๐Ÿ’ป๋ชจ์˜ํ•ดํ‚น/Microsoft

Windows ์นจํ•ด ๋Œ€์‘ ๋ฐ ๋ถ„์„ ๊ธฐ๋ฒ• ( ๊ธˆ์œต๋ณด์•ˆ์› ๊ต์œก )

Mark930.k 2022. 6. 22. 16:51

 

๊ณผ๊ฑฐ์˜ ๊ณต๊ฒฉ์–‘์ƒ (์•ฝ.. 10๋…„์ „..?) exe ๋˜๋Š” dll ํ™•์žฅ์ž ํŒŒ์ผ์„ ํ†ตํ•ด ํ•จ์ˆ˜ ํ˜ธ์ถœ ๋ณ€์ˆ˜๋ฅผ ํ†ตํ•œ C&C์—์„œ๋กœ์˜ ๊ณต๊ฒฉ์„ ๊ฐํ–‰ํ•จ
ํ•˜์ง€๋งŒ ์•ˆํ‹ฐ๋ฐ”์ด๋Ÿฌ์Šค์—์„œ ๋‹ค ๊ฒ€์ถœ๋˜๊ธฐ์— ํ˜„์žฌ๋Š” ์ด๋Ÿฐ ์žฌ๋ž˜์‹ ํ˜•ํƒœ๋กœ ๊ณต๊ฒฉ์„ ๊ฐํ–‰ํ•˜์ง€ ์•Š์Œ.

 

๊ทธ๋ž˜์„œ LotL(Living of the Land) ๊ณต๊ฒฉ๊ธฐ๋ฒ• --> ๊ธฐ์กด์˜ ์žˆ๋Š” ์‹œ๋ฃŒ๋“ค์„ ํ†ตํ•ด ๊ณต๊ฒฉ์„ ๊ฐํ–‰ํ•˜๋Š” ๊ธฐ๋ฒ•


wscrpite.exe, certutil.exe ๋“ฑ ๊ธฐ์กด์˜ Windows Built in ์„ค์น˜ ํŒŒ์ผ์„ ํ†ตํ•œ ๊ณต๊ฒฉ ๊ฐํ–‰ ํ˜•ํƒœ๋กœ ์–‘์ƒ ๋ณ€ํ˜•

์ตœ๊ทผ ๊ณต๊ฒฉ ํ˜•ํƒœ์˜ ์–‘์ƒ


1.์•…์„ฑ ๋ฌธ์„œ ํŒŒ์ผ ์ƒ์„ฑ
2.๊ณต๊ฒฉ์ž๋Š” Victim PC ์— ์•…์„ฑ๋ฌธ์„œ ์ „๋‹ฌ
3. maleware.hwp ๋ฌธ์„œํŒŒ์ผ ํ†ตํ•ด ํ•œ๊ธ€ ์˜คํ”ผ์Šค ํ”„๋กœ๊ทธ๋žจ ์‹คํ–‰๋จ

 

    maleware.hwp ์‹คํ–‰ ์‹œ,

    ์œ ๊ด€๋œ dll ํŒŒ์ผ์„ ๋ฉ”๋ชจ๋ฆฌ์— ์ ์žฌํ•จ (๋ฌด์ˆ˜ํžˆ ๋งŽ์€ dll ์„ ํ˜ธ์ถœํ•˜๋ฉฐ ํ”„๋กœ์„ธ์‹ฑ์„ ํ•จ)


์ด ์‹œ์ ์—์„œ dllํŒŒ์ผ์„ ํ˜ธ์ถœํ•˜๋Š”๊ฒŒ ์•„๋‹Œ ๊ฑด๋„ˆ๋›ฐ๊ณ  ๋‹ค๋ฅธ ๋ฉ”๋ชจ๋ฆฌ ์˜์—ญ์„ ํ†ตํ•ด Powershell ํ˜ธ์ถœํ•จ

 

โ€ป ๊ฐ€์ƒ ๋ฉ”๋ชจ๋ฆฌ ๊ณต๊ฐ„
    ( ์ปค๋„ ๋ฉ”๋ชจ๋ฆฌ - ์ฃผ์š” ์ž๋ฃŒ ์˜์—ญ๊ตฌ์—ญ / ์œ ์ € ๋ฉ”๋ชจ๋ฆฌ ์˜์—ญ - ๊ฐ๊ฐ์˜ ํ”„๋กœ์„ธ์Šค๋“ค์ด ๊ฐ€์ƒ์˜ ๊ฒฉ๋ฆฌ๋œ ์˜์—ญ์„ ๊ฐ–์Œ )
    ๋ฉ”๋ชจ๋ฆฌ๊ฐ€ ํ—ˆ์šฉํ•˜๋Š” ๋งŒํผ ๊ฐ€์ƒ์˜ ๋ฉ”๋ชจ๋ฆฌ ๊ณต๊ฐ„์„ ๊ฐ€์ง

 

ํ•ด๋‹น๋ฌธ์„œ์˜ ๋‚ด๋ถ€์—๋Š” ์‰˜์ฝ”๋“œ(์•…์„ฑ์ฝ”๋“œ)๊ฐ€ ์‚ฝ์ž…๋˜์–ด ๊ณต๊ฒฉ์ž์˜ C&C ์„œ๋ฒ„์™€ ํ†ต์‹ ํ•˜๋ฉฐ ๊ณต๊ฒฉ์ž์˜ ํ๋ฆ„๋Œ€๋กœ ์›€์ง์ž„.

๊ณต๊ฒฉ์ž์ฝ”๋“œ : ์ธํ„ฐ๋„ท ๊ฒฝ๋กœ์˜ ์–ด๋””์–ด๋””๋กœ๊ฐ€๋ฉด script๊ฐ€ ์žˆ์–ด ๊ทธ๊ฑธ ํ˜ธ์ถœํ•ด

 

์ •์ƒ์ ์ธ ํ”„๋กœ์„ธ์Šค explore.exe ์• ๋“คํ•œํ…Œ code injection์„ ์‹ค์‹œ
๋‹ค๋ฅธ ํ”„๋กœ์„ธ์Šค์˜ ๋ฉ”๋ชจ๋ฆฌ์ƒ์—๋‹ค๊ฐ€ ์•…์„ฑํ”„๋กœ์„ธ์Šค๋ฅผ ์ฃผ์ž…
๊ทธ๋Ÿผ ์•…์„ฑํ”„๋กœ์„ธ์Šค๊ฐ€ C&C ์„œ๋ฒ„์™€ ํ†ต์‹ ํ•จ (์ด๋•Œ Powershell ์€ 0.1์ดˆ๋งŒ ์ž ๊น ์‹คํ–‰๋˜์—ˆ๋‹ค๊ฐ€ ๋‹ซํž˜ )
์‚ฌ์šฉ์ž ์ž…์žฅ์—์„œ๋Š” ๋ณ€ํ™” ์ฒด๊ฐ ๋ชปํ•จ

์ด๊ฒƒ์„ ์šฐ๋ฆฌ๋Š” ํŒŒ์ผ๋ฆฌ์Šค ๊ณต๊ฒฉ( Fileleass Attack )์ด๋ผ๊ณ  ๋ถ€๋ฆ„

 

 

๊ฐ์—ผ PC๋กœ ์˜์‹ฌ๋˜๋ฉด ๋‹ค์Œ๊ณผ ๊ฐ™์€ ํ–‰๋™์ด ํ•„์š”ํ•จ.

 

๐Ÿ” 1. ์•„ํ‹ฐํŒฉํŠธ (๋””์ง€ํ„ธ ์ฆ๊ฑฐ) ์ˆ˜์ง‘

    ์ปฌ๋ ‰์…˜ ๋„๊ตฌ๋ฅผ ์™ธ์žฅ USB๋ฅผ ํ†ตํ•ด Victim PC ์— ์˜ฎ๊ฒจ๋‘ 

    ๊ทธ ๋‚ด์šฉ์„ ๊ฐ€์ง€๊ณ ์„œ ๋ถ„์„๊ด€ PC ๋กœ ์˜ฎ๊ฒจ ํ”ผํ•ด๋‚ด์šฉ ๋ถ„์„ ์ง„ํ–‰

 

    โ€ป ํ”ผํ•ด PC์—์„œ๋Š” ๊ฐ€๊ธ‰์ ์ด๋ฉด ๋ถ„์„ํ•˜์ง€ X

    --> ๊ทธ ์ด์œ ๋Š” Victim PC์˜ ํ”„๋กœ์„ธ์Šค ํ•จ์ˆ˜ ํ˜ธ์ถœ์„ ํ•˜๋ฉฐ ๋ฉ”๋ชจ๋ฆฌ ๋ณ€ํ™” ์‹œ์Šคํ…œ ๋ณ€ํ™”๊ฐ€ ์ผ์–ด๋‚˜๊ธฐ ๋•Œ๋ฌธ์—
         ํ•ด๋‹น PC์˜ ์ƒํƒœ๋ณ€ํ™”๋ฅผ ์ด‰๊ตฌํ•จ, ์ตœ๋Œ€ํ•œ ํ•ด๋‹น PC๋ฅผ ์›์ƒํƒœ๋กœ ๋‘๊ธฐ ์œ„ํ•จ์ž„.

 

ํ”„๋กœ์„ธ์Šค ๋ฆฌ์ŠคํŠธ ํ™•๋ณด

 

tasklist /SVC > tasklist.txt

๋ชจ๋“  ํ”„๋กœ์„ธ์Šค๋Š” ์‹คํ–‰ ํ›„ ๋ฐ˜๋“œ์‹œ ์„œ๋น„์Šค๋ฅผ ์ฑ…์ž„์ ธ์•ผํ•จ

์„œ๋น„์Šค๋ฅผ ์ฑ…์ž„์ง€๋Š” ํ”„๋กœ์„ธ์Šค๊ฐ€ ์—†๋‹ค ( EX. N/A๋กœ ํ‘œ์‹œ๋œ๋‹ค๋ฉด ์•…์„ฑ์ฝ”๋“œ์ผ ํ™•๋ฅ ์ด ๋†’์Œ )

 

listdlls ํ”„๋กœ๊ทธ๋žจ ํ†ตํ•œ DLLํŒŒ์ผ ํ™•๋ณด ( sysinternals suite )

sysinternals ์—์„œ ๋งŒ๋“ฌ

 

listdlls -u

 

--> u ์˜ต์…˜์€ unsigned ๋œ DLL ๋งŒ ํ™•์ธํ•˜์—ฌ ๊ฒ€์ถœํ•จ

 

์ด ์˜ต์…˜๋•Œ๋ฌธ์— sysinternal ์„ ์“ฐ๋Š”๊ฑฐ์ž„ ( ์„œ๋ช…์ •๋ณด๊ฐ€ ์—†๊ฑฐ๋‚˜ ๋ˆ„๋ฝ๋œ ํŒŒ์ผ์„ ํ™•์ธ ํ•˜๊ธฐ ์œ„ํ•จ์ž„ )

ํŒŒ์ผ์„ ์‹คํ–‰ํ• ๋•Œ ์„œ๋ช…์ •๋ณด๊ฐ€ ์กด์žฌํ•˜์ง€ ์•Š๋Š”๋‹ค๋ฉด ๊ฒฝ๊ณ ๊ฐ€ ์˜ฌ๋ผ์˜ด

 

MS ํ•œํ…Œ ์•…์„ฑ์ฝ”๋“œ๋ฅผ ๋งค๋ฒˆ ์„œ๋ช…์ •๋ณด๋ฅผ ๋ฐ›์•„์˜ค๊ธฐ๋Š” ํž˜๋“ค๊ธฐ ๋•Œ๋ฌธ์— ํ•ด๋‹น ํŒŒ์ผ์„ ์ˆ˜์ง‘ํ•˜๋Š”๊ฑฐ์ž„

 

Persistence (์ œ์–ด์ง€์†์ •๋ณด)

๊ณต๊ฒฉ์ž๋Š” ์›ํ•˜๋Š” ์‹œ๊ฐ„์— ๊ณต๊ฒฉํ•˜๊ธธ ํฌ๋งํ•จ

๊ทธ๋ž˜์„œ ์ง€์†์ ์œผ๋กœ ๊ณต๊ฒฉ์ž๊ฐ€ ์ž๋™์œผ๋กœ ์‹œ์ž‘๋˜๊ฒŒ ๋งŒ๋“  ํ”„๋กœ์„ธ์Šค๋ฅผ ์ฐพ์•„์•ผํ•จ..!

 

sysinternals - Autoruns ํ†ตํ•ด ํ™•์ธ

 

ํŒŒ์ผ ์‹œ์Šคํ…œ ๊ด€๋ จ ์ฆ๊ฑฐ ์ˆ˜์ง‘ ( HBGary's fget ๋„๊ตฌ ํ™œ์šฉ )

โ€ป ํ™˜๊ฒฝ๋ณ€์ˆ˜์— ์„ค์ •ํ•ด์ฃผ์–ด์„œ ํŽธํ•˜๊ฒŒ ์‹คํ–‰ํ•˜์ž !!!

 

raw ํ•œ ํŒŒ์ผ์‹œ์Šคํ…œ ํ™•์ด ๊ฐ€๋Šฅ

 

Windows Prefetch ํŒŒ์ผ ์‹คํ–‰ ์ด๋ ฅ ํ™•์ธ

 

C:\windows/Prefetch ๊ฒฝ๋กœ์— pf ํ™•์žฅ์ž ๋ช…์œผ๋กœ ์กด์žฌํ•จ


pf ๋ชฉ๋ก์—ด์„ ํ™•์ธํ•˜๋ฉด exeํŒŒ์ผ์˜ ํŒŒ์ผ๋“ค์ด ๋‚˜์˜ด

ํ•ด๋‹น ํŒŒ์ผ๋“ค์€ ํ•œ๋ฒˆ์ด๋ผ๋„ ์ด PC์—์„œ ์‹คํ–‰ํ–ˆ๋˜ ํŒŒ์ผ๋ช…์ด๋ผ๊ณ  ์•Œ์ˆ˜์žˆ์Œ

 

Memory Dump

 

Dumpit.exe ํŒŒ์ผ ์‹คํ–‰ ํ›„ ๋ฉ”๋ชจ๋ฆฌ ๋คํ”„๋ฅผ ๋œฐ ์ˆ˜ ์žˆ์Œ

 

Registry ์ˆ˜์ • ๋‚ด์šฉ ํ™•์ธ

 

๋ฆฌ๋ˆ…์Šค์˜ /etc ํด๋”์™€ ๊ฐ™์€์—ญํ• ์ž„

์‹œ์Šคํ…œ์˜ ์ „๋ฐ˜์ ์ธ ํ™˜๊ฒฝ๋ณ€์ˆ˜ ์„ค์ •๋“ค์„ ๋‹ด๊ณ ์žˆ์Œ

 

C:\Windows\System32\config ์— ํ•ด๋‹น ์„ค์ • ํŒŒ์ผ๋“ค์ด ์žˆ์Œ

SAM --> ์œˆ๋„์šฐ์˜ ๋น„๋ฐ€๋ฒˆํ˜ธ

 

 

 

ํŒŒ์ผ์ด๋ž€

ํ”„๋กœ์„ธ์Šค๋“ค์ด ๋กœ๋”ฉํ•œ ๋ชฉ๋ก๋“ค์ด ๋‚˜์˜ด

 

๐Ÿ“Š 2. ๋ถ„์„ ๋‹ด๋‹น์ž PC์—์„œ ํ™•์ธ

volatility ํŒŒ์ผ ํ†ตํ•ด ๋ฉ”๋ชจ๋ฆฌ๋คํ”„ ํ™•์ธ

 

        ์ฒ˜์Œ ์‚ฌ์šฉ์‹œ OS ๋ฒ„์ „์„ ํ™•์ธ์‹œ์ผœ์ค˜์•ผํ•จ

 

ํ•ด๋‹น ๋ฉ”๋ชจ๋ฆฌ ๋คํ”„๋ฅผ ํ†ตํ•ด PID // PPID ํ™•์ธ ๊ฐ€๋Šฅ

        โ€ป PPID : ๋ถ€๋ชจ ํ”„๋กœ์„ธ์Šค

 

pslist

DLLList

Netscan

 

## ๋ฉ”๋ชจ๋ฆฌ ๋คํ”„๋ฅผ ํ†ตํ•ด OS ์œˆ๋„์šฐ ์ด๋ฏธ์ง€ ์ •๋ณด ํ™•์ธ ##
vola -f memory.raw imageinfo

vola -f memory.raw --profile=Win7SP0X86 pslist > .\volataility_pslist.txt
vola -f memory.raw --profile=Win7SP0X86 netscan > .\volataility_netscan.txt
vola -f memory.raw --profile=Win7SP0X86 dlllist > .\volataility_dlllist.txt

 

์ƒ๊ธฐ 3๊ฐœ์˜ ๋ช…๋ น์–ด๋ฅผ ํ†ตํ•ด Windows Built-In ํŒŒ์ผ ์ค‘ ์ ˆ๋Œ€ Network ํŠธ๋ž™์žญ์…˜์ด ์ผ์–ด๋‚˜์ง€ ์•Š์•„์•ผํ•  ํŒŒ์ผ์ด ํ†ต์‹ ์ด ์ด๋ฃจ์–ด์ง„ ์ด๋ ฅ์ด ์žˆ๋‹ค๋ฉด ํ•ด๋‹น ํŒŒ์ผ์€ ์ฝ”๋“œ์ธ์ ์…˜์ด ์ผ์–ด๋‚ฌ์„ ์ˆ˜ ์žˆ๋‹ค๋Š” ๊ฐ€๋Šฅ์„ฑ์„ ์ œ๊ธฐ ํ•  ์ˆ˜ ์žˆ์Œ.

 

 

 

AnalyzeMFT.py ํ†ตํ•œ mft.raw ํŒŒ์ผ๋ถ„์„

 

python analyzeMFT.py -l -f mft.raw -o -mft.csv

 

๐Ÿ‘ฃ 3. ๋ถ„์„ (Interpretation)

 

       ์•…์„ฑ ํ”„๋กœ์„ธ์Šค ์‹๋ณ„ ๋ฐฉ๋ฒ•

             1) ์ •์ƒ ํ”„๋กœ์„ธ์Šค์™€ ์œ ์‚ฌํ•œ ์ด๋ฆ„์„ ์‚ฌ์šฉํ•˜๋Š” ํ”„๋กœ์„ธ์Šค๊ฐ€ ์กด์žฌํ•˜๋Š”์ง€

             2) ํ”„๋กœ์„ธ์Šค์˜ ๋ถ€๋ชจ์ž์‹ ๊ด€๊ณ„์—์„œ ์ด์ƒ์ง•ํ›„๊ฐ€ ๋ณด์ด๋Š”์ง€

             3) ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•ด์•ผ ํ•  ํ”„๋กœ์„ธ์Šค๊ฐ€ ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜์ง€ ์•Š๋Š”์ง€

             4) ์‹คํ–‰ ๊ฒฝ๋กœ๊ฐ€ ์ผ๋ฐ˜์ ์ด์ง€ ์•Š์€ ๊ฒฝ์šฐ๊ฐ€ ์žˆ๋Š”์ง€

                   C:/Windows                                                                      --> ์ •์ƒ ๊ฒฝ๋กœ

                   C:/Windows/system32/explorer.exe                                 --> ์ž˜๋ชป๋œ ๊ฒฝ๋กœ // ์•…์„ฑ์ฝ”๋“œ ์˜์‹ฌ

                   C:/Users/์‚ฌ์šฉ์ž๋ช…/AppData/Local/Temp/                         --> ์ž„์‹œ ๊ฒฝ๋กœ // ์•…์„ฑ์ฝ”๋“œ ์˜์‹ฌ


             ์ผ๋ฐ˜์ ์œผ๋กœ C:/Windows or C:\Program Files ์˜ ๊ฒฝ๋กœ์—์„œ ๋Œ€๋ถ€๋ถ„์˜ ํ”„๋กœ๊ทธ๋žจ๋“ค์ด ์‹คํ–‰์ด ๋จ.

             ๊ทธ๋ ‡๋‹ค๋ฉด ๊ทธ๋ ‡์ง€ ์•Š์€๊ฒฝ๋กœ์—์„œ ํ”„๋กœ๊ทธ๋žจ์ด ์‹คํ–‰๋œ ์ด๋ ฅ์ด ์žˆ๋Š”์ง€ ๊ฒ€์ถœ ํ•˜๋ฉด ๋จ.

 

             5) ๋ณธ๋ž˜์˜ ๊ธฐ๋Šฅ๊ณผ๋Š” ๋‹ค๋ฅด๊ฒŒ ๋„คํŠธ์›Œํฌ ํ†ต์‹ ์„ ์ˆ˜ํ–‰ํ•˜๋Š” ํ”„๋กœ์„ธ์Šค๊ฐ€ ์žˆ๋Š”์ง€

                   ์œˆ๋„์šฐ ์šด์˜์ฒด์ œ์—์„œ๋Š” Network ํ†ต์‹ ์„ ํ•˜์ง€ ์•Š๋Š” ํ”„๋กœ์„ธ์Šค๋“ค์ด ์žˆ์Œ.

                   --> ํ•ด๋‹น ๋‚ด์šฉ์€ ํ™•์ธ ํ•ด๋ณด๊ธธ

             6) ์ •์ƒ์ ์ธ ํ”„๋กœ์„ธ์Šค์ด์ง€๋งŒ ์ข…๋ฃŒ ๋˜์–ด ์žˆ์–ด์•ผ ํ•จ์—๋„ ๋™์ž‘ํ•˜๊ณ  ์žˆ๋Š” ํ”„๋กœ์„ธ์Šค๊ฐ€ ์žˆ๋Š”์ง€

                   EX) userinit.exe (์‚ฌ์šฉ์ž ๋กœ๊ทธ์ธ ํ›„ ํ™˜๊ฒฝ ์ดˆ๊ธฐํ™” ํ›„ ๋ฐ”๋กœ ์ข…๋ฃŒํ•จ, ํ•ด๋‹น ํ”„๋กœ์„ธ์Šค๊ฐ€ explorer.exe ํ˜ธ์ถœ)

                   

             7) ์„œ๋ช…์ด ๋˜์–ด ์žˆ์ง€ ์•Š์€ exe or DLL ์ด ์‹คํ–‰๋˜๊ณ  ์žˆ๋Š” ๊ฒฝ์šฐ๊ฐ€ ์žˆ๋Š”์ง€

                 listdlls_unsigned ํ†ตํ•ด ์•„๋ž˜์˜ ์˜์‹ฌ์Šค๋Ÿฌ์›€ ํ™•์ธ

                   C:\Program Files\SearchNQ\SearchNQ.exe

                   C:\Windows\system32\svcnet.exe

 

                   โ€ป ์•…์„ฑ์ฝ”๋“œ ๋ถ„์„์€ ๊ฒฉ๋ฆฌ๋œ ํ™˜๊ฒฝ์—์„œ ์ˆ˜ํ–‰ํ•˜๊ณ , ๋ถ„์„๊ด€์€ ์•…์„ฑ์ฝ”๋“œ Malicious File ์„ ๋ณดํ†ต Hash๊ฐ’์œผ๋กœ ๋ณ€๊ฒฝํ•จ

 

       ์•…์„ฑ ํ”„๋กœ์„ธ์Šค ์‹๋ณ„ ๋ฐฉ๋ฒ•

             1) ์ •์ƒ ํ”„๋กœ์„ธ์Šค์™€ ์œ ์‚ฌํ•œ ์ด๋ฆ„์„ ์‚ฌ์šฉํ•˜๋Š” ํ”„๋กœ์„ธ์Šค๊ฐ€ ์กด์žฌํ•˜๋Š”๊ฐ€

 

             svchost.exe (O)
             svch0st.exe (X)

             scvhost.exe (X)

             --> ์‚ฌ์šฉ์ž๋ฅผ ๋ˆˆ์†์ž„ ํ•˜๊ธฐ์œ„ํ•จ

 

์ •์ƒํ”„๋กœ์„ธ์Šค์— ๋Œ€ํ•œ ํŒ๋ณ„์€ ?

์•„๋ž˜์˜ ํ•˜๊ธฐ ๋ฌธ๊ฑด์„ ์ฐธ์กฐํ•˜๋ฉด ๋จ

 

๋งํฌ์ฐธ์กฐ : Hunt Evil | SANS Poster

์ •์ƒ ํ”„๋กœ์„ธ์Šค ์—ฌ๋ถ€๋ฅผ ํŒ๋‹จํ•˜๊ธฐ์œ„ํ•œ ์ฐธ์กฐ ๋ฌธํ—Œ

 

 

KALILINUX ์™€ ์ƒ๋ฐ˜์ ์œผ๋กœ ๋ฐฉ์–ด์šฉ ์šฐ๋ถ„ํˆฌ OS ๋ถ„์„์šฉ OS๋Š” REMNux ํŒจํ‚ค์ง• ์˜คํ”ˆ์†Œ์Šค๊ฐ€ ์žˆ์Œ

 

๋งํฌ : REMnux: A Linux Toolkit for Malware Analysts

 

REMnux: A Linux Toolkit for Malware Analysts

REMnux: A Linux Toolkit for Malware Analysis REMnux® is a Linux toolkit for reverse-engineering and analyzing malicious software. REMnux provides a curated collection of free tools created by the community. Analysts can use it to investigate malware witho

remnux.org

 

๋ชจ๋ฐ”์ผ ๋ฐฉ์–ด ๋ฐ ์ทจ์•ฝ์  ๋ถ„์„์€ ์•„๋ž˜์˜ 

 

๋งํฌ : Download · Santoku Linux (santoku-linux.com)

 

Download · Santoku Linux

Santoku Community Edition runs in the lightweight Lubuntu Linux distro. It can be run in VirtualBox (recommended) or VMWare Player, both available free and run on Linux, Mac or Windows. The Lubuntu download is large because it is a full .iso. We recommend

santoku-linux.com

 

์ƒ๊ธฐ์˜ ๋ฐฐํฌ์šฉ ํŒจํ‚ค์ง• OS๋Š” SANS๋ผ๋Š” ๋ณด์•ˆํšŒ์‚ฌ์—์„œ ๋งŒ๋“ค์—ˆ์Œ

 

 

             2) ํ”„๋กœ์„ธ์Šค์˜ ๋ถ€๋ชจ์ž์‹ ๊ด€๊ณ„์—์„œ ์ด์ƒ์ง•ํ›„๊ฐ€ ๋ณด์ด๋Š”์ง€

 

             Services.exe - svchost.exe ( ์ •์ƒ )

             explorer.exe - cmd.exe ( ์ •์ƒ )

 

             rundll32.exe - powershell.exe ( ๋น„์ •์ƒ )

             powershell.exe - dllhost.exe ( ๋น„์ •์ƒ )

             DLLHOST์˜ ๋ถ€๋ชจํ”„๋กœ์„ธ์Šค๋Š” svchost.exe ์ž„.

 

             svchost.exe - dllhost.exe ( ์ •์ƒ )

 

 

## svchost์˜ ํ”„๋กœ์„ธ์Šค ๋ฆฌ์ŠคํŠธ ##
C:\Users\fsiedu>tasklist /SVC | findstr svchost | more

          svchost.exe ํ”„๋กœ์„ธ์Šค๊ฐ€ ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜๊ณ  ์žˆ์ง€ ์•Š๋Š”์ง€ ํ™•์ธ

          svchost.exe ํ”„๋กœ์„ธ์Šค๊ฐ€ ํŒŒ๋ผ๋ฏธํ„ฐ๋ฅผ ๊ฐ€์ง€์ง€ ์•Š๋Š”์ง€ ํ™•์ธ

N/A ๊ฐ’์„ ๊ฐ€์ง€๊ฒŒ๋œ๋‹ค๋ฉด ์•…์„ฑ์ฝ”๋“œ๋กœ ์˜์‹ฌ

 

-k  Parameter๋ฅผ ํ†ตํ•ด svchsot์— ์„œ๋น„์Šค๋ฅผ ์ ์žฌํ•˜๊ณ  ์„œ๋น„์Šค๊ฐ€ ํ”„๋กœ์„ธ์‹ฑ๋จ

์ด๋Ÿฐ Parameter๊ฐ€ ์—†๋‹ค๋ฉด ์•…์„ฑ์ฝ”๋“œ๋กœ ํŒ๋‹จํ•  ์ˆ˜ ์žˆ์Œ.

 

             explorer.EXE --> GUI ์˜ ์ธํ„ฐํŽ˜์ด์Šค๋ฅผ ๊ด€์žฅํ•˜๋Š” ์…ธ ํ”„๋กœ์„ธ์Šค

             

 

 

์ด๊ฒƒ์„ ์ˆ˜์‹œ๋กœ ๋ถ„์„ํ•˜๊ธฐ ์œ„ํ•ด์„œ๋Š” EDR ์†”๋ฃจ์…˜์ด ํ•„์š”ํ•จ.

 

 

 

 

 

์ œ์–ด ์œ ์ง€ ๋ฐฉ์‹

 

1. Registry ( ๋ ˆ์ง€์ŠคํŠธ๋ฆฌ )

 

๋ ˆ์ง€์ŠคํŠธ๋ฆฌ ๋ชฉ๋ก ๊ตฌ์กฐ / ์—ญํ• ๋“ค์„ ์•Œ์•„์•ผํ•จ

 

2. Task schedule ( ์ž‘์—…์Šค์ผ€์ค„๋Ÿฌ )

 

3. ์‹œ์ž‘ ํด๋”

- Win + R > shell:startup

 

 

 

์—”ํŠธ๋ฆฌํฌ์ธํŠธ๋ž€ ๋ฌด์—‡์ธ๊ฐ€..?

 

ํŒŒ์ผ๊ตฌ์กฐ๋Š” [VBR / MFT / DATA] --> ์ด๋Ÿฐ ๊ตฌ์กฐ

 

MFT ( Master File Table )์•ˆ์—๋Š” 

[MFT / MFT Entry /  ]

 

 

 

WinprefetchView --> ํ†ตํ•ด ์ตœ๊ทผ ์‹คํ–‰ ํŒŒ์ผ ํ”์  ํ™•์ธ

ํ•ด๋‹น Firefox ํŒŒ์ผ์ด ์ƒ์„ฑ๋˜๊ณ  ๋งŒ๋“ค์–ด์ง„ ์‹œ๊ฐ„ / ์•„๋ž˜๋Š” ์œ ๊ด€๋œ ๋งํฌํŒŒ์ผ์ด ๋ฌด์—‡์ธ์ง€ ์•Œ๋ ค์คŒ

Run Count : 1

๋ณดํ†ต ์•…์„ฑ์ฝ”๋“œ๋Š” ์ตœ์ดˆ 1~2ํšŒ ์‹คํ–‰๋˜๋‹ˆ ํ™•์ธํ•ด๋ณผ๊ฒƒ

 

Missing Process

ํ˜„์žฌ ๊ทธํŒŒ์ผ์ด ์กด์žฌํ•˜๋Š”์ง€ ์—ฌ๋ถ€ ํ™•์ธ 

Yes : ์—†์–ด์ง

No : ํ˜„์žฌ๋„ ์กด์žฌ

 

[UserAssist]

 

์‚ฌ์šฉ์ž๊ฐ€ ์‹ค์ œ๋กœ ์‹คํ–‰ํ•œ ํŒŒ์ผ

 

๋””์ง€ํ„ธ ํฌ๋ Œ์‹ ์•„ํ‹ฐํŒฉํŠธ & ์ฆ๊ฑฐ ๋ถ„์„ ๊ธฐ๋ฒ• ๊ณต์œ  | ์ธ์„น์‹œํ๋ฆฌํ‹ฐ (forensic-artifact.com)

 

๋””์ง€ํ„ธ ํฌ๋ Œ์‹ ์•„ํ‹ฐํŒฉํŠธ & ์ฆ๊ฑฐ ๋ถ„์„ ๊ธฐ๋ฒ• ๊ณต์œ  | ์ธ์„น์‹œํ๋ฆฌํ‹ฐ

[์ฆ๊ฑฐ]ํ…Œ์ด๋ธ”์˜ ์ƒ๋‹จ ์นผ๋Ÿผ ์ •๋ณด๋ฅผ ํ†ตํ•ด ์‚ฌ์šฉ์ž ์ด๋ฆ„, ์‘์šฉํ”„๋กœ๊ทธ๋žจ ์ด๋ฆ„, ๋งˆ์ง€๋ง‰ ์‹คํ–‰ ์‹œ๊ฐ„, ์‹คํ–‰ ํšŸ์ˆ˜ ์ •๋ณด๋ฅผ ํ™•์ธ ํ•  ์ˆ˜ ์žˆ๊ณ  ์šฐ์ธก [์„ธ๋ถ€ ์ •๋ณด]ํ…Œ์ด๋ธ”์„ ํ†ตํ•ด์„œ๋„ ํ™•์ธ ๊ฐ€๋Šฅ

www.forensic-artifact.com

 

 

 

 

NirSoft - freeware utilities: password recovery, system utilities, desktop utilities

 

freeware utilities: password recovery, system utilities, desktop utilities - For Windows

Unique collection of freeware desktop utilities, system utilities, password recovery tools, and more

www.nirsoft.net

 

๋ฉ”๋ชจ๋ฆฌ ๋คํ”„

 

vlola.exe -f mft.raw --profile=[์šด์˜์ฒด์ œ_Version] [์ถ”์ถœํ•  ๋ฐ์ดํ„ฐ] > [์ถ”์ถœ๋ฐ์ดํ„ฐ].txt

 

vlola.exe -f mft.raw --profile=Win7SPx86 dlllist > dlllist.txt
vlola.exe -f mft.raw --profile=Win7SPx86 malfind > malfind.txt
vlola.exe -f mft.raw --profile=Win7SPx86 pslist > pslist.txt

 

OpenProcess(PID) : ํ‘œ์  ํ”„๋กœ์„ธ์Šค ํ•ธ๋“คํ™•๋ณด

VirtualAllocEx(200) : ํ‘œ์ ํ”„๋กœ์„ธ์Šค์— ๋ฉ”๋ชจ๋ฆฌ ํ• ๋‹น

WriteProcessMemory() : ํ‘œ์  ํ”„๋กœ์„ธ์Šค์˜ ๋ฉ”๋ชจ๋ฆฌ์— ์•…์„ฑ ๋ฐ์ดํ„ฐ ์“ฐ๊ธฐ

CreateRemoteThread() : ํ‘œ์  ํ”„๋กœ์„ธ์Šค์•  ์“ฐ๋ ˆ๋“œ ์ƒ์„ฑ

 

๋ฉ”๋ชจ๋ฆฌ๋คํ”„ ๊ณต๋ถ€ํ•˜๊ธฐ

 

--> vola ํ†ตํ•ด์„œ ํ•ด๋‹น ๋ฉ”๋ชจ๋ฆฌ ๋คํ”„ ํ™•์ธ๊ฐ€๋Šฅ

 

 

ํ”„๋กœ์„ธ์Šค ์ธ์ ์…˜ ๊ณต๋ถ€ 

 

Ten process injection techniques: A technical survey of common and trending process injection techniques | Elastic Blog

 

Ten process injection techniques: A technical survey of common and trending process injection techniques

Process injection is a widespread defense evasion technique employed often within malware and fileless adversary tradecraft, and entails running custom code within the address space of another process. Process injection improves stealth, and some technique

www.elastic.co

 

 

์ž๋™ํ™” ๋„๊ตฌ

 

 BriMor Labs - Tools

 

You are being redirected...

 

www.brimorlabs.com

 

Live Response Collection – Cedarpelta Build

 

- ์—ฌ๋Ÿฌ๊ฐœ์˜ ์Šคํƒ ๋“œ ์–ผ๋ก  ์‹คํ–‰ ํŒŒ์ผ์„ ๋ฐฐ์น˜ ์Šคํฌ๋ฆฝํŠธ๋ฅผ ํ†ตํ•ด ์‹คํ–‰

- ๋…ธ์ด์ฆˆ๊ฐ€ ์‹ฌํ•˜๋‹ค๋Š” ๋‹จ์  ์•„ํ‹ฐํŒฉํŠธ ์›๋ณธ์„ ์ถฉ์‹คํ•˜๊ฒŒ ํ™•๋ณดํ•จ

- Collection + Extraction(์ผ๋ถ€) ๊นŒ์ง€ ์ˆ˜ํ–‰ํ•จ

 

 

Fireeye's Redline

-๋ณ„๋„์˜ ์•„ํ‹ฐํŒฉํŠธ๋ฅผ ์ˆ˜์ง‘ ์Šคํฌ๋ฆฝํŠธ๋ฅผ ์ƒ์„ฑํ•จ

-์ˆ˜์ง‘๋œ ์•„ํ‹ฐํŒฉํŠธ๋ฅผ ๋Œ€์ƒ์œผ๋กœ ๋ถ„์„ํ•˜์—ฌ GUI ๋กœ ๋ณด์—ฌ์คŒ

- ๊ทผ๋ฐ ๋Š๋ฆผ..