Forensic¶
Malware Scanner¶
- Microsoft Safety Scanner
- MSRT (Windows Malicious Software Removal Tool)
- Trend Micro Anti-Threat Toolkit
- VirusTotal
- nodistribute
Artifact¶
- Sysinternals (
https://live.sysinternals.com/\\live.sysinternals.com\tools\)
File¶
- Disk Forensic
- autopsy
- OSForensic / OSFClone
- FTK Imager
- Sleuth Kit
- Search
CMD$ forfileCMD$ dir /s *filename*SH$ find -name *filename*SH$ find -perm /4000SH$ find -mtime +3
- Directory
C:\$Recycle.Bin
Registry¶
- Query
PS$ dir "Registry::HKLM\"
-
Essential Registry
Path Description HKLM\System\CurrentControlSet\Control\HiveListreg file location {HKLM\|HKCU}\SOFTWARE\WOW6432Noderedirected key {HKLM\|HKCU}\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\{Shell Folders\|User Shell Folders}user shell folders ( shell:<ValueName>)HKCR\{HKLM,HKCU}\Software\ClassesHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution OptionsIFEO controls binary executive behavior
Autorun¶
- Overall
- 🟦 Autoruns (SysinternalsSuite)
-
Startup
- 🟦
RUN$ shell:Startup
🟦RUN$ shell:Common Startup -
🟦
{HKLM|HKCU}\Software[\WOW6432Node]\Microsoft\Windows\CurrentVersion\Run\
🟦{HKLM|HKCU}\Software[\WOW6432Node]\Microsoft\Windows\CurrentVersion\RunOnce\
🟦{HKLM|HKCU}\Software[\WOW6432Node]\Microsoft\Windows\CurrentVersion\RunOnceEx\Can be triggered by
CMD$ RunOnce.exe /explorer. -
🟦
{HKLM|HKCU}\Software[\WOW6432Node]\Microsoft\Windows NT\CurrentVersion\Winlogon\
🟦HKLM\SYSTEM\CurrentControlSet\Control\Print\Monitors\ - 🐧
/etc/profile - Service
- 🟦
HKLM\SYSTEM\CurrentControlSet\Services\
🟦HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\ - Scheduled Task
- 🟦
CMD$ taskschd.msc
🟦$ schtasks /query /FO list /V - 🟦
%SystemRoot%\{System32|SysWOW64}\Tasks\
🟦%SystemRoot%\Tasks\ - 🟦
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\Taskcache\Tasks\
🟦HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\Taskcache\Tree\ - 🐧
/etc/crontab
🐧/etc/cron.d/
- 🟦
-
GPO
Process¶
- Process List
$ tasklist$ wmic process$ Get-CimInstance -ClassName Win32_Process
- Advanced Tool
- Process Monitor (SysinternalsSuite)
- Process Explorer (SysinternalsSuite)
- Task Explorer (ExplorerSuite)
- Driver List (ExplorerSuite)
- WinObj (SysinternalsSuite)
- pspy
Network¶
- Wireshark
- FakeNet-NG
Memory¶
- Dumpit
- Volatility Workbench
Logs¶
Windows Event¶
- Event Log File
%SystemRoot%\System32\winevt\Logs\
-
Event List
PS# Get-WinEvent -ListProvider * -Erroraction Silentlycontinue | Select ProviderName -ExpandProperty Events | Select * -ExpandProperty LogLink | Format-Table LogName,ProviderName,Version,ID,Description -
Event Filter
Get-EventLogGet-WinEvent -Path C:\Windows\System32\Winevt\Logs\System.evtx Get-WinEvent -ListLog * Get-WinEvent -ListLog System | Format-List -Property * (Get-WinEvent -ListLog *).ProviderNames (Get-WinEvent -ListProvider *).Events | Format-Table Id, Description -
Channel
-
Sysmon
-