Top Banner
Registry Analysis • Using regedit.exe – System Information – Autostart locations – USB Removable Storage Devices – Mounted Devices – Finding Users – User Activity – Restore Points
35

Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

Dec 19, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

Registry Analysis

• Using regedit.exe– System Information– Autostart locations– USB Removable Storage Devices– Mounted Devices– Finding Users– User Activity– Restore Points

Page 2: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

System Information

• Located in the Current Control Set

• If the systemm is not active must find the Control Set that was current

• Time zone

• Shares

• Audit policy

• Wireless SSIDs

Page 3: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

Current Control Set• CurrentControlSet is a volatile portion of the Registry

• Which of the 2 or more Control Sets are Current

• The following indicate that #1 is current

Page 4: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

Time Zone Information

• SYSTEM\ControlSet001\Control\TimeZoneInformation

Page 5: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

Computer Name

HKLM\SYSTEM\ControlSet001\Control\ComputerName\ComputerName

Page 6: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

Shutdown TimeHKLM\SYSTEM\CurrentControlSet\Control\WindowsHKLM\SYSTEM\ControlSet001\Control\Windows

Time is measured in the number of 100-nanosecond intervals since 1 January 1601.

Page 7: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

Shares

• Windows 2K, XP, 2003, and Vista create a number of administrative shares– IPC$ - IPC share– ADMIN$ - shares that refer to the root of dirves

C$, D$, etc.

• User enabled shares show up in

HKLM\SYSTEM\CurrentControlSet\Servicecs\lanmanserver\Shares

Page 8: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

Wireless SSIDs

• XP Laptops maintain a list of service set IDs

• The GUID is associated with the wireless interface

• Under the Static#000x lists all of the SSIDs connected

Page 9: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

SSIDsA different Static#000x for each SSID ever connected to.

Page 10: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

SSID Registry Entry

At offset 0x10 is a DWORD (4 bytes) that contains the length of the SSID, remember little endian.“0b 00 00 00” = 0x 00 00 00 0b = 1110

SSID Length SSID

Page 11: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

Autostarts

• Applications that are launched without any interaction from the user

• Often at boot time

• Occasionally upon launch of a app.

Page 12: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

Autostart Locations

• Auto-start extensibility points (ASEPs)

• Registry locations• HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

• HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

• And elsewhere

• All over the place

Page 13: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

Autostart Locations• Start -> run -> msconfig

• Lists some of the acknowledge startups

Page 14: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

Startup Locations

Page 15: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

Other Startup Locations

• System boot

• User Login

• User Activity

• See Carvey’s Ch4 spreadsheet for more locations

Page 16: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

System boot

• Startup services at boot time are contained in

• HKLM\SYSTEM\CurrentControlSet\Services

• The services are enumerated with parameters

• Should be sorted by LastWriteTime

• Only possible in FTK or ProDiscover

Page 17: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

ControlSet\Services

Page 18: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

Boot Time AppsStart value = 2, the app starts on boot time. Star value != 2 starts on user logon

Page 19: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

Evil Start Time Services

• Generally LastWrite times should be about the same time the system was built.

• Later dates would suggest that an intruder of sysadmin was altering the boot time sequence

Page 20: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

User Login

• Startup Keys are parsed in order when a user logs in:1. HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce

2. HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run

3. HKLM\Software\Microsoft\Windows\CurrentVersion\Run

4. HKCU\Software\Microsoft\WindowsNT\CurrentVersion\Windows\Run

5. HKCU\Software\Microsoft\Windows\CurrentVersion\Windows\Run

6. HKCU\Software\Microsoft\Windows\CurrentVersion\Windows\RunOnce

• The run keys are ignored if started in Safe Mode

Page 21: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

#3 On the Startup List

Page 22: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

User Activity

• On user action certain registry keys are accessed

• Keys for other Classes of files control what happens when that file is opened

• Or when the file is double-clicked

Page 23: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

Example

• Go to:HKLM\Software\Microsoft\CommandProcessor\AutoRun

Right click on AutoRun

Select Modify

Enter sol.exe in the Value data: field.

Start -> run -> cmd.exe

• This is the how one can modify application behavior

• Used by much malware to launch backdoors or an IRCbot

Page 24: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

AutoRuns from Sysinternals

Page 25: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

Hijacked App

Page 26: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

USB Devices

• Tracking USB devices• When mounted on Windows they leave

• Footprints in the Registry

• Artifacts in the setupapi.log file

• The PnP Manager queries the device descriptor• Located in the thumb drive’s firmware

• Log updated

• Creates a Registry Key inHKLM\System\CurrentControlSet\Enum\USBSTOR

Page 27: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

USBSTOR Key

Page 28: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

Device Held IDCdRom&Ven_SanDisk&Prod_U3_Cruzer_Micro&Rev_6.61

Manufacturer Model Version

Device class IDUnique Instance IDSerial Number

Page 29: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

System Created KeyDisk&Ven_JMTek&Prod_USBDrive&Rev_7.77

Manufacturer Model Version

Device class ID

Unique Instance IDNo Serial NumberMade up by system

Page 30: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

Device Information

• HKLM\SYSTEM\MountedDevices

• List of recently Mounted Devices• Look down the list for \DosDevices\

• The REG_BINARY data field should start with5C 00 3F00 3F 00

• To find which device this is right click on the device

• Select Modify

Page 31: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

USBSTOREParentIdPrefixUnique Instance ID

Serial Number

Page 32: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

USB Devices Tracking

• By correlating ParentIdPrefix form Mounted devices and USBSTORE one can generate a timeline

• CurrentUser\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2

• May give more information

Page 33: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

Mounted Devices

Page 34: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

Binary Data in \DosDevices\G:

ParentIdPrefix matches the Kingston Traveler in the USBSTORE key

Page 35: Registry Analysis Using regedit.exe –System Information –Autostart locations –USB Removable Storage Devices –Mounted Devices –Finding Users –User Activity.

Research Topic

• USB devices• Some USB Devices have a Device ID, others do not

• Some generate a ParentIdPrefix others do not

• Some Correlate to the MountedDevices ID others do not

• Sort it out

• Use references to the the Microsoft Knowledge Base