SlideShare a Scribd company logo
1 of 25
Hiding in plain sight
Adam Burt
Example based on a previous case
• Customer called us in to investigate suspect machines
• Systems were infected with malicious software
• Customer already attempted discovery / analysis
• 64-bit malware
• Had to re-create the malware manually
• Attempted to evade detection / collection
Example based on a previous case
• Customer called us in to investigate suspect machines
• Systems were infected with malicious software
• Customer already attempted discovery / analysis
• 64-bit malware
• Had to re-create the malware manually
• Attempted to evade detection / collection
• Didn’t make use of any Jedi mind tricks
• Does show Fidelis Technologies (a bit)
• I feel a little bad labelling Obi-wan as malware
Scenario
• We deployed to site
• We were briefed
• We were given access to their on-site tooling (which was handy)
• Here is what we found…
Scenario
Suspect process
mftf.exe
80/TCP
C2 (internal intel)
C:Windowssystem32mftf.exe
MD5 7a02b873bfb5ec3957eef4d9983443be
Initial communications
These are the Fidelis bits - Specifically, Fidelis Endpoint
Initial communications
These are the Fidelis bits - Specifically, Fidelis Network
Let’s go get that file!
• Using customers already deployed tools
• Agent was capable of forensic capture (file / memory)
• We went to collect “C:WindowsSystem32mftf.exe”
• Sure, we can disassemble and pick through the code, easy, no problem
What did the file look like?
Static analysis
What did the file look like?
Virus Total Info
What did the file look like?
Virus Total Info
Something didn’t look right
Errrrr, what???
7a02b873bfb5ec3957eef4d9983443be != f2c7bb8acc97f92e987a2d4087d021b1
= No match!
How does this feel?
• The customer is always watching
• You feel compelled to find and fix everything humanly possible
• When something doesn’t go right, panic can set in..
How does this feel?
• The customer is always watching
• You feel compelled to find and fix everything humanly possible
• When something doesn’t go right, panic can set in..
• Even when it’s nothing to panic about
What was this malware doing?
• Rootkit?
• Custom file system filter?
• Automated suspension / termination on recognised process execution?
• Fileless / injected?
Microsoft, I’m sure you’re trying to be helpful…
File System Redirector
File System Redirector
“Most DLL file names were not changed when 64-bit versions of the DLLs were
created, so 32-bit versions of the DLLs are stored in a different directory. WOW64
hides this difference by using a file system redirector.” *
“In most cases, whenever a 32-bit application attempts to access
%windir%System32, the access is redirected to %windir%SysWOW64.” *
* https://msdn.microsoft.com/en-us/library/windows/desktop/aa384187(v=vs.85).aspx
File System Redirector
On 64-bit Windows
System32 = 64-bit
SysWOW64 = 32-bit
That makes sense 
Why was this done?
Perhaps to help us avoid that complication of re-writing in 64-bit code? oh, wait….
One reason
DLL search order
(in no particular order, due to DLL safe search, SetDllDirectory, LOAD_WITH_ALTERED_SEARCH_PATH etc..)
• The directory from which the application loaded.
• The system directory
• The 16-bit system directory
• The Windows directory
• The current directory.
• The directories that are listed in the PATH environment variable
This is the one relevant to our situation
File System Redirector
Process
File System Redirector
C:Windowssystem32 C:WindowsSysWOW64
Customer’s acquisition tools
were here
The malware
was here
Lessons learned
• Their tools didn’t accommodate the File System Redirector
• File System Redirector can be “disabled” for a process
• The malware authors didn’t have to work hard (or perhaps they didn’t know
about FSR) to hide their malware
• Other than the file collection issue, the malware was pretty obvious
• Microsoft always surprise us
“Applications can control the WOW64 file system redirector using
the Wow64DisableWow64FsRedirection, Wow64EnableWow64FsRedirection, and Wow64RevertWow64FsRedirection functions.
Disabling file system redirection affects all file operations performed by the calling thread, so it should be disabled only when
necessary for a single CreateFile call and re-enabled again immediately after the function returns.”
Hiding in plain sight
• There are many aspects that can hinder an investigation
• Investigations can take unexpected turns
• They can be stressful and emotional
• It’s easy to make an assumption, but without evidence, this is dangerous
• We are always assessing our evidence and tool sets
Questions and Contact
Adam Burt
adam.burt@fidelissecurity.com
Peter Wieschollek
peter.wieschollek@fidelissecurity.com
Lukasz Przybylski
lukasz.przybylski@eversys.pl

More Related Content

Similar to How File System Redirector Hindered Malware Detection

Ask a Malware Archaeologist
Ask a Malware ArchaeologistAsk a Malware Archaeologist
Ask a Malware ArchaeologistMichael Gough
 
SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012Rian Yulian
 
Logging for hackers SAINTCON
Logging for hackers SAINTCONLogging for hackers SAINTCON
Logging for hackers SAINTCONMichael Gough
 
Logging for Hackers v1.0
Logging for Hackers v1.0Logging for Hackers v1.0
Logging for Hackers v1.0Michael Gough
 
Programs you need!
Programs you need!Programs you need!
Programs you need!clcewing
 
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?Michael Gough
 
Programs you need!
Programs you need!Programs you need!
Programs you need!dshinkfield
 
Technical Workshop - Win32/Georbot Analysis
Technical Workshop - Win32/Georbot AnalysisTechnical Workshop - Win32/Georbot Analysis
Technical Workshop - Win32/Georbot AnalysisPositive Hack Days
 
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)BlueHat Security Conference
 
5.2. Digital forensics
5.2. Digital forensics5.2. Digital forensics
5.2. Digital forensicsdefconmoscow
 
On non existent 0-days, stable binary exploits and
On non existent 0-days, stable binary exploits andOn non existent 0-days, stable binary exploits and
On non existent 0-days, stable binary exploits andAlisa Esage Шевченко
 
Proper logging can catch breaches like retail PoS
Proper logging can catch breaches like retail PoSProper logging can catch breaches like retail PoS
Proper logging can catch breaches like retail PoSMichael Gough
 
Proper logging can catch breaches like retail PoS
Proper logging can catch breaches like retail PoSProper logging can catch breaches like retail PoS
Proper logging can catch breaches like retail PoSMichael Gough
 
Esage on non-existent 0-days, stable binary exploits and user interaction
Esage   on non-existent 0-days, stable binary exploits and user interactionEsage   on non-existent 0-days, stable binary exploits and user interaction
Esage on non-existent 0-days, stable binary exploits and user interactionDefconRussia
 
ANALYZE'15 - Bulk Malware Analysis at Scale
ANALYZE'15 - Bulk Malware Analysis at ScaleANALYZE'15 - Bulk Malware Analysis at Scale
ANALYZE'15 - Bulk Malware Analysis at ScaleJohn Bambenek
 
CNIT 152: 4 Starting the Investigation & 5 Leads
CNIT 152: 4 Starting the Investigation & 5 LeadsCNIT 152: 4 Starting the Investigation & 5 Leads
CNIT 152: 4 Starting the Investigation & 5 LeadsSam Bowne
 
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows toolIntroducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows toolMichael Gough
 
Apparatus finding bad(malware)
Apparatus finding bad(malware)Apparatus finding bad(malware)
Apparatus finding bad(malware)John Read
 

Similar to How File System Redirector Hindered Malware Detection (20)

Ask a Malware Archaeologist
Ask a Malware ArchaeologistAsk a Malware Archaeologist
Ask a Malware Archaeologist
 
SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012SANS Digital Forensics and Incident Response Poster 2012
SANS Digital Forensics and Incident Response Poster 2012
 
Logging for hackers SAINTCON
Logging for hackers SAINTCONLogging for hackers SAINTCON
Logging for hackers SAINTCON
 
Logging for Hackers v1.0
Logging for Hackers v1.0Logging for Hackers v1.0
Logging for Hackers v1.0
 
Programs you need!
Programs you need!Programs you need!
Programs you need!
 
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?
EDR, ETDR, Next Gen AV is all the rage, so why am I ENRAGED?
 
Programs you need!
Programs you need!Programs you need!
Programs you need!
 
Technical Workshop - Win32/Georbot Analysis
Technical Workshop - Win32/Georbot AnalysisTechnical Workshop - Win32/Georbot Analysis
Technical Workshop - Win32/Georbot Analysis
 
Defending Your "Gold"
Defending Your "Gold"Defending Your "Gold"
Defending Your "Gold"
 
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
 
5.2. Digital forensics
5.2. Digital forensics5.2. Digital forensics
5.2. Digital forensics
 
On non existent 0-days, stable binary exploits and
On non existent 0-days, stable binary exploits andOn non existent 0-days, stable binary exploits and
On non existent 0-days, stable binary exploits and
 
Proper logging can catch breaches like retail PoS
Proper logging can catch breaches like retail PoSProper logging can catch breaches like retail PoS
Proper logging can catch breaches like retail PoS
 
Proper logging can catch breaches like retail PoS
Proper logging can catch breaches like retail PoSProper logging can catch breaches like retail PoS
Proper logging can catch breaches like retail PoS
 
Esage on non-existent 0-days, stable binary exploits and user interaction
Esage   on non-existent 0-days, stable binary exploits and user interactionEsage   on non-existent 0-days, stable binary exploits and user interaction
Esage on non-existent 0-days, stable binary exploits and user interaction
 
ANALYZE'15 - Bulk Malware Analysis at Scale
ANALYZE'15 - Bulk Malware Analysis at ScaleANALYZE'15 - Bulk Malware Analysis at Scale
ANALYZE'15 - Bulk Malware Analysis at Scale
 
CNIT 152: 4 Starting the Investigation & 5 Leads
CNIT 152: 4 Starting the Investigation & 5 LeadsCNIT 152: 4 Starting the Investigation & 5 Leads
CNIT 152: 4 Starting the Investigation & 5 Leads
 
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows toolIntroducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
 
DR FAT
DR FATDR FAT
DR FAT
 
Apparatus finding bad(malware)
Apparatus finding bad(malware)Apparatus finding bad(malware)
Apparatus finding bad(malware)
 

Recently uploaded

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Recently uploaded (20)

Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

How File System Redirector Hindered Malware Detection

  • 1. Hiding in plain sight Adam Burt
  • 2. Example based on a previous case • Customer called us in to investigate suspect machines • Systems were infected with malicious software • Customer already attempted discovery / analysis • 64-bit malware • Had to re-create the malware manually • Attempted to evade detection / collection
  • 3.
  • 4. Example based on a previous case • Customer called us in to investigate suspect machines • Systems were infected with malicious software • Customer already attempted discovery / analysis • 64-bit malware • Had to re-create the malware manually • Attempted to evade detection / collection • Didn’t make use of any Jedi mind tricks • Does show Fidelis Technologies (a bit) • I feel a little bad labelling Obi-wan as malware
  • 5. Scenario • We deployed to site • We were briefed • We were given access to their on-site tooling (which was handy) • Here is what we found…
  • 6. Scenario Suspect process mftf.exe 80/TCP C2 (internal intel) C:Windowssystem32mftf.exe MD5 7a02b873bfb5ec3957eef4d9983443be
  • 7. Initial communications These are the Fidelis bits - Specifically, Fidelis Endpoint
  • 8. Initial communications These are the Fidelis bits - Specifically, Fidelis Network
  • 9. Let’s go get that file! • Using customers already deployed tools • Agent was capable of forensic capture (file / memory) • We went to collect “C:WindowsSystem32mftf.exe” • Sure, we can disassemble and pick through the code, easy, no problem
  • 10. What did the file look like? Static analysis
  • 11. What did the file look like? Virus Total Info
  • 12. What did the file look like? Virus Total Info
  • 13. Something didn’t look right Errrrr, what??? 7a02b873bfb5ec3957eef4d9983443be != f2c7bb8acc97f92e987a2d4087d021b1 = No match!
  • 14. How does this feel? • The customer is always watching • You feel compelled to find and fix everything humanly possible • When something doesn’t go right, panic can set in..
  • 15.
  • 16. How does this feel? • The customer is always watching • You feel compelled to find and fix everything humanly possible • When something doesn’t go right, panic can set in.. • Even when it’s nothing to panic about
  • 17. What was this malware doing? • Rootkit? • Custom file system filter? • Automated suspension / termination on recognised process execution? • Fileless / injected?
  • 18. Microsoft, I’m sure you’re trying to be helpful… File System Redirector
  • 19. File System Redirector “Most DLL file names were not changed when 64-bit versions of the DLLs were created, so 32-bit versions of the DLLs are stored in a different directory. WOW64 hides this difference by using a file system redirector.” * “In most cases, whenever a 32-bit application attempts to access %windir%System32, the access is redirected to %windir%SysWOW64.” * * https://msdn.microsoft.com/en-us/library/windows/desktop/aa384187(v=vs.85).aspx
  • 20. File System Redirector On 64-bit Windows System32 = 64-bit SysWOW64 = 32-bit That makes sense  Why was this done? Perhaps to help us avoid that complication of re-writing in 64-bit code? oh, wait….
  • 21. One reason DLL search order (in no particular order, due to DLL safe search, SetDllDirectory, LOAD_WITH_ALTERED_SEARCH_PATH etc..) • The directory from which the application loaded. • The system directory • The 16-bit system directory • The Windows directory • The current directory. • The directories that are listed in the PATH environment variable This is the one relevant to our situation
  • 22. File System Redirector Process File System Redirector C:Windowssystem32 C:WindowsSysWOW64 Customer’s acquisition tools were here The malware was here
  • 23. Lessons learned • Their tools didn’t accommodate the File System Redirector • File System Redirector can be “disabled” for a process • The malware authors didn’t have to work hard (or perhaps they didn’t know about FSR) to hide their malware • Other than the file collection issue, the malware was pretty obvious • Microsoft always surprise us “Applications can control the WOW64 file system redirector using the Wow64DisableWow64FsRedirection, Wow64EnableWow64FsRedirection, and Wow64RevertWow64FsRedirection functions. Disabling file system redirection affects all file operations performed by the calling thread, so it should be disabled only when necessary for a single CreateFile call and re-enabled again immediately after the function returns.”
  • 24. Hiding in plain sight • There are many aspects that can hinder an investigation • Investigations can take unexpected turns • They can be stressful and emotional • It’s easy to make an assumption, but without evidence, this is dangerous • We are always assessing our evidence and tool sets
  • 25. Questions and Contact Adam Burt adam.burt@fidelissecurity.com Peter Wieschollek peter.wieschollek@fidelissecurity.com Lukasz Przybylski lukasz.przybylski@eversys.pl

Editor's Notes

  1. Introduce yourself: Name Position: Systems Engineering & Incident Response Working in IT since 1999 Working with computers since 1992 What is the presentation about? A view from the front lines as an incident responder Small insight into some of the challenges Small insight into the mind set and emotions of an incident responder
  2. Describe the deployment: Size of customer – Thousands of users, but only several were affected Had global sites - although only a single site was affected and only several computers On-site response team, although not an “official” IR team
  3. jinquion