21
Windows Registry Forensics Windows Registry Forensics (WRF) with Volatility Framework Speaker :: Kapil Soni (2013)

Windows Registry Forensics with Volatility Framework

Embed Size (px)

DESCRIPTION

Windows Registry Forensics is the most important part of Memory Forensics Investigations. With the help of Windows Registry Forensics we can reconstruct user activity as well find the evidence easily. Windows Registry Forensics (WRF) is a one of most important part on malware analysis. The changes made due to malware on Windows that reflect on Registry. If attacker tried to make changes on Windows OS so all the logs like opening, deleting, modifying folder or file as well if attacker executed a file like .exe , everything is stores in Windows Registry that helps investigator to catch cyber criminal.

Citation preview

Page 1: Windows Registry Forensics with Volatility Framework

Windows Registry Forensics

Windows Registry Forensics (WRF) with Volatility

Framework

Speaker :: Kapil Soni (2013)

Page 2: Windows Registry Forensics with Volatility Framework

Content ::

Small Introduction of tools› DumpIt› Volatility Framework

Image Info, Process Analysis, Services Analysis Hive Info, Printkey Hardware Analysis Hash Dumping and LSA Secrets Dump Shellbags Analysis Userassist Analysis & Shimcache

Page 3: Windows Registry Forensics with Volatility Framework

Registry Manage and Basics

Page 4: Windows Registry Forensics with Volatility Framework

DumpIt & Volatility Framework -

DumpIt is a utility for windows. DumpIt dumps memory and create a .raw dump file.

Volatility Framework is a advanced and powerful memory analysis and forensics framework. › Platform Supported - Windows, Linux, Mac.

Page 5: Windows Registry Forensics with Volatility Framework

Image Info, Process Analysis, Services Analysis – Short Desc.

Image Info – In this section we can find out important things that related to dumped memory file.

Process Analysis – Process analysis is the most important part in memory analysis and malicious activity analysis.

Services Analysis – Service analysis is yet another important part in forensics investigations.

Page 6: Windows Registry Forensics with Volatility Framework

Image Info, Process Analysis, Services Analysis – Short Desc.

Page 7: Windows Registry Forensics with Volatility Framework

Image Info, Process Analysis, Services Analysis – Short Desc.

Page 8: Windows Registry Forensics with Volatility Framework

Image Info, Process Analysis, Services Analysis – Short Desc.

Page 9: Windows Registry Forensics with Volatility Framework

Hive Info & PrintKeyHivelist ::

PrintKey ::

Page 10: Windows Registry Forensics with Volatility Framework

Hardware Identification -

Some keys or subkeys contains hardware information in memory.

By registry analysis , this is the good way to gather information about BIOS, Hardware, and other internal external devices.

Command :: Volatility.exe –f Windows7.raw –profile=Win7SP1x86 -o HKLM_VirtualAddress –K DESCRIPTION/System/BIOS

Page 11: Windows Registry Forensics with Volatility Framework

Hardware Identification -

Some keys or subkeys contains hardware information in memory.

By registry analysis , this is the good way to gather information about BIOS, Hardware, and other internal external devices.

Command :: Volatility.exe –f Windows7.raw –profile=Win7SP1x86 -o HKLM_VirtualAddress –K DESCRIPTION/System/BIOS

Page 12: Windows Registry Forensics with Volatility Framework

Hash Dumping ::

User password stores in the form of Hashes in Registry.

Volatility Framework provide plugin for hash dumping from windows registry. › Windows Password Hashes

Command :: Volatility.exe –f WinXP.raw --profile=WinXPSP2x86 hashdump –y system_virutal –s sam_virtual

Page 13: Windows Registry Forensics with Volatility Framework

Hash Dumping ::

Volatility Framework provide hash dumping facility from windows registry. › Windows Password Hashes

Command :: Volatility.exe –f WinXP.raw --profile=WinXPSP2x86 hashdump –y system_virutal –s sam_virtual

Page 14: Windows Registry Forensics with Volatility Framework

LSA Secret Dump ::

We can dump LSA (Local Security Authority) Secrets into the windows registry.› (*Special protected storage for important data

used by LSA in Windows i.e. Local Security Policies, Auditing, Authenticating, Logging users on the system, Storing private data.

› User’s and System’s sensitive data is stored in secrets.

Command :: Volatility.exe –f WinXP.raw –profile=WinXPSP2x86 lsadump –y system_offset –s security_offset

Page 15: Windows Registry Forensics with Volatility Framework

LSA Secret Dump ::

We can dump LSA (Local Security Authority) Secrets into the windows registry.› (*Special protected storage for important data

used by LSA in Windows i.e. Local Security Policies, Auditing, Authenticating, Logging users on the system, Storing private data.

› User’s and System’s sensitive data is stored in secrets.

Command :: Volatility.exe –f WinXP.raw –profile=WinXPSP2x86 lsadump –y system_offset –s security_offset

Page 16: Windows Registry Forensics with Volatility Framework

Shellbags Analysis -

In simple, if you will open or close a folder in windows, that all activity stores in shellbag keys.

This is one of most important part in any investigation or forensics.

In other words, Microsoft Windows uses a set of Registry keys known as “shellbags” to maintain the size, view, icon, and position of a folder when using Explorer.

Command :: Volatility.exe –f WinXP.raw –profile=WinXPSP2x86 shellbags

Page 17: Windows Registry Forensics with Volatility Framework

Shellbags Analysis -

In simple, if you will open or close a folder in windows, that all activity stores in shellbag keys.

This is one of most important part in any investigation or forensics.

In other words, Microsoft Windows uses a set of Registry keys known as “shellbags” to maintain the size, view, icon, and position of a folder when using Explorer.

Command :: Volatility.exe –f WinXP.raw –profile=WinXPSP2x86 shellbags

Page 18: Windows Registry Forensics with Volatility Framework

Userassist Analysis -

Userassist provide a lot information about user activity.

When any file is update or modify by user so these changes also update in registry.› Example..

Page 19: Windows Registry Forensics with Volatility Framework

Userassist Analysis -

Userassist provide a lot information about user activity.

When any file is update or modify by user so these changes also update in registry.› Example..

Page 20: Windows Registry Forensics with Volatility Framework

Shimcache Analysis -

Shimcache shows all the .exe files that executes in windows. If a file is executed with windows “CreateProcess” , It will logged in Shimcache› Example.. Windows7 Shimcache

Page 21: Windows Registry Forensics with Volatility Framework

Thank You !!