Automated Windows Event Log Forensics



Similar documents
Vista Log Forensics. Dr. Rich Murphey, ACS Background Case Study. Engagement Preliminary Report Final Report Vista Event Logging

Resources You can find more resources for Sync & Save at our support site:

Recovering and Analyzing Deleted Registry Files

TZWorks Windows Event Log Viewer (evtx_view) Users Guide

Chapter 24: Creating Reports and Extracting Data

Recover Data Like a Forensics Expert Using an Ubuntu Live CD

Log Management and Intrusion Detection

MapGuide Open Source Repository Management Back up, restore, and recover your resource repository.

W ith the ubiquity of comes the increased A BNA, INC. DIGITAL DISCOVERY & E-EVIDENCE! Exchange Message Tracking Logs Message Forensics

Q. If I purchase a product activation key on-line, how long will it take to be sent to me?

Log Processing Tools. PS Tools Suite. PSTools Suite. PSTools Suite

your Apple warranty; see There are two main failure modes for a mirrored RAID 1 set:

Backup and Recovery Procedures

Monitoring System Status

Registry Tuner. Software Manual

FORENSIC ANALYSIS OF USB MEDIA EVIDENCE. Jesús Alexander García. Luis Alejandro Franco. Juan David Urrea. Carlos Alfonso Torres

Filemaker Go 12/13 pre-installed (available free of charge from the App Store)

Computer Forensics and Investigations Duration: 5 Days Courseware: CT

PCmover Enterprise User Guide

1! Registry. Windows System Artifacts. Understanding the Windows Registry. Organization of the Windows Registry. Windows Registry Viewer

NSS Volume Data Recovery

STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER

Exchange Brick-level Backup and Restore

PCRecruiter Resume Inhaler

SQL Server Replication Guide

DiskPulse DISK CHANGE MONITOR

Note: With v3.2, the DocuSign Fetch application was renamed DocuSign Retrieve.

IronKey Enterprise File Audit Admin Guide

EnCase 7 - Basic + Intermediate Topics

Forensics Book 2: Investigating Hard Disk and File and Operating Systems. Chapter 5: Windows Forensics II

How To Use The Tzworks Eventlog Parser (Evtwalk) On A Pc Or Mac Or Mac (Windows) With A Microsoft Powerbook Or Ipad (Windows Xp) With An Ipad Or Ipa (Windows 2

Stellar Phoenix SQL Recovery

Zinstall HDD User Guide

TRIFORCE ANJP. THE POWER TO PROVE sm USER S GUIDE USER S GUIDE TRIFORCE ANJP VERSION 3.10

Cloud. Hosted Exchange Administration Manual

ENTERPRISE COMPUTER INCIDENT RESPONSE AND FORENSICS TRAINING

Acronis Backup & Recovery: Events in Application Event Log of Windows

Stellar Phoenix. SQL Database Repair 6.0. Installation Guide

The Meaning. Linkfiles In Forensic Examinations

How To Test The Bandwidth Meter For Hyperv On Windows V (Windows) On A Hyperv Server (Windows V2) On An Uniden V2 (Amd64) Or V2A (Windows 2

Published. Technical Bulletin: Use and Configuration of Quanterix Database Backup Scripts 1. PURPOSE 2. REFERENCES 3.

Symantec Backup Exec 11d for Windows Small Business Server

USB 2.0 Flash Drive User Manual

Mobile memory dumps, MSAB and MPE+ Data collection Information recovery Analysis and interpretation of results

VX Search File Search Solution. VX Search FILE SEARCH SOLUTION. User Manual. Version 8.2. Jan Flexense Ltd.

Kroll Ontrack Data Recovery. Oracle Data Loss: When the best of plans fail

EVENT LOG MANAGEMENT...

Understanding Backup and Recovery Methods

HALOGEN. Technical Design Specification. Version 2.0

State of the art of Digital Forensic Techniques

Tracking Network Changes Using Change Audit

GAUSS 9.0. Quick-Start Guide

Archiving in Microsoft Outlook. This document looks at archiving and saving space in the Microsoft Outlook program. INFORMATION SYSTEMS SERVICES

NovaBACKUP. User Manual. NovaStor / November 2011

Improved Navigation Magento Extension User Guide

Response Time Analysis of Web Templates

Automation License Manager

SonicWALL GMS Custom Reports

Getting Started Guide

Fleet Manager II. Operator Manual

-lead Grabber Business 2010 User Guide

AWS Schema Conversion Tool. User Guide Version 1.0

Bitrix Site Manager 4.0. Quick Start Guide to Newsletters and Subscriptions

User Manual in English. Call Center RC Elastix. For more information visit

5-Bay Raid Sub-System Smart Removable 3.5" SATA Multiple Bay Data Storage Device User's Manual

Analyzing Network Servers. Disk Space Utilization Analysis. DiskBoss - Data Management Solution

The full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code.

EMC NetWorker Module for Microsoft Exchange Server Release 5.1

Using Wireshark to Create Network-Usage Baselines

DocuSign Quick Start Guide. Using the Bulk Recipient Feature. Overview. Table of Contents

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 16 Fixing Windows Problems

Advanced BIAR Participant Guide

Chapter 26 EasyPrinter

(Installation through ADSelfService Plus web portal and Manual Installation)

Dial-up Installation for CWOPA Users (Windows Operating System)

Grandstream Networks, Inc. UCM6100 Series IP PBX Appliance CDR and REC API Guide

Declaration of Conformity 21 CFR Part 11 SIMATIC WinCC flexible 2007

PopupProtect User Guide

Symantec Mail Security for Domino

JAMS 6.X Client Features 3. Working with Jobs 4-5. Submitting Jobs Manually 6-7. Working with Setups 8-9. Working with Views 10-14

RECOVERING FROM SHAMOON

Skype Forensics: Analyzing Call and Chat Data From Computers and Mobile

Design and Configuration of a Network Security and Forensics Lab

UTILITIES BACKUP. Figure 25-1 Backup & Reindex utilities on the Main Menu

Retrieving Internet chat history with the same ease as a squirrel cracks nuts

Forensic Analysis of Internet Explorer Activity Files

Time Clock V1.2 User Manual. Time Clock V1.2. User Manual. Page 1.

Power Update - Documentation Power Update Manager

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

1. To start Installation: To install the reporting tool, copy the entire contents of the zip file to a directory of your choice. Run the exe.

ShoreTel Active Directory Import Application

MultiAlign Software. Windows GUI. Console Application. MultiAlign Software Website. Test Data

Data Logging Software and Cable Bundle Model DL-SC3 User Manual. Overview

Ad Hoc Reporting: Data Export

Transcription:

DIGITAL FORENSIC RESEARCH CONFERENCE Automated Windows Event Log Forensics By Rich Murphey Presented At The Digital Forensic Research Conference DFRWS 2007 USA Pittsburgh, PA (Aug 13 th - 15 th ) DFRWS is dedicated to the sharing of knowledge and ideas about digital forensics research. Ever since it organized the first open workshop devoted to digital forensics in 2001, DFRWS continues to bring academics and practitioners together in an informal environment. As a non-profit, volunteer organization, DFRWS sponsors technical working groups, annual conferences and challenges to help drive the direction of research and development. http:/dfrws.org

Automated Windows event log forensics Case Study Engagement Preliminary Results Final Report Log Analysis Extract Repair Interpret Rich Murphey ACS Extract Repair DFRWS Aug 13, 2007 1

Sponsor: Special Thanks To Digital Forensic Services In-depth Analysis, Testimony Data Recovery Services Complex RAID, Exotic File Systems Technology Consulting Reviewers: Matthew Geiger, CERT Jerlyn Mardis, ACS 2

Forensic Process Models Log Forensics Process Extract Repair Extract Analyze Interpret 3

Forensic Process Models Log Forensics Process Extract Repair Recover: Step 1 Extract Data Carve for Logs, etc. Step 2 Repair and Validate Obtain valid log files. Step 3 time, files, paths, Analyze Interpret 4

Officer/Director calls 1 st Hurdle: Define a Scope Something bad happened. Possible contract violation. Outgoing transfer of proprietary documents. #1: Define a scope of work. Can we identify file transfer? Examine hard drives Email attachments File transfer, uploads Anything else? 5

Good news: We know what to look for. Well defined keywords, file names #2: Preliminary Report D:\OfInterest.doc In unallocated space. 2 nd Hurdle: Preliminary Report Bad News: IT deleted the user profile, and gave laptop to a new employee, six months ago, after they reformatted and reinstalled Windows XP. 6

#2: Preliminary Report Shortcuts D:\OfInterest.doc In unallocated space. Surrounding data looks like a shortcut. Shortcuts contain a snapshot of: MAC timestamps Filename Absolute Path, Relative Path Kind of Device (Hard disk/cd-rom) Partition s Volume Serial Number 7

Shortcuts may contain IDs, label, size Shortcut File Shortcuts A snapshot of file s attributes, media s attributes Link target information Local Path Volume Type Volume Label Volume Serial Number File size Creation time (UTC) Last write time (UTC) Last access time (UTC) File attributes Read-only D:\OfInterest.doc CD-ROM Nov 11 2006 E2C3-F184 1643743 11/11/2006 3:21:14 PM 11/3/2006 10:12:34 AM N/A 8

3 rd Hurdle: Final Report How to identify outgoing file transfer? Data carve for file path, time. Where to find time stamps? Event logs Internet history Shortcuts Registry, and others?... 9

Log Analysis Log recovery process Step 1 Extract Data Carve for Logs, etc. Step 2 Repair Fix corrupt log files. Step 3 Formulate queries for time, names, 10

XP log signature 16 bytes Signatures 30 00 00 00 4c 66 4c 65 01 00 00 00 01 00 00 00 Typical log sizes: 512K on desktops 1MB on servers 11

Using DataLifter: 12

Log Recovery scalpel.conf entry: Extract Repair evt y 1048576 \x30\x00\x00\x00\x4c\x66\x4c\x65 \x01\x00\x00\x00\x01\x00\x00\x00 Step 1 Initial script to recover logs: scalpel /dev/sda1 13

The Results: Step 1 Extract Step 1 Extract evt y 1048576 \x30\x00\x00\x00\x4c\x66\x4c\x65 \x01\x00\x00\x00\x01\x00\x00\x00 % scalpel /dev/sda1 Run DataLifter 100 logs are extracted. Only two are viewable. 98 corrupt logs Step 2 Repair 98 corrupt logs? 14

Windows 2000, XP, 2003 Event Logging Time, SID, Source, Severity, Message windows/system32/config: AppEvent.evt SecEvent.evt SysEvent.evt Internet.evt 15

Repair FixEvt an XP log repair tool Automatically repairs corrupt logs Extract Repair Repairs or identifies known forms of corruption. http://murphey.org In seconds. Steve Bunting's Manual Method http://128.175.24.251/forensics 16

XP event log repair Repair Invalid Header: Trailer with good data: Repaired Header: 17

Available on the web. A 4K command line executable. Extract FixEvt Repair Very simple no install. % fixevt *.evt For each log, FixEvt reports either: 1 - Did not need repair 2 - Was repaired 3 - Cannot be repaired 4 - Might be repaired by another method 18

How the process works Log Analysis Extract Repair Step 1 Extract Run DataLifter 100 logs are extracted. 98 corrupt logs. Step 2 Repair the Logs Manual: 15 minutes/log * 98 Logs = 3 days FixEvt *.evt : 2 seconds. 19

The Results: Extract Results Repair Step 1 Extract 100 logs are extracted. 98 corrupt logs. 2 valid logs Step 2 Repair 50 logs repaired 52 Total logs. scalpel /dev/sda1 fixevt *.evt Step 3 events in 51 logs? 20

LogParser Extract Repair Input: evt, IIS, REG, FS, ADS Output: csv, XML, SQL, HTML Run SQL queries on multiple log files 21

50 logs were repaired. Some are still invalid due to corruption. Tools will not parse a sets containing corrupt logs. Use LogParser to validate the logs. LogParser "select count(*) from log.evt" Returns an error status that indicates parsing errors. Script to extract, repair and validate logs: scalpel /dev/sda1 fixevt *.evt for i in *.evt;do LogParser "select count(*) from $i" \ && cp $i goodlogs; done Result: 46 total valid logs 23 empty, 23 non-empty 87,413 events total 14 months of activity prior to reformatting of the hard drive. Extract Results Repair 22

Step 3 select <columns> from <table> into <output-file> logparser select * from system.evt into excel.csv Reads the log file: system.evt Creates a spreadsheet of comma separated values * selects all columns of data Write Queries for correlating time, name select TimeGenerated, Message from system.evt Output timestamp and full message where TimeGenerated > '2006-11-11 00:00:00' and TimeGenerated < '2006-11-12 00:00:00' Filter a one day period. where Message like %CD Burning% Filters for start, stop, running events 23

SQL queries to identify patterns logparser select TimeGenerated, Message from system.evt where TimeGenerated > '2006-11-11 00:00:00' and TimeGenerated < '2006-11-12 00:00:00 and Message like %CD Burning% Extract Repair Time (UTC) 11/11/2006 15:21 11/11/2006 15:21 11/11/2006 15:22 11/11/2006 15:23 11/11/2006 15:24 11/11/2006 15:25 11/11/2006 15:26 11/11/2006 15:27 11/11/2006 15:27 Message The CD Burning service was successfully sent a start control. The CD Burning service entered the running state. The CD Burning service entered the running state. The CD Burning service entered the running state. The CD Burning service entered the running state. The CD Burning service entered the running state. The CD Burning service entered the running state. The CD Burning service entered the running state. The CD Burning service entered the stopped state. 24

Shortcuts may contain IDs, label, size Shortcut File Shortcuts A snapshot of file s attributes, media s attributes Link target information Local Path Volume Type Volume Label Volume Serial Number File size Creation time (UTC) Last write time (UTC) Last access time (UTC) File attributes Read-only D:\OfInterest.doc CD-ROM Nov 11 2006 E2C3-F184 1643743 11/11/2006 3:21:14 PM 11/3/2006 10:12:34 AM N/A 25

Link target information Local Path Volume Type Volume Label Volume Serial Number File size Creation time (UTC) Last write time (UTC) Last access time (UTC) File attributes Read-only D:\OfInterest.doc CD-ROM Nov 11 2006 E2C3-F184 1643743 11/11/2006 3:21:14 PM 11/3/2006 10:12:34 AM N/A Timestamp Analysis Last write time is earlier than created. Created 11/11/2006 3:21:14 PM Last write 11/3/2006 10:12:34 AM Can indicate the time at which a file was transferred from source media. Can help identify the location of the source media. 26

Correlations indicate A CD-ROM was burned On this system. By account name: Bob At: 11/11/2006 3:21 PM UTC Report Extract Repair The CD media may be identified: Label: Nov 11 2006 Volume serial number: E2C3-F184 The source media may be identified: OfInterest.doc with size = 1643743 bytes, and Last Modified = 11/3/2006 10:12:34 AM UTC 27

Extract Repair Questions? Rich@Murphey.org http://murphey.org http://acsworldwide.com 28