AN ANALYSIS OF MICROSOFT EVENT LOGS by Michelle D. Mullinix A Capstone Project Submitted to the Faculty of Utica College December 2013 in Partial Fulfillment of the Requirements for the Degree of Master of Science in Cybersecurity © Copyright 2013 by Michelle D. Mullinix All Rights Reserved ii Abstract Microsoft Windows event logs are central to conducting an investigation when determining whether or not a virus has been installed on a targeted system. However, there was very little substantial research about Windows event logs and how they are used in conducting an investigation. This research explores forensic artifacts recovered during an investigation to determine whether virus activity may be involved. The research describes the relevance of the event logs and discusses various techniques used for investigators to collect and examine the logs. Three viruses, Fizzer, Zeus, and MyDoom were installed and run in virtual machines to determine what events will populate in the logs. This research also explains best practices regarding the use of Windows event logs in an investigation. Keywords: Cybersecurity, Professor Christopher Riddell, Professor Cynthia Gonnella, Security, Application, System, Malware. iii Acknowledgments I would like to thank my family for their support by allowing me the time to lock myself away with this research and throughout the courses for both my Bachelors of Science and my Master of Science in Cybersecurity. I especially would like to thank Tyrone Mullinix, my best friend and husband for not letting me quit at the times that I was frustrated, disillusioned and exhausted due to such heavy academic and life loads. I would also like to thank Cynthia Gonnella, Vern McCandlish and Craig Nelson for being my 1st Chair, my 2nd reader and a 3rd Subject Matter Expert, respectively. Finally, I would like to thank Mark Low, my editor and most importantly, Utica College for having such an outstanding degree program in Cybersecurity. iv Table of Contents List of Illustrative Materials........................................................................................................... vi An Analysis of Microsoft Event Logs ............................................................................................ 1 Literature Review............................................................................................................................ 9 Methodology ................................................................................................................................. 14 Key Event IDs ........................................................................................................................... 18 Selected Viruses for Infection ................................................................................................... 20 Fizzer. .................................................................................................................................... 21 Zeus. ...................................................................................................................................... 21 MyDoom. ............................................................................................................................... 22 Processing a Compromised Machine ........................................................................................ 22 Setting up WINSNORT ............................................................................................................ 35 Whitelists and Blacklists ........................................................................................................... 40 Discussion of Findings .................................................................................................................. 41 Future Research Recommendations .............................................................................................. 48 Appendix ....................................................................................................................................... 54 References ..................................................................................................................................... 56 v List of Illustrative Materials Table 1. Windows OS Release Years ............................................................................................ 1 Figure 1. Application and Services Logs ........................................................................................ 7 Figure 2. Event Viewer Prototypes ............................................................................................... 17 Figure 3. Temporary Internet File Locations. ............................................................................... 24 Figure 4. Registry File Tree .......................................................................................................... 25 Figure 5. RunRedLine batch file ................................................................................................... 26 Figure 6. Application Log Event ID 1000 .................................................................................... 29 Figure 7. Zeus Trojan Installation. ................................................................................................ 30 Figure 8. Fizzer Virus Installation. ............................................................................................... 31 Figure 9. Windows Server 2008 x 64’s ........................................................................................ 32 Figure 10. Event Log Viewer after Fizzer installation. ................................................................ 33 Figure 11. Avast virus scan results. .............................................................................................. 34 Figure 12. McAfee blocking the Fizzer virus ............................................................................... 35 Figure 13. Final execution of Snort .............................................................................................. 37 Figure 14. Setup of the IIS Manager in Windows. ....................................................................... 38 Figure 15. Installation of Snort as a Service. ................................................................................ 39 Figure 16. Barnyard2 after reboot ................................................................................................. 40 vi An Analysis of Microsoft Event Logs The purpose of this research was to analyze Microsoft Windows event logs for artifacts that may be pertinent to an investigation. How are investigators using Windows event logs in forensic investigations? How do investigators approach the various types of breaches when collecting data from Windows event logs? What are the best practices to analyze Windows event logs? The world of Digital Forensics is expanding each day. There are many OSs available for use by professionals and casual users to choose from. In 2013 the three main OSs in use on nontablet computers are Windows, Linux and Mac OS. This research focuses on the Windows OS. The first version of Windows was Windows 1.0 which was released in 1985 (Microsoft, 2013). Since that time, there have been 8 major new Windows releases. Table 1 lists Windows OS and their release dates. Table 1 Windows OS Release Years Windows 1.0 Windows 2.0 Windows 3.0 Windows 95 Windows 98 Windows XP Windows Vista Windows 7 1985 1987 1990 1995 1998 2001 2006 2009 Windows 8 2012 Note. This table illustrates the various Window OS and when they were released by Microsoft. Mark Hackman (2013), a staff writer for PC World, reports that according to Net Applications’ NetMarketshare tracker in June 2013, about 44.37% of computers are using Windows 7 and another 5.1% are using Windows 8. The newest Windows OS update, Windows 1 8.1, was released to manufacturers on August 27, 2013 (Endler, 2013). Most businesses and home users choose Windows based systems over Macs due to the lower operational and training costs (Menga, 2008). These statistics indicate that over half of the computers currently used are Windows based systems. The amount of Windows based systems in use by businesses and home users gives criminals a broader range of computers to break into for any type of data theft. Home users typically do not keep their systems as secure as they should (Byrne, Howe, Ray, Roberts, & Urbanska, 2012). Programmers often design computer hacking techniques called "hacks" to test certain scenarios. Regardless of the purpose they were designed, organized cyber criminals who are computer savvy often employ these hacks for nefarious purposes. The criminals either buy a hack from the author or they find it on a hacking website (Jordan, 1998). Cyber criminals will break into home user systems in order to build a network to attack a corporate or government target (Wash, 2010). This intrusion and victimization of another's computer is called a Botnet. The number of Windows event logs has grown over the years. For instance, prior to Windows Vista, there were only three main logs in the event viewer, System, Security and Application. Today there are application specific logs and service logs as well in the main event viewer. There are an additional 100 plus log files, but this research focused on the main three, System, Security and Application. Windows event logs are used to help correlate and prove that certain actions occurred at certain times and by specific individuals, groups or IP addresses. For instance, Windows Security event logs can be analyzed to help determine how many failed logon attempts occurred in a particular time period. It can also be used to identify who logged in by examining the Event ID 4624 (Smith, 2013). Cyber attackers use event logs nefariously to determine what is running on a 2 targeted network so they can take advantage of known threats that have not been patched (Stuttard, 2008). This research discusses the importance of specific logs when providing facts to an investigator. When discussing how event logs will be used during an investigation, it is important to differentiate between the various types of analysis and forensic practices. Different logs and methods of collection are necessary depending on the type of investigation or attack defense. Investigators will perform either a traditional or live analysis of the data stored within a computer or on a network. The purpose for the collection of the targeted data usually dictates which type of analysis should be performed. Today, it is expected to be a hybrid of both because some important computer processes and data are stored in volatile memory, such as RAM. RAM requires continuous power and will fade away as soon as the system is shutdown. Therefore, it cannot be collected once systems are shut down (Cummings, 2008). There are three main types of analysis, traditional, live, and network. Traditional, or dead-box analysis, includes shutting down the computer and removing the hard drive or other media from the computer for analysis with another machine (Amari, 2009). Live analysis refers to the capturing of data while the computer is still running. A live analysis targets data on the hard drives and attached media, artifacts of the operating system (OS), processes and data stored in volatile memory, and network traffic coming in or going out of the computer (Amari, 2009). Investigators often concentrate on the type of data stored in RAM. Since RAM memory is volatile and must be analyzed or captured while the machine is operating, a live analysis is required. RAM is where processes run and significant data that is not stored elsewhere may be collected. Memory forensics is the analysis of RAM that stores data while a machine is running 3 (Amari, 2009). RAM can be collected using tools such as a Tribble Card, a hardware based tool (Carrier, 2004). Another memory collection method is to use software tools such as Memdump, built into the Windows OS or another trusted tool; for example KnTTools (GMG Systems Inc, 2007). KnTTools is one of two winners at the Digital Forensics Research Workshop (DFRWS) 2005 Forensic Challenge (Garner & Mora, 2005). Once the RAM data has been collected, it can be saved and analyzed later. The last type of analysis, network forensics, is a specific network analysis after security attacks or other cybercrime has occurred (Janssen, Cory, 2013). Today’s technology has decreased the RAM requirements to run the OS. However, it has also increased the amount of RAM that Windows OS is capable of using on a computer system (Microsoft, 2013). This gives the computer operator the ability to run more applications at the same time for increased productivity. It also increases the size of the collected RAM file. These are considerations that investigators must consider to ensure that enough time and storage capacity are provided to collect the RAM. Another important consideration for today's investigators are the various types of devices they will encounter and the specialized equipment or skills required to collect data. Technology has advanced so much that people carry small computers with them daily; some in the form of smartphones. PC Magazine describes smartphones as a cellular telephone with built-in applications and Internet access (PCMagazine, 2013). The Nielsen Company survey of the 3rd Quarter of 2012 showed that 50% of mobile subscribers owned smartphones (Nielsen Ratings, 2012). Yet another aspect of the evolution of computer analysis is the availability of the Internet to support a cyber-attack. With the small computers carried on person, and the widespread 4 availability of connections to networks and Internet, criminals are finding even more creative ways to facilitate crimes involving electronic means. Wireless access points are available almost everywhere in populated areas offered by businesses such as Starbucks and Barnes and Noble. According to the study, “Global Developments in Public WiFi” there will be 5.8 million hotspots globally by 2015 (Wireless Broadband Alliance, 2011, p. 5). In 2012, a study by Pew Research found that 77% of home users have at least one desktop or laptop, 44% own a smartphone, and 18% own a Tablet (Christian, Mitchell, & Rosenstiel, 2012). People use computers to help make their lives easier and to complete repetitive tasks faster. Cyber Intruders and their targets are in a constant state where the targets are resigned to attacks and the intruders are able to exploit and disrupt networks without suffering the consequences (Endicott-Popovsky, 2007). Many banks that once used Unix Systems, have updated to Windows based systems and servers to store account balances and transactions along with millions of personally identifiable information (PII) on their customers (Narter & Greer, 2012). With some banks making a change from a UNIX core to a Windows core, it is crucial that the event logs are closely monitored for signs of attacks. In 2009, Microsoft and Temenos partnered to establish a new Core banking system (Conz, 2009). They merged Microsoft's operating platform software and the .NET architecture to produce the same functionality and scalability of similar mainframe and UNIX based systems. In a personal communication, C. A. Nelson, a leading Digital Forensic Investigator for Microsoft stated, “The rationale for forensics is grounded on a spectrum of problems, some of which face the consumer such as malware, abuse, piracy, botnets, ID theft or spying”. Forensic Investigators use many tools to trace attacks by unskilled hacker criminals who use scripts created by professional hackers for the thrill of it. These script scavengers are often referred to as 5 Script Kiddies (Techopedia, 2013). There have been many reports in the news about various hacking incidents. As an AP Reporter, Tom Krisher, reported in September 2013, hackers now have the ability to break into the computers on a car. In one demonstration, it was proven that a hacker can slam the brakes on a car that is moving and they can shut down the engine (Krisher, 2013). The U.S. Department of Energy suffered a data breach that allowed hackers to steal 53,000 current and past employee’s PII including their Social Security Number (SSN), Name and Date of Birth (DOB) (Schwartz, 2013). In Pierce County, Washington, individuals qualified for Section 8 housing, but on the waiting list, had hundreds of their SSNs displayed due to human error (Greenberg, Adam, 2013). Collecting thousands of PII records allows criminals to steal the identity of these victims. Krisher went on to report that no victims have reported an issue with the compromise of their personal information (Krisher, 2013). Many of these types of attacks may be detected or investigated through the use of event log monitoring and alert functions. Some of the primary event logs are Application, Security and System. In addition to several others, Forwarded Events and Setup under the Windows log file allow for the monitoring of remote event logs and alerting of events of interest. There are other logs in the Applications and Services folder including Hardware Events, and Media Center (See Figure 1). To set up the Operational Log, the system administrator, after selecting the Properties, can enable and adjust the size of the log and how often it is updated or cleared. If the computer is not on a corporate network, the individual owner of the system can setup these logs. 6 Figure 1. Application and Services Logs Screenshot of the Windows event logs as displayed in the Event Viewer in Windows 8. One way event logs can be helpful during an investigation is to search for certain artifacts that will help identify the source of an attack. The IP address is an important key when trying to locate a specific individual or group. This is one of the reasons various event logs are so important for the collaboration and confirmation of other hard data found on the system or network. IP Addresses by themselves cannot be filtered using the event log as the filtering mechanism. However, a specific IP can be found by using Microsoft’s Power Shell GetNetIPAddress Cmdlet (Microsoft, 2012). Another way to get IP addresses would be to create a custom view and use the XML tab to write the query (PaperCut, 2013). One case where IP addresses were a key point in the investigation is the APT1 unit Cyber Espionage attack. Mandiant, one of the leading security companies, released a report concerning one of the Cyber Espionage units in China (Mandiant, 2013). Mandiant named the unit “APT1”. 7 An Advanced Persistent Threat (APT) has become the most common attack on enterprise level network systems. APT attacks are usually carried out by well-funded and educated Nation States such as China, or other criminal groups conducting cyber espionage (Cloppert, 2009). Mandiant responded to 150 victims in seven years that APT1 had stolen vast amounts of data from (Mandiant, 2013, p. 2). Mandiant's report discovered several key findings. One finding is that APT1 is believed to be the 2nd Bureau of the People’s Liberation Army (PLA). The unit designator is "Unit 61398". The PLA is specifically looking to “compromise organizations in a broad range of industries in English speaking countries” (Mandiant, 2013, p. 4). Mandiant found that there were 614 distinct routable IP addresses registered in China where these attacks originated. Mandiant revealed three of the personas that were used by these attackers. One is “UglyGorilla”, who has registered domains that were attributed to APT1 (Mandiant, 2013, p. 5). There is also evidence that this unit recruits new talent from the Science and Engineering departments of China’s universities (Mandiant, 2013, p. 11). APTs tend to target specific organizations to steal specific data or cause specific damage (Cloppert, 2009). Another way event logs can help identify when these types of attacks are happening is by identifying an increase in elevated login’s late at night (Grimes, 2012). This research paper will analyze several Windows event logs for artifacts that can assist investigators in halting an attack or catching an insider threat. Throughout the research, various examples of breaches that might require a forensic examination are identified. Examples of how investigators use the information found in various event logs during the course of their investigation are discussed, in addition to best practices for analyzing the logs to allow the investigators to use a particular event or use a more holistic approach, based on the breach or threat. Finally, the research suggests and 8 identifies techniques for parsing log data more efficiently. These tools and practices will assist new or seasoned investigators in their approach to using event logs more efficiently to recognize, deter, and investigate network incidents. Literature Review According to James P. Anderson Company in a report titled “Computer Security Threat Monitoring and Surveillance” a clandestine user is possibly the most difficult to detect by normal audit trail methods. This shows that event logs were used in various network analysis before being used by digital forensic investigators for investigative purposes. The summary of this particular report states the need to augment the log collections to assist the security personnel at any corporation (Anderson, Computer Security Threat Monitoring and Surveillance (Vol. 17), 1980). The Computer Security Technology Planning Study that was conducted in 1972 for the U.S. Air Force was requested because of a need to secure both classified and unclassified networks. At that time, the security of computer systems was an add-on after OS development (Anderson, Computer Security Technology Planning Study, 1972). In the 1980’s, computers became more affordable for average consumers and businesses and law enforcement realized they had a new crime class, computer crime (Bem, Feld, Huebner, & Bem, 2008, p. 44). In the National Institute of Justice, Issues and Practices, “Organizing for Computer Crime Investigation and Prosecution”, computer related crime was defined to help law enforcement and prosecutors establish better guidelines. Computer-related crime, defined to be any illegal act that requires the knowledge of computer technology for its perpetration, investigation, or prosecution, is used to capture the broad range of offenses that investigators and prosecutors have been required to handle. (Conly, 1989, p. 6) 9 This report contained several site studies for various police departments. According to one site study, the police agency began using a departmental modem in 1981 and found that electronic bulletin boards were being used to share illegal information among some of the board users. Another study found that while most of the cases involved juveniles, one case involved a disgruntled employee who stole proprietary data from the company he was leaving (Conly, 1989, p. 17). The “Computer Crime Investigation and Prosecution” report is a very thorough document that also discusses the challenges of collecting computer related evidence from these “file cabinets” requiring training and expertise (Conly, 1989). The 18 United States Code (USC) Section 1029: The Access Device Statute “defines and establishes penalties for fraud and illegal activity that can take place by the use of such counterfeit access” (Harris, Harper, Eagle, & Ness, 2008, p. 19). This USC section refers to passwords, credit card numbers, phones and PINs which are identified as the credential and the device (Division of Homeland Security and Emergency Services, 2013). This law was used when charges were brought against an alleged criminal that accessed credit card information from a retail sales agency by breaking into their network and stealing this information for nefarious use. The US Department of Justice, brought charges against three people who had hacked into eleven cash registers for Dave & Busters and then sold the information to others who made fraudulent purchases (Depatment of Justice, 2008). At least one of the people in this case, Albert “Segvec” Gonzalez, was also indicted in another case in 2008 that involved eleven perpetrators (Department of Justice, 2008). This case was unsealed in 2010 and was reported by CBS News (CBS News, 2010). In March of 2010, Albert Gonzalez was sentenced to 20 years in prison for these identity theft charges (Feeley & Van Voris, 2010). The United States Army requires, according to Army Regulation 25-2, that Audit Logs 10 are examined once a week by System Administrators (United States Army, 2009). The Army requires that these audit logs are maintained for ninety days (United States Army, 2009, p. 32). Caroline Allinson, a former member of the Queensland Police, stated: The audit is now a process where a record is maintained of a particular series of events in order to provide evidence in the case of a dispute, to ensure compliance with certain rules and regulations, to check on the effectiveness of control systems, and to provide evidence in the case of criminal activity. (Allinson, 2001, p. 410) Microsoft states “event logs record events that happen on the computer. Examining the events in these logs can help you trace activity, respond to events, and keep your systems secure” (Microsoft, 2013). Harlan Carvey describes event logs as “files within the file system” (Carvey, 2009). Event logs can be changed by configuring what events are being audited and how they are configured on the targeted system (Carvey, 2009). Steve Anson and Steve Bunting, the authors of a book called Mastering Windows Network Forensics and Investigations, the authors inserted a note on page 327about the convenience of the config folder. Anson & Bunting stated the registry hive files and the event log files are both located in the system32/config folder. By collecting and analyzing this folder while waiting on the official report, the investigator can keep the network examination moving (Anson & Bunting, 2007). Computer forensic investigators should be looking at two different types of audits when investigating for a corporation (Brown, 2006). The first set is the logs collected before the current investigation and the second is the information system audits conducted during the current investigation (Brown, 2006). Brown recommends that computer forensic investigators read and understand the IS Standards, Guidelines and Procedures for Auditing and Control Professionals (ISACA). ISACA provides a guideline for specific auditing procedures in three of 11 eight areas including, IS Risk Assessment, Digital Signatures and Desktop Support Policies (Brown, 2006, pp. 71-72). ISACA has also published a performance guideline that describes what constitutes Audit Evidence (ISACA, IT Audit Assurance Guidance, 2010, pp. 22-23). Audited events are written to the three primary log files: Application, System and Security (Anson & Bunting, 2007). Anson and Bunting go on to write “Application logs provide a space where any application that wants to use the Windows APIs can note significant events to that application” (Anson & Bunting, 2007, p. 327). One application is Internet Explorer, used to access the Internet from any computer with various OSs (Microsoft, 2007). In United States vs. Milton Scott Pruitt, Mr. Pruitt was convicted of accessing child pornography on his work computer (United States v. Milton Scott Pruitt, 2011). Mr. Pruitt had been a police officer at the time he committed the crimes. In 2007, Milton Scott Pruitt ("Defendant"), a deputy sheriff in the Forsyth County Sheriff's Department, used his work computer to access and view child-pornography images. Instead of saving the images directly to his work computer, Defendant used his computer to access the images remotely: the images remained stored electronically on the County's network server. The images resided in computer folders assigned to the sole Forsyth County detective in charge of investigating computer crimes, including childpornography cases; and some of the files were identified, in part, by the letters "CP," an abbreviation the County used for "child pornography." Defendant had no work-related purpose for accessing the images. (United States v. Milton Scott Pruitt, 2011, p. 2) U.S. v. Pruitt goes on to show that the investigator located the temporary Internet files in Mr. Pruitt’s home computer’s cache (United States v. Milton Scott Pruitt, 2011, p. 3). Mr. Pruitt did access his computer from work remotely and what brought his case to light was the increased 12 network use after the normal work day has ended (United States v. Milton Scott Pruitt, 2011, p. 1). Mr. Pruitt did not actively download any of the child porn; he simply viewed it (United States v. Milton Scott Pruitt, 2011, p. 6). “The ordinary meaning of 'receive' is to knowingly accept; to take possession or delivery of; or to take in through the mind or senses" (United States v. Milton Scott Pruitt, 2011, p. 7). 18th U.S.C. describes “knowingly receives” when he “intentionally views” child pornography (United States v. Milton Scott Pruitt, 2011, p. 7). Based on this information, Mr. Pruitt’s conviction was affirmed (United States v. Milton Scott Pruitt, 2011, p. 9). Application analysis helps to establish a picture when viewed as a whole (U.S. Department of Justice, 2004). “Analysis of logs generated by network services, a firewall or a web server fall under Application Analysis” (Carrier, 2003, p. 7). Network Administrators can inadvertently clear the application log files by clearing the Microsoft Directory Synchronization logs in Windows Server 2003 according to Article ID 906516 on the Support.Microsoft.com website (Microsoft, 2013). The National Security Agency (NSA) published a report called Spotting the Adversary with Windows Event Log Monitoring (National Security Agency, 2013). This report recommends certain Windows events that would show a machine may have been compromised. Some of these events are 1000-1004 and 4097 (National Security Agency, 2013, pp. 29-30). All of these events will populate in the Application Log. Microsoft made an important announcement on November 14, 2013 in the battle against organized crime. They announced a new Cybercrime Center in Redmond, WA. According to Moreno, “The Cybercrime Center maps, tracks and traces organized crime groups. A major part of the effort is to disrupt botnets, which are networks of hacked computers used to defraud 13 people and financial institutions.” (Moreno, 2013, p. 1). Microsoft is using their resources to track organized crime and the malware that makes use of botnets, confirming that big business is taking APTs seriously. This research analyzed several Windows event logs for artifacts that can assist investigators in halting an attack or identifying an insider threat. As demonstration models, examples were provided of various breaches that might require a forensic examination. Examples were also provided of how investigators use the information found in various event logs during the course of their investigation. In addition, best practices for analyzing the logs based on the breach or threat were discussed. Finally, the research suggested and identified techniques for efficiently parsing log data. Methodology In the interest of time, the research was conducted on three VMs that were loaded on a Hewlett Packard Pavilion Elite m9515y with 8 GB of RAM and an AMD Phenom 9850 QuadCore Processor at 2.50 GHz, running a 64-bit Windows 7 Ultimate, SP1 OS. The VMware workstation is version 8.0 build 1035888. The OSs for the VMs are two patched Windows 7 OS, one is a 64 bit and the other is a 32 bit OS. The final VM is a patched Windows Server 2008. Patched systems are computers that have received and installed the latest updates (MIT, 2013). Open source network IDS tools were used in lieu of commercial tools to provide a means for another researcher to follow this methodology as a means of validation at a later point in time. Plenty of open source tools are available to download and use freely without cost. The tools chosen for this research are accepted in the networking community and perform as well as commercial tools that require payment, called “fee-for-service”. Open source tools are generally funded by donations. If the funding disappears, this may cause the tool to become obsolete 14 because it was not updated to keep up with changing technology and OSs. The fee-for-service tools are generally used for enterprise networks and will keep their virus and malware detection files updated for the company. Symantec's Norton AntiVirus (Norton) is an example that allows individuals and enterprise entities to download its proprietary software and manage it on the customer’s network. Norton releases patches, virus and malware updates regularly. Home users pay a small annual fee while enterprise users will pay a larger annual fee based on the number of clients. For instance, small businesses with 50 clients will pay $1,350.00 per year (Norton, 2013). For the purposes of this research, the free intrusion detection system (IDS) software, WINSNORT was installed on the three VMs as the IDS. “Snort is an open source network intrusion prevention and detection system” (Snort, 2013). WINSNORT is a version for Snort for Windows systems only. Snort itself can be run using the command line interface. Both WINSNORT and Snort use the current version of Snort. The only difference is that additional tools are required to set up WINSNORT on Windows. In each instance of testing, Snort was installed before a virus was introduced. Additionally, each VM had a different version of virus protection installed after the malware was introduced. Safer-Networking Ltd's Spybot version 2.1.21 SR 2 was installed on the patched Windows 7 x 64 VMs (Safer Networking, 2013). AVAST Software's free home version 9 was installed on the Windows 7 x 32 VM. (Avast, 2013). McAfee's antivirus version 8.8 was installed on the Windows Server 2008 VM. (McAfee, 2013). An explanation of the various network settings in VMware is necessary to understand why this is a useful way of testing without infecting other machines on both the Internet and internal network. The VMware Help menu explains how to set up a bridged network allowing 15 two or more VMs to be networked together. To accomplish the virtual network, certain hardware is necessary. The host system must have two network adapters to create a virtual network with the VMs. In this case, one of the VMs used the wireless network adapter, and the other used the wired network adapter. The virtual network was created using the Windows Server 2008 and one of the Windows 7 x64. VMware’s snapshot feature was used to create a snapshot at the various stages of setup, infection and cleanup after the data had been collected for analysis. Related Event IDs were collected and explained in detail as each virus was run against a given VM. VMs are fully functioning computers with an OS, with the look and feel of an ordinary desktop computer. The only difference between the VM and the host machine is the VM runs on the host machine and does not use any physical space except on a hard drive. The VM uses the host machine’s hardware. VMware is one particular brand of VM tools; however, Microsoft has also enabled the ability to create VMs through its Hyper Visor. VMs are used to increase productivity in businesses and allow businesses to create test machines before updating or upgrading the software they use in day to day operations. VMs can also be encrypted and even have an “expiration date” for students or companies to evaluate any business software tools (VMware, 2013). Most VM software allows the user to take snapshots or create clones for testing. In this research, snapshots were used to set a baseline of the VM as originally created, and then after the virus was introduced another snapshot was taken. Snapshots are an efficient means of testing virus activity in an OS, as it allows the ability to revert back to the VM in its original state before the virus was introduced without having to create the VM all over again (VMware, 2013). It is commonly seen and used today in many technology situations including wireless networking. Each virtual system had one virus installed: Fizzer, Zeus and MyDoom. As a precaution, 16 none of the machines were ever allowed Internet access. The machines were unable to see any hardware on the host system except the hard drive. The printer, disk drive, USB drive and Network were all turned off. This was to ensure these viruses did not infect the host machine or the Internet Service Providers (ISP) network. The event viewer open source tool, Windows Event Log Viewer (evtx_view) prototype was used to search for all events that helped identify when a virus is installed. Windows Event Log Viewer was also used to analyze what other Event IDs indicated that a virus is at work on a computer or network. This tool can be used on a live host machine or the files can be copied from one machine and examined on another that has the viewer installed (Works, 2012). Windows Event Log Viewer shows the event in each log identified as an “R” file. Under the “R” file the Records folder then displays the event number and the Event ID. Figure 2 below is a screenshot of the first record as 0001 [1531]. The number "1531" in brackets is the actual event ID and reports that a user profile service has started successfully (Microsoft, 2013). Figure 2. Event Viewer Prototypes by TZ Works, LLC while operating this tool. In this screenshot, record 0001 indicates that according to event ID 1531, the Windows User Profile has started. During each phase, the investigator examined the security logs, application logs and the system logs to determine what had changed and what had not changed. Each machine was base lined to allow easier tracking of the changes. A base line system means the initial installation of 17 the OS has been completed, the updates are up to date, and any additional programs needed to conduct business in day to day operations have also been installed. Each of the updated VMs had the Windows automatic update turned on but could not access the Internet once an infection was introduced. After infection, each VM was left running for four to six hours to allow Event IDs to be initiated. Key Event IDs Due to time constraints, not all Windows Event IDs were examined. This research focused on what events were created when a virus was installed on a system and identified attempts to communicate with its creator. Application logging is automatically turned on by default in the Windows OS and populates in the Application log. Normally, AppLocker is an additional tool that would be set up on a network and works with Group Policies to prevent viruses, which are applications, from being installed (Microsoft, 2012). While it is recommended that AppLocker be installed in a production environment, it would prevent the virus installation, and as such, the researcher did not install and populate AppLocker. AppLocker helps administrators control which applications and files users can run. These include executable files, scripts, Windows Installer files, dynamic-link libraries (DLLs), packaged apps, and packaged app installers. (Microsoft, 2012, para. 1) The researcher observed certain key events that occurred when a virus had been installed: application crashes, system or service failures and Windows firewall alerts. Application crashes were reported by Event IDs 1000-1004, Windows Error Reporting (WER) 4097 and 1001 (National Security Agency, 2013, p. 29). Event ID 1000 is an Application Error, event ID 1002 is an Application Hang notice. Event ID 1000 and 1001 also occur when a Blue Screen of Death (BSOD) has occurred. WER 4097 occurs when a DrWatson error has occurred on Windows XP. 18 WER 1001 is also used to provide information about additional errors that occurred. Further information can be gained by examining each event ID. Event IDs should be collected when the system fails or after service failures. These events are logged in the System log of Windows 7 and Server 2008 are 7000, 7001, 7022, 7023, 7024, 7026, 7031, 7032 and 7034 (National Security Agency, 2013, p. 30). 7000 and 7001 event IDs did occur on the Windows Server 2008 x 64 VM. Event 7000 occurred on 10/29/2013 at 4:39 pm PST. Event ID 7001 was a Winlogon error that occurred on 10/29/2013 at 5:14:14 pm PST. This occurred after the virus was installed. Event ID 7023 occurred on 10/29/2013 at 4:26:02 PM. Windows update failed events are logged in the Microsoft-WindowsWindowsUpdateClient/Operational log. The update failed events are 25 and 31. The event ID 1000 also shows when an application has crashed. This can be indicative of a virus. Hotpatching failed event is 1009 and is located in the Setup log. The researcher did not see the Hotpatching event in any of the VMs. Distributed Component Object Model (DCOM) invalid permission event is 10016 and populates in the System log. This event ID was observed to have occurred on 11/8/2013 at 10:00 am PST. Windows update failed for Windows XP is event ID 20. Windows XP populates Event IDs 11708 and 11923 in the Application log. These two events occur when the Microsoft Windows Installer (MSI) Installer fails (Microsoft, 2013, para. 1). Firewall logs need to be collected if the state goes from on to off. Those Event IDs are 2004, 2005, 2006, 2033 and 2009 (National Security Agency, 2013, p. 31). In Windows XP, the Event IDs are 852, 851 and 854. These are populated in the Microsoft-Windows-Windows Firewall with Advance Security/Firewall and the Security logs. Some of these Event IDs were expected to be populated because the virus was running on a VM that was not connected to the 19 Internet. Monitoring account logon/logoff information can be key to determine when malicious activity has occurred if an unauthorized user appears in a privileged group. SQL injections can be used to log on with an unauthorized username and password by using Power Shell to inject a dynamic link library (DLL) into an existing winlogon process (clymb3r, 2013). While not part of this research; SQL injections would be beneficial for future research. The following user account Event IDs should be examined if malicious activity is suspected. The corresponding Event IDs were not observed in this research, which is likely due to the fact that the full set up of a network including privileged groups was not part of the project. These Event IDs all populate in the Security log and are account lockout event ID 4740, user added to privileged group event ID 4728, 4732 and 4756. The successful user account login, event ID 4624. The failed user account login event ID 4625 and finally account login with explicit privileges, event ID 4648. See Appendix A for further information on each event ID identified. Selected Viruses for Infection Viruses are omnipresent on the Internet and a significant number of them are created on a daily basis. Some are created by nation states and others are created by individuals. Kaspersky stated in their 2012 report that, “exploits for Windows and Internet Explorer were the third most popular,” compared to Oracle in first place, and Adobe in second place (Kaspersky, Security Bulletin, 2012). In 2011, 75% of all malicious programs on the Internet were malicious URL’s or websites (Kaspersky, Security Bulletin, 2012). Three viruses were selected for installation and examination on the VMs: Fizzer, Zeus, and MyDoom. 20 Fizzer. The first of the three viruses that was downloaded and installed in one of the virtual systems is purported to be financial in nature by F-Secure. Fizzer was spread through email and the file-swapping service, Kazaa. According to F-Secure, “the virus contained a built-in IRC backdoor, a Denial of Service (DoS) attack tool, a data-stealing Trojan (uses external keylogger DLL), an HTTP server and other components” (F-Secure, Worm:W32/Fizzer, 2013). The keylogger file is saved so the owner of the virus can gain access via a back door in Internet Relay Chat (IRC), HTTP or Telnet Protocols (Kaspersky, 2003). An Internet relay chat is a separate network of IRC servers that allows users to connect to IRC. It is similar to text messaging, except that it allows communications with large groups (IRC Help, 2013). Zeus. The second virus selected for this research was Zeus; another malware kit that targets personal information. Zeus was first noticed in 2007 and the code was rarely available. Today’s cyber criminals can purchase a Zeus malware kit in the cybercrime underworld. Zeus steals passwords and files (Weinberger, 2012). If an individual has their identity stolen, it isn’t just their bank accounts, but also their maiden names, mother’s maiden names, date of birth and postal address. Zeus was used to exploit LinkedIn. In September, 2010, Brian Krebs, who author Krebs on Security, reported the new malware spam campaign that mimics invites sent through LinkedIn: Those that click on the link in their emails will be passed through another website that has the SEO Exploit Pack. This is a commercial crime ware kit that tries to exploit more than a dozen browser vulnerabilities’ in an attempt to install Zeus. ( Fake LinedIn Invite, para 2) 21 MyDoom. The third and final malware that was installed on one of the virtual computers was MyDoom. According to Cisco’s IPS signatures, the f variant of MyDoom affects files ending in “scr”, “pif”, “cmd” and “exe” (Cisco, 2005). Sub signatures 1 and 2 of the f variant affect files with attachments ending in “zip”. The rest of the sub signatures on the m variant affect “com”, “exe”, “src”, and “pif” files. Finally, the BB variant affects files ending with “zip” and “pif”. The Cisco IPS Signatures website shows many other viruses, their release dates and what those viruses affect. This worm will show up in the directory, "%SysDir%\taskmon.exe" and the backdoor location of "%SysDir%\shimgapi.dll" (F-Secure, Worm:W32/Mydoom, 2013). According to the F-Secure website, the payload is delivered when the machine is booted after the 1st Sunday of February at 16:09:18(UTC) according to the infected systems clock. It launches a Distributed Denial-of-Service (DDoS) at www.sco.com (F-Secure, Worm:W32/Mydoom, 2013). The investigator found that www.sco.com is now Xinuos and is the home of SCO UnixWare and SCO OpenServer (Xinuos, 2013). A DDoS “attack is one in which a multitude of compromised systems attack a single target” (Rouse, 2013). The next step was to set up the IDS on each system. Processing a Compromised Machine The first step in protecting the OS is to update all of the applications on any computer, install and update a virus protection and maintain the updates. The forensic investigator has a responsibility to collect the image and files related to a specific case based on the search warrant or the guidelines set forth by the corporation they are supporting. In all cases the evidence will likely be admitted in court so the examination of the files and volatile data should be conducted with the utmost of care in a forensically sound examination by collecting an image of the system. This can be accomplished on a live system by connecting an external hard drive and running the 22 software from that tool. An example of a free, but not open source imaging tool is AccessData’s FTK Imager Lite v 3.1.1 (AccessData, 2013). Mandiant’s Redline, Access Data’s Forensic Tool Kit and Guidance Software's EnCase are all tools that can be used to collect and examine the images of a targeted system. Some of these tools are free and all of these tools will require testing and documentation by the investigator to show they understand what each tool might change on a live system. Once the data is collected, it can be parsed and examined for evidence of the type of breach or threat that may have occurred. Not all Windows event logs are displayed via the Event Viewer in the Windows OS. In Windows 7, 8 and Windows Server 2008, the Internet Explorer (IE) log is not enabled by default. Research was conducted to turn on these logs. The standard method to turn on the logs is to turn off the Delete Browsing History in the Internet Options. This will show the temporary Internet file (TIF) storage location. In Windows 7 using Internet Explorer 10, the file would be stored in the User's default TIF location. In this case it would be in, C:\Users\<USERNAME>\AppData\Local\Microsoft\Windows\Tempory Internet Files\, as seen in Figure 3. 23 Figure 3. Temporary Internet File Locations. This shows the locations of Temporary Internet Files. This screenshot displays the location of the Temporary Internet Files on the computer under Current location. Another way to “enable IE event logging is by creating a new DWORD registry value named Feature_Enable_Compat_Logging” (Tulloch, 2012). When testing this method, the Windows 7 file tree in the registry editor stopped at HKCU\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl. The \Feature_Enable_Compat_Logging and the iexplorer.exe DWORD were added and events began populating in the Internet Explorer log under Applications and Services. The Windows registry contains the Internet Explorer registry key. The Feature_Enable_Compat_Logging registry key was added along with the sub key iexplorer.exe to attempt turn on the Internet Explorer log (see Figure 4). 24 Figure 4. Registry File Tree HKCU\Software\Microsoft\Internet Explorer\Main\FeatureControl\Feature_Enable_Compat_Logging Each virtual system was verified that all updates had been completed and that there was a good connection via the Network Address Translation (NAT) in VMware to the Internet. The Techterms website defines NAT: NAT translates the IP addresses of computers in a local network to a single IP address. This address is often used by the router that connects the computers to the Internet. The router can be connected to a DSL modem, cable modem, T1 line, or even a dial-up modem. When other computers on the Internet attempt to access computers within the local network, they only see the IP address of the router. This adds an extra level of security, since the router can be configured as a firewall, only allowing authorized systems to access the computers within the network. (2013, NAT, para 1) NAT allows the internal network to remain secure from attacks originating outside the network. The router used for this research only allows those systems authorized by the network administrator to access the network. The router is a Cisco Linksys E3000; Wi-Fi Protected Access 2 (WPA2) secured, and supports NAT (Linksys, 2013). A snapshot was taken after the updates and before any malware or searches were completed on the VMs. In the interest of time, a third party tool was used to collect the event 25 logs for evaluation. Mandiant Redline was updated to support Windows 7 and 8 in both x 32 and x 64 bit systems (Mandiant, 2013). Redline was also verified by running and collecting an image using a 64 GB USB Drive. The audit was then examined using Redline. The first system tested was the Windows 7 x 32 VM. Mandiant’s user guide was easy to follow and facilitated the examination efforts well. The RunRedLine batch file was executed and the test collection was completed. However, after running Redline and analyzing the file, Redline provided an error message stating the file was empty. Checking with Mandiant’s technical support, it was discovered that the image file was not created. Despite selecting all of the browser history and event logs, the collection did not occur. Personal correspondence via email with Mandiant's help desk resolved the problem by recommending the entire collection file be moved to the desktop of the machine being collected. Figure 5 is a screenshot of the batch collection in progress. The full path of the event logs and the event log names themselves, were entered in the advanced tools. The log names were then changed to reflect the correct logs in each path. Figure 5. RunRedLine batch file while the imagewas collected. The Tor Browser also known as The Onion Router (TOR) was downloaded and extracted onto a USB Drive so it could be used without installation onto a VM or Host System (Project, Tor Project Download, 2013). Tor Browser is an open source tool that can be used to 26 surf the Internet anonymously. Tor allows the individual to go to various websites without using an IP address that is assigned to them; rather Tor uses a pool of proxy servers to issue IP addresses masking the true IP address of the source machine. The Tor Project is the open source organization that created the browser used for this research. The Tor Project established a network of proxy servers that are privately and publically owned. Similar to any organization, they have companies that provide funds for managing the relays in addition to private contributors that provide code writing/testing and the proxy servers used for the relays (Project, Sponsors, 2013). Tor does not have to be installed on a computer for it to be used. Running the Tor Brower from a USB device, little trace is left on the system if it is compromised. In an effort to duplicate the type of clandestine browsing that a cybercriminal might employ, Tor Browser was run from a thumb drive. The Tor Browser does not keep history on the websites visited using that application. Tor Browser changes the Public IP address that is broadcast to the Internet to hide the identity of the person or organization using the tool. Law enforcement, human rights activists, cybersecurity personnel and governments use this tool for their protection (Project, Tor Project: Overview, 2013). The more people who use the tool, the more the anonymity of the individuals are protected (Project, Tor Project: Overview, 2013). Tor uses a minimum of three servers to pass traffic that is encapsulated and encrypted, which ensures privacy. Unlike a VPN which uses only one specific server for an organization. Tor sees the real IP at the first server, but not the content or the destination. Tor is a dynamic network which makes it difficult for the person or group that is trying to spy, to do so. It is not meant for the user to log into their bank account, etc. This will identify a user and will enable the “spy” to trace the user (Lambert, 2013). 27 Forensically, the VM or the host machine will show that a USB was used and even the application it used (Tor Browser). The exit nodes, or last relay server, can be traced, which will show the unencrypted data upon exiting the Tor network. If a private individual or company allows their server to be used as a Tor exit node, and a criminal uses Tor to transmit child pornography, that individual can be arrested for distributing child pornography (Goodin, 2012). This means that while Tor can be used to keep Internet activities private, it can also be used against the individual using it, if they are being investigated for a crime, even if they are not the person committing the crime. This tool was used in this research simply to collect and download the viruses needed during this project. After searching Google for the MyDoom virus in the Tor environment, it was downloaded while still in Tor Browser to the download file of the Windows 7 x 32 VM (Downloadviruss, 2012). The VM did not have virus protection software installed. The virus was not extracted and installed at the time of download. The same process was followed on each of the other two VMs when the investigator searched for and then downloaded Fizzer and Zeus. The NAT was turned off on the Windows 7 x 32 VMs. NAT was turned off as a precaution to contain any viruses downloaded and installed on the VM from infecting the host machine or the network that the host machine was connected to. All of the hardware was turned off by removing access to everything but the hard drive. MyDoom, was installed on the Windows 7 x 32 VM. A password was provided at downloadviruss.wordpress.com that allowed MyDoom to be downloaded (Downloadviruss, 2012). Event ID 1000 to 1004 is a possible indication of hacking attempts (Steel, 2006). The service performance logs were stopped and Event ID 1000 was entered into the Application logs as seen in Figure 6. The infected Windows 7 x 32 VM was left running for 5 hours to allow Event IDs to be recorded, ending at 28 approximately 05:00 am. Mandiant Redline was used to collect the image for the MyDoom infected Windows 7 x 32 VM. Figure 6. Application Log Event ID 1000 showing possible virus. Mandiant was then executed to analyze the Windows 7 x 32 images that were previously collected. There were 23 hooks that were suspicious or untrusted. However, there were no IDT hooks. IDT hooks are usually made by malicious software and are Interrupt Descriptor Tables (Phrack, 2002). Further defined: The Interrupt Descriptor Table (IDT) is an internal data structure used by the operating system in processing interrupts. Devices use the IDT to process events in the operating system. The IDT is a data structure often exploited by rootkits. [4] By subverting the IDT, the attacker can point critical items such as the keyboard interrupt to a different function. Using this method an attacker can then insert malicious code to be executed when certain interrupts are run. (Quist & Smith, 2013, p. 1) The Zeus Trojan was downloaded on the Windows 7 x 64 VM using the Tor Browser, from the website, “malwaredomainlist.com" (List, 2013). This is a website for security 29 professionals to download viruses for testing purposes. After the Zeus Trojan was installed and the NAT was disconnected from the host machine, the infection was verified by checking the event logs and finding the Event ID 1000 in the application logs. The Windows 7 x 64 VM was left running for 3 hours while the Zeus Trojan was running on it to allow Event IDs to be recorded. An image was then collected of the Windows 7 x 64 VM. Figure 7 displays the event ID 1000 that occurred immediately after the Trojan was installed. Figure 7. Zeus Trojan Installation. This figure displays Event ID 1000 to verify that Zeus Trojan was installed. Fizzer was downloaded on a Windows Server 2008 through the Tor Browser at the "http://openmalware.org" website. The Fizzer version selected was added on September 13, 2012 to the malware website and is identified as W32/Fizzer.A@mm. It has an authentication password of “infected”. Fizzer was installed on the server. 30 Figure 8. Fizzer Virus Installation. Fizzer installed on Windows Server 2008 Virtual Machine. After letting the virus run for four to six hours to allow Event IDs to be recorded, the image was collected for analysis. The Server 2008 and the Windows 7 x 64 VMs were placed on a host-only internal network before collecting the image for the Server. Throughout the research, several attempts were made to cause the Event IDs of 5148 and 5149 to be created, but those Event IDs were never observed in the log. Windows Defender was running and the Windows Defender logs were also examined for 5148 and 5149 Event IDs. These Event IDs were also not present in the Windows Defender logs. Further research on the use of these two Event IDs show that they only appear in Windows Server 2008 R2 and not in Windows 7 (Microsoft, 2013). “Windows Defender is the first line of defense against spyware and other unwanted software” (Microsoft, 2013, p. 1). According to Microsoft, Windows Defender has less impact on the performance of a computer and it provides one-click purging of all suspicious software. The EventLog Viewer tool was used to examine the event log files for each of the VMs. The first log files to be examined were the Windows Server 2008 VM. Event ID 900 is a connection request from when the server was initially booted up and it attempted to connect to the newly created host-only internal network. The logs were verified to show that there are numerous entries of event ID 1000 to 1004 which has been identified to mean there is possibly a 31 virus on this system (Steel, 2006). The investigator installed a second virus, Fizzer, on the Windows Server 2008 x 64 VM. This virus can cause a Denial of Service (DoS) and provides a back door access for the creator of the virus. These additional Event IDs, 4625 and 902 could be part of the attempted communications from Fizzer. Normally, Event IDs will have a username or the system itself associated with the activity that caused the event. Event ID 4625 does not contain the user account name on a computer that is running Windows Vista, Windows Server 2008, Windows 7, or Windows Server 2008 R2. Figure 9 is a screenshot of the Application log in the Windows Server 2008 x 64 VM. Figure 9. Windows Server 2008 x 64’s Application Log. The number in the [ ] is the event ID. In the Windows Server 2008 VM, the Security log has event ID 4902, which is an “Audit Audit Policy Change” (Microsoft, 2013). This could be related to the attempted change to the Internet Explorer log to cause it to log browser events. The event ID 4624 assigns special privileges to new logons. This occurred at the time of the Fizzer install and continued until the machine was powered down. This could be another Event ID that is associated with a virus attempting to communicate with its creator. Figure 10 is a screenshot of event ID 4624 using the 32 EventLog viewer. Figure 10. Event Log Viewer after Fizzer installation. Event Log Viewer showing event ID 4624. This coincides with the installation of the Fizzer virus. The event logs for the Windows x64 VM and the Windows x32 VM with the same results as described above. Event ID 4624 showed when the Zeus and the MyDoom Viruses were installed. In the Windows x64 VM and the Windows x32 VM, there were too many entries of the 1004, 1001, 1003 and 1000 Event IDs to count in the Application logs for both systems. These IDs are associated with a virus. There were multiple entries where the Windows x64 VM could not communicate with a server as evidenced by the Event IDs of 8212 and 8196. These events could be triggered by the Zeus virus trying to communicate with its maker, or the Windows x64 VM’s inability to communicate with the Windows Server 2008 VM. The two way communication between the Server and the Windows x64 VM had already been verified to work by establishing a remote connection into the Windows x64 VM from the Server VM. All of the events IDs were verified on the EventID.net website and the Microsoft TechNet website. Event ID 4907 in the security log shows that auditing settings were changed. This could be associated with Zeus because the auditing settings were not changed by the investigator. There were over two thousand 4907 events in the security logs. Event 4672 is 33 associated with assigning special privileges to a new logon. This occurred at the time that the Zeus virus was running without the system being shut down. Event ID 4624 is associated with an OS special login of Data Name="SubjectUserSid">S-1-5-18</Data>. This was seen near the 4672 Event IDs in the security log. The 5148 and 5149 Denial of Service Event IDs did not populate on any of the three test systems. The Avast antivirus was installed on the Windows x 32 VM. After installation and updates, Avast was run to determine if the machine was still infected with the MyDoom virus or any others that may have occurred. However, at the end of the scan, there were nine files that could not be scanned. Those files are displayed in Figure 11 below. Figure 11. Avast virus scan results. These files could not be scanned by Avast. McAfee Internet Security version 8.8 was installed on the Windows Server 2008 VM. After installing the virus protection, the VM was re-infected with Fizzer. Almost as soon as the virus was installed, McAfee caught and quarantined the virus. This test was completed to show the importance of keeping all networked tools as secure as possible. Figure 12 shows the quarantined file. 34 Figure 12. McAfee blocking the Fizzer virus, which produced a pop up window notifying the user. Setting up WINSNORT The WINSNORT software was installed on the Windows 7 x 32, Windows 7 x64 and the Windows Server 2008 VMs. The investigator must verify which version of Windows they are using due to the fact that the WINSNORT guides were created to cover different versions of Windows and Database tools (Steele, 2013). The instructions for installation on a Windows machine can be found at "www.winsnort.com". Before Snort can be installed, several other programs need to be installed. All of the software tools must be downloaded from the WINSNORT website for the tools to work. The first is WinIDS created by Michael E. Steele from the WINSNORT website (Steele, 2013). This was installed without running a scan after installation. The next software tool is WinPcap v4.1.3, followed by Snort 2.9.5.5, snortrulessnapshot-2953, Rule Documentation, Strawberry Perl 5.14.2.1, PostgreSQL Database and PHP 5.5.5 NTS (VC11). In the online guide under my setup is a classical Windows Intrusion Detection System (WinIDS) deployment section, Michael Steele explains what this setup does. The Snort detection engine will be running in passive mode, logging events to a unified2 log file. Barnyard2 will be processing the Windows Intrusion Detection Systems 35 (WinIDS) unified2 log files. A PostgreSQL-driven database will store processed events/logs for further analysis. Internet Information Services 7.5 / 8.x web-server will drive the Windows Intrusion Detection Systems (WinIDS) analysis GUI console. BASE will serve as the web-based Windows Intrusion Detection Systems (WinIDS) events analysis GUI console. (Steele M. , 2013) The various software tools for WINSNORT to work as an IDS are described here. Windows Intrusion Detection System (WinIDS) is installed first. The WinIDS package for WINSNORT has been developed by Michael Steele. The Deployment Image Servicing and Management (DISM) tool is installed via command line for all version of Windows after Server 2008 (Steele M. E., 2013). Another tool to be installed is WinPcap. The Introduction to WinPcap states “WinPcap is the packet capture and filtering engine for many open source and commercial network tools” (WinPcap, 2013). Following the instructions to the guided install, the command prompt was opened as an Administrator. The two commands entered were: "d:\winids-sp-x32-09.17.13.exe" followed by "d:\temp\modder.vbs". The Installing Core Support files section then requires the modder.vbs to be executed. The modder.vbs contains a script that installs Notepad2, tartool and the WinIDS hostname host file (Steele M. E., 2013). These commands also turned off the User Access Control, installed Microsoft Visual C++, Unzip and tartool. This also set several registry keys according to the WINSNORT installation guide (Steele, 2013). The installation of the tools in the modder.vbs forced the system to restart after installation. The next tool installed is WinPcap using the command: "d:\temp\WinPcap_4_1_3.exe". The following tools were installed as instructed by the guided install: Snort, Snort rules, Strawberry Perl, Syslog, Internet Services and moveiis7-8.bat. Snort is a standalone intrusion 36 detection and prevention (IDS/IPS) tool produced by Sourcefire (Snort, 2013). The Snort rules are developed and tested by Sourcefire’s Vulnerability Research Team (VRT) (Snort, 2013). The Strawberry Perl version 5.14.2.1 via command line (Strawberry Perl, 2013). Strawberry Perl is a Windows compatible version of the Practical Extraction and Reporting Language (Perl, 2013). The Internet Information Services 7.5 for Windows 7 is already installed on the Windows OS and only needs to be turned on in the Windows Features (Steele M. E., 2013). The WinIDS security console was installed followed by Barnyard2 and the PostgreSQL Database server. “Barnyard2 is a dedicated spooler for Snort’s unified2 binary output format” (Github, 2013). PostgreSQL is an “open source object relatable database system” (PostgreSQL, 2013). The “ADODB is a database extraction library for PHP” (Sourceforge, 2013). The ADODB and the PHP was installed followed by the command to update the sid-msg.map file. The sid-msg.map is used by Barnyard2 to input the names of the events in the database (Steele, 2013). In order to use Snort, the Snort.conf file has to be changed. The rule path, the dynamic engine and the dynamic preprocessors all need to be changed to "D:\Snort\rules". Figure 13 shows Snort running on all three Windows VMs. After configuring the Snort.conf file according to the instructions on the WINSNORT website, it was successfully tested one last time to ensure that it completed successfully. Figure 13. Final execution of Snort using the command d:\winids\snort\bin\snort -cd:\winids\snort\etc\snort.conf -l d:\winids\snort\log –i1 –T. 37 The next step following the installation of the php.ini file and making the necessary changes to the php.ini file using Notepad2 was to open the iis.msc file through the command line. In the iis.msc GUI interface, the Sites file was expanded and the Handler mappings were opened by the investigator. Under the Add Script Map, the request path, the Executable and the Name dialog boxes were filled out and are displayed in Figure 14. Figure 14. Setup of the IIS Manager in Windows. This figure displays the path, executable and the name of the IIS Manager. After the IIS Manager was changed to PHP, it was reset and restarted. The "http://winids/test.php" file was then opened to verify that all of the required paths were correct. These paths were the "d:\winids\php\php.ini", "d:\winids\php", "d:\winids\php\pear" and the "c:\windows\temp files". When the test was completed, the "d:\winids\inetpub\wwwroot\test.php" file was deleted. Snort was then added to the Windows Services Database as shown in Figure 15 for all three Windows VMs. 38 Figure 15. Installation of Snort as a Service. /SERVICE /INSTALL command is displayed indicating successfully added to the registry and local machine. The PostgreSQL Database server was started and creating the databases for the Windows IDS. The WINSNORT guided install has the commands used to create the databases. The command listed was “create database snort;” (Steele, 2013). The final three steps were to configure the Barnyard2.conf file, set Barnyard2 to auto-run and run the WinIDS security console. Barnyard2 is used to display the information collected using Snort and PostgreSQL in the host, WinIDS Home. This last step was completed by opening a browser and typing “http://winids” in the URL. The Barnyard2 console was started immediately on reboot and works with Snort to display the incoming traffic on the "http://winids" URL. Figure 16 shows Barnyard2 console after reboot. 39 Figure 16. Barnyard2 after reboot in finalizing the WINSNORT IDS. Three different viruses were installed to demonstrate how WINSNORT could be used in conjunction with an Antivirus to protect a system. Some of the Event IDs were identified in conjunction with a virus installed on the test systems. This was to educate other investigators what exact Event IDs to look for when the defense has stated, “a virus did it,” also known as the "Trojan defense." The investigator conducted an examination of the images taken with Mandiant and the event logs viewed in the Evtx_view tool. Whitelists and Blacklists As part of the research process Event IDs were loaded into the Whitelist and the Blacklist on the VMs during the WINSNORT Installation. However, these logs were also collected and viewed using the Event Viewer third party tool. A Whitelist identifies items that are not forbidden and has multiple uses; most commonly whitelists are known for use with valid domain names, authorized websites and a list of applications a user is authorized to run in an organization (PC Magazine, 2013). In contrast, an Application Whitelist looks for applications that have been blocked from execution, meaning they will be drawn to an analyst's attention (National Security Agency, 2013, p. 28). A Blacklist is commonly associated with a list of email 40 addresses or domains of known spammers, applications that a user is forbidden to run and websites that are off limits or considered dangerous (PC Magazine, 2013). Again in contrast, black listed applications or events are items that the analyst wishes to ignore. Whitelist Event IDs that are automatically collected are 1001, 64004, 2, 5, 4688, 4697, 4698, 4624 and 4625 and system 7034 to name a few. Some of these Event IDs were listed in the log files collected from all three VMs. Event ID 7034 is created when a virus protection program is terminated unexpectedly. Event ID 4697 was created when a new service was installed. This occurred after the viruses were installed and again when Snort was added as a service. The default Whitelist was used in the WINSNORT setup. Blacklist events are events the analyst does not want to collect or be notified about. They are identifiable as Event ID numbers like 5156-5157 (Microsoft, 2013) or as URLs. These events appear when a firewall acceptance or denial takes place in the Security log. Other items which may be included on a Blacklist are specific IP addresses and URLs known to install viruses on a system. Due to the large amount of traffic through a firewall, maintaining a log would be far too costly in terms of expense and data space to be either sustainable or reasonable. Accordingly, were a log to be maintained, the return on investment does not justify the expense of time in review for events having a nominal impact on a report resulting from digital forensic analysis. The Blacklist from Snort, for example, listed over 2000 lines of website URLs that were blocked by WINSNORT. Blacklists reduce the amount of data that a forensic analyst would be required to examine. Discussion of Findings In litigation, hackers may attempt to evade prosecution or establish innocence by alleging a virus to be responsible for that which they are accused, such virus not being their creation. 41 Event IDs may be used to mitigate or negate such defenses altogether. When considering viruses, it’s worth exploring how a virus could be obtained without first party direction from any one individual and the nature of viruses as it pertains to Event IDs. Viruses generally slow a computer down and can provide a means for nefarious hackers to steal a user’s identity. Steps can be taken to safeguard against most computer virus infections, such as maintaining the most current version of an OS, utilizing an anti-virus and anti-malware application, which also requires regular updates, and enabling security features of the internet browser. Computer users are barraged with safety tips, software, and tricks in the interest of protecting themselves, their information, and the integrity of their systems nearly every time they log into a browser. Unfortunately, some of the more basic protections afforded by maintaining a current version of the OS are often unavailable either due to a willful disregard for the prompts provided by the OS to update or because users are unsure the process to do so. Users may not understand the impact neglecting such simple security measures could have on their systems. Leaving systems vulnerable may enable hackers to break into a computer or a computer network. Hackers look for systems that have not been updated so they can take advantage of that vulnerability. Once inside a system, a hacker might steal valuable personal information, security information, or seize control of a system to spread other viruses or malware. Many types of viruses and malware exist to seek out such opportunistic machines, which may not be the work product of a hacker being prosecuted. Research referenced herein was conducted to document, for investigators, some of the Event IDs that should be identified and further scrutinized in an investigation. This is especially important in cases where the defendant is claiming the computer was infected with a virus and was used to perpetrate a crime by another person. The methodology and testing were designed to 42 identify and test some of the free tools investigators may employ. The steps delineated in the research documented various means of collecting event logs and best practices investigators use today. The tools used were the Event Log viewer within Microsoft’s Windows OS, the EventLog Viewer tool created by TZ Works, Mandiant’s Redline Tool and Michael E. Steele’s WINSNORT with PostgreSQL. These tools were used on three virtual machines; one Windows 7 x64, one Windows 7 x32 and one Windows Server 2008 R2. The Antivirus tools used were Avast Home, Spybot and McAfee. There were some glaring discrepancies identified throughout this research project. One of the most difficult to overcome was the need for clearer indications as to why a particular event ID shows up in application and security logs. Digital forensic investigators are not trained to identify what these events mean or why they occur in the first place. The network administrators that were consulted during this project also did not have clear explanations of why certain Event IDs occur and only referred to Microsoft’s technical websites. Network administrators look specifically to see what events occur on their network that are normal, called setting a baseline, then relies on IDS tools to tell them when something is abnormal, deviates from the baseline, or both. Network administrators normally do not examine traffic to determine if they are receiving a DDoS or a DoS when they are having network issues. The first step is usually to assess the physical network, the Firewall and the IDS tools. The Networking and Security book, under the "Monitoring the Performance of your Network" section states, “Some of these tools will notify the network administrators about slowdowns, overloaded servers and other signs of trouble before they affect staff and patrons” (Techsoup, 2013). Larger organizations may not deploy 43 network administrators to examine these types of logs at satellite locations. These services are often provided by regionalized offices. It is standard practice that an organization would have proxy servers that control all traffic before an outside connection is linked to their public facing website. Chad Steele identified the Event IDs 1000 to 1004 in his textbook as a possible link indicating a virus has been installed on a system (Steel, 2006, pp. 247-270). Beyond Steel's assertions, this research identified that Event ID 5 was generated when a virus had been installed. Event ID 5 populated the application log and was generated by antivirus software when the virus was detected on the system. During the baseline phase of each Windows VM, Microsoft’s Windows Defender was automatically installed and updated. This event may have been identified by Windows Defender since there was no antivirus software installed on the images at that time. Event ID 4097 may indicate when a hacking attempt has been made. This has been known to occur with the Dr. Watson virus but also showed up with Fizzer, Zeus and MyDoom. This event ID was prevalent after the three viruses were installed on each of the VMs. This research was able to corroborate that event ID 1000-1004 populates in the event logs when a virus has been installed on a system, as Steel indicated. The 1000-1004 event IDs did not populate until after the virus was introduced to the systems. These events were also verified in the NSAs report, published in 2013, concerning the use of Windows event logs to spot the adversary (National Security Agency, 2013). The Security logs record when a system has been successfully logged on or off. It will log when a user created, modified or deleted a file. If the user attempted to access a resource, but did not have access, the log will display an Audit Fail message (Microsoft, 2013). This event log may be used to corroborate when a virus that is attempting to determine the administrator 44 username and password attack has been attempted using a dictionary or brute force attack. According to Microsoft’s TechNet website, the 5148 and 5149 events are only seen on Windows Server 2008 R2 and newer Windows Servers (Microsoft, 2013). During this research, no server was set up outside of the firewall, which may explain why these two Event IDs did not appear. The research also did not use a proxy server. A proxy server is used by security researchers, criminals and some tech savvy home users for privacy and security. Proxy servers are point to point connections. When used by corporation's VPNs, they are often connecting to their internal networks via a tunnel through a proxy. Proxy servers strip the originating address. Whether you use a VPN, which relies on a protocol like PPTP to encapsulate your packets securely, an SSL proxy, a Socks proxy, or even a simple web gateway (which doesn't actually provide you with any encryption) they all have a couple of features that are similar. The basic principle is that the server is relaying those packets for you, and stripping the originating address. Instead of your own IP address, they only see the proxy servers. That also means if you connect using the previous example, instead of thinking you're in Seattle, every site you connect to will think you're sitting right there in the Dallas corporate office. (Lambert, Patrick, 2012, p. 1) Without using a proxy server, it is possible that event ID 5148 and 5149 did not appear due to the fact that the Internet was connected through a public ISP. The firewall provided by the ISP and their proxy servers might have blocked the attempted DoS attacks. Further research is required to determine what conditions invoke 5148 and 5149 IDs. Event IDs are a crucial tool in forensic analysis. More documentation and research is necessary to understand the extent to which these IDs may be used in evaluating forensic information. The lack of examiners to handle the investigations and the research limits the 45 resources to test and document all Event IDs. Forensic investigators generally go from one case to another without being able to share their findings with the community. The failure to document means the case details are eventually forgotten, leaving a knowledge gap in the community, highlighting the need for improved documentation practices and peer-to-peer education within the profession. Microsoft is a for-profit company providing software and Internet resources for business and academic professionals in Information Technology. However, the company is not able to share all of the Event IDs and the purpose behind each because some information is proprietary. This means digital forensic investigators need to share their own knowledge with the rest of the community. Two key Event IDs that need to be further examined are 4688 and 592. Both event IDs identify when a new process has been created. Investigators should always look for a common process name that is misspelled as this can be a malicious program (Anthony, 2013). During this research no common processes were found to be misspelled. Each of the VMs' hard disk size in this research was 60 GB in size and it took a significant amount of time to collect the images for each machine. Once the images were collected, the examiner used Mandiant tools to examine the contents of the images, looking for signs of the viruses being downloaded and installed. The files were downloaded using Tor Browser, and purposely installed the viruses for testing. During the research, prior to downloading the viruses or using the VMs, an unplanned drive-by infection was received on the host system that was immediately quarantined by Norton. A drive-by infection is a web-based malware attack that occurs without the user knowing it has happened (Levinson, 2012). This drive-by was received from a website while seeking the Fizzer virus and provided another example of why it is important to keep antivirus software updated during the research process. 46 Mandiant Redline was used to collect the images of the VMs for examination by the investigator. Redline has to be placed on the desktop of the system the investigator is examining. This requirement caused a change to the machine during the analysis process, which is acceptable in a court of law, as long as the investigator articulates in the report what changed and why it was necessary. In fact, it is a common practice during a live analysis. The Mandiant guide was consulted several times during the research and was deemed a good resource for guiding a digital forensic investigator who might be using the software for the first time. Although Redline was used to collect and examine the images, it failed to collect the event logs requested. The collection tool has an Advanced Settings required to identify the path to the event logs. The file paths were correctly identified and inserted into the tool. However, the event logs were missing and due to time constraints, an alternative tool was used to examine the event logs. The viruses were located using Mandiant by looking at the “Downloads” file in each image. This was the proper location where the viruses had been placed by the investigator during the set up phase of the research. WINSNORT was set up in each of the systems; however, initially viewing the results was unsuccessful in the WinIDS tool due to the registry changes that had extra symbols inserted in the location files. Following personal communications with the WINSNORT developer who viewed the configuration logs and the screenshots, it was determined that there were extra symbols in the final setup of Barnyard2. The WINSNORT developer also identified the name and location of the required files which had previously resulted in the local http://winids security console failure. This was corrected by returning to a previous snapshot and reinstalling WINSNORT using the Windows Server 2008 and Windows 7 (Steele, 2013). The http://winids local file then correctly displayed the output from Snort and PostgreSQL. 47 Antivirus tools are not perfect and can be easily defeated by well written programming code. When Fizzer was installed, it looked for any processes that had NAV, SCAN, AVP, TASKM, VIRUS, F-PROT, VSHW, ANTIV, VSS and NMAIN and attempted to end the processes (Liu, 2003). These processes are all associated with antivirus tools. When Fizzer was installed, there was no antivirus installed on the systems so it did not find those processes. The Fizzer virus did attempt to talk to irc.awesomechat.net but was unsuccessful because the VM was not connected to a network. This was verified in the image of the VM collected with Mandiant. The research of this paper was conducted to analyze Microsoft Windows event logs for artifacts that may be pertinent to an investigation. Throughout the research, examples were offered of how investigators can use Windows event logs in forensic investigations. Three viruses were obtained and installed and the event logs analyzed to demonstrate how investigators should approach the various types of breaches when collecting data from Windows event log. In all methodology and testing, best practices were utilized to illustrate best practices to analyze Windows event logs. Future Research Recommendations This research analyzed several Windows event logs for artifacts that can assist investigators in halting an attack or identifying an insider threat. Demonstration models were created to illustrate the various breaches that might require a forensic examination and how an investigator might use event logs during the course of an investigation. The research identified and discussed the best practices to follow when faced with certain types of breaches or threats. Finally, the research suggested and demonstrated techniques for efficiently parsing log data. Several other aspects of using event logs to aid an investigation should be explored. 48 Digital forensic analysts typically do not view event logs on a server unless they happen to be responding to a request by a corporation that complains of a hacking incident. This research corroborated that Event IDs 1000-1004 do populate in the Application logs when a virus has been installed. However, two of the events IDs 5148 and 5149, were not observed during the research. These Event IDs indicate that a DoS has started and stopped respectively (Microsoft, 2013). After repeated attempts to invoke the 5148 and 5149, further research indicated that the Windows Server 2008 VM set up would not have provided the logging of those events. Most of the logs showed an attack after a virus had been installed; it was not true for the DoS events only occur under certain server set ups. Due to research time constraints, the specific server set up for capturing the DoS Event IDs 5148 and 5149 should be further investigated, the proper server conditions set, and the events invoked, in a testing methodology similar to this research. Once the server is set up to include Windows Defender and install the virus, the investigator would need to document what Event IDs populate. Brief research has indicated that the server should be networked internally with at least one client. In addition, it is likely these Event IDs will appear on the proxy server and not the public facing server. Time constraints did not allow for setting up the proxy server logs to populate in a log collection server. According to PC Magazine’s Encyclopedia, a definition of a Proxy Server is: A Proxy Server is a computer system or router that breaks the connection between sender and receiver. Functioning as a relay between client and server, proxy servers help prevent an attacker from invading a private network and are one of several tools used to build a firewall. (PC Magazine, 2013, para. 1) One minor difficulty experienced during this research was with the Mandiant Redline 49 program. The program requires the exact location of the event logs being collected to be configured in the collection tool's Advanced Settings. The logs were not successfully collected with the image. A second tool was employed to complete the analysis. It would be beneficial to have a single open source tool to collect the image as well as the event logs. Open source tools afford investigators on a budget the opportunity to complete the same tasks that that can be accomplished using commercial software such as EnCase and FTK. Open source tools also provide an opportunity for improved collaboration across the profession which could result in better, more specialized tools, than closed source commercial tools. Mandiant's guide for Redline was fairly helpful. However, it did not explain that the collection tool had to be dropped on the desktop of the system the image is being collected from, a key step in the collection process. While this seems a simple issue to overcome, the lack of this critical detail increased the research time. Most investigators are working under time constraints and would benefit from complete and thorough instructions. It is recommended that Mandiant include this detail in the instructions. The NSA’s 2013 report Spotting the Adversary with Windows Event Log Monitoring is another resource to consult when setting up the server. By the time this resource was discovered, there was no time to fully implement this guide during this research. Had the report been discovered early in the initial research, the directions beginning on page 4 of the NSA report would have been followed to set up the testing environment. One server should be set up to be the event log collector in a local subnet. This is to avoid confusion and security related concerns (National Security Agency, 2013, p. 4). Another means of testing that could have been employed in this research process would be to set up a penetration testing lab. A good source to start with is the Rapid7 network 50 penetration lab (Kirsch, 2013). Rapid7 describes how to set up a penetration lab and recommends what services need to be running on each virtual system. There is information on Windows events available via Microsoft web sites and other resources on the Internet, but very little explains how they can be used in a digital investigation. A third recommendation to further the objectives of this research would be to create a list of all Event IDs that would be pertinent to a digital forensic investigation. One way this can be done is to identify every known event ID that shows a virus was installed, what the event ID is, how it was created and determine what other events occur in tandem with those already known. This would benefit all examiners. During this research the vague descriptions of the Event IDs on the Microsoft website increased the amount of time required to determine what invokes the Event ID and what it means. Microsoft will tell the IT professional that a particular event ID can be fixed and how to fix it. However, it doesn’t necessarily explain what invokes the Event ID. Further research describing why a particular event is important to the investigation of a network or an individual’s home system will go a long way to narrow the scope of an investigation. Microsoft has an event log description Excel spreadsheet that can be used as a starting point (Microsoft, 2013). One series of events that would be beneficial to the digital forensic community is 5063-5070. These events are related to cryptographic context, function and modification. This would be useful when looking for evidence of files that have been encrypted and can help corroborate when those files were encrypted. SANS published an Intrusion Cheat Discovery Sheet that can be used when trying to determine if any registry files were changed (SANS Institute, 2013). Viruses can be installed with the intent to check the registry files to determine if anything has changed after installation. 51 As identified earlier, Event IDs will denote the installation of a virus as is done when any new service has been started or task scheduled by populating an Event ID 4697 or 4698. The event ID 4624 is a log-on event and one of the security identifiers (SID) is S-1-5-18 which is associated with a service account used by the OS (Microsoft, 2013). A random check of another identified SID was S-1-0-0 which is associated with a “nobody” group (Microsoft, 2013). The SID will also display when an approved user of a system has logged in or it can be used to help identify a hacker has logged in using elevated privileges. Event ID 4624 can be hacked using an authentication bypass allowing a perpetrator the ability to hide their presence by appearing as a “system” logon (clymb3r, 2013). Cisco defines an authentication bypass under Ramifications of Successful SQL Injection Attacks, as an attack that “allows an attacker to log on to an application, potentially with administrative privileges, without supplying a valid username and password” (Cisco, 2013). Further research in SQL Injections that allow hackers to access data from networked servers would help the digital forensic community to know what to look for when responding to an organization. WINSNORT made use of Blacklists and Whitelists to find any changes in the System, Security and Application event logs. These Blacklists and Whitelists were pulled from WINSNORT. It is possible that the research would have made a better use of the WINSNORT tool if a custom list was created. Another means of educating the forensic investigator would be to examine how a custom list is created and then used in a digital forensic exam. This research analyzed Microsoft Windows event logs for artifacts in an investigation. It also examined how the investigators can use the event logs in an investigation. One of the approaches to the various breaches that were used in this research was to install viruses and examine the event logs for changes made after installation. Best practices were utilized and 52 explained for detecting, collecting, and analyzing Windows event logs. The open source IDS tool, WINSNORT, was used to identify the Event IDs pertaining to breaches by using a whitelist and a blacklist. Event IDs were examined by number and researched to help determine what events should be further examined when a defendant claims that a virus is responsible for a criminal act. Event IDs are often overlooked due to lack of training and understanding. The work of this research provides an initial knowledge base by identifying factors that trigger virus related Event IDs, adding to the body of research on this crucial topic in today's malware rich computer environments. Future recommendations were compiled to suggest further research that should be conducted and to clearly define the limits and difficulties encountered during this research. Contributing to the body of research relating to Event IDs allows future analysts a resource to capitalize on this potential goldmine of evidence that is so often overlooked. 53 Appendix Event ID Description Event Log 1000 Application Error Application 1002 Application Hang Application 1000 BSOD, WER System 1001 Informational and BSOD System 1 EMET Warning Application 2 EMET Error Application 1003 BSOD Application 1004 Application Error Application 4097 WER Informational Application 7000 Windows Service Fails or Crashes System 7001 Windows Service Fails or Crashes System 7022 Windows Service Fails or Crashes System 7023 Windows Service Fails or Crashes System 7024 Windows Service Fails or Crashes System 7026 Windows Service Fails or Crashes System 7031 Windows Service Fails or Crashes System 7032 Windows Service Fails or Crashes System 7034 Windows Service Fails or Crashes 25 Windows Update Failed System Microsoft-WindowsWindowsUpdateClient/Operational 31 Windows Update Failed Microsoft-WindowsWindowsUpdateClient/Operational Hotpatching Failed Setup DCOM Invalid Permission System Windows Service Fails or Crashes System Windows Update Failed System 11708 MSI Installation Failed Application 11923 MSI Installation Failed Application 10016 DCOM Invalid Permission System Microsoft-Windows-Firewall with Advanced Security/Firewall Microsoft-Windows-Firewall with Advanced Security/Firewall Microsoft-Windows-Firewall with Advanced Security/Firewall 1009 10016 7034 20 2004 Firewall Rule Add 2005 Firewall Rule Change 2006 Firewall Rules Deleted 2033 Firewall Rules Deleted 2009 Firewall Failed to load Group Policy Microsoft-Windows-Firewall with Advanced Security/Firewall Microsoft-Windows-Firewall with Advanced Security/Firewall 54 55 References Allinson, C. (2001). Information Systems Audit Trails in Legal Proceedings as Evidence. Computers & Security Vol. 20, No.5, pp. 409-421. Amari, K. (2009, March 26). Techniques and Tools for Recovering and Analyzing Data from Volatile Memory. Retrieved September 2, 2013, from SANS.org: http://computerforensics.sans.org/community/papers/gcfa/techniques-tools-recovering-analyzing-datavolatile-memory_3609 Anderson, J. (1972). Computer Security Technology Planning Study. Fort Washington: James P. Anderson Company. Retrieved October 6, 2013, from http://seclab.cs.ucdavis.edu/projects/history/papers/ande72a.pdf Anderson, J. (1980). Computer Security Threat Monitoring and Surveillance (Vol. 17). Fort Washington: James P. Anderson Company. Retrieved October 6, 2013, from http://seclab.cs.ucdavis.edu/projects/history/seminal.html Anson, S., & Bunting, S. (2007). Mastering Windows Network Forensics and Investigations. Indianapolis: Wiley Publishing, Inc. Anthony, R. (2013, June 19). Detecting Security Incidents Windows Workstation Event Logs. Retrieved from Sans.org: http://www.sans.org/readingroom/whitepapers/logging/detecting-security-incidents-windows-workstation-event-logs34262 Avast. (2013, November 4). Avast 2014. Retrieved from Avast.com: http://www.avast.com/enus/lp-ppc-paid-01?cha=ppc&sen=google&ste=avast&var=28794671656&omcid=ENUS_Search_Brand&gclid=COqXg93by7oCFSdp7AodbQQAMg 56 Bem, D., Feld, F., Huebner, E., & Bem, O. (2008). Computer Forensics - Past, Present and Future. Journal of Information Science and Technology, 43-59. Brown, C. L. (2006). Computer Evidence Collection and Preservation. Hingham: Charles River Media, Inc. Byrne, Z., Howe, A., Ray, I., Roberts, M., & Urbanska, M. (2012). The Psychology of Security for the Home Computer User. 2012 IEEE Symposium on Security and Privacy, 210-223. Carrier B., G. J. (2004). A Hardware-Based Memory Acquisiion Procedure for Digital Investigations. Journal of Digital Investigations, 57-59. Carrier, B. (2003). Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers. International Journal of Digital Evidence, Winter 2003, Volume 1, Issue 4, 1-12. Carvey, H. (2009). Windows Forensic Analysis. Burlington: Syngress Publishing, Inc. CBS News. (2010, February 23). 11 Indicted In Largest ID Theft Case Ever. Retrieved from CBSNews.com: http://www.cbsnews.com/8301-205_162-4323211.html Christian, L., Mitchell, A., & Rosenstiel, T. (2012). The State of the News Media 2012. Washington DC: Pew Research Center. Retrieved September 10, 2013, from http://stateofthemedia.org/files/2012/03/PEJ-Mobile-Devices-and-News-Topline.pdf Cisco. (2005, Feb 17). IPS Signatures. Retrieved from tools.cisco.com: http://tools.cisco.com/security/center/mviewIpsSignature.x?signatureId=3135&signature SubId=6&softwareVersion=5.1&releaseVersion=S145 Cloppert, M. (2009, July 22). Security Intelligence: Introduction (pt 1). Retrieved from Sans.org: http://computer-forensics.sans.org/blog/2009/07/22/security-intelligence-introduction-pt1 57 clymb3r. (2013, November 17). Injecting Logon Credentials with Powershell. Retrieved from Wordpress.com: http://clymb3r.wordpress.com/ Conly, C. (1989, July). Organizing for Computer Crime Investigation and Prosecution. Issues and Practices in Criminal Justice, pp. 1-121. Conz, N. (2009, December 10). Microsoft and Temenos Partner on Core Banking. Retrieved from Banktech.com: http://www.banktech.com/core-systems/microsoft-and-temenospartner-on-core-ba/222001538 Cummings, R. (2008, November-December). Computer Forensics Detecting, Analyzing, and Reporting on Evidentiary Artifacts Found in Computer Physical Memory. Evidence Technology Magazine, Volume 6, p. Number 6. Retrieved from Technology Magazine. Department of Justice. (2008, August 5). Retail Hacking Ring Charged for Stealing and Distributing Credit and Debit Card Numbers from Major U.S. Retailers. Retrieved from Justice.gov: http://www.justice.gov/opa/pr/2008/August/08-ag-689.html Depatment of Justice. (2008, May 12). Hackers Indicted for Stealing Credit and Debit Card Numbers from National Restaurant Chain. Retrieved from Justice.gov: http://www.justice.gov/opa/pr/2008/May/08-crm-403.html Division of Homeland Security and Emergency Services. (2013, October 8). Title 18. Crimes and Criminal Procedure, Section 1029. Retrieved from Division of Homeland Security and Emergency Services, New York: http://www.dhses.ny.gov/laws-policies/uslaw.cfm Downloadviruss. (2012, May 11). Download Virus Email Worm x32 MyDoom. Retrieved from Downloadviruss.Wordpress.com: http://downloadviruss.wordpress.com/2012/05/11/download-virus-email-worm-win32mydoom-aa/ 58 Efaw, K. (2013, November 2). Installing Snort 2.8.6.1 onWindows 7. Retrieved from Snort.org: http://www.snort.org/assets/151/Installing_Snort_2.8.6.1_on_Windows_7.pdf Endicott-Popovsky, B. F. (2007). A Theoretical Framework for Organizational Network Forensic Readiness. Journal of Computers, VOL. 2, NO. 3, MAY, 1-11. Endler, M. (2013, August 27). Windows 8.1 Released To Manufacturers. Retrieved August 28, 2013, from InformationWeek.com: http://www.informationweek.com/software/windows8/windows-81-released-tomanufacturers/240160483?cid=NL_IWK_Daily_240160483&elq=a1be6fd88a6d428e906 810103aaa000c Feeley, J., & Van Voris, B. (2010, March 25). Hacker Gets 20 Years in Largest Identity-Theft Case (Update2). Retrieved from Bloomberg.com: http://www.bloomberg.com/apps/news?pid=newsarchive&sid=aCDo3co5A0Zk Fitzgibon, N., & Wood, M. (2009, April 1). Conficker C, A Technical Analysis. Retrieved from Sophos.com: http://www.sophos.com/medialibrary/PDFs/marketing%20material/confickeranalysis.pdf F-Secure. (2013, October 20). Worm:W32/Fizzer. Retrieved from F-Secure.com: http://www.fsecure.com/v-descs/fizzer.shtml F-Secure. (2013, October 20). Worm:W32/Mydoom. Retrieved from F-Secure.com: http://www.f-secure.com/v-descs/novarg.shtml Garner, G., & Mora, R. (2005, August 1). DFRWS 2005 Forensic Challenge. Retrieved from dfrws.org: http://www.dfrws.org/2005/challenge/ GMG Systems Inc. (2007). KnTTools with KnTList. Retrieved from GMG Systems, INC: http://www.gmgsystemsinc.com/knttools/ 59 Goodin, D. (2012, November 29). Tor operator charged for child porn transmitted over his servers. Retrieved from arstechnica.com: http://arstechnica.com/tech-policy/2012/11/toroperator-charged-for-child-porn-transmitted-over-his-servers/ Greenberg, Adam. (2013, September 11). Housing Wait List Posted Online Contained Personal Data. Retrieved from SC Magazine.com: http://www.scmagazine.com/housing-wait-listposted-online-contained-personal-data/article/311253/ Grimes, R. A. (2012, October 16). 5 Signs You've Been Hit with an Advance Persistent Threat. Retrieved from Infoworld.com: http://www.infoworld.com/d/security/5-signs-youvebeen-hit-advanced-persistent-threat-204941 Hachman, Mark. (2013, July 1). Windows 8 finally passes Vista in OS market share. Retrieved from PCWorld.com: http://www.pcworld.com/article/2043390/windows-8-finally-passesvista-in-os-market-share.html Harris, S., Harper, A., Eagle, C., & Ness, J. (2008). Gray Hat Hacking: The Ethical Hacker's Handbook, Second Edition. United States of America: McGraw-Hill. IRC Help. (2013, November 18). IRCHelp. Retrieved from irchelp.org: http://www.irchelp.org/ ISACA. (2010). IT Audit Assurance Guidance. Rolling Meadows: ISACA.org. ISACA. (2013, October 17). ISACA. Retrieved from ISACA.org: https://www.isaca.org/Pages/default.aspx Janssen, Cory. (2013, September 3). Network Forensics Definition. Retrieved from Techopedia.com: http://www.techopedia.com/definition/16122/network-forensics Jordan, T. T. (1998). A Sociology of Hackers. A Sociological Review, 757-780. Kaspersky. (2003, May 12). Fizzer - A Multi-threat Worm That Attacks Via E-mail and KaZaA. Retrieved from Kaspersky.com: http://www.kaspersky.com/news.html?id=977151 60 Kaspersky. (2012, December 10). Kaspersky Security Bulletin 2012. The overall statistics for 2012. Retrieved from Securelist.com: http://www.securelist.com/en/analysis/204792255/Kaspersky_Security_Bulletin_2012_T he_overall_statistics_for_2012#9 Kaspersky. (2012). Kaspersky Security Bulletin 2012. The overall statistics for 2012. Moscow: Kaspersky. Kirsch, C. (2013, September 26). How to Set up a Penetration Testing Lab. Retrieved from Rapid7.com: https://community.rapid7.com/docs/DOC-2196 Krebs, B. (2010, September 28). Fake LinkedIn Invites Leads to Zeus Trojan. Retrieved from krebsonsecurity: http://krebsonsecurity.com/2010/09/fake-linkedin-invite-leads-to-zeustrojan/ Krebs, B. (2013, November 1). How to Avoid Cryptolocker Ransomware. Retrieved from Krebs On Security: http://krebsonsecurity.com/ Krisher, T. (2013, September 3). Associated Press - Hackers find weaknesses in Car Computers. Retrieved from News, MSN.com, Science and Technology: http://news.msn.com/sciencetechnology/hackers-find-weaknesses-in-car-computer-systems Lambert, P. (2013, June 28). Everything you need to know about using TOR. Retrieved from TechRepublic: http://www.techrepublic.com/blog/it-security/everything-you-need-toknow-about-using-tor/ Lambert, Patrick. (2012, December 4). The Basics of Using a Proxy Server for Privacy and Security. Retrieved from Techrepublic.com: http://www.techrepublic.com/blog/itsecurity/the-basics-of-using-a-proxy-server-for-privacy-and-security/ 61 Levinson, M. (2012, February 13). Six Ways to Prevent Drive-by Download Malware Attacks. Retrieved from TechWorld.com: http://features.techworld.com/security/3336877/sixways-to-prevent-drive-by-download-malware-attacks/ Linksys. (2013, November 2). High Performance Wireless-N Router (E3000). Retrieved from Support.Linksys.com: http://support.linksys.com/en-us/support/routers/E3000 List, M. D. (2013, October 24). Malware Domain List. Retrieved from malwaredomainlist.com: http://www.malwaredomainlist.com/mdl.php Liu, Y. (2003, May 8). W32.HLLW.Fizzer@mm. Retrieved from Symantec.com: http://www.symantec.com/security_response/writeup.jsp?docid=2003-050821-031699&tabid=2 Mandiant. (2013, February 18). APT1, Exposing One of China's Cyber Espionage Units. Retrieved from Mandiant.com: http://intelreport.mandiant.com/?gclid=CMDgqojKw7kCFeHm7AodDBwAeg McAfee. (2013, November 4). Safe is a Privilege, Not a Right. Retrieved from McAfee.com: http://www.mcafee.com/us/ Menga, R. (2008, June 27). Why Use Windows? Retrieved from PCMech: http://www.pcmech.com/article/why-use-windows/ Microsoft. (2007, August 15). Downloading Internet Explorer for a different operating system. Retrieved from Support.Microsoft.com: http://support.microsoft.com/kb/174680 Microsoft. (2012, November 8). Net TCP/IP Cmdlets in Windows PowerShell. Retrieved from technet.microsoft.com: http://technet.microsoft.com/en-us/library/hh826123.aspx 62 Microsoft. (2013, September 13). A History of WIndows, Hightlights From the First 25 Years. Retrieved from Windows Microsoft.com: http://windows.microsoft.com/enus/windows/history Microsoft. (2013, November 11). All the Application event logs are unexpectedly deleted when you clear the MSDSS. Retrieved from Support.Microsoft.com: http://support.microsoft.com/kb/906516 Microsoft. (2013, November 11). Audit Audit Policy Change. Retrieved from Technet.Microsoft: http://technet.microsoft.com/en-us/library/dd772736(v=ws.10).aspx Microsoft. (2013, November 21). Event ID 5148 — IIS Protocol Adapter Availability. Retrieved from Technet.Microsoft.com: http://technet.microsoft.com/enus/library/dd349271(v=WS.10).aspx Microsoft. (2013, October 16). Event Log. Retrieved from Technet.Microsoft.com: http://technet.microsoft.com/en-us/library/cc722385(v=ws.10).aspx Microsoft. (2013, September 21). Memory Limits for Windows Releases. Retrieved from msdn.microsoft.com: http://msdn.microsoft.com/enus/library/windows/desktop/aa366778.aspx Microsoft. (2013, October 28). Microsoft Windows User Profiles Service Event 1531. Retrieved from Microsoft Technet: http://social.technet.microsoft.com/wiki/contents/articles/12382.microsoft-windows-userprofiles-service-event-1531.aspx Microsoft. (2013, November 25). Security Audit Events for Windows 7 and Windows Server 2008 R2. Retrieved from Microsoft.com: http://www.microsoft.com/enus/download/confirmation.aspx?id=21561 63 Microsoft. (2013, November 27). Security Audit Events for Windows 7 and Windows Server 2008 R2. Retrieved from Microsoft.com: http://www.microsoft.com/enus/download/details.aspx?id=21561 Microsoft. (2013, December 3). Well-known security identifiers in Windows operating systems. Retrieved from Support.Microsoft.com: http://support.microsoft.com/kb/243330 Microsoft. (2013, November 13). What Is Deployment Image Servicing and Management? Retrieved from Technet.Microsoft.com: http://technet.microsoft.com/enus/library/dd744566(v=ws.10).aspx Microsoft. (2013, December 5). Windows Defender. Retrieved from Windows.Microsoft.com: http://windows.microsoft.com/en-us/windows7/products/features/windows-defender MIT. (2013, November 4). Software Patches & OS Updates. Retrieved from ist.mit.edu: http://ist.mit.edu/security/patches Moreno, J. (2013, November 14). Microsoft unveils state-of-the-art Cybercrime Center. Retrieved from Komo News: http://www.komonews.com/news/business/Microsoftunveils-state-of-the-art-Cybercrime-Center-231995791.html Murdock, S. (2013, July 30). Ronald Brown, Pedophile Puppeteer, Sentanced to 20 Years. Retrieved from The Huffington Post: http://www.huffingtonpost.com/2013/07/30/ronaldbrown-child-porn_n_3676727.html Narter, B., & Greer, S. (2012, March 27). Core Banking Solutions for Large Banks, A Global Perspective. Retrieved from CELENT.com: http://www.celent.com/reports/core-bankingsolutions-midsize-and-large-banks-north-american-perspective-0 National Security Agency. (2013). Spotting the Adversary with Windows Event Log Monitoring. Washington, D.C.: National Security Agency. 64 Nielsen Ratings. (2012, December 12). Nielsen Tops of 2012: Digital. Retrieved from Nielsen.com: http://www.nielsen.com/us/en/newswire/2012/nielsen-tops-of-2012digital.html Norton. (2013, October 20). Add Piece of Mind to your Business Plan. Retrieved from Norton: https://buy.symantec.com/estore/clp/home Operating System.org. (2013, August 21). List of Operating Systems. Retrieved September 2, 2013, from Operating System.org: http://www.operatingsystem.org/betriebssystem/_english/os-liste.htm PaperCut. (2013, August 7). Knowledge Base. Retrieved from papercut.com: http://www.papercut.com/kb/Main/HowToFilterTheWindowsEventLogByIPAddress PC Magazine. (2013, December 5). Blacklist. Retrieved from PCMag.com: http://www.pcmag.com/encyclopedia/term/38741/blacklist PC Magazine. (2013, December 5). Encyclopedia. Retrieved from Pcmag.com: http://www.pcmag.com/encyclopedia/term/54441/whitelist PC Magazine. (2013, November 25). Encylopedia. Retrieved from PCMag.com: http://www.pcmag.com/encyclopedia/term/49892/proxy-server PCMagazine. (2013, September 10). Encyclopedia. Retrieved from PCMag.com: http://www.pcmag.com/encyclopedia/term/49892/proxy-server Phrack. (2002, July 28). Handling the Interrupt Descriptor Table. Retrieved from Phrack.org: http://www.phrack.org/issues.html?issue=59&id=4 PostgreSQL. (2013, November 10). Createdb. Retrieved from PostgreSQL.org: http://www.postgresql.org/docs/current/static/app-createdb.html 65 Project, T. (2013, November 2). Sponsors. Retrieved from Tor Project.org: https://www.torproject.org/about/sponsors.html.en Project, T. (2013, November 2). Tor Project Download. Retrieved from torproject.org: https://www.torproject.org/download/download-easy.html.en Project, T. (2013, November 2). Tor Project: Overview. Retrieved from torproject.org: https://www.torproject.org/about/overview.html.en Quist, D., & Smith, V. (2013). Detecting the Presence of Virtual Machines Using the Local Data Table. Atlanta: Offensive Computing. Rouse, M. (2013, May). Definition distributed denial-of-service attack (DDoS). Retrieved from Search Security: http://searchsecurity.techtarget.com/definition/distributed-denial-ofservice-attack Safer Networking. (2013, November 4). Spybot, Search and Destroy. Retrieved from Safer Networking.org: http://www.safer-networking.org/ SANS Institute. (2013, December 4). Intrusion Discovery Cheat Sheet. Retrieved from Sans.org: http://www.sans.org/score/checklists/ID_Windows.pdf Schwartz, M. J. (2013, September 3). Energy Department Updates Breach Count, Says 53,000 Affected. Retrieved from InformationWeek Security: http://www.informationweek.com/security/attacks/energy-department-updates-breachcounts/240160706?cid=NL_IWK_Daily_240160706&elq=8a67bbcc11e842b5bac6f1c36316f1 24 Smith, Randy F. (2013, September 19). Windows Security Log Event ID 4624. Retrieved from Ultimatewindowssecurity.com: 66 http://www.ultimatewindowssecurity.com/securitylog/encyclopedia/event.aspx?eventid= 4624 Snort. (2013, October 20). Snort . Retrieved from Snort.org: http://www.snort.org/ Soong, Jennifer. (2008, June 6). When Addiction Takes Over Your Life. Retrieved from WebMD.com: http://www.webmd.com/mental-health/features/when-technologyaddiction-takes-over-your-life Steel, C. (2006). Windows Forensics: The Field Guide for Conducting Corporate Computer Investigations. Indianapolis: Wiley Publishing, INC. Steele, M. E. (2013, November 6). Winsnort. Retrieved from Winsnort.com: http://www.winsnort.com/index.php?module=Pages&func=display&pageid=49 Stuttard, D. P. (2008). The Web Application Hackers Handbook. Indianapolis: Wiley Publishing, Inc. Technology, N. I. (2001, November 26). Federal Information Processing Standards 197. Retrieved from NIST.gov: http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf Techopedia. (2013, September 21). Script Kiddie. Retrieved from Techopecia.com: http://www.techopedia.com/definition/4090/script-kiddie Techsoup. (2013, November 18). Networking and Security. Retrieved from Techsoupforlibraries.org: http://www.techsoupforlibraries.org/book/export/html/592 Techterms. (2013, November 3). Denial of Service Definition. Retrieved from Techterms.com: http://www.techterms.com/definition/denial_of_service Techterms. (2013, November 2). Network Address Translation. Retrieved from Techterms.com: http://www.techterms.com/definition/nat 67 Tulloch, M. (2012, December 19). Enabling event logging for Internet Explorer. Retrieved from WindowsNetworking.com: http://www.windowsnetworking.com/kbase/WindowsTips/Windows7/AdminTips/Miscel laneous/EnablingeventloggingforInternetExplorer.html U.S. Department of Justice, O. o. (2004). Forensic Examination of Digital Evidence: A Guide for Law Enforcement. Washington, D.C.: National Institute of Standards and Technology. United States Army. (2009, March 23). Army Regulation 25-2, Information Assurance. Retrieved from APD.Army.mil: http://www.apd.army.mil/pdffiles/r25_2.pdf United States v. Milton Scott Pruitt, 10-10829 (United States Court of Appeals for the Eleventh Circuit April 213, 2011). VMware. (2013, November 2). VMware Workstation. Retrieved from VMware.com: http://www.vmware.com/products/workstation/ W3Schools.com. (2013, July). OS Platform Statistics. Retrieved September 2, 2013, from W3Schools.com: http://www.w3schools.com/browsers/browsers_os.asp Wash, R. (2010). Folk Models of home Computer Security. SOUPS '10 (p. Article No. 11). New York: ACM New York. Weinberger, S. (2012, March 20). Top Ten Most-Destructive Computer Viruses. Retrieved from Smithsonian.com: http://www.smithsonianmag.com/science-nature/Top-Ten-MostDestructive-Computer-Viruses.html?c=y&page=2 Wireless Broadband Alliance. (2011). Global Developments in Public WiFi. Tampa: Informat Telecoms and Media. Works, T. (2012). Windows Event Log Viewer (evtx_view). Retrieved from TZ Works.net: https://tzworks.net/prototype_page.php?proto_id=4 68 Xinuos. (2013, November 18). Xinuos. Retrieved from Xinuos.com: http://www.xinuos.com/ 69