SlideShare a Scribd company logo
1 of 24
1ACRONIS © 2017
ENTERPRISE FORENSICS:
RANSOMWARE INCIDENTS
Mona Arkhipova
Unit Manager of information security architecture and monitoring
POSITIVE HACK DAYS VII, Moscow, Russia
2ACRONIS © 2017
#whoami
Unit Manager of information security architecture and
monitoring, Acronis
Past:
• Head of SOC and OPS monitoring, Lead information security
expert at QIWI group;
• Security analyst at General Electric (GE Capital);
• Independent security consultant at fintech start-ups;
• *nix systems and network administrator
3ACRONIS © 2017
Previous year references (Backwards)
Enterprise forensics 101 (for those who’d missed)
https://www.slideshare.net/monasax1/enterprise-forensics-101
http://2016.phdays.ru/broadcast/
Let’s apply the basics to the real case
4ACRONIS © 2017
What is Ransomware?
• Started with simple
lock-screens
• Evolved to
cryptolockers
• “Pay-to-unlock”
5ACRONIS © 2017
Intro
Sometimes it’s just happens…Evening email may be like this:
6ACRONIS © 2017
Backwards: First steps
• Write down all the non-technical incident details – gathered user
answers
• Possibility of live response? – yes, in the same area
• Grab all the checksums/hardware details/images/etc – next
• Inspect all the related systems (if applicable) - next
7ACRONIS © 2017
Backwards: Windows live response
• MIR-ROR script with Sysinternals suite package
• DLLs, setupapi.log
• Mapped drives, opened shares
• Prefetch
• Policies
• RAW registry files (hives)
• Autorun, NTUSER.DAT from all accounts
• Imaging software: AccessData FTK imager (image+memdump)
8ACRONIS © 2017
Backwards: Imaging
• Prepared a proper drive for imaging
• Write down date, time, S/N and size of the device
• Dump memory with FTK imager or Memoryze
• Image with FTK Imager in RAW mode, write checksum for report
• Gather all the files hierarchy
• Begin to prepare your live stand
9ACRONIS © 2017
Imaging: report notes
Physical Evidentiary Item (Source) Information:
[Device Info]
Source Type: Physical
[Drive Geometry]
Cylinders: 30,401
Tracks per Cylinder: 255
Sectors per Track: 63
Bytes per Sector: 512
Sector Count: 488,397,168
[Physical Drive Information]
Drive Model: Samsung SSD 850 EVO M.2 250GB
Drive Serial Number: S33CNX0H536900H
Drive Interface Type: IDE
Removable drive: False
Source data size: 238475 MB
Sector count: 488397168
[Computed Hashes]
MD5 checksum: 4d4cc4e6c7c21d93ff62909368f7a10f
SHA1 checksum: 0f12c8c0456c09685e98c06e4f2407a3c1e29af9
Sample note
Disk imaging has been performed with
AccessData FTK imager in RAW (dd) mode.
Acquisition started: Mon Jan 30 14:06:22 2017
Acquisition finished: Mon Jan 30 15:49:15 2017
http://accessdata.com/product-download/ftk-imager-version-3.4.3
10ACRONIS © 2017
Digital forensics stand
• May be Physical or Virtual (preferable physical)
• Win7 or later
• SW for R/O mount: FTK Imager or OSFmount
• SW for MFT investigation: Mft2Csv
• AV tools, KFF (if needed), FAR and so on
11ACRONIS © 2017
Mounting
Never. Mount. Original. Evidence. Partitions.
Use hardware write blockers if possible.
12ACRONIS © 2017
Investigating
• Known files DB if you’re using enterprise suites
• User-related incident:
• IM logs
• Browsers history and cache
• Recently opened files and downloads
• Devices history
• Remote control tools artefacts
• You may try to run some AV tools against the RO image:
13ACRONIS © 2017
MFT fun – origin timestamps
• Temp folder (first point found)
• Browsers folders
• MFT
14ACRONIS © 2017
MFT fun – drill-down
Files in the same time in temp locations (suspected download)
15ACRONIS © 2017
Show me your caches
16ACRONIS © 2017
Original attachment
Original file had been lost: only the executable had been found on FS. Finding audit trails on the user and file:
17ACRONIS © 2017
Sandboxing (fast way)
You may use public(malwr, hybrid analysis) or private (such as
Cuckoo) sandboxes for fast investigation on calls.
Infection path overview
1. User downloads the file Ground-Label-05496793.doc.zip
2. This archive file contains one more Ground-Label-
05496793.doc.zip in it
3. After double-clicking both archives unzipped one by one and
original .lnk file with notepad icon extracted
4. Dropper script execution
18ACRONIS © 2017
Dropper
• The dropper script is continuously connecting to CnC domain with
the following requests, downloads the a1.exe (or a2.exe)
attachment
19ACRONIS © 2017
Updates and certs
A little bit of network requests: self-update
20ACRONIS © 2017
Meanwhile in system
• Two random test files %TEMP%a.doc and %TEMP%a.txt with 10000b length
created (seems like it’s for testing purposes only) and the following script is injected
to HKCU hive
• The file with decryption instructions added to FF or another default browser
• Execution of self-destroy
21ACRONIS © 2017
Case Conclusion & Recovery
Investigation revealed user mistake and problems with AV on
system (had not prevented infection)
• User downloaded the file from CRM case
• Tried to run
• ”No result” (encryption started in background)
Workstation recovery
• Rolled back from backup copy
• Reinstalled AV for proper work
22ACRONIS © 2017
Backwards: Enterprise notes
• Export all the related information from your security tools
• IDS/IPS,
• firewall logs,
• proxies,
• SIEM records,
• DLP,
• AV alerts
• Sometimes the initial point of compromise is not what you’ve
suspected
• If you do not see something strange in your SIEM – it is not a
reason to relax.
• Perform regular agents review on every subsystem
23ACRONIS © 2017
Backwards: Reporting
Forensics part
Common information
• Case summary (brief overview what’s
happened and when)
• Serial numbers, make, model etc.
• All the preparation steps
Investigation process
• Tools used, start and end dates
• Detailed information about process –
artifacts, pictures, documents…
Conclusion
Incident response part
• Preparation
• Identification
• Containment
• Eradication
• Recovery
• Lessons learned
(I know you still hate doing that ;))
Questions?
Mona Arkhipova
Unit Manager of information security architecture and monitoring
Mona@acronis.com /monaarkhipova
mona.sax m0na_sax

More Related Content

What's hot

Csw2017 bazhaniuk exploring_yoursystemdeeper_updated
Csw2017 bazhaniuk exploring_yoursystemdeeper_updatedCsw2017 bazhaniuk exploring_yoursystemdeeper_updated
Csw2017 bazhaniuk exploring_yoursystemdeeper_updated
CanSecWest
 
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat Security Conference
 
BlueHat v17 || Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging ...
BlueHat v17 || Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging ...BlueHat v17 || Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging ...
BlueHat v17 || Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging ...
BlueHat Security Conference
 
Lateral Movement - Phreaknik 2016
Lateral Movement - Phreaknik 2016Lateral Movement - Phreaknik 2016
Lateral Movement - Phreaknik 2016
Xavier Ashe
 
CSW2017 chuanda ding_state of windows application security
CSW2017 chuanda ding_state of windows application securityCSW2017 chuanda ding_state of windows application security
CSW2017 chuanda ding_state of windows application security
CanSecWest
 
Csw2016 freingruber bypassing_application_whitelisting
Csw2016 freingruber bypassing_application_whitelistingCsw2016 freingruber bypassing_application_whitelisting
Csw2016 freingruber bypassing_application_whitelisting
CanSecWest
 
Defcon 22-david-wyde-client-side-http-cookie-security
Defcon 22-david-wyde-client-side-http-cookie-securityDefcon 22-david-wyde-client-side-http-cookie-security
Defcon 22-david-wyde-client-side-http-cookie-security
Priyanka Aash
 
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CanSecWest
 
BlueHat v17 || “_____ Is Not a Security Boundary." Things I Have Learned and...
BlueHat v17 ||  “_____ Is Not a Security Boundary." Things I Have Learned and...BlueHat v17 ||  “_____ Is Not a Security Boundary." Things I Have Learned and...
BlueHat v17 || “_____ Is Not a Security Boundary." Things I Have Learned and...
BlueHat Security Conference
 
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
CanSecWest
 

What's hot (20)

BSides Roma 2018 - Red team techniques
BSides Roma 2018 - Red team techniquesBSides Roma 2018 - Red team techniques
BSides Roma 2018 - Red team techniques
 
Csw2017 bazhaniuk exploring_yoursystemdeeper_updated
Csw2017 bazhaniuk exploring_yoursystemdeeper_updatedCsw2017 bazhaniuk exploring_yoursystemdeeper_updated
Csw2017 bazhaniuk exploring_yoursystemdeeper_updated
 
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
BlueHat v18 || Return of the kernel rootkit malware (on windows 10)
 
BlueHat v17 || Down the Open Source Software Rabbit Hole
BlueHat v17 || Down the Open Source Software Rabbit Hole BlueHat v17 || Down the Open Source Software Rabbit Hole
BlueHat v17 || Down the Open Source Software Rabbit Hole
 
BlueHat v17 || Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging ...
BlueHat v17 || Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging ...BlueHat v17 || Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging ...
BlueHat v17 || Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging ...
 
Sticky Keys to the Kingdom
Sticky Keys to the KingdomSticky Keys to the Kingdom
Sticky Keys to the Kingdom
 
Lateral Movement - Phreaknik 2016
Lateral Movement - Phreaknik 2016Lateral Movement - Phreaknik 2016
Lateral Movement - Phreaknik 2016
 
CSW2017 chuanda ding_state of windows application security
CSW2017 chuanda ding_state of windows application securityCSW2017 chuanda ding_state of windows application security
CSW2017 chuanda ding_state of windows application security
 
Csw2016 freingruber bypassing_application_whitelisting
Csw2016 freingruber bypassing_application_whitelistingCsw2016 freingruber bypassing_application_whitelisting
Csw2016 freingruber bypassing_application_whitelisting
 
Defcon 22-david-wyde-client-side-http-cookie-security
Defcon 22-david-wyde-client-side-http-cookie-securityDefcon 22-david-wyde-client-side-http-cookie-security
Defcon 22-david-wyde-client-side-http-cookie-security
 
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
 
BlueHat v17 || “_____ Is Not a Security Boundary." Things I Have Learned and...
BlueHat v17 ||  “_____ Is Not a Security Boundary." Things I Have Learned and...BlueHat v17 ||  “_____ Is Not a Security Boundary." Things I Have Learned and...
BlueHat v17 || “_____ Is Not a Security Boundary." Things I Have Learned and...
 
Telehack: May the Command Line Live Forever
Telehack: May the Command Line Live ForeverTelehack: May the Command Line Live Forever
Telehack: May the Command Line Live Forever
 
Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...
Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...
Критически опасные уязвимости в популярных 3G- и 4G-модемах или как построить...
 
Hacker bootcamp
Hacker bootcampHacker bootcamp
Hacker bootcamp
 
Security Onion Conference - 2015
Security Onion Conference - 2015Security Onion Conference - 2015
Security Onion Conference - 2015
 
MS Just Gave the Blue Team Tactical Nukes (And How Red Teams Need To Adapt) -...
MS Just Gave the Blue Team Tactical Nukes (And How Red Teams Need To Adapt) -...MS Just Gave the Blue Team Tactical Nukes (And How Red Teams Need To Adapt) -...
MS Just Gave the Blue Team Tactical Nukes (And How Red Teams Need To Adapt) -...
 
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
CSW2017 Privilege escalation on high-end servers due to implementation gaps i...
 
Bsides NYC 2018 - Hunting for Lateral Movement
Bsides NYC 2018 - Hunting for Lateral MovementBsides NYC 2018 - Hunting for Lateral Movement
Bsides NYC 2018 - Hunting for Lateral Movement
 
Nguyen Duc Thinh - Docker security in Dev Ops environment 2.0
Nguyen Duc Thinh - Docker security in Dev Ops environment 2.0Nguyen Duc Thinh - Docker security in Dev Ops environment 2.0
Nguyen Duc Thinh - Docker security in Dev Ops environment 2.0
 

Similar to Инциденты с использованием ransomware. Расследование

Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
Kai Wähner
 
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
Robert Conti Jr.
 

Similar to Инциденты с использованием ransomware. Расследование (20)

Positive Hack Days 7 - Ransomware forensiсs
Positive Hack Days 7 - Ransomware forensiсsPositive Hack Days 7 - Ransomware forensiсs
Positive Hack Days 7 - Ransomware forensiсs
 
Not petya business case
Not petya business case Not petya business case
Not petya business case
 
Protecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry RansomwareProtecting Your organization from WannaCry Ransomware
Protecting Your organization from WannaCry Ransomware
 
Mcas log collector deck
Mcas log collector deckMcas log collector deck
Mcas log collector deck
 
Transforming your Security Products at the Endpoint
Transforming your Security Products at the EndpointTransforming your Security Products at the Endpoint
Transforming your Security Products at the Endpoint
 
Check Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private CloudCheck Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private Cloud
 
Webinar–Vulnerabilities in Containerised Production Environments
Webinar–Vulnerabilities in Containerised Production EnvironmentsWebinar–Vulnerabilities in Containerised Production Environments
Webinar–Vulnerabilities in Containerised Production Environments
 
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadkówPLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
PLNOG19 - Gaweł Mikołajczyk & Michał Garcarz - SOC, studium ciężkich przypadków
 
Mastering the move
Mastering the moveMastering the move
Mastering the move
 
Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
 
Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)Bypassing Windows Security Functions(en)
Bypassing Windows Security Functions(en)
 
Introduction to chrome os
Introduction to chrome osIntroduction to chrome os
Introduction to chrome os
 
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
 
Coscup2018 itri android-in-cloud
Coscup2018 itri android-in-cloudCoscup2018 itri android-in-cloud
Coscup2018 itri android-in-cloud
 
Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014Securing with Sophos - Sophos Day Belux 2014
Securing with Sophos - Sophos Day Belux 2014
 
Open Audit
Open AuditOpen Audit
Open Audit
 
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
ISS Capstone - Martinez Technology Consulting and Cedar Hills Church Security...
 
Secure DevOps: A Puma's Tail
Secure DevOps: A Puma's TailSecure DevOps: A Puma's Tail
Secure DevOps: A Puma's Tail
 
Beyond Horizon: Open Source Management On the Go for OpenStack and the Rest o...
Beyond Horizon: Open Source Management On the Go for OpenStack and the Rest o...Beyond Horizon: Open Source Management On the Go for OpenStack and the Rest o...
Beyond Horizon: Open Source Management On the Go for OpenStack and the Rest o...
 
Beyond Horizon: Open Source Management On the Go for OpenStack and the Rest o...
Beyond Horizon: Open Source Management On the Go for OpenStack and the Rest o...Beyond Horizon: Open Source Management On the Go for OpenStack and the Rest o...
Beyond Horizon: Open Source Management On the Go for OpenStack and the Rest o...
 

More from Positive Hack Days

Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»
Positive Hack Days
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложений
Positive Hack Days
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Positive Hack Days
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
Positive Hack Days
 

More from Positive Hack Days (20)

Инструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release NotesИнструмент ChangelogBuilder для автоматической подготовки Release Notes
Инструмент ChangelogBuilder для автоматической подготовки Release Notes
 
Как мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows DockerКак мы собираем проекты в выделенном окружении в Windows Docker
Как мы собираем проекты в выделенном окружении в Windows Docker
 
Типовая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive TechnologiesТиповая сборка и деплой продуктов в Positive Technologies
Типовая сборка и деплой продуктов в Positive Technologies
 
Аналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + QlikАналитика в проектах: TFS + Qlik
Аналитика в проектах: TFS + Qlik
 
Использование анализатора кода SonarQube
Использование анализатора кода SonarQubeИспользование анализатора кода SonarQube
Использование анализатора кода SonarQube
 
Развитие сообщества Open DevOps Community
Развитие сообщества Open DevOps CommunityРазвитие сообщества Open DevOps Community
Развитие сообщества Open DevOps Community
 
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
Методика определения неиспользуемых ресурсов виртуальных машин и автоматизаци...
 
Автоматизация построения правил для Approof
Автоматизация построения правил для ApproofАвтоматизация построения правил для Approof
Автоматизация построения правил для Approof
 
Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»Мастер-класс «Трущобы Application Security»
Мастер-класс «Трущобы Application Security»
 
Формальные методы защиты приложений
Формальные методы защиты приложенийФормальные методы защиты приложений
Формальные методы защиты приложений
 
Эвристические методы защиты приложений
Эвристические методы защиты приложенийЭвристические методы защиты приложений
Эвристические методы защиты приложений
 
Теоретические основы Application Security
Теоретические основы Application SecurityТеоретические основы Application Security
Теоретические основы Application Security
 
От экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 летОт экспериментального программирования к промышленному: путь длиной в 10 лет
От экспериментального программирования к промышленному: путь длиной в 10 лет
 
Уязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на граблиУязвимое Android-приложение: N проверенных способов наступить на грабли
Уязвимое Android-приложение: N проверенных способов наступить на грабли
 
Требования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПОТребования по безопасности в архитектуре ПО
Требования по безопасности в архитектуре ПО
 
Формальная верификация кода на языке Си
Формальная верификация кода на языке СиФормальная верификация кода на языке Си
Формальная верификация кода на языке Си
 
Механизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET CoreМеханизмы предотвращения атак в ASP.NET Core
Механизмы предотвращения атак в ASP.NET Core
 
SOC для КИИ: израильский опыт
SOC для КИИ: израильский опытSOC для КИИ: израильский опыт
SOC для КИИ: израильский опыт
 
Honeywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services CenterHoneywell Industrial Cyber Security Lab & Services Center
Honeywell Industrial Cyber Security Lab & Services Center
 
Credential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атакиCredential stuffing и брутфорс-атаки
Credential stuffing и брутфорс-атаки
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Инциденты с использованием ransomware. Расследование

  • 1. 1ACRONIS © 2017 ENTERPRISE FORENSICS: RANSOMWARE INCIDENTS Mona Arkhipova Unit Manager of information security architecture and monitoring POSITIVE HACK DAYS VII, Moscow, Russia
  • 2. 2ACRONIS © 2017 #whoami Unit Manager of information security architecture and monitoring, Acronis Past: • Head of SOC and OPS monitoring, Lead information security expert at QIWI group; • Security analyst at General Electric (GE Capital); • Independent security consultant at fintech start-ups; • *nix systems and network administrator
  • 3. 3ACRONIS © 2017 Previous year references (Backwards) Enterprise forensics 101 (for those who’d missed) https://www.slideshare.net/monasax1/enterprise-forensics-101 http://2016.phdays.ru/broadcast/ Let’s apply the basics to the real case
  • 4. 4ACRONIS © 2017 What is Ransomware? • Started with simple lock-screens • Evolved to cryptolockers • “Pay-to-unlock”
  • 5. 5ACRONIS © 2017 Intro Sometimes it’s just happens…Evening email may be like this:
  • 6. 6ACRONIS © 2017 Backwards: First steps • Write down all the non-technical incident details – gathered user answers • Possibility of live response? – yes, in the same area • Grab all the checksums/hardware details/images/etc – next • Inspect all the related systems (if applicable) - next
  • 7. 7ACRONIS © 2017 Backwards: Windows live response • MIR-ROR script with Sysinternals suite package • DLLs, setupapi.log • Mapped drives, opened shares • Prefetch • Policies • RAW registry files (hives) • Autorun, NTUSER.DAT from all accounts • Imaging software: AccessData FTK imager (image+memdump)
  • 8. 8ACRONIS © 2017 Backwards: Imaging • Prepared a proper drive for imaging • Write down date, time, S/N and size of the device • Dump memory with FTK imager or Memoryze • Image with FTK Imager in RAW mode, write checksum for report • Gather all the files hierarchy • Begin to prepare your live stand
  • 9. 9ACRONIS © 2017 Imaging: report notes Physical Evidentiary Item (Source) Information: [Device Info] Source Type: Physical [Drive Geometry] Cylinders: 30,401 Tracks per Cylinder: 255 Sectors per Track: 63 Bytes per Sector: 512 Sector Count: 488,397,168 [Physical Drive Information] Drive Model: Samsung SSD 850 EVO M.2 250GB Drive Serial Number: S33CNX0H536900H Drive Interface Type: IDE Removable drive: False Source data size: 238475 MB Sector count: 488397168 [Computed Hashes] MD5 checksum: 4d4cc4e6c7c21d93ff62909368f7a10f SHA1 checksum: 0f12c8c0456c09685e98c06e4f2407a3c1e29af9 Sample note Disk imaging has been performed with AccessData FTK imager in RAW (dd) mode. Acquisition started: Mon Jan 30 14:06:22 2017 Acquisition finished: Mon Jan 30 15:49:15 2017 http://accessdata.com/product-download/ftk-imager-version-3.4.3
  • 10. 10ACRONIS © 2017 Digital forensics stand • May be Physical or Virtual (preferable physical) • Win7 or later • SW for R/O mount: FTK Imager or OSFmount • SW for MFT investigation: Mft2Csv • AV tools, KFF (if needed), FAR and so on
  • 11. 11ACRONIS © 2017 Mounting Never. Mount. Original. Evidence. Partitions. Use hardware write blockers if possible.
  • 12. 12ACRONIS © 2017 Investigating • Known files DB if you’re using enterprise suites • User-related incident: • IM logs • Browsers history and cache • Recently opened files and downloads • Devices history • Remote control tools artefacts • You may try to run some AV tools against the RO image:
  • 13. 13ACRONIS © 2017 MFT fun – origin timestamps • Temp folder (first point found) • Browsers folders • MFT
  • 14. 14ACRONIS © 2017 MFT fun – drill-down Files in the same time in temp locations (suspected download)
  • 15. 15ACRONIS © 2017 Show me your caches
  • 16. 16ACRONIS © 2017 Original attachment Original file had been lost: only the executable had been found on FS. Finding audit trails on the user and file:
  • 17. 17ACRONIS © 2017 Sandboxing (fast way) You may use public(malwr, hybrid analysis) or private (such as Cuckoo) sandboxes for fast investigation on calls. Infection path overview 1. User downloads the file Ground-Label-05496793.doc.zip 2. This archive file contains one more Ground-Label- 05496793.doc.zip in it 3. After double-clicking both archives unzipped one by one and original .lnk file with notepad icon extracted 4. Dropper script execution
  • 18. 18ACRONIS © 2017 Dropper • The dropper script is continuously connecting to CnC domain with the following requests, downloads the a1.exe (or a2.exe) attachment
  • 19. 19ACRONIS © 2017 Updates and certs A little bit of network requests: self-update
  • 20. 20ACRONIS © 2017 Meanwhile in system • Two random test files %TEMP%a.doc and %TEMP%a.txt with 10000b length created (seems like it’s for testing purposes only) and the following script is injected to HKCU hive • The file with decryption instructions added to FF or another default browser • Execution of self-destroy
  • 21. 21ACRONIS © 2017 Case Conclusion & Recovery Investigation revealed user mistake and problems with AV on system (had not prevented infection) • User downloaded the file from CRM case • Tried to run • ”No result” (encryption started in background) Workstation recovery • Rolled back from backup copy • Reinstalled AV for proper work
  • 22. 22ACRONIS © 2017 Backwards: Enterprise notes • Export all the related information from your security tools • IDS/IPS, • firewall logs, • proxies, • SIEM records, • DLP, • AV alerts • Sometimes the initial point of compromise is not what you’ve suspected • If you do not see something strange in your SIEM – it is not a reason to relax. • Perform regular agents review on every subsystem
  • 23. 23ACRONIS © 2017 Backwards: Reporting Forensics part Common information • Case summary (brief overview what’s happened and when) • Serial numbers, make, model etc. • All the preparation steps Investigation process • Tools used, start and end dates • Detailed information about process – artifacts, pictures, documents… Conclusion Incident response part • Preparation • Identification • Containment • Eradication • Recovery • Lessons learned (I know you still hate doing that ;))
  • 24. Questions? Mona Arkhipova Unit Manager of information security architecture and monitoring Mona@acronis.com /monaarkhipova mona.sax m0na_sax