SlideShare una empresa de Scribd logo
1 de 77
Descargar para leer sin conexión
CNIT 152:
Incident
Response
12 Investigating Windows Systems
(Part 2)
Updated 11-26–18
Ch 12 Part 2
Ch 12 Part 3
The Windows Registry
Purpose
• The registry contains configuration data for the
Windows operating system and applications
• Many artifacts of great forensic value
Hive Files
• Binary files that store the Registry
• Five main registry hives in 

%SYSTEMROOT%system32config
• SYSTEM, SECURITY, SOFTWARE, SAM, DEFAULT
• User-specific hive files in each user's profile
directory
• UsersusernameNTUSER.DAT
• UsersusernameAppDataLocalMicrosoftWindo
wsUSRCLASS.DAT
Windows Profiles
• Created the first time a user interactively logs
on to a system
• Users who connect over the network don't
create a profile folder
Terms
Keys Values Data
The Five Root Keys
HKEY_USERS
Virtual Key Paths
• Dynamically created in a running system
• Not visible on a registry capture
• HKEY_Current_User
• Links to HKEY_USERS{SID}
• HKLMSYSTEMCurrentControlSet
• Links to HKLMSYSTEMControlSetNNN
• HKEY_CLASSES_ROOT
• Merges two subways
Registry Timestamps
• Only one: LastWriteTime
• Stored on a key, not value
• Changed when any value under the key is
added, removed, or changed
• But not when subkeys' values are modified
Example
• Run key: programs that launch on system startup
• Cannot determine when these three Run items
were added, without other evidence
More Limitations
• Windows frequently updates the
LastUpdateTime for large swaths of registry
keys
• During updates, and sometimes even from a
reboot
• Attackers cannot easily change registry
timestamps, although SetRegTime can do this
• Link Ch 12o
Registry Reflection and
Redirection
• 64-bit Windows allows 32-bit software to run
• 32-bit programs are redirected by the W0W64
sybsystem to alternate registry keys, like
• HKLMSOFTWAREWoW6432Node
• This means 32-bit forensic software won't see
the whole Registry
Important Registry Keys
System Configuration
Registry Keys
Basic System Information
• Computer Name
• HKLMSystemCurrentControlSet

ControlComputername
• Windows Version
• HKLMSoftwareMicrosoftWindows NT

CurrentVersion
• Time Zone
• HKLMSystemCurrentControlSet

ControlTimeZoneInformation
Basic System Information
• List of Installed Applications
• HKLMSoftwareMicrosoftWindows

CurrentVersionUninstall{Appname}
• Mounted Devices (with drive letters)
• HKLMSystemMountedDevices
USBSTOR
• Shows every USB device that has been
connected
• A forensic examiner should look here first, to
find out what other devices should be requested
for discovery, by court order or search warrant
Network Information
• Network adapter configuration
• Wireless networks previously used
• Shares
• Firewall settings
User and Security
Information
• Audit policy
• Profile folder path
• Group membership
Shim Cache
Shim Cache
• Also called "Application Compatibility Cache"
• Used to track special compatibility settings for
executable files and scripts
• May include:
• File name, path, and size
• Last modified date
• Whether the file actually ran on the system
Shim Cache
• Maintained in memory, written to the registry on
shutdown
• Maintains up to 1024 entries
• More than Prefetch (128)
• includes apps that haven't executed yet
• Next two slides from link Ch 12a
Common Auto-Run Registry
Keys
Auto-Run Keys
(Auto-Start Extensibility Points)
• Load programs on system boot, user login, and
other conditions
• Commonly used by malware to attain
persistence
• Windows provides hundreds of registry-based
persistence mechanisms
• Some are still undocumented
Services
• Most common and widely used persistence
mechanism
• Services run in the background
• Usually under one of these login accounts
• Local System (most powerful)
• Network System
• Local Service
Services in the Registry
• Each service has its own subkey under
• HKLMCurrentControlSetservicesservicename
• With this information:
• DisplayName and Description
• ImagePath
• How service starts
• Type off service, such as driver or process
ServiceDLL
• Most services are DLL, not EXE files
Service Control Manager
• Services.exe
• Launches Windows services upon startup
• Command-line "sc" command lets you examine,
start, stop, and create services
sc at Command line
Services GUI
One EXE Can Run Several
Services
Four Common Run Keys
Four Common Run Keys
Active Setup
• Subkeys named with GUIDs (long random-looking
numbers)
• Malware authors often re-use GUIDs so Googling
them can be useful
• StubPath points to an EXE that will run on startup
AppInit_DLLs
• DLLs that will be automatically loaded whenever
a user-mode app linked to user32.dll is
launched
• Almost every app uses user32 to draw
windows, etc. (link Ch 12p)
LSA (Local Security
Authority) Packages
• Load on startup
• Intended for authentication packages, but can
be used to launch malware
Browser Helper Objects
(BHOs)
• Add-ons or plug-ins for Internet Explorer
• Such as toolbars, adware, scareware
Shell Extensions
• Like Browser Helper Objects, but for Windows
Explorer
• Add context items when right-clicking a file
• Found at:
• HKCRCLSID{CLSID}InprocServer32
• HKCR{sub-key}shellex
Shell Extensions
Winlogon Shell
• The shell that loads when user logs on
• Normally set to Explorer.exe
• Can be set to any executable file
Winlogon Userinit
• Loads logon and group policy scripts, other
auto-runs, and the Explorer shell
• Attackers can append additional executables to
this value
Identifying Malicious
Auto-Runs
• Eye-ball it, looking for suspicious files or paths,
spelling errors, broken English, etc.
• Risky; real commercial software is often
sloppily made, and some attackers are careful
• Next slide: which item is malicious?
A
B
C
D
Recommended Steps
1. Exclude persistent binaries signed by trusted
publishers (but not all signed binaries)
2. Exclude persistent items created outside the
time window of interest
3. Examine paths of remaining persistent binaries
•Attackers tend to use Temp folders or
common directories within %SYSTEMROOT%
•Not deeply nested subdirectories specific to
obscure third-party applications
Recommended Steps
4. Research MD5 hashes for remaining persistent
binaries on VirusTotal, Bit9, etc.
5. Compare remaining unknowns against a
known "gold image" used to install the
systems
Tools
• Sysinternals AutoRuns
• Mandiant Redline
Signed Malware
• Attackers have been stealing code-signing
signatures, and signing malware
• Also, not all legitimate persistent files, even
Windows components, are signed
• Sometimes updates remove signatures
User Hive Registry Keys
Personalization
• User hive registry keys contain personalization
settings for each user
• First priority: compromised accounts
• Acquire NTUSER.DAT and USRCLASS.DAT
• Check machine accounts, such as
NetworkService and LocalSystem
• May also contain evidence
Most Helpful User-Specific
Keys
• Shellbags
• UserAssist
• MUICache
• Most Recently Used (MRU)
• TypedURLs
• TypedPaths
Shellbags
• Used to remember size,
position, and view settings of
windows
• Persist even if a directory is
deleted
• Saved in a user’s profile
registry hive
Shellbags Contain
• Full directory paths accessed via Explorer
• Date and time of access
• Modified, Accessed, and Created times of each
path recorded when the access occurred
• Such historical records are very useful to track
attacker actions
Example Shellbags
• Link Ch 12q
UserAssist
• Tracks applications a user has launched
through the Windows Explorer shell
UserAssist v. Prefetch
• UserAssist only tracks items opened via
Explorer
• Including from the Run box and Start menu
• But not from the command prompt
• Prefetch files don't identify which user executed
a program
Obfuscated with ROT13
MUICache
• Another list of programs executed by a user
• HKEY_USERS{SID}_ClassesLocalSettingsSoftware

MicrosoftWindowsShellMuiCache
Most Recently Used
(MRU) Keys
• Used by
many
applications
• No standard
registry
path or
value
naming
convention
MRU-Blaster
• Clears the MRU lists (link Ch 12r)
Explorer Open and Save
MRU
• RegRipper can find the data
Start Menu Run MRU
• Programs recently launched from the Run box
• Human-readable
• HKEY_USERS{SID}SoftwareMicrosoftWindows

CurrentVersionExplorerRunMRU
RecentDocs
• Recently opened documents (any file extension)
• Used to populate File menu of various
applications
• HKEY_USERS{SID}SoftwareMicrosoft

WindowsCurrentVersionExplorerRecentDocs
Internet Explorer
TypedURLs & TypedPaths
• Used to populate the address bar drop-down list
in Internet Explorer
• May contain URLs and paths to local files
• HKEY_USERS{SID}SoftwareMicrosoft

InternetExplorerTypedURLs
• HKEY_USERS{SID}
SoftwareMicrosoftInternetExplorer

TypedPaths
Proves Intent
• User typed (or pasted) these URLs into the
address bar
• Didn't just click a link
Remote Desktop MRU
• Used to remotely control Windows machines
• Maintains history of recent connections and
configuration data
• May tell you where a user connected and who
they attempted to log in as
Registry Analysis Tools
All-In-One Tools
• RegRipper (link Ch 10m)
• Windows Registry Decoder (link Ch 12s)
• AutoRuns
• Redline
Single-Purpose Utilities
• ShimCacheParser
• Shellbags.py
• sbag
• UserAssist
• Nirsoft Registry Analysis Tools
CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)

Más contenido relacionado

La actualidad más candente

CNIT 152 12 Investigating Windows Systems (Part 2)
CNIT 152 12 Investigating Windows Systems (Part 2)CNIT 152 12 Investigating Windows Systems (Part 2)
CNIT 152 12 Investigating Windows Systems (Part 2)Sam Bowne
 
CNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating ApplicationsCNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating ApplicationsSam Bowne
 
CNIT 152 12. Investigating Windows Systems (Part 3)
CNIT 152 12. Investigating Windows Systems (Part 3)CNIT 152 12. Investigating Windows Systems (Part 3)
CNIT 152 12. Investigating Windows Systems (Part 3)Sam Bowne
 
CNIT 152: 10 Enterprise Services
CNIT 152: 10 Enterprise ServicesCNIT 152: 10 Enterprise Services
CNIT 152: 10 Enterprise ServicesSam Bowne
 
CNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence CNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence Sam Bowne
 
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)Sam Bowne
 
CNIT 152 10 Enterprise Service
CNIT 152 10 Enterprise ServiceCNIT 152 10 Enterprise Service
CNIT 152 10 Enterprise ServiceSam Bowne
 
Investigating Hackers' Tools
Investigating Hackers' ToolsInvestigating Hackers' Tools
Investigating Hackers' ToolsIsrael Umana
 
CNIT 152: 4 Starting the Investigation & 5 Leads
CNIT 152: 4 Starting the Investigation & 5 LeadsCNIT 152: 4 Starting the Investigation & 5 Leads
CNIT 152: 4 Starting the Investigation & 5 LeadsSam Bowne
 
CNIT 152: 9 Network Evidence
CNIT 152: 9 Network EvidenceCNIT 152: 9 Network Evidence
CNIT 152: 9 Network EvidenceSam Bowne
 
CNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence CNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence Sam Bowne
 
CNIT 152 11 Analysis Methodology
CNIT 152 11 Analysis MethodologyCNIT 152 11 Analysis Methodology
CNIT 152 11 Analysis MethodologySam Bowne
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationSam Bowne
 
CNIT 126: 10: Kernel Debugging with WinDbg
CNIT 126: 10: Kernel Debugging with WinDbgCNIT 126: 10: Kernel Debugging with WinDbg
CNIT 126: 10: Kernel Debugging with WinDbgSam Bowne
 
CNIT 152: 6. Scope & 7. Live Data Collection
CNIT 152: 6. Scope & 7. Live Data CollectionCNIT 152: 6. Scope & 7. Live Data Collection
CNIT 152: 6. Scope & 7. Live Data CollectionSam Bowne
 
CNIT 152: 1 Real-World Incidents
CNIT 152: 1 Real-World IncidentsCNIT 152: 1 Real-World Incidents
CNIT 152: 1 Real-World IncidentsSam Bowne
 
CNIT 152: 3 Pre-Incident Preparation
CNIT 152: 3 Pre-Incident PreparationCNIT 152: 3 Pre-Incident Preparation
CNIT 152: 3 Pre-Incident PreparationSam Bowne
 
CNIT 152 8. Forensic Duplication
CNIT 152 8. Forensic DuplicationCNIT 152 8. Forensic Duplication
CNIT 152 8. Forensic DuplicationSam Bowne
 
Practical Malware Analysis Ch 14: Malware-Focused Network Signatures
Practical Malware Analysis Ch 14: Malware-Focused Network SignaturesPractical Malware Analysis Ch 14: Malware-Focused Network Signatures
Practical Malware Analysis Ch 14: Malware-Focused Network SignaturesSam Bowne
 
Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs
Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs
Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs Sam Bowne
 

La actualidad más candente (20)

CNIT 152 12 Investigating Windows Systems (Part 2)
CNIT 152 12 Investigating Windows Systems (Part 2)CNIT 152 12 Investigating Windows Systems (Part 2)
CNIT 152 12 Investigating Windows Systems (Part 2)
 
CNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating ApplicationsCNIT 121: 14 Investigating Applications
CNIT 121: 14 Investigating Applications
 
CNIT 152 12. Investigating Windows Systems (Part 3)
CNIT 152 12. Investigating Windows Systems (Part 3)CNIT 152 12. Investigating Windows Systems (Part 3)
CNIT 152 12. Investigating Windows Systems (Part 3)
 
CNIT 152: 10 Enterprise Services
CNIT 152: 10 Enterprise ServicesCNIT 152: 10 Enterprise Services
CNIT 152: 10 Enterprise Services
 
CNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence CNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence
 
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
CNIT 121: 12 Investigating Windows Systems (Part 2 of 3)
 
CNIT 152 10 Enterprise Service
CNIT 152 10 Enterprise ServiceCNIT 152 10 Enterprise Service
CNIT 152 10 Enterprise Service
 
Investigating Hackers' Tools
Investigating Hackers' ToolsInvestigating Hackers' Tools
Investigating Hackers' Tools
 
CNIT 152: 4 Starting the Investigation & 5 Leads
CNIT 152: 4 Starting the Investigation & 5 LeadsCNIT 152: 4 Starting the Investigation & 5 Leads
CNIT 152: 4 Starting the Investigation & 5 Leads
 
CNIT 152: 9 Network Evidence
CNIT 152: 9 Network EvidenceCNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence
 
CNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence CNIT 152: 9 Network Evidence
CNIT 152: 9 Network Evidence
 
CNIT 152 11 Analysis Methodology
CNIT 152 11 Analysis MethodologyCNIT 152 11 Analysis Methodology
CNIT 152 11 Analysis Methodology
 
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic DuplicationCNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
 
CNIT 126: 10: Kernel Debugging with WinDbg
CNIT 126: 10: Kernel Debugging with WinDbgCNIT 126: 10: Kernel Debugging with WinDbg
CNIT 126: 10: Kernel Debugging with WinDbg
 
CNIT 152: 6. Scope & 7. Live Data Collection
CNIT 152: 6. Scope & 7. Live Data CollectionCNIT 152: 6. Scope & 7. Live Data Collection
CNIT 152: 6. Scope & 7. Live Data Collection
 
CNIT 152: 1 Real-World Incidents
CNIT 152: 1 Real-World IncidentsCNIT 152: 1 Real-World Incidents
CNIT 152: 1 Real-World Incidents
 
CNIT 152: 3 Pre-Incident Preparation
CNIT 152: 3 Pre-Incident PreparationCNIT 152: 3 Pre-Incident Preparation
CNIT 152: 3 Pre-Incident Preparation
 
CNIT 152 8. Forensic Duplication
CNIT 152 8. Forensic DuplicationCNIT 152 8. Forensic Duplication
CNIT 152 8. Forensic Duplication
 
Practical Malware Analysis Ch 14: Malware-Focused Network Signatures
Practical Malware Analysis Ch 14: Malware-Focused Network SignaturesPractical Malware Analysis Ch 14: Malware-Focused Network Signatures
Practical Malware Analysis Ch 14: Malware-Focused Network Signatures
 
Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs
Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs
Practical Malware Analysis: Ch 7: Analyzing Malicious Windows Programs
 

Similar a CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)

12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)Sam Bowne
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat HuntingGIBIN JOHN
 
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"EPAM Systems
 
CNIT 126 7: Analyzing Malicious Windows Programs
CNIT 126 7: Analyzing Malicious Windows ProgramsCNIT 126 7: Analyzing Malicious Windows Programs
CNIT 126 7: Analyzing Malicious Windows ProgramsSam Bowne
 
CNIT 126 11. Malware Behavior
CNIT 126 11. Malware BehaviorCNIT 126 11. Malware Behavior
CNIT 126 11. Malware BehaviorSam Bowne
 
Concepts of Malicious Windows Programs
Concepts of Malicious Windows ProgramsConcepts of Malicious Windows Programs
Concepts of Malicious Windows ProgramsNatraj G
 
Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1Rhydham Joshi
 
Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1Rhydham Joshi
 
Practical Malware Analysis: Ch 11: Malware Behavior
Practical Malware Analysis: Ch 11: Malware BehaviorPractical Malware Analysis: Ch 11: Malware Behavior
Practical Malware Analysis: Ch 11: Malware BehaviorSam Bowne
 
CNIT 126 Ch 11: Malware Behavior
CNIT 126 Ch 11: Malware BehaviorCNIT 126 Ch 11: Malware Behavior
CNIT 126 Ch 11: Malware BehaviorSam Bowne
 
Windows internals
Windows internalsWindows internals
Windows internalsPiyush Jain
 
unit 2 confinement techniques.pdf
unit 2 confinement techniques.pdfunit 2 confinement techniques.pdf
unit 2 confinement techniques.pdfRohitGautam261127
 
Let's Talk Technical: Malware Evasion and Detection
Let's Talk Technical: Malware Evasion and DetectionLet's Talk Technical: Malware Evasion and Detection
Let's Talk Technical: Malware Evasion and DetectionJames Haughom Jr
 
CNIT 123: 6: Enumeration
CNIT 123: 6: EnumerationCNIT 123: 6: Enumeration
CNIT 123: 6: EnumerationSam Bowne
 
CNIT 126: 10: Kernel Debugging with WinDbg
CNIT 126: 10: Kernel Debugging with WinDbgCNIT 126: 10: Kernel Debugging with WinDbg
CNIT 126: 10: Kernel Debugging with WinDbgSam Bowne
 
CNIT 126 Ch 7: Analyzing Malicious Windows Programs
CNIT 126 Ch 7: Analyzing Malicious Windows ProgramsCNIT 126 Ch 7: Analyzing Malicious Windows Programs
CNIT 126 Ch 7: Analyzing Malicious Windows ProgramsSam Bowne
 
Lannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber AttacksLannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber AttacksSecurity Bootcamp
 
openioc_scan - IOC scanner for memory forensics
openioc_scan - IOC scanner for memory forensicsopenioc_scan - IOC scanner for memory forensics
openioc_scan - IOC scanner for memory forensicsTakahiro Haruyama
 

Similar a CNIT 152: 12 Investigating Windows Systems (Part 2 of 3) (20)

12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)12 Investigating Windows Systems (Part 2 of 3)
12 Investigating Windows Systems (Part 2 of 3)
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat Hunting
 
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
 
CNIT 126 7: Analyzing Malicious Windows Programs
CNIT 126 7: Analyzing Malicious Windows ProgramsCNIT 126 7: Analyzing Malicious Windows Programs
CNIT 126 7: Analyzing Malicious Windows Programs
 
CNIT 126 11. Malware Behavior
CNIT 126 11. Malware BehaviorCNIT 126 11. Malware Behavior
CNIT 126 11. Malware Behavior
 
Concepts of Malicious Windows Programs
Concepts of Malicious Windows ProgramsConcepts of Malicious Windows Programs
Concepts of Malicious Windows Programs
 
Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1
 
Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1Anomalies Detection: Windows OS - Part 1
Anomalies Detection: Windows OS - Part 1
 
Practical Malware Analysis: Ch 11: Malware Behavior
Practical Malware Analysis: Ch 11: Malware BehaviorPractical Malware Analysis: Ch 11: Malware Behavior
Practical Malware Analysis: Ch 11: Malware Behavior
 
CNIT 126 Ch 11: Malware Behavior
CNIT 126 Ch 11: Malware BehaviorCNIT 126 Ch 11: Malware Behavior
CNIT 126 Ch 11: Malware Behavior
 
Windows internals
Windows internalsWindows internals
Windows internals
 
Defending Your "Gold"
Defending Your "Gold"Defending Your "Gold"
Defending Your "Gold"
 
unit 2 confinement techniques.pdf
unit 2 confinement techniques.pdfunit 2 confinement techniques.pdf
unit 2 confinement techniques.pdf
 
Windows registry forensics
Windows registry forensicsWindows registry forensics
Windows registry forensics
 
Let's Talk Technical: Malware Evasion and Detection
Let's Talk Technical: Malware Evasion and DetectionLet's Talk Technical: Malware Evasion and Detection
Let's Talk Technical: Malware Evasion and Detection
 
CNIT 123: 6: Enumeration
CNIT 123: 6: EnumerationCNIT 123: 6: Enumeration
CNIT 123: 6: Enumeration
 
CNIT 126: 10: Kernel Debugging with WinDbg
CNIT 126: 10: Kernel Debugging with WinDbgCNIT 126: 10: Kernel Debugging with WinDbg
CNIT 126: 10: Kernel Debugging with WinDbg
 
CNIT 126 Ch 7: Analyzing Malicious Windows Programs
CNIT 126 Ch 7: Analyzing Malicious Windows ProgramsCNIT 126 Ch 7: Analyzing Malicious Windows Programs
CNIT 126 Ch 7: Analyzing Malicious Windows Programs
 
Lannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber AttacksLannguyen-Detecting Cyber Attacks
Lannguyen-Detecting Cyber Attacks
 
openioc_scan - IOC scanner for memory forensics
openioc_scan - IOC scanner for memory forensicsopenioc_scan - IOC scanner for memory forensics
openioc_scan - IOC scanner for memory forensics
 

Más de Sam Bowne

3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities Sam Bowne
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development SecuritySam Bowne
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the ApplicationSam Bowne
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)Sam Bowne
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic CurvesSam Bowne
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-HellmanSam Bowne
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1Sam Bowne
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android ApplicationsSam Bowne
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3Sam Bowne
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard ProblemsSam Bowne
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)Sam Bowne
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis MethodologySam Bowne
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated EncryptionSam Bowne
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)Sam Bowne
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)Sam Bowne
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream CiphersSam Bowne
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data CollectionSam Bowne
 
4. Block Ciphers
4. Block Ciphers 4. Block Ciphers
4. Block Ciphers Sam Bowne
 

Más de Sam Bowne (20)

Cyberwar
CyberwarCyberwar
Cyberwar
 
3: DNS vulnerabilities
3: DNS vulnerabilities 3: DNS vulnerabilities
3: DNS vulnerabilities
 
8. Software Development Security
8. Software Development Security8. Software Development Security
8. Software Development Security
 
4 Mapping the Application
4 Mapping the Application4 Mapping the Application
4 Mapping the Application
 
3. Attacking iOS Applications (Part 2)
 3. Attacking iOS Applications (Part 2) 3. Attacking iOS Applications (Part 2)
3. Attacking iOS Applications (Part 2)
 
12 Elliptic Curves
12 Elliptic Curves12 Elliptic Curves
12 Elliptic Curves
 
11. Diffie-Hellman
11. Diffie-Hellman11. Diffie-Hellman
11. Diffie-Hellman
 
2a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 12a Analyzing iOS Apps Part 1
2a Analyzing iOS Apps Part 1
 
9 Writing Secure Android Applications
9 Writing Secure Android Applications9 Writing Secure Android Applications
9 Writing Secure Android Applications
 
10 RSA
10 RSA10 RSA
10 RSA
 
12 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 312 Investigating Windows Systems (Part 1 of 3
12 Investigating Windows Systems (Part 1 of 3
 
9. Hard Problems
9. Hard Problems9. Hard Problems
9. Hard Problems
 
8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)8 Android Implementation Issues (Part 1)
8 Android Implementation Issues (Part 1)
 
11 Analysis Methodology
11 Analysis Methodology11 Analysis Methodology
11 Analysis Methodology
 
8. Authenticated Encryption
8. Authenticated Encryption8. Authenticated Encryption
8. Authenticated Encryption
 
7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)7. Attacking Android Applications (Part 2)
7. Attacking Android Applications (Part 2)
 
7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)7. Attacking Android Applications (Part 1)
7. Attacking Android Applications (Part 1)
 
5. Stream Ciphers
5. Stream Ciphers5. Stream Ciphers
5. Stream Ciphers
 
6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection6 Scope & 7 Live Data Collection
6 Scope & 7 Live Data Collection
 
4. Block Ciphers
4. Block Ciphers 4. Block Ciphers
4. Block Ciphers
 

Último

Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxNikitaBankoti2
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIShubhangi Sonawane
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesShubhangi Sonawane
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 

Último (20)

Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 

CNIT 152: 12 Investigating Windows Systems (Part 2 of 3)

  • 1. CNIT 152: Incident Response 12 Investigating Windows Systems (Part 2) Updated 11-26–18
  • 2. Ch 12 Part 2 Ch 12 Part 3
  • 4. Purpose • The registry contains configuration data for the Windows operating system and applications • Many artifacts of great forensic value
  • 5. Hive Files • Binary files that store the Registry • Five main registry hives in 
 %SYSTEMROOT%system32config • SYSTEM, SECURITY, SOFTWARE, SAM, DEFAULT • User-specific hive files in each user's profile directory • UsersusernameNTUSER.DAT • UsersusernameAppDataLocalMicrosoftWindo wsUSRCLASS.DAT
  • 6. Windows Profiles • Created the first time a user interactively logs on to a system • Users who connect over the network don't create a profile folder
  • 10. Virtual Key Paths • Dynamically created in a running system • Not visible on a registry capture • HKEY_Current_User • Links to HKEY_USERS{SID} • HKLMSYSTEMCurrentControlSet • Links to HKLMSYSTEMControlSetNNN • HKEY_CLASSES_ROOT • Merges two subways
  • 11. Registry Timestamps • Only one: LastWriteTime • Stored on a key, not value • Changed when any value under the key is added, removed, or changed • But not when subkeys' values are modified
  • 12. Example • Run key: programs that launch on system startup • Cannot determine when these three Run items were added, without other evidence
  • 13. More Limitations • Windows frequently updates the LastUpdateTime for large swaths of registry keys • During updates, and sometimes even from a reboot • Attackers cannot easily change registry timestamps, although SetRegTime can do this • Link Ch 12o
  • 14. Registry Reflection and Redirection • 64-bit Windows allows 32-bit software to run • 32-bit programs are redirected by the W0W64 sybsystem to alternate registry keys, like • HKLMSOFTWAREWoW6432Node • This means 32-bit forensic software won't see the whole Registry
  • 17. Basic System Information • Computer Name • HKLMSystemCurrentControlSet
 ControlComputername • Windows Version • HKLMSoftwareMicrosoftWindows NT
 CurrentVersion • Time Zone • HKLMSystemCurrentControlSet
 ControlTimeZoneInformation
  • 18. Basic System Information • List of Installed Applications • HKLMSoftwareMicrosoftWindows
 CurrentVersionUninstall{Appname} • Mounted Devices (with drive letters) • HKLMSystemMountedDevices
  • 19. USBSTOR • Shows every USB device that has been connected • A forensic examiner should look here first, to find out what other devices should be requested for discovery, by court order or search warrant
  • 20. Network Information • Network adapter configuration • Wireless networks previously used • Shares • Firewall settings
  • 21. User and Security Information • Audit policy • Profile folder path • Group membership
  • 23. Shim Cache • Also called "Application Compatibility Cache" • Used to track special compatibility settings for executable files and scripts • May include: • File name, path, and size • Last modified date • Whether the file actually ran on the system
  • 24. Shim Cache • Maintained in memory, written to the registry on shutdown • Maintains up to 1024 entries • More than Prefetch (128) • includes apps that haven't executed yet • Next two slides from link Ch 12a
  • 25.
  • 26.
  • 27.
  • 29. Auto-Run Keys (Auto-Start Extensibility Points) • Load programs on system boot, user login, and other conditions • Commonly used by malware to attain persistence • Windows provides hundreds of registry-based persistence mechanisms • Some are still undocumented
  • 30. Services • Most common and widely used persistence mechanism • Services run in the background • Usually under one of these login accounts • Local System (most powerful) • Network System • Local Service
  • 31. Services in the Registry • Each service has its own subkey under • HKLMCurrentControlSetservicesservicename • With this information: • DisplayName and Description • ImagePath • How service starts • Type off service, such as driver or process
  • 32. ServiceDLL • Most services are DLL, not EXE files
  • 33. Service Control Manager • Services.exe • Launches Windows services upon startup • Command-line "sc" command lets you examine, start, stop, and create services
  • 36. One EXE Can Run Several Services
  • 39. Active Setup • Subkeys named with GUIDs (long random-looking numbers) • Malware authors often re-use GUIDs so Googling them can be useful • StubPath points to an EXE that will run on startup
  • 40. AppInit_DLLs • DLLs that will be automatically loaded whenever a user-mode app linked to user32.dll is launched • Almost every app uses user32 to draw windows, etc. (link Ch 12p)
  • 41. LSA (Local Security Authority) Packages • Load on startup • Intended for authentication packages, but can be used to launch malware
  • 42. Browser Helper Objects (BHOs) • Add-ons or plug-ins for Internet Explorer • Such as toolbars, adware, scareware
  • 43. Shell Extensions • Like Browser Helper Objects, but for Windows Explorer • Add context items when right-clicking a file • Found at: • HKCRCLSID{CLSID}InprocServer32 • HKCR{sub-key}shellex
  • 45. Winlogon Shell • The shell that loads when user logs on • Normally set to Explorer.exe • Can be set to any executable file
  • 46. Winlogon Userinit • Loads logon and group policy scripts, other auto-runs, and the Explorer shell • Attackers can append additional executables to this value
  • 47. Identifying Malicious Auto-Runs • Eye-ball it, looking for suspicious files or paths, spelling errors, broken English, etc. • Risky; real commercial software is often sloppily made, and some attackers are careful • Next slide: which item is malicious?
  • 49.
  • 50. Recommended Steps 1. Exclude persistent binaries signed by trusted publishers (but not all signed binaries) 2. Exclude persistent items created outside the time window of interest 3. Examine paths of remaining persistent binaries •Attackers tend to use Temp folders or common directories within %SYSTEMROOT% •Not deeply nested subdirectories specific to obscure third-party applications
  • 51. Recommended Steps 4. Research MD5 hashes for remaining persistent binaries on VirusTotal, Bit9, etc. 5. Compare remaining unknowns against a known "gold image" used to install the systems
  • 53. Signed Malware • Attackers have been stealing code-signing signatures, and signing malware • Also, not all legitimate persistent files, even Windows components, are signed • Sometimes updates remove signatures
  • 54.
  • 56. Personalization • User hive registry keys contain personalization settings for each user • First priority: compromised accounts • Acquire NTUSER.DAT and USRCLASS.DAT • Check machine accounts, such as NetworkService and LocalSystem • May also contain evidence
  • 57. Most Helpful User-Specific Keys • Shellbags • UserAssist • MUICache • Most Recently Used (MRU) • TypedURLs • TypedPaths
  • 58. Shellbags • Used to remember size, position, and view settings of windows • Persist even if a directory is deleted • Saved in a user’s profile registry hive
  • 59. Shellbags Contain • Full directory paths accessed via Explorer • Date and time of access • Modified, Accessed, and Created times of each path recorded when the access occurred • Such historical records are very useful to track attacker actions
  • 61. UserAssist • Tracks applications a user has launched through the Windows Explorer shell
  • 62. UserAssist v. Prefetch • UserAssist only tracks items opened via Explorer • Including from the Run box and Start menu • But not from the command prompt • Prefetch files don't identify which user executed a program
  • 64. MUICache • Another list of programs executed by a user • HKEY_USERS{SID}_ClassesLocalSettingsSoftware
 MicrosoftWindowsShellMuiCache
  • 65. Most Recently Used (MRU) Keys • Used by many applications • No standard registry path or value naming convention
  • 66. MRU-Blaster • Clears the MRU lists (link Ch 12r)
  • 67. Explorer Open and Save MRU • RegRipper can find the data
  • 68. Start Menu Run MRU • Programs recently launched from the Run box • Human-readable • HKEY_USERS{SID}SoftwareMicrosoftWindows
 CurrentVersionExplorerRunMRU
  • 69. RecentDocs • Recently opened documents (any file extension) • Used to populate File menu of various applications • HKEY_USERS{SID}SoftwareMicrosoft
 WindowsCurrentVersionExplorerRecentDocs
  • 70. Internet Explorer TypedURLs & TypedPaths • Used to populate the address bar drop-down list in Internet Explorer • May contain URLs and paths to local files • HKEY_USERS{SID}SoftwareMicrosoft
 InternetExplorerTypedURLs • HKEY_USERS{SID} SoftwareMicrosoftInternetExplorer
 TypedPaths
  • 71.
  • 72. Proves Intent • User typed (or pasted) these URLs into the address bar • Didn't just click a link
  • 73. Remote Desktop MRU • Used to remotely control Windows machines • Maintains history of recent connections and configuration data • May tell you where a user connected and who they attempted to log in as
  • 75. All-In-One Tools • RegRipper (link Ch 10m) • Windows Registry Decoder (link Ch 12s) • AutoRuns • Redline
  • 76. Single-Purpose Utilities • ShimCacheParser • Shellbags.py • sbag • UserAssist • Nirsoft Registry Analysis Tools