Mark930.k
Nightcrawler
Mark930.k
์ „์ฒด ๋ฐฉ๋ฌธ์ž
์˜ค๋Š˜
์–ด์ œ
  • ๐Ÿ“š WWW (102)
    • ๐Ÿ–ฅํ•˜๋“œ์›จ์–ด (1)
    • โšก๋„คํŠธ์›Œํฌ (38)
      • Amazon AWS (5)
      • OSI 7 Layer (1)
      • ๋„คํŠธ์›Œํฌ ๊ธฐ์ดˆ (2)
      • Linux (2)
    • ๐Ÿ’ป๋ชจ์˜ํ•ดํ‚น (9)
      • Android (1)
      • Microsoft (7)
      • Linux (0)
      • ์นจํ•ด๋Œ€์‘ (1)
    • ๐Ÿง๋ฆฌ๋ˆ…์Šค (0)
    • ๐Ÿ‹๏ธ‍โ™‚๏ธ์šด๋™ (7)
      • ํ—ฌ์Šค ๋ฃจํ‹ด (6)
    • ๐ŸŽ๏ธ์ž๋™์ฐจ (1)
      • BMW (1)
    • ๊ธฐํƒ€ (13)
      • NetScaler ์—…๋ฌด ํŽ˜์ด์ง€ (8)
    • ๐Ÿ“–๋…์„œ (1)
      • ๊ฒฝ์ œ (1)

๋ธ”๋กœ๊ทธ ๋ฉ”๋‰ด

    ๊ณต์ง€์‚ฌํ•ญ

    ์ธ๊ธฐ ๊ธ€

    ํƒœ๊ทธ

    • ๋„คํŠธ์›Œํฌ
    • ์›น์œ„๋ณ€์กฐ
    • Python test
    • python
    • ํ•ดํ‚น
    • Security
    • CVE-2022-30190
    • ๋ณด์•ˆ
    • ์œ„๋ณ€์กฐ
    • ์ •๋ณด๋ณด์•ˆ
    • zeroday

    ์ตœ๊ทผ ๋Œ“๊ธ€

    ์ตœ๊ทผ ๊ธ€

    ํ‹ฐ์Šคํ† ๋ฆฌ

    hELLO ยท Designed By ์ •์ƒ์šฐ.
    Mark930.k

    Nightcrawler

    Windows ์นจํ•ด ๋Œ€์‘ ๋ฐ ๋ถ„์„ ๊ธฐ๋ฒ• ( ๊ธˆ์œต๋ณด์•ˆ์› ๊ต์œก )
    ๐Ÿ’ป๋ชจ์˜ํ•ดํ‚น/Microsoft

    Windows ์นจํ•ด ๋Œ€์‘ ๋ฐ ๋ถ„์„ ๊ธฐ๋ฒ• ( ๊ธˆ์œต๋ณด์•ˆ์› ๊ต์œก )

    2022. 6. 22. 16:51

     

    ๊ณผ๊ฑฐ์˜ ๊ณต๊ฒฉ์–‘์ƒ (์•ฝ.. 10๋…„์ „..?) exe ๋˜๋Š” dll ํ™•์žฅ์ž ํŒŒ์ผ์„ ํ†ตํ•ด ํ•จ์ˆ˜ ํ˜ธ์ถœ ๋ณ€์ˆ˜๋ฅผ ํ†ตํ•œ C&C์—์„œ๋กœ์˜ ๊ณต๊ฒฉ์„ ๊ฐํ–‰ํ•จ
    ํ•˜์ง€๋งŒ ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค์—์„œ ๋‹ค ๊ฒ€์ถœ๋˜๊ธฐ์— ํ˜„์žฌ๋Š” ์ด๋Ÿฐ ์žฌ๋ž˜์‹ ํ˜•ํƒœ๋กœ ๊ณต๊ฒฉ์„ ๊ฐํ–‰ํ•˜์ง€ ์•Š์Œ.

     

    ๊ทธ๋ž˜์„œ LotL(Living of the Land) ๊ณต๊ฒฉ๊ธฐ๋ฒ• --> ๊ธฐ์กด์˜ ์žˆ๋Š” ์‹œ๋ฃŒ๋“ค์„ ํ†ตํ•ด ๊ณต๊ฒฉ์„ ๊ฐํ–‰ํ•˜๋Š” ๊ธฐ๋ฒ•


    wscrpite.exe, certutil.exe ๋“ฑ ๊ธฐ์กด์˜ Windows Built in ์„ค์น˜ ํŒŒ์ผ์„ ํ†ตํ•œ ๊ณต๊ฒฉ ๊ฐํ–‰ ํ˜•ํƒœ๋กœ ์–‘์ƒ ๋ณ€ํ˜•

    ์ตœ๊ทผ ๊ณต๊ฒฉ ํ˜•ํƒœ์˜ ์–‘์ƒ


    1.์•…์„ฑ ๋ฌธ์„œ ํŒŒ์ผ ์ƒ์„ฑ
    2.๊ณต๊ฒฉ์ž๋Š” Victim PC ์— ์•…์„ฑ๋ฌธ์„œ ์ „๋‹ฌ
    3. maleware.hwp ๋ฌธ์„œํŒŒ์ผ ํ†ตํ•ด ํ•œ๊ธ€ ์˜คํ”ผ์Šค ํ”„๋กœ๊ทธ๋žจ ์‹คํ–‰๋จ

     

        maleware.hwp ์‹คํ–‰ ์‹œ,

        ์œ ๊ด€๋œ dll ํŒŒ์ผ์„ ๋ฉ”๋ชจ๋ฆฌ์— ์ ์žฌํ•จ (๋ฌด์ˆ˜ํžˆ ๋งŽ์€ dll ์„ ํ˜ธ์ถœํ•˜๋ฉฐ ํ”„๋กœ์„ธ์‹ฑ์„ ํ•จ)


    ์ด ์‹œ์ ์—์„œ dllํŒŒ์ผ์„ ํ˜ธ์ถœํ•˜๋Š”๊ฒŒ ์•„๋‹Œ ๊ฑด๋„ˆ๋›ฐ๊ณ  ๋‹ค๋ฅธ ๋ฉ”๋ชจ๋ฆฌ ์˜์—ญ์„ ํ†ตํ•ด Powershell ํ˜ธ์ถœํ•จ

     

    โ€ป ๊ฐ€์ƒ ๋ฉ”๋ชจ๋ฆฌ ๊ณต๊ฐ„
        ( ์ปค๋„ ๋ฉ”๋ชจ๋ฆฌ - ์ฃผ์š” ์ž๋ฃŒ ์˜์—ญ๊ตฌ์—ญ / ์œ ์ € ๋ฉ”๋ชจ๋ฆฌ ์˜์—ญ - ๊ฐ๊ฐ์˜ ํ”„๋กœ์„ธ์Šค๋“ค์ด ๊ฐ€์ƒ์˜ ๊ฒฉ๋ฆฌ๋œ ์˜์—ญ์„ ๊ฐ–์Œ )
        ๋ฉ”๋ชจ๋ฆฌ๊ฐ€ ํ—ˆ์šฉํ•˜๋Š” ๋งŒํผ ๊ฐ€์ƒ์˜ ๋ฉ”๋ชจ๋ฆฌ ๊ณต๊ฐ„์„ ๊ฐ€์ง

     

    ํ•ด๋‹น๋ฌธ์„œ์˜ ๋‚ด๋ถ€์—๋Š” ์‰˜์ฝ”๋“œ(์•…์„ฑ์ฝ”๋“œ)๊ฐ€ ์‚ฝ์ž…๋˜์–ด ๊ณต๊ฒฉ์ž์˜ C&C ์„œ๋ฒ„์™€ ํ†ต์‹ ํ•˜๋ฉฐ ๊ณต๊ฒฉ์ž์˜ ํ๋ฆ„๋Œ€๋กœ ์›€์ง์ž„.

    ๊ณต๊ฒฉ์ž์ฝ”๋“œ : ์ธํ„ฐ๋„ท ๊ฒฝ๋กœ์˜ ์–ด๋””์–ด๋””๋กœ๊ฐ€๋ฉด script๊ฐ€ ์žˆ์–ด ๊ทธ๊ฑธ ํ˜ธ์ถœํ•ด

     

    ์ •์ƒ์ ์ธ ํ”„๋กœ์„ธ์Šค explore.exe ์• ๋“คํ•œํ…Œ code injection์„ ์‹ค์‹œ
    ๋‹ค๋ฅธ ํ”„๋กœ์„ธ์Šค์˜ ๋ฉ”๋ชจ๋ฆฌ์ƒ์—๋‹ค๊ฐ€ ์•…์„ฑํ”„๋กœ์„ธ์Šค๋ฅผ ์ฃผ์ž…
    ๊ทธ๋Ÿผ ์•…์„ฑํ”„๋กœ์„ธ์Šค๊ฐ€ C&C ์„œ๋ฒ„์™€ ํ†ต์‹ ํ•จ (์ด๋•Œ Powershell ์€ 0.1์ดˆ๋งŒ ์ž ๊น ์‹คํ–‰๋˜์—ˆ๋‹ค๊ฐ€ ๋‹ซํž˜ )
    ์‚ฌ์šฉ์ž ์ž…์žฅ์—์„œ๋Š” ๋ณ€ํ™” ์ฒด๊ฐ ๋ชปํ•จ

    ์ด๊ฒƒ์„ ์šฐ๋ฆฌ๋Š” ํŒŒ์ผ๋ฆฌ์Šค ๊ณต๊ฒฉ( Fileleass Attack )์ด๋ผ๊ณ  ๋ถ€๋ฆ„

     

     

    ๊ฐ์—ผ PC๋กœ ์˜์‹ฌ๋˜๋ฉด ๋‹ค์Œ๊ณผ ๊ฐ™์€ ํ–‰๋™์ด ํ•„์š”ํ•จ.

     

    ๐Ÿ” 1. ์•„ํ‹ฐํŒฉํŠธ (๋””์ง€ํ„ธ ์ฆ๊ฑฐ) ์ˆ˜์ง‘

        ์ปฌ๋ ‰์…˜ ๋„๊ตฌ๋ฅผ ์™ธ์žฅ USB๋ฅผ ํ†ตํ•ด Victim PC ์— ์˜ฎ๊ฒจ๋‘ 

        ๊ทธ ๋‚ด์šฉ์„ ๊ฐ€์ง€๊ณ ์„œ ๋ถ„์„๊ด€ PC ๋กœ ์˜ฎ๊ฒจ ํ”ผํ•ด๋‚ด์šฉ ๋ถ„์„ ์ง„ํ–‰

     

        โ€ป ํ”ผํ•ด PC์—์„œ๋Š” ๊ฐ€๊ธ‰์ ์ด๋ฉด ๋ถ„์„ํ•˜์ง€ X

        --> ๊ทธ ์ด์œ ๋Š” Victim PC์˜ ํ”„๋กœ์„ธ์Šค ํ•จ์ˆ˜ ํ˜ธ์ถœ์„ ํ•˜๋ฉฐ ๋ฉ”๋ชจ๋ฆฌ ๋ณ€ํ™” ์‹œ์Šคํ…œ ๋ณ€ํ™”๊ฐ€ ์ผ์–ด๋‚˜๊ธฐ ๋•Œ๋ฌธ์—
             ํ•ด๋‹น PC์˜ ์ƒํƒœ๋ณ€ํ™”๋ฅผ ์ด‰๊ตฌํ•จ, ์ตœ๋Œ€ํ•œ ํ•ด๋‹น PC๋ฅผ ์›์ƒํƒœ๋กœ ๋‘๊ธฐ ์œ„ํ•จ์ž„.

     

    ํ”„๋กœ์„ธ์Šค ๋ฆฌ์ŠคํŠธ ํ™•๋ณด

     

    tasklist /SVC > tasklist.txt

    ๋ชจ๋“  ํ”„๋กœ์„ธ์Šค๋Š” ์‹คํ–‰ ํ›„ ๋ฐ˜๋“œ์‹œ ์„œ๋น„์Šค๋ฅผ ์ฑ…์ž„์ ธ์•ผํ•จ

    ์„œ๋น„์Šค๋ฅผ ์ฑ…์ž„์ง€๋Š” ํ”„๋กœ์„ธ์Šค๊ฐ€ ์—†๋‹ค ( EX. N/A๋กœ ํ‘œ์‹œ๋œ๋‹ค๋ฉด ์•…์„ฑ์ฝ”๋“œ์ผ ํ™•๋ฅ ์ด ๋†’์Œ )

     

    listdlls ํ”„๋กœ๊ทธ๋žจ ํ†ตํ•œ DLLํŒŒ์ผ ํ™•๋ณด ( sysinternals suite )

    sysinternals ์—์„œ ๋งŒ๋“ฌ

     

    listdlls -u

     

    --> u ์˜ต์…˜์€ unsigned ๋œ DLL ๋งŒ ํ™•์ธํ•˜์—ฌ ๊ฒ€์ถœํ•จ

     

    ์ด ์˜ต์…˜๋•Œ๋ฌธ์— sysinternal ์„ ์“ฐ๋Š”๊ฑฐ์ž„ ( ์„œ๋ช…์ •๋ณด๊ฐ€ ์—†๊ฑฐ๋‚˜ ๋ˆ„๋ฝ๋œ ํŒŒ์ผ์„ ํ™•์ธ ํ•˜๊ธฐ ์œ„ํ•จ์ž„ )

    ํŒŒ์ผ์„ ์‹คํ–‰ํ• ๋•Œ ์„œ๋ช…์ •๋ณด๊ฐ€ ์กด์žฌํ•˜์ง€ ์•Š๋Š”๋‹ค๋ฉด ๊ฒฝ๊ณ ๊ฐ€ ์˜ฌ๋ผ์˜ด

     

    MS ํ•œํ…Œ ์•…์„ฑ์ฝ”๋“œ๋ฅผ ๋งค๋ฒˆ ์„œ๋ช…์ •๋ณด๋ฅผ ๋ฐ›์•„์˜ค๊ธฐ๋Š” ํž˜๋“ค๊ธฐ ๋•Œ๋ฌธ์— ํ•ด๋‹น ํŒŒ์ผ์„ ์ˆ˜์ง‘ํ•˜๋Š”๊ฑฐ์ž„

     

    Persistence (์ œ์–ด์ง€์†์ •๋ณด)

    ๊ณต๊ฒฉ์ž๋Š” ์›ํ•˜๋Š” ์‹œ๊ฐ„์— ๊ณต๊ฒฉํ•˜๊ธธ ํฌ๋งํ•จ

    ๊ทธ๋ž˜์„œ ์ง€์†์ ์œผ๋กœ ๊ณต๊ฒฉ์ž๊ฐ€ ์ž๋™์œผ๋กœ ์‹œ์ž‘๋˜๊ฒŒ ๋งŒ๋“  ํ”„๋กœ์„ธ์Šค๋ฅผ ์ฐพ์•„์•ผํ•จ..!

     

    sysinternals - Autoruns ํ†ตํ•ด ํ™•์ธ

     

    ํŒŒ์ผ ์‹œ์Šคํ…œ ๊ด€๋ จ ์ฆ๊ฑฐ ์ˆ˜์ง‘ ( HBGary's fget ๋„๊ตฌ ํ™œ์šฉ )

    โ€ป ํ™˜๊ฒฝ๋ณ€์ˆ˜์— ์„ค์ •ํ•ด์ฃผ์–ด์„œ ํŽธํ•˜๊ฒŒ ์‹คํ–‰ํ•˜์ž !!!

     

    raw ํ•œ ํŒŒ์ผ์‹œ์Šคํ…œ ํ™•์ด ๊ฐ€๋Šฅ

     

    Windows Prefetch ํŒŒ์ผ ์‹คํ–‰ ์ด๋ ฅ ํ™•์ธ

     

    C:\windows/Prefetch ๊ฒฝ๋กœ์— pf ํ™•์žฅ์ž ๋ช…์œผ๋กœ ์กด์žฌํ•จ


    pf ๋ชฉ๋ก์—ด์„ ํ™•์ธํ•˜๋ฉด exeํŒŒ์ผ์˜ ํŒŒ์ผ๋“ค์ด ๋‚˜์˜ด

    ํ•ด๋‹น ํŒŒ์ผ๋“ค์€ ํ•œ๋ฒˆ์ด๋ผ๋„ ์ด PC์—์„œ ์‹คํ–‰ํ–ˆ๋˜ ํŒŒ์ผ๋ช…์ด๋ผ๊ณ  ์•Œ์ˆ˜์žˆ์Œ

     

    Memory Dump

     

    Dumpit.exe ํŒŒ์ผ ์‹คํ–‰ ํ›„ ๋ฉ”๋ชจ๋ฆฌ ๋คํ”„๋ฅผ ๋œฐ ์ˆ˜ ์žˆ์Œ

     

    Registry ์ˆ˜์ • ๋‚ด์šฉ ํ™•์ธ

     

    ๋ฆฌ๋ˆ…์Šค์˜ /etc ํด๋”์™€ ๊ฐ™์€์—ญํ• ์ž„

    ์‹œ์Šคํ…œ์˜ ์ „๋ฐ˜์ ์ธ ํ™˜๊ฒฝ๋ณ€์ˆ˜ ์„ค์ •๋“ค์„ ๋‹ด๊ณ ์žˆ์Œ

     

    C:\Windows\System32\config ์— ํ•ด๋‹น ์„ค์ • ํŒŒ์ผ๋“ค์ด ์žˆ์Œ

    SAM --> ์œˆ๋„์šฐ์˜ ๋น„๋ฐ€๋ฒˆํ˜ธ

     

     

     

    ํŒŒ์ผ์ด๋ž€

    ํ”„๋กœ์„ธ์Šค๋“ค์ด ๋กœ๋”ฉํ•œ ๋ชฉ๋ก๋“ค์ด ๋‚˜์˜ด

     

    ๐Ÿ“Š 2. ๋ถ„์„ ๋‹ด๋‹น์ž PC์—์„œ ํ™•์ธ

    volatility ํŒŒ์ผ ํ†ตํ•ด ๋ฉ”๋ชจ๋ฆฌ๋คํ”„ ํ™•์ธ

     

            ์ฒ˜์Œ ์‚ฌ์šฉ์‹œ OS ๋ฒ„์ „์„ ํ™•์ธ์‹œ์ผœ์ค˜์•ผํ•จ

     

    ํ•ด๋‹น ๋ฉ”๋ชจ๋ฆฌ ๋คํ”„๋ฅผ ํ†ตํ•ด PID // PPID ํ™•์ธ ๊ฐ€๋Šฅ

            โ€ป PPID : ๋ถ€๋ชจ ํ”„๋กœ์„ธ์Šค

     

    pslist

    DLLList

    Netscan

     

    ## ๋ฉ”๋ชจ๋ฆฌ ๋คํ”„๋ฅผ ํ†ตํ•ด OS ์œˆ๋„์šฐ ์ด๋ฏธ์ง€ ์ •๋ณด ํ™•์ธ ##
    vola -f memory.raw imageinfo
    
    vola -f memory.raw --profile=Win7SP0X86 pslist > .\volataility_pslist.txt
    vola -f memory.raw --profile=Win7SP0X86 netscan > .\volataility_netscan.txt
    vola -f memory.raw --profile=Win7SP0X86 dlllist > .\volataility_dlllist.txt

     

    ์ƒ๊ธฐ 3๊ฐœ์˜ ๋ช…๋ น์–ด๋ฅผ ํ†ตํ•ด Windows Built-In ํŒŒ์ผ ์ค‘ ์ ˆ๋Œ€ Network ํŠธ๋ž™์žญ์…˜์ด ์ผ์–ด๋‚˜์ง€ ์•Š์•„์•ผํ•  ํŒŒ์ผ์ด ํ†ต์‹ ์ด ์ด๋ฃจ์–ด์ง„ ์ด๋ ฅ์ด ์žˆ๋‹ค๋ฉด ํ•ด๋‹น ํŒŒ์ผ์€ ์ฝ”๋“œ์ธ์ ์…˜์ด ์ผ์–ด๋‚ฌ์„ ์ˆ˜ ์žˆ๋‹ค๋Š” ๊ฐ€๋Šฅ์„ฑ์„ ์ œ๊ธฐ ํ•  ์ˆ˜ ์žˆ์Œ.

     

     

     

    AnalyzeMFT.py ํ†ตํ•œ mft.raw ํŒŒ์ผ๋ถ„์„

     

    python analyzeMFT.py -l -f mft.raw -o -mft.csv

     

    ๐Ÿ‘ฃ 3. ๋ถ„์„ (Interpretation)

     

           ์•…์„ฑ ํ”„๋กœ์„ธ์Šค ์‹๋ณ„ ๋ฐฉ๋ฒ•

                 1) ์ •์ƒ ํ”„๋กœ์„ธ์Šค์™€ ์œ ์‚ฌํ•œ ์ด๋ฆ„์„ ์‚ฌ์šฉํ•˜๋Š” ํ”„๋กœ์„ธ์Šค๊ฐ€ ์กด์žฌํ•˜๋Š”์ง€

                 2) ํ”„๋กœ์„ธ์Šค์˜ ๋ถ€๋ชจ์ž์‹ ๊ด€๊ณ„์—์„œ ์ด์ƒ์ง•ํ›„๊ฐ€ ๋ณด์ด๋Š”์ง€

                 3) ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•ด์•ผ ํ•  ํ”„๋กœ์„ธ์Šค๊ฐ€ ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜์ง€ ์•Š๋Š”์ง€

                 4) ์‹คํ–‰ ๊ฒฝ๋กœ๊ฐ€ ์ผ๋ฐ˜์ ์ด์ง€ ์•Š์€ ๊ฒฝ์šฐ๊ฐ€ ์žˆ๋Š”์ง€

                       C:/Windows                                                                      --> ์ •์ƒ ๊ฒฝ๋กœ

                       C:/Windows/system32/explorer.exe                                 --> ์ž˜๋ชป๋œ ๊ฒฝ๋กœ // ์•…์„ฑ์ฝ”๋“œ ์˜์‹ฌ

                       C:/Users/์‚ฌ์šฉ์ž๋ช…/AppData/Local/Temp/                         --> ์ž„์‹œ ๊ฒฝ๋กœ // ์•…์„ฑ์ฝ”๋“œ ์˜์‹ฌ


                 ์ผ๋ฐ˜์ ์œผ๋กœ C:/Windows or C:\Program Files ์˜ ๊ฒฝ๋กœ์—์„œ ๋Œ€๋ถ€๋ถ„์˜ ํ”„๋กœ๊ทธ๋žจ๋“ค์ด ์‹คํ–‰์ด ๋จ.

                 ๊ทธ๋ ‡๋‹ค๋ฉด ๊ทธ๋ ‡์ง€ ์•Š์€๊ฒฝ๋กœ์—์„œ ํ”„๋กœ๊ทธ๋žจ์ด ์‹คํ–‰๋œ ์ด๋ ฅ์ด ์žˆ๋Š”์ง€ ๊ฒ€์ถœ ํ•˜๋ฉด ๋จ.

     

                 5) ๋ณธ๋ž˜์˜ ๊ธฐ๋Šฅ๊ณผ๋Š” ๋‹ค๋ฅด๊ฒŒ ๋„คํŠธ์›Œํฌ ํ†ต์‹ ์„ ์ˆ˜ํ–‰ํ•˜๋Š” ํ”„๋กœ์„ธ์Šค๊ฐ€ ์žˆ๋Š”์ง€

                       ์œˆ๋„์šฐ ์šด์˜์ฒด์ œ์—์„œ๋Š” Network ํ†ต์‹ ์„ ํ•˜์ง€ ์•Š๋Š” ํ”„๋กœ์„ธ์Šค๋“ค์ด ์žˆ์Œ.

                       --> ํ•ด๋‹น ๋‚ด์šฉ์€ ํ™•์ธ ํ•ด๋ณด๊ธธ

                 6) ์ •์ƒ์ ์ธ ํ”„๋กœ์„ธ์Šค์ด์ง€๋งŒ ์ข…๋ฃŒ ๋˜์–ด ์žˆ์–ด์•ผ ํ•จ์—๋„ ๋™์ž‘ํ•˜๊ณ  ์žˆ๋Š” ํ”„๋กœ์„ธ์Šค๊ฐ€ ์žˆ๋Š”์ง€

                       EX) userinit.exe (์‚ฌ์šฉ์ž ๋กœ๊ทธ์ธ ํ›„ ํ™˜๊ฒฝ ์ดˆ๊ธฐํ™” ํ›„ ๋ฐ”๋กœ ์ข…๋ฃŒํ•จ, ํ•ด๋‹น ํ”„๋กœ์„ธ์Šค๊ฐ€ explorer.exe ํ˜ธ์ถœ)

                       

                 7) ์„œ๋ช…์ด ๋˜์–ด ์žˆ์ง€ ์•Š์€ exe or DLL ์ด ์‹คํ–‰๋˜๊ณ  ์žˆ๋Š” ๊ฒฝ์šฐ๊ฐ€ ์žˆ๋Š”์ง€

                     listdlls_unsigned ํ†ตํ•ด ์•„๋ž˜์˜ ์˜์‹ฌ์Šค๋Ÿฌ์›€ ํ™•์ธ

                       C:\Program Files\SearchNQ\SearchNQ.exe

                       C:\Windows\system32\svcnet.exe

     

                       โ€ป ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„์€ ๊ฒฉ๋ฆฌ๋œ ํ™˜๊ฒฝ์—์„œ ์ˆ˜ํ–‰ํ•˜๊ณ , ๋ถ„์„๊ด€์€ ์•…์„ฑ์ฝ”๋“œ Malicious File ์„ ๋ณดํ†ต Hash๊ฐ’์œผ๋กœ ๋ณ€๊ฒฝํ•จ

     

           ์•…์„ฑ ํ”„๋กœ์„ธ์Šค ์‹๋ณ„ ๋ฐฉ๋ฒ•

                 1) ์ •์ƒ ํ”„๋กœ์„ธ์Šค์™€ ์œ ์‚ฌํ•œ ์ด๋ฆ„์„ ์‚ฌ์šฉํ•˜๋Š” ํ”„๋กœ์„ธ์Šค๊ฐ€ ์กด์žฌํ•˜๋Š”๊ฐ€

     

                 svchost.exe (O)
                 svch0st.exe (X)

                 scvhost.exe (X)

                 --> ์‚ฌ์šฉ์ž๋ฅผ ๋ˆˆ์†์ž„ ํ•˜๊ธฐ์œ„ํ•จ

     

    ์ •์ƒํ”„๋กœ์„ธ์Šค์— ๋Œ€ํ•œ ํŒ๋ณ„์€ ?

    ์•„๋ž˜์˜ ํ•˜๊ธฐ ๋ฌธ๊ฑด์„ ์ฐธ์กฐํ•˜๋ฉด ๋จ

     

    ๋งํฌ์ฐธ์กฐ : Hunt Evil | SANS Poster

    ์ •์ƒ ํ”„๋กœ์„ธ์Šค ์—ฌ๋ถ€๋ฅผ ํŒ๋‹จํ•˜๊ธฐ์œ„ํ•œ ์ฐธ์กฐ ๋ฌธํ—Œ

     

     

    KALILINUX ์™€ ์ƒ๋ฐ˜์ ์œผ๋กœ ๋ฐฉ์–ด์šฉ ์šฐ๋ถ„ํˆฌ OS ๋ถ„์„์šฉ OS๋Š” REMNux ํŒจํ‚ค์ง• ์˜คํ”ˆ์†Œ์Šค๊ฐ€ ์žˆ์Œ

     

    ๋งํฌ : REMnux: A Linux Toolkit for Malware Analysts

     

    REMnux: A Linux Toolkit for Malware Analysts

    REMnux: A Linux Toolkit for Malware Analysis REMnux® is a Linux toolkit for reverse-engineering and analyzing malicious software. REMnux provides a curated collection of free tools created by the community. Analysts can use it to investigate malware witho

    remnux.org

     

    ๋ชจ๋ฐ”์ผ ๋ฐฉ์–ด ๋ฐ ์ทจ์•ฝ์  ๋ถ„์„์€ ์•„๋ž˜์˜ 

     

    ๋งํฌ : Download · Santoku Linux (santoku-linux.com)

     

    Download · Santoku Linux

    Santoku Community Edition runs in the lightweight Lubuntu Linux distro. It can be run in VirtualBox (recommended) or VMWare Player, both available free and run on Linux, Mac or Windows. The Lubuntu download is large because it is a full .iso. We recommend

    santoku-linux.com

     

    ์ƒ๊ธฐ์˜ ๋ฐฐํฌ์šฉ ํŒจํ‚ค์ง• OS๋Š” SANS๋ผ๋Š” ๋ณด์•ˆํšŒ์‚ฌ์—์„œ ๋งŒ๋“ค์—ˆ์Œ

     

     

                 2) ํ”„๋กœ์„ธ์Šค์˜ ๋ถ€๋ชจ์ž์‹ ๊ด€๊ณ„์—์„œ ์ด์ƒ์ง•ํ›„๊ฐ€ ๋ณด์ด๋Š”์ง€

     

                 Services.exe - svchost.exe ( ์ •์ƒ )

                 explorer.exe - cmd.exe ( ์ •์ƒ )

     

                 rundll32.exe - powershell.exe ( ๋น„์ •์ƒ )

                 powershell.exe - dllhost.exe ( ๋น„์ •์ƒ )

                 DLLHOST์˜ ๋ถ€๋ชจํ”„๋กœ์„ธ์Šค๋Š” svchost.exe ์ž„.

     

                 svchost.exe - dllhost.exe ( ์ •์ƒ )

     

     

    ## svchost์˜ ํ”„๋กœ์„ธ์Šค ๋ฆฌ์ŠคํŠธ ##
    C:\Users\fsiedu>tasklist /SVC | findstr svchost | more

              svchost.exe ํ”„๋กœ์„ธ์Šค๊ฐ€ ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜๊ณ  ์žˆ์ง€ ์•Š๋Š”์ง€ ํ™•์ธ

              svchost.exe ํ”„๋กœ์„ธ์Šค๊ฐ€ ํŒŒ๋ผ๋ฏธํ„ฐ๋ฅผ ๊ฐ€์ง€์ง€ ์•Š๋Š”์ง€ ํ™•์ธ

    N/A ๊ฐ’์„ ๊ฐ€์ง€๊ฒŒ๋œ๋‹ค๋ฉด ์•…์„ฑ์ฝ”๋“œ๋กœ ์˜์‹ฌ

     

    -k  Parameter๋ฅผ ํ†ตํ•ด svchsot์— ์„œ๋น„์Šค๋ฅผ ์ ์žฌํ•˜๊ณ  ์„œ๋น„์Šค๊ฐ€ ํ”„๋กœ์„ธ์‹ฑ๋จ

    ์ด๋Ÿฐ Parameter๊ฐ€ ์—†๋‹ค๋ฉด ์•…์„ฑ์ฝ”๋“œ๋กœ ํŒ๋‹จํ•  ์ˆ˜ ์žˆ์Œ.

     

                 explorer.EXE --> GUI ์˜ ์ธํ„ฐํŽ˜์ด์Šค๋ฅผ ๊ด€์žฅํ•˜๋Š” ์…ธ ํ”„๋กœ์„ธ์Šค

                 

     

     

    ์ด๊ฒƒ์„ ์ˆ˜์‹œ๋กœ ๋ถ„์„ํ•˜๊ธฐ ์œ„ํ•ด์„œ๋Š” EDR ์†”๋ฃจ์…˜์ด ํ•„์š”ํ•จ.

     

     

     

     

     

    ์ œ์–ด ์œ ์ง€ ๋ฐฉ์‹

     

    1. Registry ( ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ )

     

    ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ ๋ชฉ๋ก ๊ตฌ์กฐ / ์—ญํ• ๋“ค์„ ์•Œ์•„์•ผํ•จ

     

    2. Task schedule ( ์ž‘์—…์Šค์ผ€์ค„๋Ÿฌ )

     

    3. ์‹œ์ž‘ ํด๋”

    - Win + R > shell:startup

     

     

     

    ์—”ํŠธ๋ฆฌํฌ์ธํŠธ๋ž€ ๋ฌด์—‡์ธ๊ฐ€..?

     

    ํŒŒ์ผ๊ตฌ์กฐ๋Š” [VBR / MFT / DATA] --> ์ด๋Ÿฐ ๊ตฌ์กฐ

     

    MFT ( Master File Table )์•ˆ์—๋Š” 

    [MFT / MFT Entry /  ]

     

     

     

    WinprefetchView --> ํ†ตํ•ด ์ตœ๊ทผ ์‹คํ–‰ ํŒŒ์ผ ํ”์  ํ™•์ธ

    ํ•ด๋‹น Firefox ํŒŒ์ผ์ด ์ƒ์„ฑ๋˜๊ณ  ๋งŒ๋“ค์–ด์ง„ ์‹œ๊ฐ„ / ์•„๋ž˜๋Š” ์œ ๊ด€๋œ ๋งํฌํŒŒ์ผ์ด ๋ฌด์—‡์ธ์ง€ ์•Œ๋ ค์คŒ

    Run Count : 1

    ๋ณดํ†ต ์•…์„ฑ์ฝ”๋“œ๋Š” ์ตœ์ดˆ 1~2ํšŒ ์‹คํ–‰๋˜๋‹ˆ ํ™•์ธํ•ด๋ณผ๊ฒƒ

     

    Missing Process

    ํ˜„์žฌ ๊ทธํŒŒ์ผ์ด ์กด์žฌํ•˜๋Š”์ง€ ์—ฌ๋ถ€ ํ™•์ธ 

    Yes : ์—†์–ด์ง

    No : ํ˜„์žฌ๋„ ์กด์žฌ

     

    [UserAssist]

     

    ์‚ฌ์šฉ์ž๊ฐ€ ์‹ค์ œ๋กœ ์‹คํ–‰ํ•œ ํŒŒ์ผ

     

    ๋””์ง€ํ„ธ ํฌ๋ Œ์‹ ์•„ํ‹ฐํŒฉํŠธ & ์ฆ๊ฑฐ ๋ถ„์„ ๊ธฐ๋ฒ• ๊ณต์œ  | ์ธ์„น์‹œํ๋ฆฌํ‹ฐ (forensic-artifact.com)

     

    ๋””์ง€ํ„ธ ํฌ๋ Œ์‹ ์•„ํ‹ฐํŒฉํŠธ & ์ฆ๊ฑฐ ๋ถ„์„ ๊ธฐ๋ฒ• ๊ณต์œ  | ์ธ์„น์‹œํ๋ฆฌํ‹ฐ

    [์ฆ๊ฑฐ]ํ…Œ์ด๋ธ”์˜ ์ƒ๋‹จ ์นผ๋Ÿผ ์ •๋ณด๋ฅผ ํ†ตํ•ด ์‚ฌ์šฉ์ž ์ด๋ฆ„, ์‘์šฉํ”„๋กœ๊ทธ๋žจ ์ด๋ฆ„, ๋งˆ์ง€๋ง‰ ์‹คํ–‰ ์‹œ๊ฐ„, ์‹คํ–‰ ํšŸ์ˆ˜ ์ •๋ณด๋ฅผ ํ™•์ธ ํ•  ์ˆ˜ ์žˆ๊ณ  ์šฐ์ธก [์„ธ๋ถ€ ์ •๋ณด]ํ…Œ์ด๋ธ”์„ ํ†ตํ•ด์„œ๋„ ํ™•์ธ ๊ฐ€๋Šฅ

    www.forensic-artifact.com

     

     

     

     

    NirSoft - freeware utilities: password recovery, system utilities, desktop utilities

     

    freeware utilities: password recovery, system utilities, desktop utilities - For Windows

    Unique collection of freeware desktop utilities, system utilities, password recovery tools, and more

    www.nirsoft.net

     

    ๋ฉ”๋ชจ๋ฆฌ ๋คํ”„

     

    vlola.exe -f mft.raw --profile=[์šด์˜์ฒด์ œ_Version] [์ถ”์ถœํ•  ๋ฐ์ดํ„ฐ] > [์ถ”์ถœ๋ฐ์ดํ„ฐ].txt

     

    vlola.exe -f mft.raw --profile=Win7SPx86 dlllist > dlllist.txt
    vlola.exe -f mft.raw --profile=Win7SPx86 malfind > malfind.txt
    vlola.exe -f mft.raw --profile=Win7SPx86 pslist > pslist.txt

     

    OpenProcess(PID) : ํ‘œ์  ํ”„๋กœ์„ธ์Šค ํ•ธ๋“คํ™•๋ณด

    VirtualAllocEx(200) : ํ‘œ์ ํ”„๋กœ์„ธ์Šค์— ๋ฉ”๋ชจ๋ฆฌ ํ• ๋‹น

    WriteProcessMemory() : ํ‘œ์  ํ”„๋กœ์„ธ์Šค์˜ ๋ฉ”๋ชจ๋ฆฌ์— ์•…์„ฑ ๋ฐ์ดํ„ฐ ์“ฐ๊ธฐ

    CreateRemoteThread() : ํ‘œ์  ํ”„๋กœ์„ธ์Šค์•  ์“ฐ๋ ˆ๋“œ ์ƒ์„ฑ

     

    ๋ฉ”๋ชจ๋ฆฌ๋คํ”„ ๊ณต๋ถ€ํ•˜๊ธฐ

     

    --> vola ํ†ตํ•ด์„œ ํ•ด๋‹น ๋ฉ”๋ชจ๋ฆฌ ๋คํ”„ ํ™•์ธ๊ฐ€๋Šฅ

     

     

    ํ”„๋กœ์„ธ์Šค ์ธ์ ์…˜ ๊ณต๋ถ€ 

     

    Ten process injection techniques: A technical survey of common and trending process injection techniques | Elastic Blog

     

    Ten process injection techniques: A technical survey of common and trending process injection techniques

    Process injection is a widespread defense evasion technique employed often within malware and fileless adversary tradecraft, and entails running custom code within the address space of another process. Process injection improves stealth, and some technique

    www.elastic.co

     

     

    ์ž๋™ํ™” ๋„๊ตฌ

     

     BriMor Labs - Tools

     

    You are being redirected...

     

    www.brimorlabs.com

     

    Live Response Collection – Cedarpelta Build

     

    - ์—ฌ๋Ÿฌ๊ฐœ์˜ ์Šคํƒ ๋“œ ์–ผ๋ก  ์‹คํ–‰ ํŒŒ์ผ์„ ๋ฐฐ์น˜ ์Šคํฌ๋ฆฝํŠธ๋ฅผ ํ†ตํ•ด ์‹คํ–‰

    - ๋…ธ์ด์ฆˆ๊ฐ€ ์‹ฌํ•˜๋‹ค๋Š” ๋‹จ์  ์•„ํ‹ฐํŒฉํŠธ ์›๋ณธ์„ ์ถฉ์‹คํ•˜๊ฒŒ ํ™•๋ณดํ•จ

    - Collection + Extraction(์ผ๋ถ€) ๊นŒ์ง€ ์ˆ˜ํ–‰ํ•จ

     

     

    Fireeye's Redline

    -๋ณ„๋„์˜ ์•„ํ‹ฐํŒฉํŠธ๋ฅผ ์ˆ˜์ง‘ ์Šคํฌ๋ฆฝํŠธ๋ฅผ ์ƒ์„ฑํ•จ

    -์ˆ˜์ง‘๋œ ์•„ํ‹ฐํŒฉํŠธ๋ฅผ ๋Œ€์ƒ์œผ๋กœ ๋ถ„์„ํ•˜์—ฌ GUI ๋กœ ๋ณด์—ฌ์คŒ

    - ๊ทผ๋ฐ ๋А๋ฆผ..

    ์ €์ž‘์žํ‘œ์‹œ ๋ณ€๊ฒฝ๊ธˆ์ง€ (์ƒˆ์ฐฝ์—ด๋ฆผ)

    '๐Ÿ’ป๋ชจ์˜ํ•ดํ‚น > Microsoft' ์นดํ…Œ๊ณ ๋ฆฌ์˜ ๋‹ค๋ฅธ ๊ธ€

    ํŒŒ์ผ ์‚ญ์ œ ํ”์  ์ฐพ๊ธฐ (NTFS) #nagoona  (0) 2022.06.27
    MFT Parsing ๋„๊ตฌ - analyzeMFT  (0) 2022.06.27
    Windows Registry ์นจํ•ด ๋Œ€์‘ ๋ถ„์„  (1) 2022.06.27
    ๐ŸŒWindow Froensic Tool List  (0) 2022.06.22
    [CVE-2022-30190] MS Offfice ์ œ๋กœ๋ฐ์ด ์ทจ์•ฝ์  ๋ถ„์„ & MSDT-Follina ์ทจ์•ฝ์  ๋ถ„์„  (0) 2022.06.22
      '๐Ÿ’ป๋ชจ์˜ํ•ดํ‚น/Microsoft' ์นดํ…Œ๊ณ ๋ฆฌ์˜ ๋‹ค๋ฅธ ๊ธ€
      • MFT Parsing ๋„๊ตฌ - analyzeMFT
      • Windows Registry ์นจํ•ด ๋Œ€์‘ ๋ถ„์„
      • ๐ŸŒWindow Froensic Tool List
      • [CVE-2022-30190] MS Offfice ์ œ๋กœ๋ฐ์ด ์ทจ์•ฝ์  ๋ถ„์„ & MSDT-Follina ์ทจ์•ฝ์  ๋ถ„์„
      Mark930.k
      Mark930.k
      Citrix Netscaler / Citrix VDI / KaliLinux / AWS / VMware / Window Svr

      ํ‹ฐ์Šคํ† ๋ฆฌํˆด๋ฐ”