Cheatography
https://cheatography.com
Based on John Strand's Webcast - Live Windows Forensics..
Unusual Network Usage
Look at File Shares |
|
Open Sessions with Machine |
|
Session This machine has Opened |
|
NetBIOS over TCP/IP Activity |
|
List Listening TCP and UDP Ports |
|
5 - Continuous Scrolling every 5 seconds |
|
-o flag shows process ID -b flag shows executable |
|
Inspect Firewall rules |
netsh advfirewall show currentprofile
|
|
netsh firewall show config
|
Unusual Accounts
Unexpected Users in the Administrators Group |
|
List Users |
|
List Members of Admin Group |
net localgroup administrators
|
List Domain Users |
|
When looking at domain accounts, the command will be run on the domain controller. A large domain may take some time - redirect to a text file to analyze:
net user /domain > domainUsers.txt
Windows Security & System Events To Look For
Security 4720 |
User Account Created |
Security 4722 |
User Account Enabled |
Security 4724 |
Password Reset |
Security 4738 |
User Account Change |
Security 4732 |
Accout Added or Removed From Group |
Security 1102 |
Audit Log Cleared |
System 7030 |
Basic Service Operations |
System 7045 |
Service Was Installed |
System 1056 |
DHCP Server Oddities |
System 10000 |
COM Functionality |
System 20001 |
Device Driver Installation |
System 20002 |
Remote Access |
System 20003 |
Service Installation |
Search for Other Startup Items
Users' Autostart Folders |
dir /s /b "C:\Documents and Settings\ [user name]\Start Menu\"
|
|
dir /s /b "C:\Users\ [user name]\Start Menu\"
|
Use WMIC To find Start Up Programs |
|
|
|
Unusual Processes
Task List |
|
|
`wmic process list full' |
Parend Process ID |
wmic process get name,parentprocessid, processid
|
Command-Line Options and DLLs |
tasklist /m /fi "pid eq [pid]"
|
|
wmic process where processid=[pid] get commandline
|
Run Task Manager: Start->Run... and type taskmgr.exe
- Look for unusual/unexpected processes
- Focus on processes with username SYSTEM or ADMINISTRATOR or user in the Local Administrator's group.
Unusual Scheduled Tasks
List System Scheduled Tasks |
|
You can also use the Task Scheduler GUI:
Start->Programs->Accessories->System Tools->Scheduled Tasks
Look for unusual Tasks run as a user of the Local Admin, SYSTEM, or blank username
Unusual Reg Key Entries
Check the Registry Run keys for malware that has made an entry to launch itself.
- HKLM\Software\Microsoft\Windows\CurrentVersion\Run
- HKLM\Software\Microsoft\Windows\CurrentVersion\Runonce
- HKLM\Software\Microsoft\Windows\CurrentVersion\RunonceEx
- HKCU\Software\Microsoft\Windows\CurrentVersion\Run
- HKCU\Software\Microsoft\Windows\CurrentVersion\Runonce
- HKCU\Software\Microsoft\Windows\CurrentVersion\RunonceEx
C:\reg query hklm\software\microsoft\windows\currentversion\run
|
These can also be analyzed with regedit.exe
.
Autoruns.exe
from SystInternals will pull all Auto Start Entry Points.
Unusual Services
Services Control Panel |
|
List Of Sevices Available |
|
Show Service Datail |
|
Map of Service from Which Process |
|
|
Created By
Metadata
Comments
No comments yet. Add yours below!
Add a Comment
Related Cheat Sheets