE parser for SAM, SECURITY, SYSTEM, SOFTWARE, and NTUSER.DAT HIVES. Also works on restore point registries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does pffexport do?

A

Pffexport accesses PFF (Personal Folder File) and OFF (Offline Folder File) formats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

pffexport options

A

Page 23, book 1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Where are compromised images stored on the SIFT workstation?

A

/cases. Each case should have a separate subdirectory under /cases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Where are filesystem mount points on the SIFT workstation?

A

/mnt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How should the SIFT workstation be networked?

A

SANS recommends it be placed on the air-gapped Host Only network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is IR?

A

Incident Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the 6 steps of Incident Response handling?

A
  1. Preparation
  2. Identification
  3. Containment and Intelligence Gathering
  4. Remediation
  5. Recovery
  6. Follow Up
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Where should incident detects come from? Where do they?

A

They should be found by the security team, but often they’re from a third party, often law enforcement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the first critical step of incident response?

A

Identifying all the compromised systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Why is it critical to identify all compromised systems?

A

Intruders install malware on 54% of the systems they compromise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How often is malware installed on a compromised system?

A

54% of the time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the benefit of intelligence gathering during a compromise?

A

Learning how the intruders are gaining access to systems may help identify traits of compromised systems. Those traits can be used to identify other compromised systems that hadn’t yet been detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the difference between remediation and recovery?

A

Remediation includes the short term actions required to mitigate the current incident. Recovery is the return to day-to-day operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What might happen in the follow up stage of IR?

A

Verification that the mitigation is complete and effective. Possible additional monitoring or scanning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the difference between digital forensics and enterprise forensics?

A

Digital forensics is the deep dive on specific systems looking at all processes, all timeline activity, all file system analysis. Enterprise forensics takes a broader view typically targeted at identifying systems that might be of interest. Enterprise forensics would look for select processes, specific timeline activity, and specific filesystem artifacts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is a vulnerability?

A

Not well defined on p.40.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is impact?

A

Impact is the consequence of exploiting a vulnerability. The damage to confidentiality, integrity, or availability as a result. Often a property of the organization and often difficult to change.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is a threat?

A

Not well defined on p.40.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are the three components of a threat?

A

Intent, Opportunity, and Capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is Intent with regards to threat?

A

The goal the adversary is trying to accomplish. At a high level, often data theft. Often defined by the industry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is Opportunity with regards to a threat?

A

Timing and knowledge of the target space. Often paired with vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is Capability with regards to a threat?

A

The ability of adversaries to achieve their goal. Includes skills and resources (financial, human, technical).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is CND?

A

p41. Might be Computer Network Defense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is TTP?

A

Tactics, Techniques, and Procedures (p44)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Why might you not block the IP an adversary is known to use?

A

You can instead monitor activity from the IP and watch for new attack signatures. Using those might enable detecting future attacks even if the adversary changes IPs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is the key to security intelligence?

A

Mapping intent to impact. If the goal is data theft, you probably don’t have to worry about DDoS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is “the kill chain”?

A

The attack progression. p.43.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What are the different types of indicators (of what?)

A

Atomic, Behavioral Computed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Describe an atomic indicator

A

Pieces of data, like an IP address, email address, string, FQDN, that indicates adversary activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is a behavioral indicator?

A

A combination of other indicators that form a profile. These can include other behaviors, like “targets sales force”. Broadly, how does the adversary do their job.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is a computed indicator?

A

Computed indicators include hashes and complex IDS signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What are the stages of the kill chain?

A
  1. Reconnaissance
  2. Weaponization
  3. Delivery
  4. Compromise / Exploit
  5. C2
  6. Exfiltration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Describe the reconnaissance portion of the kill chain.

A

Recon consists of passive research such as examining web sites, reading PDFs, learning about the organization. Often indistinguishable from normal activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Describe the weaponization portion of the kill chain.

A

The act of placing malicious payload in a delivery vehicle, such as a trojan in a document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Describe the delivery phase of the kill chain.

A

Straightforward. The payload is delivered to the target. For example, though email, HTTP, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Describe the compromise or exploit phase of the kill chain.

A

Either a multi-phase or straightforward attack that might have software, hardware, and/or human components (aka social engineering). This typically provokes the classic incident response. Compromise doesn’t guarantee that C2 is established.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Describe the C2 phase of the kill chain.

A

Command and Control (C2) is the period following the compromise where the adversary has control over the system. C2 may be established after compromise, but not always. For example, if an adversary inserts malware that isn’t compatible with the system, or if you’ve studied the adversary and have mitigated the attack that would have established C2.

This also includes lateral movement inside the organization, file system enumeration, additional tool dropping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Describe the exfiltration phase of the kill chain.

A

Exfiltration is the phase where data is takenby the adversary. This doesn’t include data taken for the purpose of furthering the attack. Such data movement happens during the C2 phase. Exfiltration removes the actual target data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

How is the P in APT manifested?

A

In two ways: maintaining a presence on the network and making repeated attempts to gain access to areas that are not yet compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Why is it important to reconstruct the entire kill chain?

A

Failure to reconstruct the entire kill chain may result in detections only at the compromise stage, which leaves the organization continually vulnerable to intrusions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is an “Indicator of compromise”?

A

A combination of boolean expressions that can be used to identify general characteristics of malware. These can be host or network based.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

How do you identify indicators of compromise?

A

Through malware reverse engineering and application footprinting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What is IOC?

A

Indicator of Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is Cybox?

A

A Mitre project: Cyber Observable eXpression. A standardized schema for the specification, capture, characterization, and communications of events or stateful properties that are observable in the operational domain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What is STIX?

A

Structured Threat Information eXpression. Also by Mitre. Community driven effort to define and develop a standardized language t represent structured cyber threat information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

CRITS?

A

p.51.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

YARA?

A

p51

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

OpenIOC?

A

Originally for MANDIANT’s products, now standardized and open sourced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Describe IOC Editor

A

Part of OpenIOC, this GUI editor edits XML documents that capture attributes of malicious files, registry changes, memory artifacts, etc. Also supports detailed descriptions of attributes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Add content on psexec.

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

How has the default “image anything” policy changed?

A

It’s become more triage oriented, using remote and automated tools to identify indicators of compromise. Once found, those systems can be examined in more depth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What does a Remote Access Agent do?

A

Provides a connector to raw disk and memory only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What does a Remote Analysis Agent do?

A

Contains code to perform system analysis in addition or instead of a connector to raw disk and memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Pros of a Remote Access Agent compared to a Remote Analysis Agent?

A

Good for targeted analysis, file querying, quick artifact examination, and it’s cheap.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Pros of a Remote Analysis Agent compared to a Remote Access Agent?

A

Great for targeted or deep analysis, registry, file querying and scanning, quick or deep artifact analysis, and memory analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Cons of Remote Access Agent compared to a Remote Analysis Agent?

A

Poor for file carving, stream extraction, memory analysis since the data has to traverse the network for local processing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Cons of Remote Analysis Agent compared to a Remote Access Agent?

A

Often a resource hog. Usually have to scan when the systems aren’t being utilized. Expensive, and requires a separate controller.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

F-Response stuff

A

p64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

What is dc3dd?

A

?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Does malware have to be present on a system for it to be compromised?

A

No. Compromise a system and add an account. It’s compromised, but no malware present.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

If you have a compromised system that’s malware free, what might you look for?

A

Unusual OS artifacts that wouldn’t normally be present.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

How do you analyze prefetch?

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

How do you analyze shimcache?

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

How do you analyze userassist registry keys?

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

How do you analyze jump lists?

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What binary is used for command line access in Windows?

A

cmd.exe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What is cmd.exe?

A

A command line access tool (shell) in Windows.

81
Q

What is rar.exe?

A

A file compressor with difficult to crack encryption.

82
Q

What might at.exe or schtasks.exe suggest on a Windows system.

A

Evidence of compromise, possible privilege escalation or persistence.

83
Q

What SysInternal tools might you find on a compromised Windows system, and what might they do?

A

PsExec: remote execution
PsLoggedOn: interactive logon enumeration
ProcDump: dumping of credentials within lsass.exe address space

84
Q

What are wmic.exe, powershell.exe, and winrm.vbs?

A

They’re all used for remote execution

85
Q

What would net.exe use suggest

A

It’s used for mapping drives and enumerating groups, such as “Domain Admins”. Suggests possible attempts at lateral movement in the network.

86
Q

What does reg.exe or sc.exe execution suggest?

A

Adding persistence such as run keys or services.

87
Q

What does the MountPoints2 registry key do?

A

It shows shares on remote systems such as C$, Temp$, etc.

88
Q

What is a .job file?

A

?

89
Q

What is the “Malware Paradox”?

A

Malware can exist on a system, but it can’t hide inactive forever. To do what it is intended for, it must run.

See http://jessekornblum.com/publications/ijde06.html

90
Q

What are the three possible detection situations?

A
  1. Malware acive
  2. Malware exists, but not active
  3. No malware, but the system is compromised.
91
Q

What detection situation is hardest to detect?

A

A system that’s compromised, but no malware is present. There’s little to look for.

92
Q

What is the most popular malware file name for a system service?

A

svchost.exe. It’s running 5-6 times on most systems, and it’s hard to identify a good one from a bad one.

93
Q

List common malware binary names.

A

svchost. exe
iexplore. exe
iprinp. dll
winzf32. dll

94
Q

How can malware avoid detection?

A

Process injection, service persistence

95
Q

What services does malware often replace?

A

Wireless Zero Configuration Service
RIP Listener Service
Background Intelligent Transfer Service

96
Q

What file types are often malware, according to Virustotal.

A

executables, libraries, PDFs, ZIPs, and other document types.

97
Q

What advantages does hiding in plain sight have for malware?

A

Attempts to hide can make the system unstable or result in detection anyway.

98
Q

What tactics does malware use to evade AV or host based intrusion detection?

A

Frequent compilation, packing, armoring.

99
Q

How does trusted code signing work?

A

Duh

100
Q

Why hasn’t code signing eliminated malware?

A

It’s proven too easy to steal certificates (Adobe, Opera). Stuxnet was signed code.

101
Q

What advantage does signed malware have?

A

It spreads and hides easier on networks. It can remain hidden longer without arousing suspicion. Often espionage malware is hidden.

102
Q

How likely is it that malware is signed?

A

According to McAfee, 4.5% of malware is signed. Malware discovered in the last year: 6%. This has been stable over the past several years. 6.6% in 2012.

103
Q

What are the drawbacks to signing malware?

A

Slower development and release. Rapid devleopment and release is needed to thwart AV.

Need “a plethora of signing certs” to avoid burning all their active malware when certs are revoked.

104
Q

What adversaries are more likely to use signed malware?

A

Nation states.

105
Q

If you wanted to limit the scope of signed code to examine, how might you do it?

A

Don’t focus on big name companies that are more likely to stay on top of certificates and revocations, like Microsoft, Apple, Google.

106
Q

If malware is not found on a system, do you know the system is not compromised?

A

No. Only about half of compromised systems have malware.

107
Q

p103

A

p103 needs more examination.

108
Q

p104

A

p104

109
Q

What is an ASEP?

A

Auto Start Execution Points. These are places in Windows that automatically run programs. There are over 50.

110
Q

What are the most popular ASEPs?

A

NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Run
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\RunOnce
\Software\Microsoft\Windows\CurrentVersion\Run
\Software\Microsoft\Windows\CurrentVersion\policies\Explorer\Run
\Software\Microsoft\Windows\CurrentVersion\Runonce

111
Q

What is the Userinit key?

A

A registry key, an ASEP, that should only contain a reference to userinit.exe. It runs logon scripts, reestablishes network connections, and starts explorer.exe.

112
Q

What is explorer.exe?

A

The Windows user interface.

113
Q

What is userinit.exe?

A

A program that is automatically started in Windows. It runs logon scripts, reestablishes network connections, and starts explorer.exe.

114
Q

What malware persistence technique on Windows doesn’t require admin rights?

A

Placing a program in %AppData%\Roaming\Microsoft\Windows\Start Menu\Programs\Startup. Shortcuts placed here start upon user logon.

115
Q

RegRipper ASEPs

A

p110

116
Q

What is svchost.exe?

A

It’s a generic service host process.

117
Q

How is svchost.exe configured?

A

Registry keys under HKLM\System\CurrentControlSet\Servces provide parameters for each service.

118
Q

Why is it useful for malware to be configured as a windows service?

A

Services often start before antivirus, making it easier to avoid detection. Also, a typical Windows system may have > 100 services registered, making it easier to hide in plain sight.

119
Q

What is service replacement?

A

Similar to service creation as a malware persistence method, but different in that it finds a service already set to auto start that is unimportant, or one that isn’t typically started at boot. Not as common as service creation due to its complexity.

120
Q

What Start value starts a Windows service?

A

0x02

121
Q

Service Recovery Mode option?

A

p112

122
Q

What tool can you use to identify and analyze services on a system?

A

Sysinternals autoruns

123
Q

What is at.exe?

A

A windows method of scheduling a task to run later.

124
Q

What artifacts does at.exe create?

A

Files named at*.job (at1.job and up) in the \Windows\Tasks and \Windows\System32\Tasks folders

125
Q

Why was at.exe a popular attack vector?

A

At ran as SYSTEM regardless of the user’s privileges.

126
Q

What is schtasks.exe?

A

An upgraded at.exe, a windows tool for scheduling tasks for later execution.

127
Q

If at.exe or schtasks.exe are used to schedule a task remotely, where are most artifacts found?

A

On the remote system where the task actually runs, not the one it was scheduled from.

128
Q

What tool can collect currently scheduled jobs on Windows?

A

Sysinternals autoruns.

129
Q

What SIFT tool can be used to parse AT job files?

A

jobparser.py. jobparse.pl also does this.

130
Q

What does Event ID 106 record?

A

Newly created Scheduled Tasks. It contains the user and task name, but not a lot more (look into what).

131
Q

What kinds of events are in the Task Scheduler/Operational log?

A

106: Scheduled Task Created
140: Scheduled Task Updated
141: Scheduled Task Deleted

132
Q

How can you get more granular logging for Windows Scheduled Tasks?

A

Turn Object access auditing on and look in the Security log for:

4698: Scheduled Task Created
4699: Scheduled Task Deleted
4700: Scheduled Task Enabled
4701: Scheduled TAsk Diabled
4702: Scheduled Task Updated

133
Q

How does DLL persistence attack work?

A

Search order hijacking: place a malicious DLL in the search path before the legitimate one. Search path starts at CWD and ends at c:\Windows\System32. Exception: DLLs listed in the KnownDLLs registry key.

134
Q

What is Phantom DLL hijacking?

A

Abusing the fact that some old DLLs are still loaded (or attempted) by applications even though they aren’t needed, and sometimes not present on the system.

135
Q

What is DLL side loading?

A

p118

136
Q

What is WMI?

A

Windows Management Instrumentation

137
Q

What is a WMI Event Consumer?

A

A feature that permits monitoring for specific events, and when triggered, alert event consumers that can run scripts or execute code. Requires admin privs, but can be used to create a backdoor.

138
Q

What privileged do WMI Consumers run at?

A

SYSTEM in XP and LOCAL_SERVICE in Win7+.

139
Q

What is a MOF?

A

Managed Object Format file.

140
Q

What can you use a MOF to do?

A

A MOF (managed object format) file can be used to register new classes into the WMI repository.

141
Q

What is Get-WmiObject?

A

A PowerShell cmdlet for identifying and removing suspicious WMI entries.

142
Q

What are the most common persistence mechanisms?

A
  • Auto-start locations
  • Service creation / replacement
  • Service failure recovery
  • Scheduled tasks
  • DLL hijacking
  • WMI Event Consumers
143
Q

What is the go-to tool for incident responders?

A

The autoruns tool from Sysinternals.

144
Q

What is autorunsc.exe?

A

The command line version of the Sysinternals too, Autoruns.

145
Q

Autoruns command line options?

A

p122

146
Q

What limitation does autorunsc.exe have?

A

It has to be run on a live system.

147
Q

How does autorunner differ from autorunsc.exe?

A

Autorunsc.exe has to be run on a live system. Autorunner works on a forensic image.

148
Q

More from p124

A

p.124

149
Q

What is the Windows kernel executable called?

A

ntoskrnl.exe

150
Q

Poster

A

http://digital-forensics.sans.org/media/poster_2014_find_evil.pdf

151
Q

What are the two major methods that malware authors use to obscure their processes?

A

Hide in plain sight or use code injection or rootkit methods to appear legitimate.

152
Q

What, other than suspicious processes should you look for on a Windows system as evidence of compromise?

A

Suspicious DLLS executed through rundll32.exe, implemented as services with svchost.exe, or injected into legitimate processes.

153
Q

What software will check on disk signatures for running code?

A

Mandiant Redline.

154
Q

What software will check offline software for valid signatures?

A

Didier Stevens’ Authenticode Tools or Sysinternals’ sigcheck.exe.

155
Q

How does code injection or rootkits benefit a malware author?

A

Hiding from normal analysis techniques.

156
Q

How can you detect code injection or rootkits?

A

Memory analysis.

157
Q

What is the one legitimate use of code injection?

A

Software debugging.

158
Q

Why is code injection nearly always worth investigating?

A

It has few legitimate uses; notably software debugging. There may be no others.

159
Q

What is a rootkit?

A

Software which can use any of a broad category of methods intended to subvert the operating system to hide activities and data.

160
Q

List rootkit detection software:

A

GMER

Rootkit Revealer

161
Q

How do rootkit detection tools work?`

A

By comparing the state of the system according to the OS compared to the state determined by the tool.

162
Q

Why doesn’t offline memory analysis work well for detecting rootkits?

A

It doesn’t rely on the compromised OS, so artifacts like unlinked but still running processes and suspicious function hooks may be found.

163
Q

Why are rootkits relatively rare?

A

They require skill to create a reliable exploit across various Windows versions.

164
Q

What tools have robust features for finding code injection and rootkit behaviors?

A

Mandiant Redline and Volatility

165
Q

What is svchost.exe?

A

A generic service host process. It’s typical to see 5 or more running on a Windows system.

166
Q

Under what registry key are service configurations and device driver configurations found?

A

HKLM\SYSTEM\CurrentControlSet\Services

167
Q

What command can be used to investigate service configurations within the registry?

A

sc

168
Q

What parameters can be used with the sc command to investigate service configurations within the registry?

A

queryex
qc
qprivs
qtriggerinfo

169
Q

Can a compromised system contain no malware?

A

Yes.

170
Q

How should you look for evidence of compromise on a system that has no malware?

A

Look for unusual OS-based artifacts that wouldn’t exist on a typical workstation or server in the organization.

171
Q

When investigating program execution what should you focus on?

A

Prefetch, shimcache, userassist registry keys, and jump file lists.

172
Q

What does cmd.exe do?

A

It provides command line access to a Windows system.

173
Q

What does rar.exe do, or the presence of rar suggest?

A

Rar.exe is a hard-to-crack archiving tool. Rar files may suggest a compromise or evidence of exfiltration.

174
Q

What are at.exe and schtasks.exe used for?

A

Privilege escalation and persistence.

175
Q

What does the presence of sysinternals tools (psexec, psloggedon, ProcDump) suggest?

A

They are evidence of remote execution, interactive logon enumeration, and dumping of lsass.exe address space respectively.

176
Q

What is wmic.exe powershell.exe, or winrm.vbs used for?

A

Remote execution.

177
Q

What is net.exe used for?

A

Mapping drives (useful for lateral movement and enumerating groups like Domain Admins)

178
Q

What is reg.exe or sc.exe used for?

A

Adding persistence such as run keys or services

179
Q

What can the MountPoints2 registry key be used for?

A

It records shares on remote systems such as C$, Temp$, etc.

180
Q

What do .job files in C:\Windows\Tasks suggest?

A

They can be related to odd application executions.

181
Q

What anomalous characteristics should you look for when reviewing Windows processes?

A
  • Started with the wrong parent processes
  • Image executable in the wrong path
  • Misspelled processes
  • Processes that are running under the wrong account (incorrect SID)
  • Processes with unusual boot times (minutes or hours after boot if it should be seconds)
  • Unusual command-line arguments
  • Packed executables
182
Q

Describe the Windows system process:

A
Image Path: N/A
Parent Process: None
Number of Instances: One
User Account: Local System
Start Time: Boot
Description: Responsible for most kernel-mode threads.  Modules run under system are mostly drivers (.sys), but include several important DLLs and the kernel executable, ntoskrnl.exe.
183
Q

Describe the Windows smss.exe process:

A

Image Path: %SystemRoot%\System32\smss.exe
Parent Process: System
Number of Instances: One master and another child per session. Children exit after creating their session
User Account: Local System
Start Time: Within seconds of boot for the master
Description: Responsible for creating new sessions. Exits after starting csrss.exe and wininit.exe or winlogon.exe.

184
Q

Describe the Windows csrss.exe process:

A

Image Path: %SystemRoot%\System32\csrss.exe
Parent Process: smss.exe. Analysis tools usually can’t provide this.
Number of Instances: 2+
User Account: Local System
Start Time: Within seconds of boot for first 2, later as other sessions are created.
Description: Client/Server Run-Time Subsystem: the user mode process for the Windows subsystem. Manages processes and threads, imports DLLs that provide the Windows API, shuts down the GUI during system shutdown.

*Searching the address space for csrss.exe processes is particularly useful when analyzing the memory of compromised hosts (why?).

185
Q

Describe the Windows services.exe process:

A

Image Path: %SystemRoot%\System32\services.exe
Parent Process: wininit.exe.
Number of Instances: 1
User Account: Local System
Start Time: Within seconds of boot
Description: Implements the Unified Background Process Manager (UBPM), which is responsible for services and scheduled tasks. Also implements the Service Control Manager (SCM) which handles loadin gof services and device drivers marked for auto-start. Also sets the Last Known Good control set to the value of the CurrentControlSet once a user has successfully logged in.

186
Q

Describe the Windows svchost.exe process:

A

Image Path: %SystemRoot%\System32\svchost.exe
Parent Process: services.exe.
Number of Instances: 5+
User Account: Varies, but typically Local System, Network Service or Local Service.
Start Time: Within seconds of boot, unless services are started later.
Description: Generic Windows host process. Used for running service DLLs. -k parameter used for grouping similar services. (List them p133).

187
Q

Why do malware authors use svchost.exe?

A

It’s ubiquitous, so easy to hide.

188
Q

How do malware authors use svchost.exe?

A

Either as camoflage (misspelling, putting an executable in an incorrect directory), or directly to start illegitimate services.

189
Q

Describe the Windows lsm.exe process:

A

Image Path: %SystemRoot%\System32\svchost.exe
Parent Process: wininit.exe.
Number of Instances: 1
User Account: Local System
Start Time: Within seconds of boot
Description: Local Session Manager handles terminal services including RDP and additional local sessions via Fast User Switching. Communicates with smss.exe to start new sessions. Should never have child processes.

190
Q

Describe the Windows explorer.exe process:

A

Image Path: %SystemRoot%\explorer.exe
Parent Process: userinit.exe. Analysis tools usually can’t provide this.
Number of Instances: 1 per interactively logged in user.
User Account: the logged on user
Start Time: When the user logs in
Description: Provides access to files, file browser, user interface to desktop, start menu, task bar, control panel, application launching via file extension and shortcut files.

191
Q

Describe the Windows iexplore.exe process:

A

Image Path: \ProgramFiles\Internet Explorer\iexplore.exe
Parent Process: explorer.exe
Number of Instances:0 to many
User Account: the logged on user
Start Time: When the user starts it. Can be started automatically via the -embedding switch, which causes a different parent process.
Description: Web browser. Subprocess for each tab (several reasons, including enhanced security). Tabs run with low integrity to make it more difficult to modify sensitive areas of the registry or filesystem.

192
Q

How do attackers use iexplorer.exe to hide?

A

Hiding in plain sight by naming their executable iexplore.exe and putting it in another directory or misspelling as iexplorer.exe.

193
Q

Describe the Windows winlogon.exe process:

A

Image Path: %SystemRoot%\System32\winlogon.exe
Parent Process: smss.exe which exits, so analysis tools usually don’t provide it.
Number of Instances: 1 or more
User Account: Local System
Start Time: Within seconds of boot for the first instance (Session 1). Additional as new sessions are created through RDP or Fast User Switching.
Description: Handles interactive user logons and logoffs. Launches LoginUI.exe, which accepts the username and password. Credentials verified by lsass.exe, then loads the user’s NTUSER.DAT into NKCU and starts the shell (explorer.exe) via userinit.exe.

194
Q

Describe the Windows lsass.exe process:

A

Image Path: %SystemRoot%\System32\lsass.exe
Parent Process: wininit.exe
Number of Instances: 1
User Account: Local System
Start Time: Within seconds of boot
Description: Local Security Authentication Subsystem Server. Responsible for authenticating users by calling an appropriate security service provider (SSP) authenication package specified in HKLM\SYSTEM\CurrentControlSet\Control\Lsa. Typically kerberos SSP for domain accounts or MSV1_0 SSP for local. Generates an access token for the user that specifies security rights and constraints for the user and processes. Should never have child processes.

195
Q

Describe the Windows taskhost.exe process:

A

Image Path: %SystemRoot%\System32\taskhost.exe
Parent Process: services.exe
Number of Instances: Multiple
User Account: . One or more owned by logged in users and/or local service accounts
Start Time: Vary greatly
Description: Generic host process for Windows Tasks. Tasks are handled through Universal Background Process Manager (UBPM). Runs in a continuous loop listining for trigger events, such as: definied schedule, user logon, system startup idle CPU, Windows log event, workstation lock or unlock.

196
Q

Describe the Windows wininit.exe process:

A

Image Path: %SystemRoot%\System32\wininit.exe
Parent Process: smss.exe, which exits so analysis tools usuall can’t provide it.
Number of Instances: 1
User Account: . Local System
Start Time: Within seconds of boot
Description: Starts key background processes within Session 0. Starts the Service Control Manager (SCM, services.exe), Local Security Authority processes (lsass.exe), and the Local Session Manager (lsm.exe).

197
Q

What should be in a minimal live response kit?

A
  • Small hub or switch
  • CAT5
  • Crossover cable
  • Enterprise scanning capability (F-Response, GRR, Mandiant MIR)
  • Live resonse tools
  • Memory and Drive Analysis and/or Acquisition Tools
  • Sysinternals tools + scripts
  • Drive Adapters (SATA/IDE/SCSI) or
  • SATA/IDE Hardware write-blocker
  • Large Capacity Target media
198
Q

p142

A

p142