Forensic Investigation of Malware – What’s going on Behind the Scenes

Home > Blogs > Security > Forensic Investigation of Malware – What’s going on Behind the Scenes

Forensic Investigation of Malware – What’s going on Behind the Scenes

Like This Blog 0 Mike Danseglio
Added by August 7, 2015

This post is an excerpt from a previous webinar – Live Detailed Forensic Investigation of Malware Infection with Mike Danseglio. April 21, 2015.

Security-webinar-blowtorch-thumbnail

You can watch the replay of this webinar on our website Detailed Forensic Investigation of Malware Infections.


In this webinar, Mike Danseglio setup three computers with a fresh installation of Windows 7, each with their own user scenarios to convey how easy it is to accidently install malware on their system.

During the webinar, Mike answered participants question and provided some step-by-step methods people can take to identify if they have malware on their computers.

This post begins at approximately 34 minutes into the webinar.


After malware has infected a system, how can we see what’s going on behind the scenes?

Mike Danseglio: All right. I took the liberty bringing up this particular Task Manager.

001-Forensic-Investigation-of-Malware

I actually added the Command Line column to Task Manager because I wanted to see where all of this malware is launching from.

002-Forensic-Investigation-of-Malware

You’ll notice that we’ve actually got a bunch of different software launching from different locations.

Program Files is typically where apps install but apps install based on the “honor system” most of the time. They don’t have to install in Program Files.

This app, the third one down, “node.exe” did not install in Program Files.

003-Forensic-Investigation-of-Malware

It actually installed under the User Profile. It actually installed under the Admin User Profile. It’s the OkayFreedom application and it’s an executable is called, “node.exe.”

004-Forensic-Investigation-of-Malware

We’ve actually got a bunch of different apps here.

My favorite technique for using this particular window of Task Manager in malware forensics is actually to just sort by command line. Why? Because anything that’s generally (generally but not universally) that’s in Windows is probably going to be something I want to have. It’s less interesting to me. It’s not immune or perfect, but less interesting to me.

005-Forensic-Investigation-of-Malware

Anything above that, anything that’s loading at a Program Files, x86 or Program Files, which, if you have a 32‑bit system, you won’t see x86, you will just see them all as Program Files. Anything that’s loading in Program Files are all suspect. These are all things that loaded up. I haven’t done anything since the machine booted. These are all things that loaded at boot time and are running currently.

I can immediately see that I don’t want most of the stuff that is up here.

007-Forensic-Investigation-of-Malware

There’s even a USTechSupport/PC Optimizer. I haven’t even got it into the fact that there’s a live tech support thing going on in the machine.

008-Forensic-Investigation-of-Malware

Let’s look at killing one of these. You may think, “Well, I can remediate that. I’ll just kill the process….” It’s not that simple. Let’s get rid of GeekBuddy.

009-Forensic-Investigation-of-Malware

Let’s get rid of Driver Update.

010-Forensic-Investigation-of-Malware

Wait, I thought I got rid of GeekBuddy. Hold on. Let me right click it again and choose, “End Process.”

011-Forensic-Investigation-of-Malware

I could have sworn that I just got rid of GeekBuddy like 10 seconds ago. What an interesting coincidence that it has launched itself again, and again, and again, and again, and again.

012-Forensic-Investigation-of-Malware

There’s GeekBuddy reminding me that it launches itself. It’s taunting me, teasing me.

013-Forensic-Investigation-of-Malware

How does that happen?

How does this app keep getting killed and then launching itself? There’s a bunch of different ways that software can actually hook itself. It could be a restart on crash service. It can actually be a scheduler thing. It could be a separate process that’s watching for the existence of GeekBuddy as a process or a service, and if it’s failed, will re‑launch it automatically.

There’s a bunch of places in the registry that we can actually hide entries that will tell Windows, “This thing has to be running all the time, and if it isn’t, launch it again.” We can tell Windows to do that, or the software can manually do it, or both. I would wager since GeekBuddy is so persistent and so quick, it’s probably doing both.

We can try to kill these things. Actually, the hallmark of malware, typically, is the fact that it likes to be persistent. It likes to come back to itself over and over and over again. Is that bad? Yeah, that’s actually really, really, really bad.

How does malware disable anti‑malware software?

Windows is a layered modular operating system. We have the Win 32 apps. The typical 32‑64 bit apps that run up here.

014-Forensic-Investigation-of-Malware

We have some other modules that sit down here.

015-Forensic-Investigation-of-Malware

Then, we have User Mode and Kernel Mode.

016-Forensic-Investigation-of-Malware

Here in the Kernel we actually have services, like Service Control Manager (CTRLMGR), File System, GDI, the graphics display and a bunch of IO, etc…..

017-Forensic-Investigation-of-Malware

Under that, we have Kernel and the Hardware Abstraction Layer (HAL).

Finally we have the actual hardware.

This is not a perfect description, but this is good enough for this conversation.

018-Forensic-Investigation-of-Malware

Everything above the hardware layer is software, everything.

If you’ve got a malware scanner running here…

Let’s say you have, at this layer, you’ve actually got Semantic running up here as a Win 32 app or as something that plugs directly into Win 32.

019-symantic-Forensic-Investigation-of-Malware

If the malware plugs in down here, let’s say as a service.

020-symantic-Forensic-Investigation-of-Malware

As a Kernel Mode Service, the malware can actually affect anything higher up on the stack than itself. It can actually either fool Symantic, and tell it “there’s no malware here”. Everything is a notepad text document with ‘hello’ as the only content,” or it can actually kill processes and services that are running above it.

The question is how deep did the malware infect the system? The deeper it gets infected, the harder it is to remove, the harder it is write, and the easier it is to actually fool the anti‑malware software or uninstall it, or disable it entirely.

You can watch the replay of this webinar at Detailed Forensic Investigation of Malware Infections..


Mike Danseglio – CISSP, MCSE, and CEH

Mike Danseglio teaches IT Security Training, Windows, System Center and Windows Server 2012 classes at Interface Technical Training. His classes are available in Phoenix, AZ and online with RemoteLive™.

 

 

Videos You May Like

A Simple Introduction to Cisco CML2

0 3901 0

Mark Jacob, Cisco Instructor, presents an introduction to Cisco Modeling Labs 2.0 or CML2.0, an upgrade to Cisco’s VIRL Personal Edition. Mark demonstrates Terminal Emulator access to console, as well as console access from within the CML2.0 product. Hello, I’m Mark Jacob, a Cisco Instructor and Network Instructor at Interface Technical Training. I’ve been using … Continue reading A Simple Introduction to Cisco CML2

Creating Dynamic DNS in Network Environments

0 645 1

This content is from our CompTIA Network + Video Certification Training Course. Start training today! In this video, CompTIA Network + instructor Rick Trader teaches how to create Dynamic DNS zones in Network Environments. Video Transcription: Now that we’ve installed DNS, we’ve created our DNS zones, the next step is now, how do we produce those … Continue reading Creating Dynamic DNS in Network Environments

Cable Testers and How to Use them in Network Environments

0 732 1

This content is from our CompTIA Network + Video Certification Training Course. Start training today! In this video, CompTIA Network + instructor Rick Trader demonstrates how to use cable testers in network environments. Let’s look at some tools that we can use to test our different cables in our environment. Cable Testers Properly Wired Connectivity … Continue reading Cable Testers and How to Use them in Network Environments

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.