Section 2.1: Intrusion Analysis: Evidence of Execution Flashcards

1
Q

Name two ways credential theft can be detected.

A

By seeing the execution of credential dump, and by tracking credential usage via event log.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Windows Prefetch?

A

It is a process in which the OS loads key pieces of data and code from disk into memory before it is needed. The directory is “C:\Windows\Prefetch” and carries 1024 files since Windows 8. It can be turned off through the registry. Prefetch files are compressed but PECmd.exe can decompress them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What information does each prefetch file contain?

A

The file contains the application name, hash based on its path, and ends with “.pf” extension. Embedded in each file is the total number of times an application has been executed, the original path, and the last time it ran. A total of 9 execution times if creation time is counted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why is it important for an analyst to take notice of prefetch files with the same executable name?

A

Prefetch files with the same name indicate that one of the files was run from a different location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the standard path for cmd.exe?

A

System32 folder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Why is it a priority to collect prefetch files?

A

Extraction tools can cause new prefetch files that can cause older ones to be deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the registry path for prefetch?

A

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Session Manager\Memory Management\PrefetchParameters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the cache manager do?

A

It monitors all “helper” files and directories that reference the application related to the prefetch file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When reading the dates on a prefetch file, what do the creation and modified tell analysts?

A

The creation date tells the first time we know the file was executed (-10 seconds) and the modified date tells the last time it was executed (-10 seconds). Be aware that if the executable is old, it can be given a new creation date if its overwritten.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Does a prefetch file indicate application success?

A

No. Maybe the application (or malware) wasn’t compatible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When analyzing the prefetch file, what can I understand from the volume information and file sections?

A

I can find list of documents opened by the application, bad DLLs or hidden folders. Remember to observe SYSWOW64 paths.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does the prefetch timeline file help me as an analyst?

A

I can track applications that ran at the same time as other applications or it can tell me a story of what other applications adversaries ran along the way by looking at the RunTime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain the Application Compatibility Cache system (AppCompatCache AKA ShimCache)?

A

It is designed to detect and remediate programs compatibility challenges when a program launches like have it load properties of a previous version. These binaries are stored in the AppCompatCache registry inside the SYSTEM hive regardless if they are shimmed or not. This registry cannot be deleted from adversaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Detail the full path of AppCompatCache and how many entries it holds.

A

SYSTEM\CurrentControlSet\Control\SessionManager\AppCompatCache\AppCompatCache. It holds 1024 entries. There can be multiple files so look at all the controlsets (the parser tool gets them all thankfully).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What information does the AppCompatCache provide to the analyst about the registered binaries?

A

It records the binary’s last modification date, file path, and if it was executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a mistake many analysts make when analyzing the AppCompatCache modification date?

A

They assume it is the last time a program ran when in reality it is the last time the program was modified.

17
Q

What is an advanced technique analysts need to know about AppCompatCache?

A

If an applications file content is updated or renamed, then the system shims it again. Its perfect for seeing if applcations were moved, renamed, or timestomped (Ex: downloaded file is renamed).

18
Q

Name two functions on how ShimCache functions on the OS.

A

Most recent events are on the top of the list and entries are only written on shutdown. They are placed in memory until that happens.

19
Q

What does Amcache.hve do?

A

It tracks installed applications with their metadata, programs executed, its path, SHA1 hash, and drivers loaded. Just like prefetch, programs here does not indicate execution. Amcache replaced the old RecentFileCache.bcf from other older OS.

20
Q

What directories does Amcache track for new executables?

A

Program Files, Program Files (x86), and Desktop.

21
Q

What is the path to the Amcache.hve file?

A

C:\Windows\AppCompat\Programs\Amcache.hve

22
Q

When auditing executable presence inside the amcache.hve file? Where can I start?

A

Go to the InventoryApplicationFile key to see the list of executables and pick one to see its contents. ProgramId contains the identification number to cross-reference with the InventoryApplication key. LowerCaseLongPath is the Full Path. LinkDate is the PE compilation time (recent dates can be malware). The FileId is the SHA1 hash (skip the first 4 zeros).

23
Q

When auditing executable presence inside the amcache.hve file? Where can I start?

A

Go to the InventoryApplicationFile key to see the list of executables and pick one to see its contents. ProgramId contains the identification number to cross-reference with the InventoryApplication key. LowerCaseLongPath is the Full Path. LinkDate is the PE compilation time (recent dates can be malware). The FileId is the SHA1 hash (skip the first 4 zeros).

24
Q

When auditing installed drivers inside the amcache.hve file, how do I approach?

A

Start with the InventoryDriverBinary key and look for suspicious paths first. Check for legit SHA1 hashing. Last modification time is important (DriverLastWriteTime) and see if it connects with incident timeliine. Check if the driver is signed since they should always be. Lastly, observe for any missing metadata.

25
Q

What is an important command to use when parsing Amcache?

A

Make sure to parse the program entries (associated entries) because the parser only does unassociated entries. The “-i” command does that.

26
Q

When analyzing the parsed files from AmcacheParser, what are some things I should pay attention to?

A

“Am_cacheProgramEntries” is data that is from the InventoryApplication key. The InventoryApplicationFile key is divided associated and unassociated software. The latter one has information on binaries present on the system that may have not been part of the installation package.

27
Q

Should Win-64 bits always contain signed drivers?

A

Yes.

28
Q

Name common living of the land tools that an adversary may execute for malicious purposes.

A

Psexesvc.exe, wmic.exe, scrcons.exe, certutil.exe, rar.exe, wsmprovhost.exe, and whoami.exe.

29
Q

What is so special about the appcompatprocessor.py tool?

A

It can scales and parses both Shimcache and Amcache artifacts. It can take many types of formats including raw SYSTEM, amcache.hve, and in-memory extraction of Shimcache. It can be stacked and sent to an SQL database. Its good to put all files in a database so that modules can be run like: reconscan, tcorr, search, and more! Stacking can lead to results as to which computer ran the binary, all this can be done with this tool.