336x280(권장), 300x250(권장), 250x250, 200x200 크기의 광고 코드만 넣을 수 있습니다.
침해사고대응
수집, 분석 -> 수집
OOV (Order of Volatility) - 휘발도
메모리 - 하드디스크
-> 디스크 리커버리 -> 데이터 복구 -> 메타정보 기반으로 복구
-> 데이터 카빙 -> 메타정보 없어, 파일시스템에서 찾음
메모리 수집 -> 물리 메모리 수집 -> Live data collection(조금 지난 방식)
-> Memory Forensic(최근 동향) -> DumpIt(32bit/64bit동시호환)사용 -> 영구적보관, 분석
DumpIt.exe
-> 다른 건 32bit로 64bit 덤프 못함
-> 금융권에서는 베카?? 사용
Memory 분석도구
volitality -> 파이썬 base -> 메모리만 분석
-> 외부 덤프 분석 가능
fireEye의 red line -> 자기가 분석한 덤프만 분석 가능
-> 수집시 광범위하게 오래걸림
정적 - 리버싱
동적 - vm(가상머신) -> 가상시스템에서는 작동안하는 악성코드 -> 샌드박싱 필요
-> 하나하나 돌리기
-> 샌드박스아이 -> 동적,정적...한번에
-> zerowine -> 많이 죽었음
-> cuckoo 2.0 -> 사내에 virus total을 만드는 개념 -> 감염파일에 대한 기밀성 보장
-> 설치,셋팅하는데 오래걸림
네트워크 포렌직 -> 비용이 많이 듦 -> 펄, 파이썬이용해서 자동화
FTK imager 참고
volatility로 윈도우, IOS, 안드로이드 분석가능
VMware -> 스냅샷 -> VMEM파일에 메모리 수집됨
https://code.google.com/p/volatility/ -> standalone은 확장 기능 사용 불가
infected.vmem -> 대상 메모리 덤프 파일
vol.exe -f .\infetced.vmem imageinfo -> 이미지에 대한 정보
----------------------------
PS C:\volatility_2.4.win.standalone> .\vol.exe -f .\infetced.vmem
Volatility Foundation Volatility Framework 2.4
ERROR : volatility.debug : You must specify something to do (try -h)
PS C:\volatility_2.4.win.standalone> .\vol.exe -f .\infetced.vmem imageinfo
Volatility Foundation Volatility Framework 2.4
Determining profile based on KDBG search...
Suggested Profile(s) : WinXPSP2x86, WinXPSP3x86 (Instantiated with WinXPSP2x86)
AS Layer1 : IA32PagedMemoryPae (Kernel AS)
AS Layer2 : FileAddressSpace (C:\volatility_2.4.win.standalone\infetced.vmem)
PAE type : PAE
DTB : 0x319000L
KDBG : 0x80544ce0L
Number of Processors : 1
Image Type (Service Pack) : 2
KPCR for CPU 0 : 0xffdff000L
KUSER_SHARED_DATA : 0xffdf0000L
Image date and time : 2010-08-15 19:17:56 UTC+0000
Image local date and time : 2010-08-15 15:17:56 -0400
PS C:\volatility_2.4.win.standalone>
PS C:\volatility_2.4.win.standalone> .\vol.exe -f .\infetced.vmem --profile=WinXPSP2x86 pslist
Volatility Foundation Volatility Framework 2.4
Offset(V) Name PID PPID Thds Hnds Sess Wow64 Start Exit
---------- -------------------- ------ ------ ------ -------- ------ ------ ------------------------------ -------------
-----------------
0x810b1660 System 4 0 58 379 ------ 0
0xff2ab020 smss.exe 544 4 3 21 ------ 0 2010-08-11 06:06:21 UTC+0000
0xff1ecda0 csrss.exe 608 544 10 410 0 0 2010-08-11 06:06:23 UTC+0000
0xff1ec978 winlogon.exe 632 544 24 536 0 0 2010-08-11 06:06:23 UTC+0000
0xff247020 services.exe 676 632 16 288 0 0 2010-08-11 06:06:24 UTC+0000
0xff255020 lsass.exe 688 632 21 405 0 0 2010-08-11 06:06:24 UTC+0000
0xff218230 vmacthlp.exe 844 676 1 37 0 0 2010-08-11 06:06:24 UTC+0000
0x80ff88d8 svchost.exe 856 676 29 336 0 0 2010-08-11 06:06:24 UTC+0000
0xff217560 svchost.exe 936 676 11 288 0 0 2010-08-11 06:06:24 UTC+0000
0x80fbf910 svchost.exe 1028 676 88 1424 0 0 2010-08-11 06:06:24 UTC+0000
0xff22d558 svchost.exe 1088 676 7 93 0 0 2010-08-11 06:06:25 UTC+0000
0xff203b80 svchost.exe 1148 676 15 217 0 0 2010-08-11 06:06:26 UTC+0000
0xff1d7da0 spoolsv.exe 1432 676 14 145 0 0 2010-08-11 06:06:26 UTC+0000
0xff1b8b28 vmtoolsd.exe 1668 676 5 225 0 0 2010-08-11 06:06:35 UTC+0000
0xff1fdc88 VMUpgradeHelper 1788 676 5 112 0 0 2010-08-11 06:06:38 UTC+0000
0xff143b28 TPAutoConnSvc.e 1968 676 5 106 0 0 2010-08-11 06:06:39 UTC+0000
0xff25a7e0 alg.exe 216 676 8 120 0 0 2010-08-11 06:06:39 UTC+0000
0xff364310 wscntfy.exe 888 1028 1 40 0 0 2010-08-11 06:06:49 UTC+0000
0xff38b5f8 TPAutoConnect.e 1084 1968 1 68 0 0 2010-08-11 06:06:52 UTC+0000
0x80f60da0 wuauclt.exe 1732 1028 7 189 0 0 2010-08-11 06:07:44 UTC+0000
0xff3865d0 explorer.exe 1724 1708 13 326 0 0 2010-08-11 06:09:29 UTC+0000
0xff3667e8 VMwareTray.exe 432 1724 1 60 0 0 2010-08-11 06:09:31 UTC+0000
0xff374980 VMwareUser.exe 452 1724 8 207 0 0 2010-08-11 06:09:32 UTC+0000
0x80f94588 wuauclt.exe 468 1028 4 142 0 0 2010-08-11 06:09:37 UTC+0000
0xff224020 cmd.exe 124 1668 0 -------- 0 0 2010-08-15 19:17:55 UTC+0000 2010-08-15 19
:17:56 UTC+0000
PS C:\volatility_2.4.win.standalone>
의심가는 프로세스
-> 약간씩 늦게 실행되고 뜨는 프로세스
-> 핸들이나 쓰레드가 많은 프로세스
-> 필수 프로세스와 같은 이름 -> svchost -> 기본 5개에서 늘고 줌
PS C:\volatility_2.4.win.standalone> .\vol.exe -f .\infetced.vmem --profile=WinXPSP2x86 connscan
Volatility Foundation Volatility Framework 2.4
Offset(P) Local Address Remote Address Pid
---------- ------------------------- ------------------------- ---
0x02214988 172.16.176.143:1054 193.104.41.75:80 856
0x06015ab0 0.0.0.0:1056 193.104.41.75:80 856
PS C:\volatility_2.4.win.standalone>
www.geomaplookup.net -> 아이피 위치 대략적인 추적
PS C:\volatility_2.4.win.standalone> .\vol.exe -f .\infetced.vmem --profile=WinXPSP2x86 malfind -p 856
Volatility Foundation Volatility Framework 2.4
Process: svchost.exe Pid: 856 Address: 0xb70000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: CommitCharge: 38, MemCommit: 1, PrivateMemory: 1, Protection: 6
0x00b70000 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 MZ..............
0x00b70010 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 ........@.......
0x00b70020 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0x00b70030 00 00 00 00 00 00 00 00 00 00 00 00 d0 00 00 00 ................
0xb70000 4d DEC EBP
0xb70001 5a POP EDX
0xb70002 90 NOP
0xb70003 0003 ADD [EBX], AL
0xb70005 0000 ADD [EAX], AL
0xb70007 000400 ADD [EAX+EAX], AL
0xb7000a 0000 ADD [EAX], AL
0xb7000c ff DB 0xff
0xb7000d ff00 INC DWORD [EAX]
0xb7000f 00b800000000 ADD [EAX+0x0], BH
0xb70015 0000 ADD [EAX], AL
0xb70017 004000 ADD [EAX+0x0], AL
0xb7001a 0000 ADD [EAX], AL
0xb7001c 0000 ADD [EAX], AL
0xb7001e 0000 ADD [EAX], AL
0xb70020 0000 ADD [EAX], AL
0xb70022 0000 ADD [EAX], AL
0xb70024 0000 ADD [EAX], AL
0xb70026 0000 ADD [EAX], AL
0xb70028 0000 ADD [EAX], AL
0xb7002a 0000 ADD [EAX], AL
0xb7002c 0000 ADD [EAX], AL
0xb7002e 0000 ADD [EAX], AL
0xb70030 0000 ADD [EAX], AL
0xb70032 0000 ADD [EAX], AL
0xb70034 0000 ADD [EAX], AL
0xb70036 0000 ADD [EAX], AL
0xb70038 0000 ADD [EAX], AL
0xb7003a 0000 ADD [EAX], AL
0xb7003c d000 ROL BYTE [EAX], 0x1
0xb7003e 0000 ADD [EAX], AL
Process: svchost.exe Pid: 856 Address: 0xcb0000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: CommitCharge: 1, MemCommit: 1, PrivateMemory: 1, Protection: 6
0x00cb0000 b8 35 00 00 00 e9 cd d7 c5 7b 00 00 00 00 00 00 .5.......{......
0x00cb0010 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0x00cb0020 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0x00cb0030 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0xcb0000 b835000000 MOV EAX, 0x35
0xcb0005 e9cdd7c57b JMP 0x7c90d7d7
0xcb000a 0000 ADD [EAX], AL
0xcb000c 0000 ADD [EAX], AL
0xcb000e 0000 ADD [EAX], AL
0xcb0010 0000 ADD [EAX], AL
0xcb0012 0000 ADD [EAX], AL
0xcb0014 0000 ADD [EAX], AL
0xcb0016 0000 ADD [EAX], AL
0xcb0018 0000 ADD [EAX], AL
0xcb001a 0000 ADD [EAX], AL
0xcb001c 0000 ADD [EAX], AL
0xcb001e 0000 ADD [EAX], AL
0xcb0020 0000 ADD [EAX], AL
0xcb0022 0000 ADD [EAX], AL
0xcb0024 0000 ADD [EAX], AL
0xcb0026 0000 ADD [EAX], AL
0xcb0028 0000 ADD [EAX], AL
0xcb002a 0000 ADD [EAX], AL
0xcb002c 0000 ADD [EAX], AL
0xcb002e 0000 ADD [EAX], AL
0xcb0030 0000 ADD [EAX], AL
0xcb0032 0000 ADD [EAX], AL
0xcb0034 0000 ADD [EAX], AL
0xcb0036 0000 ADD [EAX], AL
0xcb0038 0000 ADD [EAX], AL
0xcb003a 0000 ADD [EAX], AL
0xcb003c 0000 ADD [EAX], AL
0xcb003e 0000 ADD [EAX], AL
PS C:\volatility_2.4.win.standalone>
PS C:\volatility_2.4.win.standalone> .\vol.exe -f .\infetced.vmem --profile=WinXPSP2x86 malfind -p 856 processdump --dump-dir C:\volatility_2.4.win.standalone
Volatility Foundation Volatility Framework 2.4
Process: svchost.exe Pid: 856 Address: 0xb70000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: CommitCharge: 38, MemCommit: 1, PrivateMemory: 1, Protection: 6
0x00b70000 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 MZ..............
0x00b70010 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 ........@.......
0x00b70020 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0x00b70030 00 00 00 00 00 00 00 00 00 00 00 00 d0 00 00 00 ................
0xb70000 4d DEC EBP
0xb70001 5a POP EDX
0xb70002 90 NOP
0xb70003 0003 ADD [EBX], AL
0xb70005 0000 ADD [EAX], AL
0xb70007 000400 ADD [EAX+EAX], AL
0xb7000a 0000 ADD [EAX], AL
0xb7000c ff DB 0xff
0xb7000d ff00 INC DWORD [EAX]
0xb7000f 00b800000000 ADD [EAX+0x0], BH
0xb70015 0000 ADD [EAX], AL
0xb70017 004000 ADD [EAX+0x0], AL
0xb7001a 0000 ADD [EAX], AL
0xb7001c 0000 ADD [EAX], AL
0xb7001e 0000 ADD [EAX], AL
0xb70020 0000 ADD [EAX], AL
0xb70022 0000 ADD [EAX], AL
0xb70024 0000 ADD [EAX], AL
0xb70026 0000 ADD [EAX], AL
0xb70028 0000 ADD [EAX], AL
0xb7002a 0000 ADD [EAX], AL
0xb7002c 0000 ADD [EAX], AL
0xb7002e 0000 ADD [EAX], AL
0xb70030 0000 ADD [EAX], AL
0xb70032 0000 ADD [EAX], AL
0xb70034 0000 ADD [EAX], AL
0xb70036 0000 ADD [EAX], AL
0xb70038 0000 ADD [EAX], AL
0xb7003a 0000 ADD [EAX], AL
0xb7003c d000 ROL BYTE [EAX], 0x1
0xb7003e 0000 ADD [EAX], AL
Process: svchost.exe Pid: 856 Address: 0xcb0000
Vad Tag: VadS Protection: PAGE_EXECUTE_READWRITE
Flags: CommitCharge: 1, MemCommit: 1, PrivateMemory: 1, Protection: 6
0x00cb0000 b8 35 00 00 00 e9 cd d7 c5 7b 00 00 00 00 00 00 .5.......{......
0x00cb0010 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0x00cb0020 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0x00cb0030 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0xcb0000 b835000000 MOV EAX, 0x35
0xcb0005 e9cdd7c57b JMP 0x7c90d7d7
0xcb000a 0000 ADD [EAX], AL
0xcb000c 0000 ADD [EAX], AL
0xcb000e 0000 ADD [EAX], AL
0xcb0010 0000 ADD [EAX], AL
0xcb0012 0000 ADD [EAX], AL
0xcb0014 0000 ADD [EAX], AL
0xcb0016 0000 ADD [EAX], AL
0xcb0018 0000 ADD [EAX], AL
0xcb001a 0000 ADD [EAX], AL
0xcb001c 0000 ADD [EAX], AL
0xcb001e 0000 ADD [EAX], AL
0xcb0020 0000 ADD [EAX], AL
0xcb0022 0000 ADD [EAX], AL
0xcb0024 0000 ADD [EAX], AL
0xcb0026 0000 ADD [EAX], AL
0xcb0028 0000 ADD [EAX], AL
0xcb002a 0000 ADD [EAX], AL
0xcb002c 0000 ADD [EAX], AL
0xcb002e 0000 ADD [EAX], AL
0xcb0030 0000 ADD [EAX], AL
0xcb0032 0000 ADD [EAX], AL
0xcb0034 0000 ADD [EAX], AL
0xcb0036 0000 ADD [EAX], AL
0xcb0038 0000 ADD [EAX], AL
0xcb003a 0000 ADD [EAX], AL
0xcb003c 0000 ADD [EAX], AL
0xcb003e 0000 ADD [EAX], AL
PS C:\volatility_2.4.win.standalone>
https://www.virustotal.com에서 생성된 dump파일 검사하여 악성코드 여부 확인
process.0x80ff88d8.0xb70000.dmp
-> 악성으로 탐지(첫번째dump)
process.0x80ff88d8.0xcb0000.dmp
-> 정상
-> 위의 방식으로 반복하여 프로세스의 악성코드 여부 확인
PS C:\volatility_2.4.win.standalone> .\vol.exe -f .\infetced.vmem --profile=WinXPSP2x86 threads
...................
..................
겁나 많이 뜸
------
ETHREAD: 0xff1ff7f0 Pid: 1028 Tid: 1388
Tags:
Created: 2010-08-11 06:06:26 UTC+0000
Exited: 1970-01-01 00:00:00 UTC+0000
Owning Process: svchost.exe
Attached Process: svchost.exe
State: Waiting:WrLpcReceive
BasePriority: 0x8
Priority: 0x8
TEB: 0x7ffac000
StartAddress: 0x7c810856 kernel32.dll
ServiceTable: 0x80552180
[0] 0x80501030
[1] 0x00000000
[2] 0x00000000
[3] 0x00000000
Win32Thread: 0x00000000
CrossThreadFlags:
Eip: 0x7c90eb94
eax=0x00000102 ebx=0x00000000 ecx=0x00effe1c edx=0x7c90eb94 esi=0x000b1310 edi=0x0
eip=0x7c90eb94 esp=0x00effe1c ebp=0x00efff80 err=0x00000000
cs=0x1b ss=0x23 ds=0x23 es=0x23 gs=0x00 fs=0x3b efl=0x00000246
dr0=0x00000000 dr1=0x00000000 dr2=0x00000000 dr3=0x00000000 dr6=0x00000000 dr7=0x0
0x7c810856 33ed XOR EBP, EBP
0x7c810858 53 PUSH EBX
0x7c810859 50 PUSH EAX
0x7c81085a 6a00 PUSH 0x0
0x7c81085c e973acffff JMP 0x7c80b4d4
0x7c810861 90 NOP
0x7c810862 90 NOP
0x7c810863 90 NOP
0x7c810864 90 NOP
0x7c810865 90 NOP
0x7c810866 90 NOP
0x7c810867 33ed XOR EBP, EBP
0x7c810869 50 PUSH EAX
0x7c81086a 6a00 PUSH 0x0
0x7c81086c e9 DB 0xe9
0x7c81086d bb DB 0xbb
------
ETHREAD: 0xff3891d0 Pid: 1432 Tid: 1100
Tags:
Created: 2010-08-11 06:06:53 UTC+0000
Exited: 1970-01-01 00:00:00 UTC+0000
Owning Process: spoolsv.exe
Attached Process: spoolsv.exe
State: Waiting:WrLpcReceive
BasePriority: 0x8
Priority: 0x9
TEB: 0x7ffd9000
StartAddress: 0x7c810856 kernel32.dll
ServiceTable: 0x80552140
[0] 0x80501030
[1] 0xbf997600
[2] 0x00000000
[3] 0x00000000
Win32Thread: 0xe15ef558
CrossThreadFlags:
Eip: 0x7c90eb94
eax=0x00000002 ebx=0x00000000 ecx=0x00000410 edx=0x00000002 esi=0x0009ace8 edi=0x0
eip=0x7c90eb94 esp=0x00a1fe1c ebp=0x00a1ff80 err=0x00000000
cs=0x1b ss=0x23 ds=0x23 es=0x23 gs=0x00 fs=0x3b efl=0x00000246
dr0=0x00000000 dr1=0x00000000 dr2=0x00000000 dr3=0x00000000 dr6=0x00000000 dr7=0x0
0x7c810856 33ed XOR EBP, EBP
0x7c810858 53 PUSH EBX
0x7c810859 50 PUSH EAX
0x7c81085a 6a00 PUSH 0x0
0x7c81085c e973acffff JMP 0x7c80b4d4
0x7c810861 90 NOP
0x7c810862 90 NOP
0x7c810863 90 NOP
0x7c810864 90 NOP
0x7c810865 90 NOP
0x7c810866 90 NOP
0x7c810867 33ed XOR EBP, EBP
0x7c810869 50 PUSH EAX
0x7c81086a 6a00 PUSH 0x0
0x7c81086c e9 DB 0xe9
0x7c81086d bb DB 0xbb
------
ETHREAD: 0xff14ebf8 Pid: 1088 Tid: 1936
Tags:
Created: 2010-08-11 06:06:38 UTC+0000
Exited: 2010-08-11 06:06:39 UTC+0000
Owning Process: svchost.exe
Attached Process: svchost.exe
State: Terminated
BasePriority: 0x8
Priority: 0x10
TEB: 0x00000000
StartAddress: 0x7c810856 kernel32.dll
ServiceTable: 0x80552180
[0] 0x80501030
[1] 0x00000000
[2] 0x00000000
[3] 0x00000000
Win32Thread: 0x00000000
CrossThreadFlags: PS_CROSS_THREAD_FLAGS_TERMINATED
Eip: 0x7c90eb94
eax=0x00000036 ebx=0x00000000 ecx=0x72493537 edx=0x724a99c0 esi=0x000e45c0 edi=0x0
eip=0x7c90eb94 esp=0x01f3fe1c ebp=0x01f3ff80 err=0x00000000
cs=0x1b ss=0x23 ds=0x23 es=0x23 gs=0x00 fs=0x3b efl=0x00000246
dr0=0x00000000 dr1=0x00000000 dr2=0x00000000 dr3=0x00000000 dr6=0x00000000 dr7=0x0
0x7c810856 33ed XOR EBP, EBP
0x7c810858 53 PUSH EBX
0x7c810859 50 PUSH EAX
0x7c81085a 6a00 PUSH 0x0
0x7c81085c e973acffff JMP 0x7c80b4d4
0x7c810861 90 NOP
0x7c810862 90 NOP
0x7c810863 90 NOP
0x7c810864 90 NOP
0x7c810865 90 NOP
0x7c810866 90 NOP
0x7c810867 33ed XOR EBP, EBP
0x7c810869 50 PUSH EAX
0x7c81086a 6a00 PUSH 0x0
0x7c81086c e9 DB 0xe9
0x7c81086d bb DB 0xbb
------
ETHREAD: 0xff39ada8 Pid: 1028 Tid: 340
Tags:
Created: 2010-08-11 06:08:00 UTC+0000
Exited: 1970-01-01 00:00:00 UTC+0000
Owning Process: svchost.exe
Attached Process: svchost.exe
State: Waiting:WrQueue
BasePriority: 0x8
Priority: 0x9
TEB: 0x7ff6b000
StartAddress: 0x7c810856 kernel32.dll
ServiceTable: 0x80552180
[0] 0x80501030
[1] 0x00000000
[2] 0x00000000
[3] 0x00000000
Win32Thread: 0x00000000
CrossThreadFlags:
Eip: 0x7c90eb94
eax=0x57d29bc0 ebx=0x00000000 ecx=0x01000068 edx=0x000c2608 esi=0x0287f37c edi=0x7
eip=0x7c90eb94 esp=0x034bff28 ebp=0x034bff54 err=0x00000000
cs=0x1b ss=0x23 ds=0x23 es=0x23 gs=0x00 fs=0x3b efl=0x00000246
dr0=0x00000000 dr1=0x00000000 dr2=0x00000000 dr3=0x00000000 dr6=0x00000000 dr7=0x0
0x7c810856 33ed XOR EBP, EBP
0x7c810858 53 PUSH EBX
0x7c810859 50 PUSH EAX
0x7c81085a 6a00 PUSH 0x0
0x7c81085c e973acffff JMP 0x7c80b4d4
0x7c810861 90 NOP
0x7c810862 90 NOP
0x7c810863 90 NOP
0x7c810864 90 NOP
0x7c810865 90 NOP
0x7c810866 90 NOP
0x7c810867 33ed XOR EBP, EBP
0x7c810869 50 PUSH EAX
0x7c81086a 6a00 PUSH 0x0
0x7c81086c e9 DB 0xe9
0x7c81086d bb DB 0xbb
------
ETHREAD: 0xff2167f8 Pid: 936 Tid: 940
Tags:
Created: 2010-08-11 06:06:24 UTC+0000
Exited: 1970-01-01 00:00:00 UTC+0000
Owning Process: svchost.exe
Attached Process: svchost.exe
State: Waiting:Executive
BasePriority: 0x8
Priority: 0x8
TEB: 0x7ffde000
StartAddress: 0x7c810867 kernel32.dll
ServiceTable: 0x80552140
[0] 0x80501030
[1] 0xbf997600
[2] 0x00000000
[3] 0x00000000
Win32Thread: 0xe1a31a58
CrossThreadFlags:
0x7c810867 33ed XOR EBP, EBP
0x7c810869 50 PUSH EAX
0x7c81086a 6a00 PUSH 0x0
0x7c81086c e9bb640000 JMP 0x7c816d2c
0x7c810871 90 NOP
0x7c810872 8bff MOV EDI, EDI
0x7c810874 90 NOP
0x7c810875 90 NOP
0x7c810876 90 NOP
0x7c810877 90 NOP
0x7c810878 90 NOP
0x7c810879 64 DB 0x64
0x7c81087a 8b DB 0x8b
0x7c81087b 15 DB 0x15
0x7c81087c 1800 SBB [EAX], AL
0x7c81087e 00 DB 0x0
------
ETHREAD: 0xff11fb30 Pid: 1968 Tid: 868
Tags:
Created: 2010-08-11 06:06:40 UTC+0000
Exited: 1970-01-01 00:00:00 UTC+0000
Owning Process: TPAutoConnSvc.e
Attached Process: TPAutoConnSvc.e
State: Waiting:UserRequest
BasePriority: 0x8
Priority: 0x8
TEB: 0x7ffdc000
StartAddress: 0x7c810856 kernel32.dll
ServiceTable: 0x80552180
[0] 0x80501030
[1] 0x00000000
[2] 0x00000000
[3] 0x00000000
Win32Thread: 0x00000000
CrossThreadFlags:
0x7c810856 33ed XOR EBP, EBP
0x7c810858 53 PUSH EBX
0x7c810859 50 PUSH EAX
0x7c81085a 6a00 PUSH 0x0
0x7c81085c e973acffff JMP 0x7c80b4d4
0x7c810861 90 NOP
0x7c810862 90 NOP
0x7c810863 90 NOP
0x7c810864 90 NOP
0x7c810865 90 NOP
0x7c810866 90 NOP
0x7c810867 33ed XOR EBP, EBP
0x7c810869 50 PUSH EAX
0x7c81086a 6a00 PUSH 0x0
0x7c81086c e9 DB 0xe9
0x7c81086d bb DB 0xbb
PS C:\volatility_2.4.win.standalone>
-> 커널 스레드의 값을 보여줌
PS C:\volatility_2.4.win.standalone> .\vol.exe -f .\infetced.vmem --profile=WinXPSP2x86 hivelist
Volatility Foundation Volatility Framework 2.4
Virtual Physical Name
---------- ---------- ----
0xe1c49008 0x036dc008 \Device\HarddiskVolume1\Documents and Settings\LocalService\Local Settings\Application Data\Micros
oft\Windows\UsrClass.dat
0xe1c41b60 0x04010b60 \Device\HarddiskVolume1\Documents and Settings\LocalService\NTUSER.DAT
0xe1a39638 0x021eb638 \Device\HarddiskVolume1\Documents and Settings\NetworkService\Local Settings\Application Data\Micr
osoft\Windows\UsrClass.dat
0xe1a33008 0x01f98008 \Device\HarddiskVolume1\Documents and Settings\NetworkService\NTUSER.DAT
0xe153ab60 0x06b7db60 \Device\HarddiskVolume1\WINDOWS\system32\config\software
0xe1542008 0x06c48008 \Device\HarddiskVolume1\WINDOWS\system32\config\default
0xe1537b60 0x06ae4b60 \SystemRoot\System32\Config\SECURITY
0xe1544008 0x06c4b008 \Device\HarddiskVolume1\WINDOWS\system32\config\SAM
0xe13ae580 0x01bbd580 [no name]
0xe101b008 0x01867008 \Device\HarddiskVolume1\WINDOWS\system32\config\system
0xe1008978 0x01824978 [no name]
0xe1e158c0 0x009728c0 \Device\HarddiskVolume1\Documents and Settings\Administrator\Local Settings\Application Data\Micro
soft\Windows\UsrClass.dat
0xe1da4008 0x00f6e008 \Device\HarddiskVolume1\Documents and Settings\Administrator\NTUSER.DAT
PS C:\volatility_2.4.win.standalone>
-> 레지스트리 하이브키 확인
추천 서적

===================================================================================================
The Art of Memory Forensics
This book is written by 4 of the core Volatility developers - Michael Ligh (@iMHLv2), Andrew Case (@attrc), Jamie Levy (@gleeda) and AAron Walters (@4tphi). We've been collaborating for well over 6 years to design the most advanced memory analysis framework and we're excited to be collaborating on a book.
-> 한국어 번역은 좀 미숙함
===================================================================================================