An Introduction to Incident Detection and Response Memory Forensic Analysis



Similar documents
Detecting Malware With Memory Forensics. Hal Pomeranz SANS Institute

Chapter 14 Analyzing Network Traffic. Ed Crowley

Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A monnappa22@gmail.com

A perspective to incident response or another set of recommendations for malware authors

CHAD TILBURY.

Memory Forensics: Collecting & Analyzing Malware Artifacts from RAM

Information Technology Audit & Forensic Techniques. CMA Amit Kumar

Incident Response. Six Best Practices for Managing Cyber Breaches.

Redline Users Guide. Version 1.12

Ovation Security Center Data Sheet

vsphere Replication for Disaster Recovery to Cloud

Alert (TA14-212A) Backoff Point-of-Sale Malware

Discovering passwords in the memory

Computing forensics: a live analysis

Ovation Security Center Data Sheet

Using Remote Desktop Clients

Search and Destroy the Unknown FROM MALWARE ANALYSIS TO INDICATIONS OF COMPROMISE

The Value of Physical Memory for Incident Response

Forensics Book 2: Investigating Hard Disk and File and Operating Systems. Chapter 5: Windows Forensics II

Getting Ahead of Malware

Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation

Intrusion Detection System

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

Overview of Computer Forensics

Persistence Mechanisms as Indicators of Compromise

Networks and Security Lab. Network Forensics

Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic

Sophos for Microsoft SharePoint startup guide

Attacking the Traveling Salesman Point-of-sale attacks on airline travelers DEFCON 2014

MSc Computer Security and Forensics. Examinations for / Semester 1

vsphere Replication for Disaster Recovery to Cloud

Data Mining in Incident Response Challenges and Opportunities

Host-based Intrusion Prevention System (HIPS)

INCIDENT RESPONSE CHECKLIST

Breach Found. Did It Hurt?

How we keep harmful apps out of Google Play and keep your Android device safe

KEY STEPS FOLLOWING A DATA BREACH

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

The Incident Response Playbook for Android and ios

EVTXtract. Recovering EVTX Records from Unallocated Space PRESENTED BY: Willi Ballenthin OCT 6, Mandiant Corporation. All rights reserved.

Sophos Endpoint Security and Control Help. Product version: 11

Network Incident Report

NetDefend Firewall UTM Services

NERC CIP Ports & Services. Part 2: Complying With NERC CIP Documentation Requirements

CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security

Section 12 MUST BE COMPLETED BY: 4/22

Sophos Anti-Virus for NetApp Storage Systems startup guide

Security Analytics The Beginning of the End(Point)

Sophos Endpoint Security and Control Help

DoD Cyber Crime Center

System Compatibility. Enhancements. Operating Systems. Hardware Requirements. Security

Securing Remote Vendor Access with Privileged Account Security

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

IBM Security QRadar Version WinCollect User Guide V7.2.2

Missing the Obvious: Network Security Monitoring for ICS

HoneyBOT User Guide A Windows based honeypot solution

Threat Advisory: Accellion File Transfer Appliance Vulnerability

Getting Physical with the Digital Investigation Process

4cast Server Specification and Installation

Linux Boot Camp. Our Lady of the Lake University Computer Information Systems & Security Department Kevin Barton Artair Burnett

That Point of Sale is a PoS

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

FATKit: A Framework for the Extraction and Analysis of Digital Forensic Data from Volatile System Memory p.1/11

NetDefend Firewall UTM Services

Sophos Anti-Virus for NetApp Storage Systems startup guide. Runs on Windows 2000 and later

Hands-On How-To Computer Forensics Training

Networks & Security Course. Web of Trust and Network Forensics

Fighting Advanced Persistent Threats (APT) with Open Source Tools

Assignment # 1 (Cloud Computing Security)

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Everything You Always Wanted to Know About Log Management But Were Afraid to Ask. August 21, 2013

Cybersecurity Health Check At A Glance

Exercise 7 Network Forensics

Xerox Mobile Print Cloud

Keyloggers ETHICAL HACKING EEL-4789 GROUP 2: WILLIAM LOPEZ HUMBERTO GUERRA ENIO PENA ERICK BARRERA JUAN SAYOL

ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications

IBM Security. How BigFix Helps Investigate a Threat in Forensic Activities IBM

Installing, Uninstalling, and Upgrading Service Monitor

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway

Acronis Backup & Recovery 11

5nine Security for Hyper-V Datacenter Edition. Version 3.0 Plugin for Microsoft System Center 2012 Virtual Machine Manager

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1

Incident Response and Forensics

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Upgrading Client Security and Policy Manager in 4 easy steps

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

IBM Security QRadar Vulnerability Manager Version User Guide

Transcription:

An Introduction to Incident Detection and Response Memory Forensic Analysis Alexandre Dulaunoy - TLP:WHITE a@foo.be February 6, 2015

An overview to incident response Detection Analysis Containment Investigation Eradication Postmortem 2 of 18

Detection (the most common) External indicators (e.g. IOCs 1 shared with third-parties. Anomalies detected by internal or external people to the organization. Performance or stability anomalies detected internally. FP 2 incidents usually cross-checked via various sources. (careful) Analysis of logs produced by network or security devices/software. 1 CIRCL MISP 2 False positives 3 of 18

Detection means gathering, checking and data mining Minimal internal team is required to ensure the adequate detecting within your organization. Ticketing software (e.g. RTIR) is required to track down incidents/indicators. The internal team can rely on Public Resource Teams, Internal Teams and Commercial Teams to operate. 4 of 18

Detection - how to deal with false positives? If you receive an indicator detecting a potential incident, we have no guarantee to be accurate. Collecting the incident reports in a ticketing system helps to reduce the time to process FP events. Sometime the event itself is accurate (e.g. a server is no more responding) but does not lead to a security incidents. It s not uncommon to have an event (initially classified as FP) to become a real incident after some times. 5 of 18

Increase detection rate (and reduce analysis time) Profiling networks and systems is a way to measure expected profile of running systems. File integrity check (e.g. default binaries checksum of internal software) is critical to detect unknown binaries and improve analysis time. Network profiling (e.g. bytes over time) of internal systems. Understand and define normal behaviors of networks, systems or applications (e.g. Which TCP ports are used by your internal software?). Keep logs 3 is critical especially that incidents may not discovered before months. 3 log retention policy 6 of 18

Analysis - The Order of Volatility (OOV) The expected life-time of data : Type of Data Life Span Registers or cache Nanoseconds Main Memory Ten Nanoseconds Network State Milliseconds Running Processes Seconds Disk Minutes Backup Medias Years CD-ROMS or printouts Tens of years Sometimes a small process trace can explain more than 50 gigabytes of a single backup... 7 of 18

Incident Analysis - Theory Broad definition of (computer) forensic analysis : Forensic analysis involves the preservation, identification, extraction, documentation and interpretation of computer data To reach those goals, the forensic specialists follow clear and well-defined methodologies. Flexibility is highly required when encountering the unusual. 8 of 18

Incident Analysis - Methodology Acquire the evidence without altering or modifying the original source. Authenticate that you gathered the evidence in a proper way. Analyze the non-original collected data without modifying it. 9 of 18

Gathering evidence: memory acquisition If the system is not running, recovering hibernation file/crash dumps/pagefiles from disk. If the system is running and accessible, acquire memory with win32dd/win64dd (or DumpIt or KnTDD). win32dd.exe -l[0 1] memory.dump dumpit.exe If the system is running but not accessible, hardware techniques using Firewire/DMA access limited to the first 4GB of memory. 10 of 18

Gathering evidence: memory acquisition - remote acquisition Systems are not always physically accessible. Some of the tools can save to a share the memory dump or use an encrypted network tunnel (e.g. over SSH). Remote acquisition over the network is not always recommended. Remote access and storing the raw dump file locally is an acceptable solution. 1 p s e x e c. exe \\ r e m o t e s y s e w c : \ c : \ \ win32dd. exe c : \ \ w i n l o c a l. raw 11 of 18

Memory acquisition of virtualized systems VMware ESX (and related products).vmem,.vmss and.vmsn files need to be collected for memory analysis. VirtualBox via the debugvm command (vboxmanage debugvm dumpguestcore filename dump.elf) strip elf part to get raw data 1 head c $ ( ( $ s i z e+$ o f f ) ) dump. e l f t a i l c +$ ( ( $ o f f +1) ) > dump. raw 12 of 18

Gathering evidence: memory acquisition - risks Memory acquisition is performed with administration privileges. If the system is suspicious (and infected), the credentials used might be abused/gathered by the attacker. Still better than user-space tools like Process Explorer (e.g. malware rootkits). Don t do acquisition when huge processes are running in memory (e.g. AntiVirus full scan, disk indexing,...). Don t forget that some malware know about memory acquisition tool. Disk acquisition should be done just after memory acquisition (comparing disk/memory is useful). 13 of 18

Analysis of the evidence: memory analysis Unstructured analysis (e.g. grep, strings) easy for analysis checking but out-of-context. File carving quick extraction of contiguous data for files or executables. Structured analysis interpretation of operating system data structure, kernel-user space separation. Volatility 4, Mandiant Redline. 4 https://code.google.com/p/volatility/ 14 of 18

Installing volatility https://github.com/volatilityfoundation/volatility git clone https://github.com/volatilityfoundation/volatility.git cd volatility python vol.py (pip install the missing packages) 15 of 18

Image profile python vol.py info python vol.py imageinfo -f your.dump python vol.py profile=winxpsp3x86 shellbags -f your.dump python vol.py profile=winxpsp3x86 pslist -f your.dump python vol.py profile=winxpsp3x86 userassist -f your.dump 16 of 18

Malware analysis - complexity What s the exact definition of a malware? (from remote access tool to custom payload used in targeted attacks) Malware are not only payload on Windows machine (but also active malicious javascript, repurposed software, bundle software,...) It s context dependent. 17 of 18

Malware - analysis During the memory or disk forensic, various suspicious files were found and could be malware. Two different approaches can be used: Static analysis File characteristics (Known operating system file? meta-information?) Result from multiple A/V detection Results from dissasembly Dynamic analysis 5 Executing malware in a controlled environment to understand the behavior during runtime Logging API calls Intercepting and logging network access Usually a combination is used to overcome limitation of dynamic and static analysis (e.g. Anti-VM/debug, Turing s Halting problem, target specific requirements...) 5 CIRCL DMA access 18 of 18