150 likes | 475 Views
Expanding Response: Deeper Analysis for Incident Handlers. Russ McRee November 2011 GIAC GCIH Gold, GCFA, GCIA, GPEN, GWAPT, GSEC Gold. Objective. Expand incident response tactics beyond common horizons Sample Overview – SpyEye Demonstrate tools for expanded toolkit Volatility 2.0 Xplico
E N D
Expanding Response: Deeper Analysis for Incident Handlers Russ McRee November 2011 GIAC GCIH Gold, GCFA, GCIA, GPEN, GWAPT, GSEC Gold SANS Technology Institute - Candidate for Master of Science Degree
Objective • Expand incident response tactics beyond common horizons • Sample Overview – SpyEye • Demonstrate tools for expanded toolkit • Volatility 2.0 • Xplico • Maltego • Confessor • Summary SANS Technology Institute - Candidate for Master of Science Degree
Broaden IR perspective • Opportunities to enhance IR tactics via: • Memory analysis (Volatility) • Network Forensic Analysis Tooling (Xplico) • Derive disparate entity relationships (Maltego) • Analysis of systems at scale with uniform results (Confessor, MOLE) • Review sample’s attributes with all tools SANS Technology Institute - Candidate for Master of Science Degree
Sample Overview • Trojan.SpyEye • MD5: 00b77d6087f00620508303acd3fd846a • Modifies registry • [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run] • cleansweep.exe = "C:\cleansweep.exe\cleansweep.exe" • Creates directory C:\cleansweep.exe • Populates with .exe and config file SANS Technology Institute - Candidate for Master of Science Degree
Volatilty 2.0 • For the extraction of digital artifacts from volatile memory image • “A Python version of the Windows Internals book, since you can really learn a lot about Windows by just looking at how Volatility enumerates evidence.”- Michael Hale Ligh SANS Technology Institute - Candidate for Master of Science Degree
Volatilty 2.0 • Gather image info: • vol.py imageinfo –f HIOMALVM02.raw • Network connections: • vol.py --profile=WinXPSP3x86 connscan -f HIOMALVM02.raw • Active processes: • vol.py --profile=WinXPSP3x86 pslist -P -f HIOMALVM02.raw SANS Technology Institute - Candidate for Master of Science Degree
Volatilty 2.0 • Process tree: • vol.py --profile=WinXPSP3x86 pstree -f HIOMALVM02.raw • Discover malware attributes: • vol.py --profile=WinXPSP3x86 -f HIOMALVM02.raw malfind -p 1512 -D output/ • Demonstration SANS Technology Institute - Candidate for Master of Science Degree
Xplico • Xplico decodes packet captures (PCAP) extracting the likes of: • email content (POP, IMAP, and SMTP protocols) • HTTP content • VoIP calls (SIP) • IM chats • FTP • TFTP SANS Technology Institute - Candidate for Master of Science Degree
Xplico • Demo: SpyEye PCAP analysis SANS Technology Institute - Candidate for Master of Science Degree
Maltego • Maltego: open source intelligence & forensics application offering extraordinary data mining and intelligence gathering capabilities • Results are well represented in a variety of easy to understand views • In concert with its graphing libraries, Maltego identifies key relationships between data sets and identifies previously unknown relationships between them SANS Technology Institute - Candidate for Master of Science Degree
Maltego • PCAPs can be converted to CSV then directly imported by Maltego • tcpdump ‑vttttnnelr SpyEye.pcap | /usr/local/bin/tcpdump2csv.pl "sip dip dport" > SpyEye.csv produces a CSV that Maltego can consume easily SANS Technology Institute - Candidate for Master of Science Degree
Maltego • Demo: IP address relationships SANS Technology Institute - Candidate for Master of Science Degree
Confessor • Confessor collects from hundreds or thousands of systems simultaneously via Sysinternals: • System logs • Volatile data • User and account information • MAC times • Can run SecCheck on 32-bit systems • Search for reg keys and existence of specific files SANS Technology Institute - Candidate for Master of Science Degree
Confessor • Confessor configuration optimized for specific registry keys and file checks SANS Technology Institute - Candidate for Master of Science Degree
Summary • Tools offered to enhance the incident handler toolkit and address challenges • Takeaways: • Tool to scale • Seek unique opportunities to correlate • Build what you can’t buy or borrow • Q&A: russ at holisticinfosec dot org SANS Technology Institute - Candidate for Master of Science Degree