In this Sherlock, you will become acquainted with MFT (Master File Table) forensics. You will be introduced to well-known tools and methodologies for analyzing MFT artifacts to identify malicious activity. During our analysis, you will utilize the MFTECmd tool to parse the provided MFT file, TimeLine Explorer to open and analyze the results from the parsed MFT, and a Hex editor to recover file contents from the MFT.
Task 1 Simon Stark was targeted by attackers on February 13. He downloaded a ZIPfile from a link received inan email. What was the name of the ZIPfilehe downloaded from the link?
:Stage-20240213T093324Z-001.zip
查找 HostUrl
重新加载打开文件,然后过滤 .zip 文件查看 Zone Id Contents 列表找到 HostUrl
Task 2 Examine the Zone Identifier contents forthe initially downloaded ZIP file. This field reveals the HostUrl from where thefile was downloaded, serving asa valuable Indicator of Compromise (IOC) in our investigation/analysis. What is the full Host URLfrom where this ZIP file was downloaded?
Task 5 Finding the hex offsetofan MFT record is beneficial in many investigative scenarios. Find the hex offsetofthe stager filefrom Question 3.
:16E3000
查找驻留文件内容
根据 “they can be stored directly on MFT File itself” 这句话我们用 010 打开 $MFT 文件,跳转到之前所计算出来的 16E3000 地址处,然后往下看会发现有 powershell.exe 的踪影,同时出现了 IP
找到:43.204.110.203:6666
1 2 3 4
Task 6 Each MFT record is1024 bytes in size. If afileon disk has smaller size than 1024 bytes, they can be stored directly on MFT File itself. These are called MFT Resident files. During Windows File system Investigation, its crucial to look for any malicious/suspicious files that may be resident in MFT. This way we can find contents of malicious files/scripts. Find the contents of The malicious stager identified in Question3 and answer with the C2 IP and port.