Acknowledgments |
|
xv | |
About the Authors |
|
xvii | |
About the Technical Editor |
|
xxi | |
Introduction |
|
xxiii | |
1 Malware Incident Response |
|
|
|
2 | (2) |
|
Local versus Remote Collection |
|
|
3 | (1) |
|
Volatile Data Collection Methodology |
|
|
4 | (14) |
|
Preservation of Volatile Data |
|
|
4 | (1) |
|
Physical Memory Acquisition on a Live Windows System |
|
|
5 | (1) |
|
Acquiring Physical Memory Locally |
|
|
6 | (1) |
|
GUI-based Memory Dumping Tools |
|
|
7 | (1) |
|
Remote Physical Memory Acquisition |
|
|
8 | (3) |
|
Collecting Subject System Details |
|
|
11 | (2) |
|
Identifying Users Logged into the System |
|
|
13 | (5) |
|
Collecting Process Information |
|
|
18 | (4) |
|
Process Name and Process Identification |
|
|
18 | (1) |
|
Process to Executable Program Mapping: Full System Path to Executable File |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
20 | (1) |
|
Dependencies Loaded by Running Processes |
|
|
21 | (1) |
|
Correlate Open Ports with Running Processes and Programs |
|
|
22 | (6) |
|
Identifying Services and Drivers |
|
|
23 | (1) |
|
Examining Running Services |
|
|
24 | (1) |
|
Examining Installed Drivers |
|
|
24 | (1) |
|
|
25 | (1) |
|
Identifying Files Opened Locally |
|
|
25 | (1) |
|
Identifying Files Opened Remotely |
|
|
25 | (1) |
|
Collecting Command History |
|
|
26 | (1) |
|
|
26 | (1) |
|
Determining Scheduled Tasks |
|
|
27 | (1) |
|
Collecting Clipboard Contents |
|
|
27 | (1) |
|
Non-Volatile Data Collection from a Live Windows System |
|
|
28 | (14) |
|
Forensic Duplication of Storage Media on a Live Windows System |
|
|
29 | (1) |
|
Forensic Preservation of Select Data on a Live Windows System |
|
|
29 | (1) |
|
Assess Security Configuration |
|
|
30 | (1) |
|
Assess Trusted Host Relationships |
|
|
30 | (1) |
|
|
31 | (1) |
|
Inspect Auto-starting Locations |
|
|
31 | (1) |
|
|
32 | (1) |
|
|
33 | (1) |
|
Review User Account and Group Policy Information |
|
|
33 | (1) |
|
|
33 | (1) |
|
Dumping and Parsing Registry Contents |
|
|
34 | (1) |
|
|
35 | (2) |
|
Examine Web Browsing Activities |
|
|
37 | (1) |
|
|
38 | (1) |
|
Inspect Protected Storage |
|
|
38 | (1) |
|
Malware Artifact Discovery and Extraction from a Live Windows System |
|
|
39 | (1) |
|
Extracting Suspicious Files |
|
|
39 | (2) |
|
Extracting Suspicious Files with F-Response |
|
|
41 | (1) |
|
|
42 | (1) |
|
|
43 | (19) |
|
Incident Response Tool Suites |
|
|
62 | (6) |
|
|
68 | (3) |
|
Volatile Data Collection and Analysis Tools |
|
|
71 | (1) |
|
Physical Memory Acquisition |
|
|
71 | (4) |
|
Collecting Subject System Details |
|
|
75 | (1) |
|
Identifying Users Logged into the System |
|
|
75 | (1) |
|
Network Connections and Activity |
|
|
76 | (3) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
Correlate Open Ports with Running Processes and Programs |
|
|
81 | (1) |
|
|
81 | (1) |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
82 | (1) |
|
Determining Scheduled Tasks |
|
|
83 | (1) |
|
|
83 | (1) |
|
Non-Volatile Data Collection and Analysis Tools |
|
|
84 | (1) |
|
System Security Configuration |
|
|
84 | (1) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
File System: Hidden Files and Alternate Data Streams |
|
|
86 | (2) |
|
Dumping and Parsing Registry Contents |
|
|
88 | (1) |
|
|
88 | (1) |
|
|
89 | (2) |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
91 | (1) |
|
Jurisprudence/RFCs/Technical Specifications |
|
|
91 | (2) |
2 Memory Forensics |
|
|
|
93 | (1) |
|
Investigative Considerations |
|
|
94 | (1) |
|
Memory Forensics Overview |
|
|
94 | (4) |
|
Old School Memory Analysis |
|
|
96 | (2) |
|
How Windows Memory Forensic Tools Work |
|
|
98 | (1) |
|
Windows Memory Forensic Tools |
|
|
98 | (20) |
|
|
99 | (7) |
|
|
106 | (3) |
|
|
109 | (3) |
|
|
112 | (6) |
|
Dumping Windows Process Memory |
|
|
118 | (3) |
|
Recovering Executable Files |
|
|
118 | (1) |
|
Recovering Process Memory |
|
|
119 | (1) |
|
Extracting Process Memory on Live Systems |
|
|
120 | (1) |
|
Dissecting Windows Process Memory |
|
|
121 | (5) |
|
|
126 | (1) |
|
|
127 | (1) |
|
Memory Forensics: Field Notes |
|
|
128 | (26) |
|
|
154 | (1) |
|
|
154 | (1) |
|
|
154 | (1) |
|
Jurisprudence/RFCs/Technical Specifications |
|
|
154 | (1) |
3 Post-Mortem Forensics |
|
|
|
155 | (1) |
|
Windows Forensic Analysis Overview |
|
|
156 | (3) |
|
Malware Discovery and Extraction from Windows Systems |
|
|
159 | (10) |
|
|
159 | (2) |
|
Survey Installed Programs |
|
|
161 | (2) |
|
|
163 | (1) |
|
|
164 | (1) |
|
Inspect Services, Drivers, Auto-starting Locations, and Scheduled Jobs |
|
|
165 | (1) |
|
|
166 | (2) |
|
Review User Accounts and Logon Activities |
|
|
168 | (1) |
|
Examine Windows File System |
|
|
169 | (1) |
|
|
170 | (2) |
|
|
171 | (1) |
|
|
172 | (1) |
|
Forensic Reconstruction of Compromised Windows Systems |
|
|
173 | (1) |
|
Advanced Malware Discovery and Extraction from a Windows System |
|
|
174 | (1) |
|
|
175 | (1) |
|
|
176 | (1) |
|
Windows System Examination: Field Notes |
|
|
177 | (8) |
|
Mounting Forensic Duplicates |
|
|
185 | (2) |
|
Forensic Examination of Window Systems |
|
|
187 | (3) |
|
|
190 | (2) |
|
Forensic Examination of Common Sources of Information on Windows Systems |
|
|
192 | (10) |
|
|
202 | (2) |
|
|
202 | (1) |
|
|
202 | (2) |
4 Legal Considerations |
|
|
|
204 | (1) |
|
|
204 | (1) |
|
|
204 | (1) |
|
Sources of Investigative Authority |
|
|
205 | (5) |
|
|
205 | (3) |
|
|
208 | (1) |
|
Statutory/Public Authority |
|
|
209 | (1) |
|
Statutory Limits on Authority |
|
|
210 | (8) |
|
|
210 | (1) |
|
|
211 | (2) |
|
|
213 | (5) |
|
|
218 | (4) |
|
|
219 | (1) |
|
|
219 | (1) |
|
|
220 | (2) |
|
Acquiring Data across Borders |
|
|
222 | (4) |
|
Workplace Data in Private or Civil Inquiries |
|
|
222 | (2) |
|
Workplace Data in Government or Criminal Inquiries |
|
|
224 | (2) |
|
Involving Law Enforcement |
|
|
226 | (3) |
|
|
226 | (1) |
|
|
227 | (1) |
|
The Law Enforcement Perspective |
|
|
227 | (1) |
|
|
228 | (1) |
|
Improving Chances for Admissibility |
|
|
229 | (2) |
|
|
229 | (1) |
|
|
229 | (1) |
|
|
230 | (1) |
|
State Private Investigator and Breach Notification Statutes |
|
|
231 | (2) |
|
|
233 | (1) |
|
Cross-Border Investigations |
|
|
233 | (1) |
|
The Federal Rules: Evidence for Digital Investigators |
|
|
234 | (3) |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
235 | (1) |
|
Limitations on Waiver of the Attorney-Client Privilege |
|
|
235 | (2) |
5 File Identification and Profiling |
|
|
|
237 | (1) |
|
Overview of the File Profiling Process |
|
|
238 | (7) |
|
Profiling a Suspicious File |
|
|
240 | (3) |
|
Command-Line Interface MD5 Tools |
|
|
243 | (1) |
|
|
243 | (2) |
|
|
245 | (1) |
|
|
246 | (21) |
|
File Signature Identification and Classification |
|
|
247 | (1) |
|
|
247 | (1) |
|
File Signature Identification and Classification Tools |
|
|
248 | (3) |
|
|
251 | (1) |
|
Web-based Malware Scanning Services |
|
|
252 | (3) |
|
Embedded Artifact Extraction: Strings, Symbolic Information, and File Metadata |
|
|
255 | (1) |
|
|
255 | (4) |
|
Inspecting File Dependencies: Dynamic or Static Linking |
|
|
259 | (2) |
|
Symbolic and Debug Information |
|
|
261 | (1) |
|
|
261 | (6) |
|
File Obfuscation: Packing and Encryption Identification |
|
|
267 | (14) |
|
|
267 | (2) |
|
|
269 | (3) |
|
Binders, Joiners, and Wrappers |
|
|
272 | (1) |
|
Embedded Artifact Extraction Revisited |
|
|
272 | (1) |
|
Windows Portable Executable File Format |
|
|
272 | (9) |
|
Profiling Suspect Document Files |
|
|
281 | (30) |
|
Profiling Adobe Portable Document Format (PDF) Files |
|
|
282 | (1) |
|
|
282 | (3) |
|
PDF Profiling Process: CLI Tools |
|
|
285 | (7) |
|
PDF Profiling Process: GUI Tools |
|
|
292 | (3) |
|
Profiling Microsoft (MS) Office Files |
|
|
295 | (1) |
|
Microsoft Office Documents: Word, PowerPoint, Excel |
|
|
295 | (1) |
|
MS Office Documents: File Format |
|
|
295 | (3) |
|
MS Office Documents: Vulnerabilities and Exploits |
|
|
298 | (1) |
|
MS Office Document Profiling Process |
|
|
298 | (3) |
|
Deeper Profiling with OfficeMalScanner |
|
|
301 | (7) |
|
Profiling Microsoft Compiled HTML Help Files (CHM) |
|
|
308 | (1) |
|
|
308 | (3) |
|
|
311 | (2) |
|
|
313 | (4) |
|
|
317 | (1) |
|
|
317 | (1) |
|
|
317 | (1) |
|
|
318 | (45) |
6 Analysis of a Malware Specimen |
|
|
|
363 | (1) |
|
|
364 | (1) |
|
Guidelines for Examining a Malicious File Specimen |
|
|
365 | (1) |
|
Establishing the Environment Baseline |
|
|
365 | (4) |
|
|
366 | (1) |
|
|
366 | (1) |
|
|
367 | (2) |
|
Pre-Execution Preparation: System and Network Monitoring |
|
|
369 | (11) |
|
Passive System and Network Monitoring |
|
|
370 | (1) |
|
Active System and Network Monitoring |
|
|
371 | (9) |
|
Execution Artifact Capture: Digital Impression and Trace Evidence |
|
|
380 | (5) |
|
|
380 | (1) |
|
|
380 | (1) |
|
Digital Impression Evidence |
|
|
380 | (1) |
|
|
381 | (4) |
|
Executing the Malicious Code Specimen |
|
|
385 | (1) |
|
Execution Trajectory Analysis: Observing Network, Process, Api, File System, and Registry Activity |
|
|
386 | (11) |
|
Network Activity: Network Trajectory, Impression, and Trace Evidence |
|
|
386 | (2) |
|
Environment Emulation and Adjustment: Network Trajectory Reconstruction |
|
|
388 | (1) |
|
Network Trajectory Reconstruction: Chaining |
|
|
389 | (1) |
|
Network Impression and Trace Evidence |
|
|
390 | (1) |
|
|
391 | (2) |
|
Examining Process Activity |
|
|
393 | (1) |
|
Process Spying: Monitoring API Calls |
|
|
394 | (1) |
|
"Peeping Tom": Window Spying |
|
|
395 | (1) |
|
Examining File System Activity |
|
|
396 | (1) |
|
Examining Registry Activity |
|
|
397 | (1) |
|
Automated Malware Analysis Frameworks |
|
|
397 | (3) |
|
Online Malware Analysis Sandboxes |
|
|
400 | (2) |
|
|
402 | (10) |
|
|
403 | (1) |
|
Dumping a Suspect Process from Memory |
|
|
404 | (2) |
|
Locating the OEP and Extracting with OllyDump |
|
|
406 | (5) |
|
Reconstructing the Imports |
|
|
411 | (1) |
|
Embedded Artifact Extraction Revisited |
|
|
412 | (10) |
|
Examining the Suspect Program in a Disassembler |
|
|
413 | (3) |
|
Advanced PE Analysis: Examining PE Resources and Dependencies |
|
|
416 | (6) |
|
Interacting with and Manipulating the Malware Specimen: Exploring and Verifying Functionality and Purpose |
|
|
422 | (4) |
|
|
422 | (2) |
|
|
424 | (1) |
|
|
425 | (1) |
|
Event Reconstruction and Artifact Review: Post-Run Data Analysis |
|
|
426 | (6) |
|
Passive Monitoring Artifacts |
|
|
427 | (2) |
|
Active Monitoring Artifacts |
|
|
429 | (1) |
|
Analyzing Captured Network Traffic |
|
|
430 | (1) |
|
|
431 | (1) |
|
Physical Memory Artifacts |
|
|
432 | (1) |
|
Digital Virology: Advanced Profiling Through Malware Taxonomy and Phylogeny |
|
|
432 | (17) |
|
Context Triggered Piecewise Hashing |
|
|
435 | (1) |
|
Textual and Binary Indicators of Likeness |
|
|
435 | (4) |
|
|
439 | (3) |
|
Process Memory Trajectory Analysis |
|
|
442 | (2) |
|
|
444 | (2) |
|
Behavioral Profiling and Classification |
|
|
446 | (3) |
|
|
449 | (1) |
|
|
450 | (4) |
|
|
454 | (51) |
|
|
454 | (1) |
|
|
454 | (51) |
Index |
|
505 | |