Professional Documents
Culture Documents
NW3C
NW3C,Inc.,d/b/atheNationalWhiteCollarCrimeCenter,isa501c3nonprofitcorporationunderthe
UnitedStatesInternalRevenueTaxcode,incorporatedintheCommonwealthofVirginia.NW3Chas
morethana30yearhistoryinservingState,Local,andTribalLawEnforcement.
NW3Csnocostmembership,training,andservicesareextendedtoallLawEnforcement,regulatory
andprosecutorialagencies.NW3CisgovernedbyaBoardofDirectorselectedfrommemberlaw
enforcementagencies.TheBoardestablishesstrategicdirectioninaccordancewiththeNW3Ccorporate
bylaws,grantconditions,andotherappropriateguidelines,suchasapplicableOfficeofManagement
andBudget(OMB)circularsandtheOJPFinancialGuide.
WhatNW3CDoes
NW3Csprimaryareaofservicetojusticeagenciesistraining,andsince1996hasbeenthenations
leadingproviderofnocostInvestigativeandForensicsComputerCrimeandDigitalEvidencetrainingto
State,Local,andTribalLawEnforcement.Throughacombinationoftrainingandcriticalsupport
services,NW3Cequipsstateandlocallawenforcementagencieswithskillsandresourcestheyneedto
tackleemergingeconomicandcybercrimeproblems.
Forthegeneralpublic,NW3Cprovidesinformationandresearchsotheytoomaybecomeproactivein
thepreventionofeconomicandcybercrime.VictimsofcrimescanrelyonNW3Ctohelpthemregister
Internetcrimecomplaintsthroughtheirwebsiteatwww.ic3.govandnotifytheappropriateauthorities
atlocal,state,andfederallevelspromptly,accurately,andsecurely.
Acongressionallyfundednonprofitorganization,NW3Chasbeencontinuouslyfundedforthepast28
yearsinsupportofstateandlocalenforcementefforts.NW3Cisanationalprogramwithapresencein
all50states.
MembershipinNW3Cisfreeandopentofederal,state,localandinternationallawenforcement;
regulatoryandprosecutionagencies;aswellasdulyconstitutedpermanenttaskforces.Neither
individualsnorprivatecompaniesareeligibleformembership.
This project was supported by Grant No. 2008-CE-CX-0001 awarded by the Bureau of Justice Assistance. The
Bureau of Justice Assistance is a component of the Office of Justice Programs, which also includes the Bureau of
Justice Statistics, the National Institute of Justice, the Office of Juvenile Justice and Delinquency Prevention, and the
Office for Victims of Crime. Points of view or opinions in this document are those of the author and do not represent
the official position or policies of the United States Department of Justice.
TableofContents
TableofContents...........................................................................................................................................i
Introduction..................................................................................................................................................1
PurposeandScope........................................................................................................................................1
TestResultSummary....................................................................................................................................1
TestAssertions..............................................................................................................................................2
TestingEnvironment.....................................................................................................................................2
TestComputer..........................................................................................................................................2
SupportSoftwareUsed.............................................................................................................................4
AdditionalInformation..............................................................................................................................4
TestResults...................................................................................................................................................5
ReportNotes...............................................................................................................................................51
AdditionalReferences.................................................................................................................................51
Glossary.......................................................................................................................................................51
Introduction
ThepurposeofthisreportistodocumentthevalidationofComputerOnlineForensicEvidence
Extractors(COFEE)generatedthumbdriveswhichwerecreatedusingthetwoNW3Ccollectionprofiles:
NW3CVolatileDataandNW3CIncidentResponse.
ToolTested:
Version:
RunEnvironments:
Supplier:
ComputerOnlineForensicEvidenceExtractor
1.1.2
WindowsXPServicePack2andWindowsXPServicePack3
Microsoft&NW3C
PurposeandScope
Thisvalidationstudywasconducted,inconjunctionwiththevalidationstudytitledCOFEEGUI
CONSOLE,toverifythattheCOFEEsuitefunctionsproperly.Thisdocumentfocusesonthevalidation
oftheCOFEEgeneratedthumbdrives.
COFEEsprimarypurposeistocreateathumbdrivewhichcontainsapredeterminedsetofapplications
whicharesettorunonasuspectslivemachine.UponconnectingaCOFEEgeneratedthumbdrivetoa
suspectsmachine,theinvestigatorexecutesrunner.exe(aprogramlocatedonthethumbdrive)which,
inturn,executesalloftheprogramsspecifiedbyCOFEE,andstoresthedatacollectedonthe
investigatorsthumbdrive.
TheprogramsplacedonthegeneratedthumbdrivesareidentifiedbyaprofileloadedintoCOFEE.
Whileanyusercancreatetheirownprofile,thisvalidationstudywillfocusonlyontheprofilescreated
byNW3C:NW3CVolatileDataandNW3CIncidentResponse.
Thisvalidationstudywasconductedtoensurethatwhenrunner.exeisexecuted:alloftheprograms
identifiedbytheprofileareexecuted,thatthecollecteddataisstoredontheinvestigatorsthumbdrive,
thatnoapplicationswererunfromthesuspectsmachine,andthatnounacceptablewritesweremade
tothesuspectsmachine.
COFEEiscurrentlyonlysupportedontheMicrosoftWindowsXPoperatingsystem.Nootheroperating
systemwastestedduringthisvalidationstudy.
TestResultSummary
OverallResult
TestingconductedonRunnerandtheNW3Cprofilesverifiedthatboththerunner.exeapplication,as
wellastheselectedprograms,functionedasexpectedandarewellwithinacceptablepracticesfordata
collectiononalivesystem.
NW3CVolatileDataProfile
Therewerenowritestothesuspectdrivesfilesystemusingthisprofile.
TherewereupdatesmadetotheWindowsRegistryonthesuspectsmachine,howevernoneofthe
registryupdateswereofobviousforensicvalue.Forspecificinformationonwhatkeyswerewrittento,
seeTestResults.
NW3CIncidentResponseProfile
Thisprofilecausedthreewritestothesuspectdrivesfilesystem.Allthreewriteswerecausedbythe
programhandle.exeandweremadetothefilePROCEXP100.sys.Thereferencetothefile
PROCEXP100.sysishardcodedintohandle.exe,aproductofSysinternals,andassuchitisnotpossible
torestrainhandle.exefromwritingtothisfile.However,thisfileisspecificallywrittenaspartofthe
Sysinternalstoolsetandisnotofevidentiaryinterest.
TherewerealsoupdatesmadetotheWindowsRegistryonthesuspectsmachine,howevernoneofthe
registryupdateswereofobviousforensicvalue.Forspecificinformationonwhatkeyswerewrittento,
seeTestResults.
DuringthetestingoftheIncidentResponseProfile,onetest(RunnerTest012)felloutsideofnormal
parameters.Duringthistest,handle.exedidnotwritetothefilePROCEXP100.sys,oranyregistryentries
relatedtoPROCEXP100.Thisanomalyoccurredduringonlyonetest,andasitcausedevenfewerwrites,
doesnotaffecttheoveralloutcomeofthisvalidation.
TestAssertions
ThefollowingassertionswerebaseduponthelistedfeaturesofCOFEE,aswellasadherencetoaccepted
forensicpracticesonalivemachine.
1.
2.
3.
4.
5.
Allprogramsidentifiedintheprofilewereexecuted.
Resultsofthetoolswereproperlystoredontheinvestigatorsthumbdrive.
Executingrunner.exedidnotcauseanydirectwritestothesuspectdrive(filesystem).
Executingrunner.exedidnotcauseanydirectwritestothesuspectdrive(registry).
Thetoolsexecutedwererunfromthethumbdrive,notfromthesuspectsmachine.
TestingEnvironment
TestComputer
1. Gateway600YG2Laptop(Abe)
a. SerialNumber:0029567634
b. IntelPentium4Mobile2.00GHz
c. 512MBRAM
d. PATA2.5HardDrive
2
2.
3.
4.
5.
6.
i. IBMIC25N030ATCS04030GBHardDrive
ii. SerialNumber:DAH4W0AB
iii. Contained1PrimaryPartitionwhichwasreportedat27.94GB
e. IntegratedNetworkCard
DellLatitudeD820Laptop(Eli)
a. IntelCentrinoDuoT25002.00GHz
b. 2GBRAM
c. SATA2.5HardDrive
i. SeagateMomentus60GB5400RPM
ii. SerialNumber:5PJ3J3FR
iii. Contained1PrimaryPartitionwhichwasreportedat55.88GB
d. IntegratedNetworkCard
DellLatitudeD820Laptop(Jenny)
a. IntelCentrinoDuoT25002.00GHz
b. 2GBRAM
c. SATA2.5HardDrive
i. SeagateMomentus60GB5400RPM
ii. SerialNumber:5PJ31XJM
iii. Contained1PrimaryPartitionwhichwasreportedat55.88GB
d. IntegratedNetworkCard
DigitalIntelligenceForensicRecoveryofEvidenceDevice(FRED)Tower(Jim)
a. SerialNumber:F0039002127
b. IntelPentium42.4GHz
c. 1GBRAM
d. PATA3.5HardDrive
i. MaxtorDiamondMaxPlus980GB
ii. SerialNumber:Y2B7HYVE
iii. Contained1PrimaryPartitionwhichwasreportedat76.33GB
e. IntegratedNetworkCard
Gateway600YG2Laptop(Pat)
a. SerialNumber:0029567607
b. IntelPentium4Mobile2.00GHz
c. 512MBRAM
d. PATA2.5HardDrive
i. IBMIC25N030ATCS04030GB
ii. SerialNumber:DAH4VJNB
iii. Contained1PrimaryPartitionwhichwasreportedat27.94GB
e. IntegratedNetworkCard
DigitalIntelligenceForensicRecoveryofEvidenceDevice(FRED)Tower(Paul)
a. SerialNumber:F0039002132
b. IntelPentium42.4GHz
c. 1GBRAM
3
d. PATA3.5HardDrive
i. MaxtorDiamondMaxPlus980GB
ii. SerialNumber:Y2B7KF6E
iii. Contained1PrimaryPartitionwhichwasreportedat76.33GB
e. IntegratedNetworkCard
SupportSoftwareUsed
1. ProcessMonitorwasusedtorecordallprocessesandwritesmadeduringthetestingofthe
generatedthumbdrives.ProcessMonitorisafreeWindowsSysinternalstoolwrittenbyMark
RussinovichandBryceCogswell.Thissoftwarewasdownloadedfrom:
http://technet.microsoft.com/enus/sysinternals/bb896645.aspx
2. MicrosoftExcel2007wasusedforanalysisofthelogfilescreatedbyProcessMonitor.Thecopy
ofMicrosoftOfficeusedislicensedtoNW3C.
AdditionalInformation
Theoperatingsystemwasnotlistedinthedescriptionsaboveastheywereauniquepartoftesting.
WhileallthemachineswererunningWindowsXP,theywerenotallrunningonthesameservicepack.
Theservicepackusedonanygiventestwillbelistedonthespecifictestpage.
TestResults
Thissectioncontainsdetailsonalltestsconductedduringthevalidationstudy.
TestResultsReportKey
TestResultsReportKey
TestName: 0001
Date: 23July2009
Description: TodetermineifXYZdoesABC
TesterName:
JShmoe
TestMachine: Dave1
AssertionsTested: XYZdoesA
XYZdoesB
XYZdoesC
UniqueSetup
NonUniversalStuff.Newpartitionscheme,etc.Couldalsoincludeprehash
Information:
values,etc.
AsExpected
ResultsBy
XYZdoesA
Assertion:
AsExpected
XYZdoesB
AnomaliesDetected
XYZdoesC
TesterNotes:
AnyadditionalinformationthetesterwantstoaddprobablyinParagraphform.
Couldincludehashinformation.
OverallSuccess:
AsExpectedorAnomaliesDetected
TestResults
TestName: RunnerTest001
Date: 26August2009
Description: RunningaCOFEEgeneratedthumbdrivewiththeNW3CVolatileDataProfile(SP3)
TesterName:
JWykes
TestMachine: Abe
AssertionsTested:
1. Allprogramsidentifiedintheprofilewereexecuted.
2. Resultsofthetoolswereproperlystoredontheinvestigatorsthumb
drive.
3. Executingrunner.exedidnotcauseanydirectwritestothesuspectdrive
(FileSystem).
4. Executingrunner.exedidnotcauseanydirectwritestothesuspectdrive
(Registry).
5. Thetoolsexecutedwererunfromthethumbdrive,notfromthesuspects
machine.
UniqueSetup
SystemwasloadedwithMicrosoftWindowsXPServicePack3.
Information:
1GBPNYAttachThumbDrivewiththeNW3CVolatileDataprofileloaded,as
wellasProcessMonitor.
InternalID#:VOL3
DriveSN#9VQRE66HNQD8RB16
AsExpected
1. Allprogramsidentifiedintheprofilewere
ResultsBy
Assertion:
executed.
2. Resultsofthetoolswereproperlystoredonthe AsExpected
investigatorsthumbdrive.
AsExpected
3. Executingrunner.exedidnotcauseanydirect
writestothesuspectdrive(FileSystem).
AnomalyDetected
4. Executingrunner.exedidnotcauseanydirect
writestothesuspectdrive(Registry).
AsExpected
5. Thetoolsexecutedwererunfromthethumb
drive,notfromthesuspectsmachine.
TesterNotes:
Thethumbdrivewasfirstconnectedtothemachineafterthesystemhadfinished
bootingtoWindows.Afterthethumbdrivedriversfinishedloading,thetester
navigatedtothethumbdriveandstartedProcessMonitor.
OnceProcessMonitorloaded,andhadbeguncapturingdata,thetesternavigated
tothethumbdriveandranrunner.exe.
StartTime:9:42am
EndTime:9:43am
Immediatelyafterthecompletionofrunner,thetesterstoppedtheProcess
Monitorcaptureandsavedthelogfiletothethumbdrive.Thelogfilewas
examinedlaterfortestingoftheassertionslistedabove.Theresultsofthe
analysisaredetailedbelow:
Assertion1:
Anexaminationofthethumbdrivesfilesystemindicatedthatalloftheprograms
associatedwiththeNW3CVolatileDataprofileweresuccessfullycopiedtothe
6
disk.
AnexaminationoftheProcessMonitorlogsindicatesthatalloftheprograms
associatedwiththeNW3CVolatileDataprofileweresuccessfullyrunduringthe
testingperiod.
Assertion2:
Anexaminationofthecontentsofthethumbdriveindicatesthatrunner.exe
successfullysavedtheoutputfilesonthethumbdrive,andintheappropriate
directories.
Assertion3:
AnexaminationoftheProcessMonitorlogsindicatesthattherewerenodirect
writesmadetothesuspectdrivebyRunneroranyofitsprocesses(toincludeall
oftheprogramswithintheselectedprofile).Thistestwasdonebyfilteringthe
ProcessMonitorlogresultstoshowonlyFilesysteminformation,andsearching
foranyWriteFileoperation.
Assertion4:
AnexaminationoftheProcessMonitorlogsindicatesthattherewere135total
writes/updates/deletionsmadetotheregistrybyRunneranditsprocesses(to
includealloftheprogramswithintheselectedprofile).Theseresultswillalso
includeattemptstochangethatwerenotallowed(i.e.,anattempttodeleteakey
thatdoesntexist).ThistestwasdonebyfilteringtheProcessMonitorlogresults
toshowonlyRegistryinformation,andsearchingforanyRegSetValue,
RegDeleteValue,orRegDeleteKeyoperation.Forsimplicitiessake,anychange
madetotheregistrywillbelistedasawritebelow.
Therewere105writesmadetotheregistrykeybelow.Thebreakdownofthe
programsthatupdatedthisregistrykeyisasfollows:ipconfig.exe(8),nbtstat.exe
(0),net.exe(8),netstat.exe(16),pslist.exe(2),psloggedon.exe(0),quser.exe(1),
sclist.exe(1),showgrps.exe(1),systeminfo.exe(8),whoami.exe(0),cmd.exe(52),
andrunner.exe(8).
HKLM\SOFTWARE\Microsoft\Cryptography\RNG\Seed
Inadditiontoanywriteslistedabove,netstat.exealsomadetwowritestothe
followingregistrykey:
HKLM\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\Parameters\
TrapPollTimeMilliSecs
Inadditiontoanywriteslistedabove,ipconfig.exealsomadetwowritestothe
followingregistrykey:
HKLM\SOFTWARE\Microsoft\ESENT\Process\7644\DEBUG\Trace Level
Inadditiontoanywriteslistedabove,ipconfig.exemadeonewritetoeachofthe
followingregistrykeys:
7
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\Active
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\ControlFlags
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\LogSessionName
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\traceIdentifier\BitNames
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\traceIdentifier\Guid
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\Active
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\ControlFlags
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\LogSessionName
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\traceIdentifier\BitNames
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\traceIdentifier\Guid
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\Active
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\ControlFlags
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\LogSessionName
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\traceIdentifier\BitNames
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\traceIdentifier\Guid
HKLM\System\CurrentControlSet\Services\Eventlog\
Application\ESENT\CategoryCount
HKLM\System\CurrentControlSet\Services\Eventlog\
Application\ESENT\CategoryMessageFile
HKLM\System\CurrentControlSet\Services\Eventlog\
Application\ESENT\EventMessageFile
HKLM\System\CurrentControlSet\Services\Eventlog\
Application\ESENT\TypesSupported
Inadditiontoanywriteslistedabove,pslist.exealsomadetwowritestoeachof
thefollowingregistrykeys:
HKLM\System\CurrentControlSet\Services\PerfOS\
Performance\Error Count
HKLM\System\CurrentControlSet\Services\PerfProc\
Performance\Error Count
OverallSuccess:
Assertion5:
AnexaminationoftheProcessMonitorlogsindicatesthattheprogramsrunas
partoftheprofilewererunfromthethumbdrive,andnotfromthesuspects
harddrive.
AdditionalTesterNotes:
Whiletherewereseveralwritestothesystemsregistry,theregistrykeys
modifiedwerenotofanyevidentiaryconcern,inaddition,themodificationswere
aresultofrunningthesetoolsonalivemachine,andcouldnotbeavoided.In
addition,duetothenatureoftheregistry,determiningiftheregistrychanges
wereactuallywrittentothedriveisdifficult.
Whiletherewereslightchangestotheregistry,thewriteswereunavoidablein
attemptingtoretrievethedesiredinformation,andassuch,theoverallratingfor
thistestwillbelistedAsExpected.
AsExpected
TestName: RunnerTest002
Date:
26August2009
Description: RunningaCOFEEgeneratedthumbdrivewiththeNW3CIncidentResponseProfile(SP3)
TesterName:
JWykes
TestMachine:
Abe
Assertions
1. Allprogramsidentifiedintheprofilewereexecuted.
Tested:
2. Resultsofthetoolswereproperlystoredontheinvestigatorsthumbdrive.
3. Executingrunner.exedidnotcauseanydirectwritestothesuspectdrives
FileSystem.
4. Executingrunner.exedidnotcauseanydirectwritestothesuspectdrives
Registry.
5. Thetoolsexecutedwererunfromthethumbdrive,notfromthesuspects
machine.
UniqueSetup
SystemwasloadedwithMicrosoftWindowsXPServicePack3.
Information:
1GBPNYAttachThumbDrivewiththeNW3CIncidentResponseprofileloaded,
aswellasProcessMonitor.
InternalID#:IR3
DriveSN#FDVRWBUS3LJO20CP
AsExpected
ResultsBy
1. Allprogramsidentifiedintheprofilewere
Assertion:
executed.
2. Resultsofthetoolswereproperlystoredonthe AsExpected
investigatorsthumbdrive.
AnomalyDetected
3. Executingrunner.exedidnotcauseanydirect
writestothesuspectdrive(FileSystem).
AnomalyDetected
4. Executingrunner.exedidnotcauseanydirect
writestothesuspectdrive(Registry).
AsExpected
5. Thetoolsexecutedwererunfromthethumb
drive,notfromthesuspectsmachine.
TesterNotes:
Thethumbdrivewasfirstconnectedtothemachineafterthesystemhadfinished
bootingtoWindows.Afterthethumbdrivedriversfinishedloading,thetester
navigatedtothethumbdriveandstartedProcessMonitor.
OnceProcessMonitorloaded,andhadbeguncapturingdata,thetesternavigatedto
thethumbdriveandranrunner.exe.
StartTime:9:21am
EndTime:9:26am
Immediatelyafterthecompletionofrunner,thetesterstoppedtheProcessMonitor
captureandsavedthelogfiletothethumbdrive.Thelogfilewasexaminedlaterfor
testingoftheassertionslistedabove.Theresultsoftheanalysisaredetailedbelow:
Assertion1:
Anexaminationofthethumbdrivesfilesystemindicatedthatalloftheprograms
associatedwiththeNW3CIncidentResponseprofileweresuccessfullycopiedtothe
disk.
AnexaminationoftheProcessMonitorlogsindicatesthatalloftheprograms
associatedwiththeNW3CIncidentResponseprofileweresuccessfullyrunduringthe
testingperiod.
10
Assertion2:
Anexaminationofthecontentsofthethumbdriveindicatesthatrunner.exe
successfullysavedtheoutputfilesonthethumbdrive,andintheappropriate
directories.
Assertion3:
AnexaminationoftheProcessMonitorlogsindicatesthattherewerethreedirect
writesmadetothesuspectsharddrive.ThistestwasdonebyfilteringtheProcess
Monitorlogresultstoshowonlyfilesysteminformation,andsearchingforany
WriteFileoperation.Theresultsindicatethattheprogramhandle.exemadethree
writestothefileC:\WINDOWS\system32\drivers\PROCEXP100.sys
AreferencetothefilePROCEXP100.sysishardcodedwithinhandle.exe,andassuch
itappearsthatitisnotpossibletorestrainhandle.exefromwritingtothisfile.
However,thisfileisspecificallywrittenaspartoftheSysinternalstoolandwouldnot
beofevidentiaryinterest.
Assertion4:
AnexaminationoftheProcessMonitorlogsindicatesthattherewere277total
writes/updates/deletionsmadetotheregistrybyRunneranditsprocesses(to
includealloftheprogramswithintheselectedprofile).Theseresultswillalsoinclude
attemptstochangethatwerenotallowed(i.e.,anattempttodeleteakeythat
doesntexist).ThistestwasdonebyfilteringtheProcessMonitorlogresultstoshow
onlyRegistryinformation,andsearchingforanyRegSetValue,RegDeleteValue,or
RegDeleteKeyoperation.Forsimplicitiessake,anychangemadetotheregistrywill
belistedasawritebelow.
Therewere239writesmadetotheregistrykeybelow.Thebreakdownofthe
programsthatupdatedthisregistrykeyisasfollows:arp.exe(8),at.exe(0),
autorunsc.exe(8),getmac.exe(8),handle.exe(0),hostname.exe(8),ipconfig.exe(8),
msinfo32.exe(8),nbtstat.exe(0),net.exe(9),netdom.exe(0),netstat.exe(16),
openfiles.exe(1),psfile.exe(0),pslist.exe(2),psloggedon.exe(0),psservice.exe(1),
pstat.exe(0),psuptime.exe(8),quser.exe(1),route.exe(0),sc.exe(2),sclist.exe(1),
showgrps.exe(1),srvcheck.exe(0),tasklist.exe(8),whoami.exe(0),cmd.exe(133),
andrunner.exe(8).
HKLM\SOFTWARE\Microsoft\Cryptography\RNG\Seed
Inadditiontoanywriteslistedabove,arp.exealsomadeonewritetothefollowing
registrykey:
HKLM\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\
Parameters\TrapPollTimeMilliSecs
Inadditiontoanywriteslistedabove,autorunsc.exealsomadeonewritetoeachof
thefollowingregistrykeys:
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\
{3c4fbd00-9243-11de-9ad6-00e0b8534d66}\BaseClass
11
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\
{923d6cc2-90ab-11de-9ad0-806d6172696f}\BaseClass
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\
{923d6cc3-90ab-11de-9ad0-806d6172696f}\BaseClass
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\
{c64021c7-90aa-11de-a515-806d6172696f}\BaseClass
Inadditiontoanywriteslistedabove,handle.exealsomadeonewritetoeachofthe
followingregistrykeys:
HKLM\System\CurrentControlSet\Services\PROCEXP100
HKLM\System\CurrentControlSet\Services\PROCEXP100\Enum
HKLM\System\CurrentControlSet\Services\PROCEXP100\ErrorControl
HKLM\System\CurrentControlSet\Services\PROCEXP100\ImagePath
HKLM\System\CurrentControlSet\Services\PROCEXP100\Start
HKLM\System\CurrentControlSet\Services\PROCEXP100\Type
Inadditiontoanywriteslistedabove,ipconfig.exealsomadetwowritestothe
followingregistrykey:
HKLM\SOFTWARE\Microsoft\ESENT\Process\6344\DEBUG\Trace Level
Inadditiontoanywriteslistedabove,ipconfig.exealsomadeonewritetoeachofthe
followingregistrykeys:
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\Active
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\ControlFlags
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\LogSessionName
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\traceIdentifier\BitNames
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\traceIdentifier\Guid
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\Active
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\ControlFlags
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\LogSessionName
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\traceIdentifier\BitNames
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\traceIdentifier\Guid
12
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\Active
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\ControlFlags
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\LogSessionName
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\traceIdentifier\BitNames
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\traceIdentifier\Guid
HKLM\System\CurrentControlSet\Services\Eventlog\Application\
ESENT\CategoryCount
HKLM\System\CurrentControlSet\Services\Eventlog\Application\
ESENT\CategoryMessageFile
HKLM\System\CurrentControlSet\Services\Eventlog\Application\
ESENT\EventMessageFile
HKLM\System\CurrentControlSet\Services\Eventlog\Application\
ESENT\TypesSupported
Inadditiontoanywriteslistedabove,netstat.exealsomadetwowritestothe
followingregistrykey:
HKLM\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\
Parameters\TrapPollTimeMilliSecs
Inadditiontoanywriteslistedabove,pslist.exemadetwowritestoeachofthe
followingregistrykeys:
HKLM\System\CurrentControlSet\Services\PerfOS\Performance\Error Count
HKLM\System\CurrentControlSet\Services\PerfProc\Performance\Error Count
Assertion5:
AnexaminationoftheProcessMonitorlogsindicatesthattheprogramsrunaspart
oftheprofilewererunfromthethumbdrive,andnotfromthesuspectsharddrive.
AdditionalTesterNotes:
Whiletherewereseveralwritestothesystemsregistry,theregistrykeysmodified
werenotofanyevidentiaryconcern,inaddition,themodificationswerearesultof
runningthesetoolsonalivemachine,andcouldnotbeavoided.Inaddition,dueto
thenatureoftheregistry,determiningiftheregistrychangeswereactuallywrittento
thedriveisdifficult.
Whiletherewereslightchangestothedriveandregistry,thewriteswereeither
specifictoaprogramrun(handle.exe)orwereunavoidableinattemptingtoretrieve
thedesiredinformation,theoverallratingforthistestwillbelistedAsExpected.
OverallSuccess: AsExpected
13
TestName: RunnerTest003
Date: 26August2009
Description: RunningaCOFEEgeneratedthumbdrivewiththeNW3CVolatileDataProfile(SP2)
TesterName:
MBowser
TestMachine: Eli
AssertionsTested:
1. Allprogramsidentifiedintheprofilewereexecuted.
2. Resultsofthetoolswereproperlystoredontheinvestigatorsthumb
drive.
3. Executingrunner.exedidnotcauseanydirectwritestothesuspectdrive
(FileSystem).
4. Executingrunner.exedidnotcauseanydirectwritestothesuspectdrive
(Registry).
5. Thetoolsexecutedwererunfromthethumbdrive,notfromthesuspects
machine.
UniqueSetup
SystemwasloadedwithMicrosoftWindowsXPServicePack2.
Information:
1GBPNYAttachThumbDrivewiththeNW3CVolatileDataprofileloaded,as
wellasProcessMonitor.
InternalID#:VOL2
DriveSN#02KDC41B09G1H205
AsExpected
1. Allprogramsidentifiedintheprofilewere
ResultsBy
Assertion:
executed.
2. Resultsofthetoolswereproperlystoredonthe AsExpected
investigatorsthumbdrive.
AsExpected
3. Executingrunner.exedidnotcauseanydirect
writestothesuspectdrive(FileSystem).
AnomalyDetected
4. Executingrunner.exedidnotcauseanydirect
writestothesuspectdrive(Registry).
AsExpected
5. Thetoolsexecutedwererunfromthethumb
drive,notfromthesuspectsmachine.
TesterNotes:
Thethumbdrivewasfirstconnectedtothemachineafterthesystemhadfinished
bootingtoWindows.Afterthethumbdrivedriversfinishedloading,thetester
navigatedtothethumbdriveandstartedProcessMonitor.
OnceProcessMonitorloaded,andhadbeguncapturingdata,thetesternavigated
tothethumbdriveandranrunner.exe.
StartTime:10:07am
EndTime:10:08am
Immediatelyafterthecompletionofrunner,thetesterstoppedtheProcess
Monitorcaptureandsavedthelogfiletothethumbdrive.Thelogfilewas
examinedlaterfortestingoftheassertionslistedabove.Theresultsofthe
analysisaredetailedbelow:
Assertion1:
Anexaminationofthethumbdrivesfilesystemindicatedthatalloftheprograms
associatedwiththeNW3CVolatileDataprofileweresuccessfullycopiedtothe
disk.
14
AnexaminationoftheProcessMonitorlogsindicatesthatalloftheprograms
associatedwiththeNW3CVolatileDataprofileweresuccessfullyrunduringthe
testingperiod.
Assertion2:
Anexaminationofthecontentsofthethumbdriveindicatesthatrunner.exe
successfullysavedtheoutputfilesonthethumbdrive,andintheappropriate
directories.
Assertion3:
AnexaminationoftheProcessMonitorlogsindicatesthattherewerenodirect
writesmadetothesuspectdrivebyRunneroranyofitsprocesses(toincludeall
oftheprogramswithintheselectedprofile).Thistestwasdonebyfilteringthe
ProcessMonitorlogresultstoshowonlyFilesysteminformation,andsearching
foranyWriteFileoperation.
Assertion4:
AnexaminationoftheProcessMonitorlogsindicatesthattherewere117total
writes/updates/deletionsmadetotheregistrybyRunneranditsprocesses(to
includealloftheprogramswithintheselectedprofile).Theseresultswillalso
includeattemptstochangethatwerenotallowed(i.e.,anattempttodeleteakey
thatdoesntexist).ThistestwasdonebyfilteringtheProcessMonitorlogresults
toshowonlyRegistryinformation,andsearchingforanyRegSetValue,
RegDeleteValue,orRegDeleteKeyoperation.Forsimplicitiessake,anychange
madetotheregistrywillbelistedasawritebelow.
Therewere105writesmadetotheregistrykeybelow.Thebreakdownofthe
programsthatupdatedthisregistrykeyisasfollows:ipconfig.exe(8),nbtstat.exe
(0),net.exe(8),netstat.exe(16),pslist.exe(2),psloggedon.exe(0),quser.exe(1),
sclist.exe(1),showgrps.exe(1),systeminfo.exe(8),whoami.exe(0),cmd.exe(52),
andrunner.exe(8).
HKLM\SOFTWARE\Microsoft\Cryptography\RNG\Seed
Inadditiontoanywriteslistedabove,netstat.exealsomadetwowritestothe
followingregistrykey:
HKLM\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\Parameters\
TrapPollTimeMilliSecs
Inadditiontoanywriteslistedabove,ipconfig.exealsomadetwowritestothe
followingregistrykey:
HKLM\SOFTWARE\Microsoft\ESENT\Process\4597\DEBUG\Trace Level
Inadditiontoanywriteslistedabove,ipconfig.exemadeonewritetoeachofthe
followingregistrykeys:
HKLM\System\CurrentControlSet\Services\Eventlog\
Application\ESENT\CategoryCount
15
HKLM\System\CurrentControlSet\Services\Eventlog\
Application\ESENT\CategoryMessageFile
HKLM\System\CurrentControlSet\Services\Eventlog\
Application\ESENT\EventMessageFile
HKLM\System\CurrentControlSet\Services\Eventlog\
Application\ESENT\TypesSupported
Inadditiontoanywriteslistedabove,pslist.exealsomadetwowritestoeachof
thefollowingregistrykeys:
HKLM\System\CurrentControlSet\Services\PerfOS\
Performance\Error Count
HKLM\System\CurrentControlSet\Services\PerfProc\
Performance\Error Count
OverallSuccess:
Assertion5:
AnexaminationoftheProcessMonitorlogsindicatethattheprogramsrunaspart
oftheprofilewererunfromthethumbdrive,andnotfromthesuspectshard
drive.
AdditionalTesterNotes:
Whiletherewereseveralwritestothesystemsregistry,theregistrykeys
modifiedwerenotofanyevidentiaryconcern,inaddition,themodificationswere
aresultofrunningthesetoolsonalivemachine,andcouldnotbeavoided.In
addition,duetothenatureoftheregistry,determiningiftheregistrychanges
wereactuallywrittentothedriveisdifficult.
Whiletherewereslightchangestotheregistry,thewriteswereunavoidablein
attemptingtoretrievethedesiredinformation,andassuch,theoverallratingfor
thistestwillbelistedAsExpected.
AsExpected
16
TestName: RunnerTest003
Date:
26August2009
Description: RunningaCOFEEgeneratedthumbdrivewiththeNW3CIncidentResponseProfile(SP2)
TesterName:
MBowser
TestMachine:
Eli
Assertions
1. Allprogramsidentifiedintheprofilewereexecuted.
Tested:
2. Resultsofthetoolswereproperlystoredontheinvestigatorsthumbdrive.
3. Executingrunner.exedidnotcauseanydirectwritestothesuspectdrives
FileSystem.
4. Executingrunner.exedidnotcauseanydirectwritestothesuspectdrives
Registry.
5. Thetoolsexecutedwererunfromthethumbdrive,notfromthesuspects
machine.
UniqueSetup
SystemwasloadedwithMicrosoftWindowsXPServicePack2.
Information:
1GBPNYAttachThumbDrivewiththeNW3CIncidentResponseprofileloaded,
aswellasProcessMonitor.
InternalID#:IR2
DriveSN#4311RZBJVSAHWWDV
AsExpected
ResultsBy
1. Allprogramsidentifiedintheprofilewere
Assertion:
executed.
2. Resultsofthetoolswereproperlystoredonthe AsExpected
investigatorsthumbdrive.
AnomalyDetected
3. Executingrunner.exedidnotcauseanydirect
writestothesuspectdrive(FileSystem).
AnomalyDetected
4. Executingrunner.exedidnotcauseanydirect
writestothesuspectdrive(Registry).
AsExpected
5. Thetoolsexecutedwererunfromthethumb
drive,notfromthesuspectsmachine.
TesterNotes:
Thethumbdrivewasfirstconnectedtothemachineafterthesystemhadfinished
bootingtoWindows.Afterthethumbdrivedriversfinishedloading,thetester
navigatedtothethumbdriveandstartedProcessMonitor.
OnceProcessMonitorloaded,andhadbeguncapturingdata,thetesternavigatedto
thethumbdriveandranrunner.exe.
StartTime:9:55am
EndTime:9:57am
Immediatelyafterthecompletionofrunner,thetesterstoppedtheProcessMonitor
captureandsavedthelogfiletothethumbdrive.Thelogfilewasexaminedlaterfor
testingoftheassertionslistedabove.Theresultsoftheanalysisaredetailedbelow:
Assertion1:
Anexaminationofthethumbdrivesfilesystemindicatedthatalloftheprograms
associatedwiththeNW3CIncidentResponseprofileweresuccessfullycopiedtothe
disk.
AnexaminationoftheProcessMonitorlogsindicatesthatalloftheprograms
associatedwiththeNW3CIncidentResponseprofileweresuccessfullyrunduringthe
testingperiod.
17
Assertion2:
Anexaminationofthecontentsofthethumbdriveindicatesthatrunner.exe
successfullysavedtheoutputfilesonthethumbdrive,andintheappropriate
directories.
Assertion3:
AnexaminationoftheProcessMonitorlogsindicatesthattherewerethreedirect
writesmadetothesuspectsharddrive.ThistestwasdonebyfilteringtheProcess
Monitorlogresultstoshowonlyfilesysteminformation,andsearchingforany
WriteFileoperation.Theresultsindicatethattheprogramhandle.exemadethree
writestothefileC:\WINDOWS\system32\drivers\PROCEXP100.sys
AreferencetothefilePROCEXP100.sysishardcodedwithinhandle.exe,andassuch
itappearsthatitisnotpossibletorestrainhandle.exefromwritingtothisfile.
However,thisfileisspecificallywrittenaspartoftheSysinternalstoolandwouldnot
beofevidentiaryinterest.
Assertion4:
AnexaminationoftheProcessMonitorlogsindicatesthattherewere261total
writes/updates/deletionsmadetotheregistrybyRunneranditsprocesses(to
includealloftheprogramswithintheselectedprofile).Theseresultswillalsoinclude
attemptstochangethatwerenotallowed(i.e.,anattempttodeleteakeythat
doesntexist).ThistestwasdonebyfilteringtheProcessMonitorlogresultstoshow
onlyRegistryinformation,andsearchingforanyRegSetValue,RegDeleteValue,
orRegDeleteKeyoperation.Forsimplicitiessake,anychangemadetotheregistry
willbelistedasawritebelow.
Therewere239writesmadetotheregistrykeybelow.Thebreakdownofthe
programsthatupdatedthisregistrykeyisasfollows:arp.exe(8),at.exe(0),
autorunsc.exe(8),getmac.exe(8),handle.exe(0),hostname.exe(8),ipconfig.exe(8),
msinfo32.exe(8),nbtstat.exe(0),net.exe(9),netdom.exe(0),netstat.exe(16),
openfiles.exe(1),psfile.exe(0),pslist.exe(2),psloggedon.exe(0),psservice.exe(1),
pstat.exe(0),psuptime.exe(8),quser.exe(1),route.exe(0),sc.exe(2),sclist.exe(1),
showgrps.exe(1),srvcheck.exe(0),tasklist.exe(8),whoami.exe(0),cmd.exe(133),
andrunner.exe(8).
HKLM\SOFTWARE\Microsoft\Cryptography\RNG\Seed
Inadditiontoanywriteslistedabove,arp.exealsomadeonewritetothefollowing
registrykey:
HKLM\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\
Parameters\TrapPollTimeMilliSecs
Inadditiontoanywriteslistedabove,autorunsc.exealsomadeonewritetoeachof
thefollowingregistrykeys:
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\
{44596dc1-923f-11de-9e16-806d6172696f}\BaseClass
18
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\
{dfb5a3d0-9247-11de-9e17-0015c5a7cb2f}\BaseClass
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\
{feaef4c4-616a-11de-93cb-806d6172696f}\BaseClass
Inadditiontoanywriteslistedabove,handle.exealsomadeonewritetoeachofthe
followingregistrykeys:
HKLM\System\CurrentControlSet\Services\PROCEXP100
HKLM\System\CurrentControlSet\Services\PROCEXP100\Enum
HKLM\System\CurrentControlSet\Services\PROCEXP100\ErrorControl
HKLM\System\CurrentControlSet\Services\PROCEXP100\ImagePath
HKLM\System\CurrentControlSet\Services\PROCEXP100\Start
HKLM\System\CurrentControlSet\Services\PROCEXP100\Type
Inadditiontoanywriteslistedabove,ipconfig.exealsomadetwowritestothe
followingregistrykey:
HKLM\SOFTWARE\Microsoft\ESENT\Process\1785\DEBUG\Trace Level
Inadditiontoanywriteslistedabove,ipconfig.exealsomadeonewritetoeachofthe
followingregistrykeys:
HKLM\System\CurrentControlSet\Services\Eventlog\Application\
ESENT\CategoryCount
HKLM\System\CurrentControlSet\Services\Eventlog\Application\
ESENT\CategoryMessageFile
HKLM\System\CurrentControlSet\Services\Eventlog\Application\
ESENT\EventMessageFile
HKLM\System\CurrentControlSet\Services\Eventlog\Application\
ESENT\TypesSupported
Inadditiontoanywriteslistedabove,netstat.exealsomadetwowritestothe
followingregistrykey:
HKLM\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\
Parameters\TrapPollTimeMilliSecs
Inadditiontoanywriteslistedabove,pslist.exemadetwowritestoeachofthe
followingregistrykeys:
HKLM\System\CurrentControlSet\Services\PerfOS\Performance\Error Count
HKLM\System\CurrentControlSet\Services\PerfProc\Performance\
Error Count
19
Assertion5:
AnexaminationoftheProcessMonitorlogsindicatethattheprogramsrunaspartof
theprofilewererunfromthethumbdrive,andnotfromthesuspectsharddrive.
AdditionalTesterNotes:
Whiletherewereseveralwritestothesystemsregistry,theregistrykeysmodified
werenotofanyevidentiaryconcern,inaddition,themodificationswerearesultof
runningthesetoolsonalivemachine,andcouldnotbeavoided.Inaddition,dueto
thenatureoftheregistry,determiningiftheregistrychangeswereactuallywritten
tothedriveisdifficult.
Whiletherewereslightchangestothedriveandregistry,thewriteswereeither
specifictoaprogramrun(handle.exe)orwereunavoidableinattemptingtoretrieve
thedesiredinformation,theoverallratingforthistestwillbelistedAsExpected.
OverallSuccess: AsExpected
20
TestName: RunnerTest005
Date: 26August2009
Description: RunningaCOFEEgeneratedthumbdrivewiththeNW3CVolatileDataProfile(SP3)
TesterName:
JWykes
TestMachine: Jenny
AssertionsTested:
1. Allprogramsidentifiedintheprofilewereexecuted.
2. Resultsofthetoolswereproperlystoredontheinvestigatorsthumb
drive.
3. Executingrunner.exedidnotcauseanydirectwritestothesuspectdrive
(FileSystem).
4. Executingrunner.exedidnotcauseanydirectwritestothesuspectdrive
(Registry).
5. Thetoolsexecutedwererunfromthethumbdrive,notfromthesuspects
machine.
UniqueSetup
SystemwasloadedwithMicrosoftWindowsXPServicePack3.
Information:
1GBPNYAttachThumbDrivewiththeNW3CVolatileDataprofileloaded,as
wellasProcessMonitor.
InternalID#:VOL2
DriveSN#02KDC41B09G1H205
AsExpected
1. Allprogramsidentifiedintheprofilewere
ResultsBy
Assertion:
executed.
2. Resultsofthetoolswereproperlystoredonthe AsExpected
investigatorsthumbdrive.
AsExpected
3. Executingrunner.exedidnotcauseanydirect
writestothesuspectdrive(FileSystem).
AnomalyDetected
4. Executingrunner.exedidnotcauseanydirect
writestothesuspectdrive(Registry).
AsExpected
5. Thetoolsexecutedwererunfromthethumb
drive,notfromthesuspectsmachine.
TesterNotes:
Thethumbdrivewasfirstconnectedtothemachineafterthesystemhadfinished
bootingtoWindows.Afterthethumbdrivedriversfinishedloading,thetester
navigatedtothethumbdriveandstartedProcessMonitor.
OnceProcessMonitorloaded,andhadbeguncapturingdata,thetesternavigated
tothethumbdriveandranrunner.exe.
StartTime:9:14am
EndTime:9:15am
Immediatelyafterthecompletionofrunner,thetesterstoppedtheProcess
Monitorcaptureandsavedthelogfiletothethumbdrive.Thelogfilewas
examinedlaterfortestingoftheassertionslistedabove.Theresultsofthe
analysisaredetailedbelow:
Assertion1:
Anexaminationofthethumbdrivesfilesystemindicatedthatalloftheprograms
associatedwiththeNW3CVolatileDataprofileweresuccessfullycopiedtothe
disk.
AnexaminationoftheProcessMonitorlogsindicatesthatalloftheprograms
21
associatedwiththeNW3CVolatileDataprofileweresuccessfullyrunduringthe
testingperiod.
Assertion2:
Anexaminationofthecontentsofthethumbdriveindicatesthatrunner.exe
successfullysavedtheoutputfilesonthethumbdrive,andintheappropriate
directories.
Assertion3:
AnexaminationoftheProcessMonitorlogsindicatesthattherewerenodirect
writesmadetothesuspectdrivebyRunneroranyofitsprocesses(toincludeall
oftheprogramswithintheselectedprofile).Thistestwasdonebyfilteringthe
ProcessMonitorlogresultstoshowonlyFilesysteminformation,andsearching
foranyWriteFileoperation.
Assertion4:
AnexaminationoftheProcessMonitorlogsindicatesthattherewere127total
writes/updates/deletionsmadetotheregistrybyRunneranditsprocesses(to
includealloftheprogramswithintheselectedprofile).Theseresultswillalso
includeattemptstochangethatwerenotallowed(i.e.,anattempttodeleteakey
thatdoesntexist).ThistestwasdonebyfilteringtheProcessMonitorlogresults
toshowonlyRegistryinformation,andsearchingforanyRegSetValue,
RegDeleteValue,orRegDeleteKeyoperation.Forsimplicitiessake,anychange
madetotheregistrywillbelistedasawritebelow.
Therewere105writesmadetotheregistrykeybelow.Thebreakdownofthe
programsthatupdatedthisregistrykeyisasfollows:ipconfig.exe(8),nbtstat.exe
(0),net.exe(8),netstat.exe(16),pslist.exe(2),psloggedon.exe(0),quser.exe(1),
sclist.exe(1),showgrps.exe(1),systeminfo.exe(8),whoami.exe(0),cmd.exe(52),
andrunner.exe(8).
HKLM\SOFTWARE\Microsoft\Cryptography\RNG\Seed
Inadditiontoanywriteslistedabove,netstat.exealsomadetwowritestothe
followingregistrykey:
HKLM\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\Parameters\
TrapPollTimeMilliSecs
Inadditiontoanywriteslistedabove,ipconfig.exemadeonewritetoeachofthe
followingregistrykeys:
HKLM\SOFTWARE\Microsoft\ESENT\Process\4597\DEBUG\Trace Level
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\Active
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\ControlFlags
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\LogSessionName
22
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\traceIdentifier\BitNames
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\traceIdentifier\Guid
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\Active
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\ControlFlags
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\LogSessionName
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\traceIdentifier\BitNames
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\traceIdentifier\Guid
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\Active
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\ControlFlags
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\LogSessionName
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\traceIdentifier\BitNames
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\traceIdentifier\Guid
HKLM\System\CurrentControlSet\Services\Eventlog\
Application\ESENT\CategoryCount
HKLM\System\CurrentControlSet\Services\Eventlog\
Application\ESENT\CategoryMessageFile
HKLM\System\CurrentControlSet\Services\Eventlog\
Application\ESENT\EventMessageFile
HKLM\System\CurrentControlSet\Services\Eventlog\
Application\ESENT\TypesSupported
Inadditiontoanywriteslistedabove,pslist.exealsomadetwowritestoeachof
thefollowingregistrykeys:
HKLM\System\CurrentControlSet\Services\PerfOS\
Performance\Error Count
HKLM\System\CurrentControlSet\Services\PerfProc\
Performance\Error Count
Assertion5:
AnexaminationoftheProcessMonitorlogsindicatethattheprogramsrunaspart
oftheprofilewererunfromthethumbdrive,andnotfromthesuspectshard
drive.
23
OverallSuccess:
AdditionalTesterNotes:
Whiletherewereseveralwritestothesystemsregistry,theregistrykeys
modifiedwerenotofanyevidentiaryconcern,inaddition,themodificationswere
aresultofrunningthesetoolsonalivemachine,andcouldnotbeavoided.In
addition,duetothenatureoftheregistry,determiningiftheregistrychanges
wereactuallywrittentothedriveisdifficult.
Whiletherewereslightchangestotheregistry,thewriteswereunavoidablein
attemptingtoretrievethedesiredinformation,andassuch,theoverallratingfor
thistestwillbelistedAsExpected.
AsExpected
24
TestName: RunnerTest006
Date:
26August2009
Description: RunningaCOFEEgeneratedthumbdrivewiththeNW3CIncidentResponseProfile(SP3)
TesterName:
JWykes
TestMachine:
Jenny
AssertionsTested:
1. Allprogramsidentifiedintheprofilewereexecuted.
2. Resultsofthetoolswereproperlystoredontheinvestigatorsthumb
drive.
3. Executingrunner.exedidnotcauseanydirectwritestothesuspectdrives
FileSystem.
4. Executingrunner.exedidnotcauseanydirectwritestothesuspectdrives
Registry.
5. Thetoolsexecutedwererunfromthethumbdrive,notfromthesuspects
machine.
UniqueSetup
SystemwasloadedwithMicrosoftWindowsXPServicePack3.
Information:
1GBPNYAttachThumbDrivewiththeNW3CIncidentResponseprofile
loaded,aswellasProcessMonitor.
InternalID#:IR2
DriveSN#4311RZBJVSAHWWDV
AsExpected
1. Allprogramsidentifiedintheprofilewere
ResultsBy
Assertion:
executed.
AsExpected
2. Resultsofthetoolswereproperlystoredon
theinvestigatorsthumbdrive.
3. Executingrunner.exedidnotcauseanydirect AnomalyDetected
writestothesuspectdrive(FileSystem).
4. Executingrunner.exedidnotcauseanydirect AnomalyDetected
writestothesuspectdrive(Registry).
5. Thetoolsexecutedwererunfromthethumb AsExpected
drive,notfromthesuspectsmachine.
TesterNotes:
Thethumbdrivewasfirstconnectedtothemachineafterthesystemhadfinished
bootingtoWindows.Afterthethumbdrivedriversfinishedloading,thetester
navigatedtothethumbdriveandstartedProcessMonitor.
OnceProcessMonitorloaded,andhadbeguncapturingdata,thetesternavigated
tothethumbdriveandranrunner.exe.
StartTime:9:01am
EndTime:9:03am
Immediatelyafterthecompletionofrunner,thetesterstoppedtheProcess
Monitorcaptureandsavedthelogfiletothethumbdrive.Thelogfilewas
examinedlaterfortestingoftheassertionslistedabove.Theresultsoftheanalysis
aredetailedbelow:
Assertion1:
Anexaminationofthethumbdrivesfilesystemindicatedthatalloftheprograms
associatedwiththeNW3CIncidentResponseprofileweresuccessfullycopiedto
thedisk.
AnexaminationoftheProcessMonitorlogsindicatesthatalloftheprograms
25
associatedwiththeNW3CIncidentResponseprofileweresuccessfullyrunduring
thetestingperiod.
Assertion2:
Anexaminationofthecontentsofthethumbdriveindicatesthatrunner.exe
successfullysavedtheoutputfilesonthethumbdrive,andintheappropriate
directories.
Assertion3:
AnexaminationoftheProcessMonitorlogsindicatesthattherewerethreedirect
writesmadetothesuspectsharddrive.ThistestwasdonebyfilteringtheProcess
Monitorlogresultstoshowonlyfilesysteminformation,andsearchingforany
WriteFileoperation.Theresultsindicatethattheprogramhandle.exemade
threewritestothefileC:\WINDOWS\system32\drivers\PROCEXP100.sys
AreferencetothefilePROCEXP100.sysishardcodedwithinhandle.exe,andas
suchitappearsthatitisnotpossibletorestrainhandle.exefromwritingtothisfile.
However,thisfileisspecificallywrittenaspartoftheSysinternalstoolandwould
notbeofevidentiaryinterest.
Assertion4:
AnexaminationoftheProcessMonitorlogsindicatesthattherewere276total
writes/updates/deletionsmadetotheregistrybyRunneranditsprocesses(to
includealloftheprogramswithintheselectedprofile).Theseresultswillalso
includeattemptstochangethatwerenotallowed(i.e.,anattempttodeleteakey
thatdoesntexist).ThistestwasdonebyfilteringtheProcessMonitorlogresults
toshowonlyRegistryinformation,andsearchingforanyRegSetValue,
RegDeleteValue,orRegDeleteKeyoperation.Forsimplicitiessake,anychange
madetotheregistrywillbelistedasawritebelow.
Therewere239writesmadetotheregistrykeybelow.Thebreakdownofthe
programsthatupdatedthisregistrykeyisasfollows:arp.exe(8),at.exe(0),
autorunsc.exe(8),getmac.exe(8),handle.exe(0),hostname.exe(8),ipconfig.exe
(8),msinfo32.exe(8),nbtstat.exe(0),net.exe(9),netdom.exe(0),netstat.exe(16),
openfiles.exe(1),psfile.exe(0),pslist.exe(2),psloggedon.exe(0),psservice.exe(1),
pstat.exe(0),psuptime.exe(8),quser.exe(1),route.exe(0),sc.exe(2),sclist.exe
(1),showgrps.exe(1),srvcheck.exe(0),tasklist.exe(8),whoami.exe(0),cmd.exe
(133),andrunner.exe(8).
HKLM\SOFTWARE\Microsoft\Cryptography\RNG\Seed
Inadditiontoanywriteslistedabove,arp.exealsomadeonewritetothefollowing
registrykey:
HKLM\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\
Parameters\TrapPollTimeMilliSecs
Inadditiontoanywriteslistedabove,autorunsc.exealsomadeonewritetoeach
ofthefollowingregistrykeys:
26
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\
{4961381b-90f6-11de-919c-806d6172696f}\BaseClass
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\
{843fd392-9240-11de-91a3-0015c5aa5641}\BaseClass
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\
{feaef4c4-616a-11de-93cb-806d6172696f}\BaseClass
Inadditiontoanywriteslistedabove,handle.exealsomadeonewritetoeachof
thefollowingregistrykeys:
HKLM\System\CurrentControlSet\Services\PROCEXP100
HKLM\System\CurrentControlSet\Services\PROCEXP100\Enum
HKLM\System\CurrentControlSet\Services\PROCEXP100\ErrorControl
HKLM\System\CurrentControlSet\Services\PROCEXP100\ImagePath
HKLM\System\CurrentControlSet\Services\PROCEXP100\Start
HKLM\System\CurrentControlSet\Services\PROCEXP100\Type
Inadditiontoanywriteslistedabove,ipconfig.exealsomadetwowritestothe
followingregistrykey:
HKLM\SOFTWARE\Microsoft\ESENT\Process\1785\DEBUG\Trace Level
Inadditiontoanywriteslistedabove,ipconfig.exealsomadeonewritetoeachof
thefollowingregistrykeys:
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\Active
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\ControlFlags
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\LogSessionName
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\traceIdentifier\BitNames
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\traceIdentifier\Guid
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\Active
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\ControlFlags
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\LogSessionName
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\traceIdentifier\BitNames
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\traceIdentifier\Guid
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
27
Tracing\Microsoft\QUtil\Active
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\ControlFlags
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\LogSessionName
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\traceIdentifier\BitNames
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\traceIdentifier\Guid
HKLM\System\CurrentControlSet\Services\Eventlog\Application\
ESENT\CategoryCount
HKLM\System\CurrentControlSet\Services\Eventlog\Application\
ESENT\CategoryMessageFile
HKLM\System\CurrentControlSet\Services\Eventlog\Application\
ESENT\EventMessageFile
HKLM\System\CurrentControlSet\Services\Eventlog\Application\
ESENT\TypesSupported
Inadditiontoanywriteslistedabove,netstat.exealsomadetwowritestothe
followingregistrykey:
HKLM\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\
Parameters\TrapPollTimeMilliSecs
Inadditiontoanywriteslistedabove,pslist.exemadetwowritestoeachofthe
followingregistrykeys:
HKLM\System\CurrentControlSet\Services\PerfOS\Performance\Error Count
HKLM\System\CurrentControlSet\Services\PerfProc\Performance\Error
Count
OverallSuccess:
Assertion5:
AnexaminationoftheProcessMonitorlogsindicatesthattheprogramsrunaspart
oftheprofilewererunfromthethumbdrive,andnotfromthesuspectshard
drive.
AdditionalTesterNotes:
Whiletherewereseveralwritestothesystemsregistry,theregistrykeysmodified
werenotofanyevidentiaryconcern,inaddition,themodificationswerearesultof
runningthesetoolsonalivemachine,andcouldnotbeavoided.Inaddition,due
tothenatureoftheregistry,determiningiftheregistrychangeswereactually
writtentothedriveisdifficult.
Whiletherewereslightchangestothedriveandregistry,thewriteswereeither
specifictoaprogramrun(handle.exe)orwereunavoidableinattemptingto
retrievethedesiredinformation,theoverallratingforthistestwillbelistedAs
Expected.
AsExpected
28
TestName: RunnerTest007
Date: 26August2009
Description: RunningaCOFEEgeneratedthumbdrivewiththeNW3CVolatileDataProfile(SP3)
TesterName:
JWykes
TestMachine: Jim
AssertionsTested:
1. Allprogramsidentifiedintheprofilewereexecuted.
2. Resultsofthetoolswereproperlystoredontheinvestigatorsthumb
drive.
3. Executingrunner.exedidnotcauseanydirectwritestothesuspectdrive
(FileSystem).
4. Executingrunner.exedidnotcauseanydirectwritestothesuspectdrive
(Registry).
5. Thetoolsexecutedwererunfromthethumbdrive,notfromthesuspects
machine.
UniqueSetup
SystemwasloadedwithMicrosoftWindowsXPServicePack3.
Information:
1GBPNYAttachThumbDrivewiththeNW3CVolatileDataprofileloaded,as
wellasProcessMonitor.
InternalID#:VOL1
DriveSN#0XRVIMHLKSVVY0X8
AsExpected
1. Allprogramsidentifiedintheprofilewere
ResultsBy
Assertion:
executed.
2. Resultsofthetoolswereproperlystoredonthe AsExpected
investigatorsthumbdrive.
AsExpected
3. Executingrunner.exedidnotcauseanydirect
writestothesuspectdrive(FileSystem).
AnomalyDetected
4. Executingrunner.exedidnotcauseanydirect
writestothesuspectdrive(Registry).
AsExpected
5. Thetoolsexecutedwererunfromthethumb
drive,notfromthesuspectsmachine.
TesterNotes:
Thethumbdrivewasfirstconnectedtothemachineafterthesystemhadfinished
bootingtoWindows.Afterthethumbdrivedriversfinishedloading,thetester
navigatedtothethumbdriveandstartedProcessMonitor.
OnceProcessMonitorloaded,andhadbeguncapturingdata,thetesternavigated
tothethumbdriveandranrunner.exe.
StartTime:8:31am
EndTime:8:33am
Immediatelyafterthecompletionofrunner,thetesterstoppedtheProcess
Monitorcaptureandsavedthelogfiletothethumbdrive.Thelogfilewas
examinedlaterfortestingoftheassertionslistedabove.Theresultsofthe
analysisaredetailedbelow:
Assertion1:
Anexaminationofthethumbdrivesfilesystemindicatedthatalloftheprograms
associatedwiththeNW3CVolatileDataprofileweresuccessfullycopiedtothe
disk.
AnexaminationoftheProcessMonitorlogsindicatesthatalloftheprograms
29
associatedwiththeNW3CVolatileDataprofileweresuccessfullyrunduringthe
testingperiod.
Assertion2:
Anexaminationofthecontentsofthethumbdriveindicatesthatrunner.exe
successfullysavedtheoutputfilesonthethumbdrive,andintheappropriate
directories.
Assertion3:
AnexaminationoftheProcessMonitorlogsindicatesthattherewerenodirect
writesmadetothesuspectdrivebyRunneroranyofitsprocesses(toincludeall
oftheprogramswithintheselectedprofile).Thistestwasdonebyfilteringthe
ProcessMonitorlogresultstoshowonlyFilesysteminformation,andsearching
foranyWriteFileoperation.
Assertion4:
AnexaminationoftheProcessMonitorlogsindicatesthattherewere132total
writes/updates/deletionsmadetotheregistrybyRunneranditsprocesses(to
includealloftheprogramswithintheselectedprofile).Theseresultswillalso
includeattemptstochangethatwerenotallowed(i.e.,anattempttodeleteakey
thatdoesntexist).ThistestwasdonebyfilteringtheProcessMonitorlogresults
toshowonlyRegistryinformation,andsearchingforanyRegSetValue,
RegDeleteValue,orRegDeleteKeyoperation.Forsimplicitiessake,anychange
madetotheregistrywillbelistedasawritebelow.
Therewere105writesmadetotheregistrykeybelow.Thebreakdownofthe
programsthatupdatedthisregistrykeyisasfollows:ipconfig.exe(8),nbtstat.exe
(0),net.exe(8),netstat.exe(16),pslist.exe(2),psloggedon.exe(0),quser.exe(1),
sclist.exe(1),showgrps.exe(1),systeminfo.exe(8),whoami.exe(0),cmd.exe(52),
andrunner.exe(8).
HKLM\SOFTWARE\Microsoft\Cryptography\RNG\Seed
Inadditiontoanywriteslistedabove,netstat.exealsomadetwowritestothe
followingregistrykey:
HKLM\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\Parameters\
TrapPollTimeMilliSecs
Inadditiontoanywriteslistedabove,ipconfig.exealsomadetwowritestothe
followingregistrykey:
HKLM\SOFTWARE\Microsoft\ESENT\Process\6898\DEBUG\Trace Level
Inadditiontoanywriteslistedabove,ipconfig.exemadeonewritetoeachofthe
followingregistrykeys:
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\Active
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\ControlFlags
30
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\LogSessionName
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\traceIdentifier\BitNames
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\traceIdentifier\Guid
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\Active
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\ControlFlags
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\LogSessionName
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\traceIdentifier\BitNames
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\traceIdentifier\Guid
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\Active
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\ControlFlags
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\LogSessionName
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\traceIdentifier\BitNames
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\traceIdentifier\Guid
HKLM\System\CurrentControlSet\Services\Eventlog\
Application\ESENT\CategoryCount
HKLM\System\CurrentControlSet\Services\Eventlog\
Application\ESENT\CategoryMessageFile
HKLM\System\CurrentControlSet\Services\Eventlog\
Application\ESENT\EventMessageFile
HKLM\System\CurrentControlSet\Services\Eventlog\
Application\ESENT\TypesSupported
Inadditiontoanywriteslistedabove,pslist.exealsomadetwowritestoeachof
thefollowingregistrykeys:
HKLM\System\CurrentControlSet\Services\PerfOS\
Performance\Error Count
HKLM\System\CurrentControlSet\Services\PerfProc\
Performance\Error Count
31
OverallSuccess:
Assertion5:
AnexaminationoftheProcessMonitorlogsindicatethattheprogramsrunaspart
oftheprofilewererunfromthethumbdrive,andnotfromthesuspectshard
drive.
AdditionalTesterNotes:
Whiletherewereseveralwritestothesystemsregistry,theregistrykeys
modifiedwerenotofanyevidentiaryconcern,inaddition,themodificationswere
aresultofrunningthesetoolsonalivemachine,andcouldnotbeavoided.In
addition,duetothenatureoftheregistry,determiningiftheregistrychanges
wereactuallywrittentothedriveisdifficult.
Whiletherewereslightchangestotheregistry,thewriteswereunavoidablein
attemptingtoretrievethedesiredinformation,andassuch,theoverallratingfor
thistestwillbelistedAsExpected.
AsExpected
32
TestName: RunnerTest008
Date:
26August2009
Description: RunningaCOFEEgeneratedthumbdrivewiththeNW3CIncidentResponseProfile(SP3)
TesterName:
JWykes
TestMachine:
Jim
AssertionsTested:
1. Allprogramsidentifiedintheprofilewereexecuted.
2. Resultsofthetoolswereproperlystoredontheinvestigatorsthumb
drive.
3. Executingrunner.exedidnotcauseanydirectwritestothesuspectdrives
FileSystem.
4. Executingrunner.exedidnotcauseanydirectwritestothesuspectdrives
Registry.
5. Thetoolsexecutedwererunfromthethumbdrive,notfromthesuspects
machine.
UniqueSetup
SystemwasloadedwithMicrosoftWindowsXPServicePack3.
Information:
1GBPNYAttachThumbDrivewiththeNW3CIncidentResponseprofile
loaded,aswellasProcessMonitor.
InternalID#:IR1
DriveSN#FAV3RW6Q0RP0L3M7
AsExpected
1. Allprogramsidentifiedintheprofilewere
ResultsBy
Assertion:
executed.
AsExpected
2. Resultsofthetoolswereproperlystoredon
theinvestigatorsthumbdrive.
3. Executingrunner.exedidnotcauseanydirect AnomalyDetected
writestothesuspectdrive(FileSystem).
4. Executingrunner.exedidnotcauseanydirect AnomalyDetected
writestothesuspectdrive(Registry).
5. Thetoolsexecutedwererunfromthethumb AsExpected
drive,notfromthesuspectsmachine.
TesterNotes:
Thethumbdrivewasfirstconnectedtothemachineafterthesystemhadfinished
bootingtoWindows.Afterthethumbdrivedriversfinishedloading,thetester
navigatedtothethumbdriveandstartedProcessMonitor.
OnceProcessMonitorloaded,andhadbeguncapturingdata,thetesternavigated
tothethumbdriveandranrunner.exe.
StartTime:8:43am
EndTime:8:51am
Immediatelyafterthecompletionofrunner,thetesterstoppedtheProcess
Monitorcaptureandsavedthelogfiletothethumbdrive.Thelogfilewas
examinedlaterfortestingoftheassertionslistedabove.Theresultsoftheanalysis
aredetailedbelow:
Assertion1:
Anexaminationofthethumbdrivesfilesystemindicatedthatalloftheprograms
associatedwiththeNW3CIncidentResponseprofileweresuccessfullycopiedto
thedisk.
AnexaminationoftheProcessMonitorlogsindicatesthatalloftheprograms
33
associatedwiththeNW3CIncidentResponseprofileweresuccessfullyrunduring
thetestingperiod.
Assertion2:
Anexaminationofthecontentsofthethumbdriveindicatesthatrunner.exe
successfullysavedtheoutputfilesonthethumbdrive,andintheappropriate
directories.
Assertion3:
AnexaminationoftheProcessMonitorlogsindicatesthattherewerethreedirect
writesmadetothesuspectsharddrive.ThistestwasdonebyfilteringtheProcess
Monitorlogresultstoshowonlyfilesysteminformation,andsearchingforany
WriteFileoperation.Theresultsindicatethattheprogramhandle.exemade
threewritestothefileC:\WINDOWS\system32\drivers\PROCEXP100.sys
AreferencetothefilePROCEXP100.sysishardcodedwithinhandle.exe,andas
suchitappearsthatitisnotpossibletorestrainhandle.exefromwritingtothisfile.
However,thisfileisspecificallywrittenaspartoftheSysinternalstoolandwould
notbeofevidentiaryinterest.
Assertion4:
AnexaminationoftheProcessMonitorlogsindicatesthattherewere277total
writes/updates/deletionsmadetotheregistrybyRunneranditsprocesses(to
includealloftheprogramswithintheselectedprofile).Theseresultswillalso
includeattemptstochangethatwerenotallowed(i.e.,anattempttodeleteakey
thatdoesntexist).ThistestwasdonebyfilteringtheProcessMonitorlogresults
toshowonlyRegistryinformation,andsearchingforanyRegSetValue,
RegDeleteValue,orRegDeleteKeyoperation.Forsimplicitiessake,anychange
madetotheregistrywillbelistedasawritebelow.
Therewere239writesmadetotheregistrykeybelow.Thebreakdownofthe
programsthatupdatedthisregistrykeyisasfollows:arp.exe(8),at.exe(0),
autorunsc.exe(8),getmac.exe(8),handle.exe(0),hostname.exe(8),ipconfig.exe
(8),msinfo32.exe(8),nbtstat.exe(0),net.exe(9),netdom.exe(0),netstat.exe(16),
openfiles.exe(1),psfile.exe(0),pslist.exe(2),psloggedon.exe(0),psservice.exe(1),
pstat.exe(0),psuptime.exe(8),quser.exe(1),route.exe(0),sc.exe(2),sclist.exe
(1),showgrps.exe(1),srvcheck.exe(0),tasklist.exe(8),whoami.exe(0),cmd.exe
(133),andrunner.exe(8).
HKLM\SOFTWARE\Microsoft\Cryptography\RNG\Seed
Inadditiontoanywriteslistedabove,arp.exealsomadeonewritetothefollowing
registrykey:
HKLM\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\
Parameters\TrapPollTimeMilliSecs
Inadditiontoanywriteslistedabove,autorunsc.exealsomadeonewritetoeach
ofthefollowingregistrykeys:
34
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2
\
{02bb35ea-1621-11da-840f-806d6172696f}\BaseClass
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2
\
{02bb35eb-1621-11da-840f-806d6172696f}\BaseClass
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2
\
{02bb35ec-1621-11da-840f-806d6172696f}\BaseClass
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2
\
{a958b38f-9106-11de-b151-000d6137076a}\BaseClass
Inadditiontoanywriteslistedabove,handle.exealsomadeonewritetoeachof
thefollowingregistrykeys:
HKLM\System\CurrentControlSet\Services\PROCEXP100
HKLM\System\CurrentControlSet\Services\PROCEXP100\Enum
HKLM\System\CurrentControlSet\Services\PROCEXP100\ErrorControl
HKLM\System\CurrentControlSet\Services\PROCEXP100\ImagePath
HKLM\System\CurrentControlSet\Services\PROCEXP100\Start
HKLM\System\CurrentControlSet\Services\PROCEXP100\Type
Inadditiontoanywriteslistedabove,ipconfig.exealsomadetwowritestothe
followingregistrykey:
HKLM\SOFTWARE\Microsoft\ESENT\Process\1785\DEBUG\Trace Level
Inadditiontoanywriteslistedabove,ipconfig.exealsomadeonewritetoeachof
thefollowingregistrykeys:
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\Active
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\ControlFlags
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\LogSessionName
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\traceIdentifier\BitNames
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappcfg\traceIdentifier\Guid
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\Active
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\ControlFlags
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
35
Tracing\Microsoft\eappprxy\LogSessionName
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\traceIdentifier\BitNames
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\eappprxy\traceIdentifier\Guid
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\Active
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\ControlFlags
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\LogSessionName
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\traceIdentifier\BitNames
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\
Tracing\Microsoft\QUtil\traceIdentifier\Guid
HKLM\System\CurrentControlSet\Services\Eventlog\Application\
ESENT\CategoryCount
HKLM\System\CurrentControlSet\Services\Eventlog\Application\
ESENT\CategoryMessageFile
HKLM\System\CurrentControlSet\Services\Eventlog\Application\
ESENT\EventMessageFile
HKLM\System\CurrentControlSet\Services\Eventlog\Application\
ESENT\TypesSupported
Inadditiontoanywriteslistedabove,netstat.exealsomadetwowritestothe
followingregistrykey:
HKLM\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\
Parameters\TrapPollTimeMilliSecs
Inadditiontoanywriteslistedabove,pslist.exemadetwowritestoeachofthe
followingregistrykeys:
HKLM\System\CurrentControlSet\Services\PerfOS\Performance\Error
Count
HKLM\System\CurrentControlSet\Services\PerfProc\Performance\Error
Count
Assertion5:
AnexaminationoftheProcessMonitorlogsindicatethattheprogramsrunaspart
oftheprofilewererunfromthethumbdrive,andnotfromthesuspectshard
drive.
AdditionalTesterNotes:
Whiletherewereseveralwritestothesystemsregistry,theregistrykeysmodified
werenotofanyevidentiaryconcern;inaddition,themodificationswerearesultof
runningthesetoolsonalivemachine,andcouldnotbeavoided.Inaddition,due
36
OverallSuccess:
tothenatureoftheregistry,determiningiftheregistrychangeswereactually
writtentothedriveisdifficult.
Whiletherewereslightchangestothedriveandregistry,thewriteswereeither
specifictoaprogramrun(handle.exe)orwereunavoidableinattemptingto
retrievethedesiredinformation,theoverallratingforthistestwillbelistedAs
Expected.
AsExpected
37
TestName: RunnerTest009
Date: 26August2009
Description: RunningaCOFEEgeneratedthumbdrivewiththeNW3CVolatileDataProfile(SP2)
TesterName:
MBowser
TestMachine: Pat
AssertionsTested:
1. Allprogramsidentifiedintheprofilewereexecuted.
2. Resultsofthetoolswereproperlystoredontheinvestigatorsthumb
drive.
3. Executingrunner.exedidnotcauseanydirectwritestothesuspectdrive
(FileSystem).
4. Executingrunner.exedidnotcauseanydirectwritestothesuspectdrive
(Registry).
5. Thetoolsexecutedwererunfromthethumbdrive,notfromthesuspects
machine.
UniqueSetup
SystemwasloadedwithMicrosoftWindowsXPServicePack2.
Information:
1GBPNYAttachThumbDrivewiththeNW3CVolatileDataprofileloaded,as
wellasProcessMonitor.
InternalID#:VOL3
DriveSN#9VQRE66HNQD8RB
AsExpected
1. Allprogramsidentifiedintheprofilewere
ResultsBy
Assertion:
executed.
2. Resultsofthetoolswereproperlystoredonthe AsExpected
investigatorsthumbdrive.
AsExpected
3. Executingrunner.exedidnotcauseanydirect
writestothesuspectdrive(FileSystem).
AnomalyDetected
4. Executingrunner.exedidnotcauseanydirect
writestothesuspectdrive(Registry).
AsExpected
5. Thetoolsexecutedwererunfromthethumb
drive,notfromthesuspectsmachine.
TesterNotes:
Thethumbdrivewasfirstconnectedtothemachineafterthesystemhadfinished
bootingtoWindows.Afterthethumbdrivedriversfinishedloading,thetester
navigatedtothethumbdriveandstartedProcessMonitor.
OnceProcessMonitorloaded,andhadbeguncapturingdata,thetesternavigated
tothethumbdriveandranrunner.exe.
StartTime:10:31am
EndTime:10:32am
Immediatelyafterthecompletionofrunner,thetesterstoppedtheProcess
Monitorcaptureandsavedthelogfiletothethumbdrive.Thelogfilewas
examinedlaterfortestingoftheassertionslistedabove.Theresultsofthe
analysisaredetailedbelow:
Assertion1:
Anexaminationofthethumbdrivesfilesystemindicatedthatalloftheprograms
associatedwiththeNW3CVolatileDataprofileweresuccessfullycopiedtothe
disk.
AnexaminationoftheProcessMonitorlogsindicatesthatalloftheprograms
38
associatedwiththeNW3CVolatileDataprofileweresuccessfullyrunduringthe
testingperiod.
Assertion2:
Anexaminationofthecontentsofthethumbdriveindicatesthatrunner.exe
successfullysavedtheoutputfilesonthethumbdrive,andintheappropriate
directories.
Assertion3:
AnexaminationoftheProcessMonitorlogsindicatesthattherewerenodirect
writesmadetothesuspectdrivebyRunneroranyofitsprocesses(toincludeall
oftheprogramswithintheselectedprofile).Thistestwasdonebyfilteringthe
ProcessMonitorlogresultstoshowonlyFilesysteminformation,andsearching
foranyWriteFileoperation.
Assertion4:
AnexaminationoftheProcessMonitorlogsindicatesthattherewere112total
writes/updates/deletionsmadetotheregistrybyRunneranditsprocesses(to
includealloftheprogramswithintheselectedprofile).Theseresultswillalso
includeattemptstochangethatwerenotallowed(i.e.,anattempttodeleteakey
thatdoesntexist).ThistestwasdonebyfilteringtheProcessMonitorlogresults
toshowonlyRegistryinformation,andsearchingforanyRegSetValue,
RegDeleteValue,orRegDeleteKeyoperation.Forsimplicitiessake,anychange
madetotheregistrywillbelistedasawritebelow.
Therewere105writesmadetotheregistrykeybelow.Thebreakdownofthe
programsthatupdatedthisregistrykeyisasfollows:ipconfig.exe(8),nbtstat.exe
(0),net.exe(8),netstat.exe(16),pslist.exe(2),psloggedon.exe(0),quser.exe(1),
sclist.exe(1),showgrps.exe(1),systeminfo.exe(8),whoami.exe(0),cmd.exe(52),
andrunner.exe(8).
HKLM\SOFTWARE\Microsoft\Cryptography\RNG\Seed
Inadditiontoanywriteslistedabove,netstat.exealsomadetwowritestothe
followingregistrykey:
HKLM\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\Parameters\
TrapPollTimeMilliSecs
Inadditiontoanywriteslistedabove,ipconfig.exemadeonewritetoeachofthe
followingregistrykeys:
HKLM\SOFTWARE\Microsoft\ESENT\Process\6898\DEBUG\Trace Level
HKLM\System\CurrentControlSet\Services\Eventlog\
Application\ESENT\CategoryCount
HKLM\System\CurrentControlSet\Services\Eventlog\
Application\ESENT\CategoryMessageFile
HKLM\System\CurrentControlSet\Services\Eventlog\
Application\ESENT\EventMessageFile
39
HKLM\System\CurrentControlSet\Services\Eventlog\
Application\ESENT\TypesSupported
Inadditiontoanywriteslistedabove,pslist.exealsomadetwowritestoeachof
thefollowingregistrykeys:
HKLM\System\CurrentControlSet\Services\PerfOS\
Performance\Error Count
HKLM\System\CurrentControlSet\Services\PerfProc\
Performance\Error Count
OverallSuccess:
Assertion5:
AnexaminationoftheProcessMonitorlogsindicatethattheprogramsrunaspart
oftheprofilewererunfromthethumbdrive,andnotfromthesuspectshard
drive.
AdditionalTesterNotes:
Whiletherewereseveralwritestothesystemsregistry,theregistrykeys
modifiedwerenotofanyevidentiaryconcern;inaddition,themodificationswere
aresultofrunningthesetoolsonalivemachine,andcouldnotbeavoided.In
addition,duetothenatureoftheregistry,determiningiftheregistrychanges
wereactuallywrittentothedriveisdifficult.
Whiletherewereslightchangestotheregistry,thewriteswereunavoidablein
attemptingtoretrievethedesiredinformation,andassuch,theoverallratingfor
thistestwillbelistedAsExpected.
AsExpected
40
TestName: RunnerTest010
Date:
26August2009
Description: RunningaCOFEEgeneratedthumbdrivewiththeNW3CIncidentResponseProfile(SP2)
TesterName:
MBowser
TestMachine:
Pat
AssertionsTested:
1. Allprogramsidentifiedintheprofilewereexecuted.
2. Resultsofthetoolswereproperlystoredontheinvestigatorsthumb
drive.
3. Executingrunner.exedidnotcauseanydirectwritestothesuspectdrives
FileSystem.
4. Executingrunner.exedidnotcauseanydirectwritestothesuspectdrives
Registry.
5. Thetoolsexecutedwererunfromthethumbdrive,notfromthesuspects
machine.
UniqueSetup
SystemwasloadedwithMicrosoftWindowsXPServicePack2.
Information:
1GBPNYAttachThumbDrivewiththeNW3CIncidentResponseprofile
loaded,aswellasProcessMonitor.
InternalID#:IR3
DriveSN#FDVRWBU53LJO20CP
AsExpected
1. Allprogramsidentifiedintheprofilewere
ResultsBy
Assertion:
executed.
AsExpected
2. Resultsofthetoolswereproperlystoredon
theinvestigatorsthumbdrive.
3. Executingrunner.exedidnotcauseanydirect AnomalyDetected
writestothesuspectdrive(FileSystem).
4. Executingrunner.exedidnotcauseanydirect AnomalyDetected
writestothesuspectdrive(Registry).
AsExpected
5. Thetoolsexecutedwererunfromthethumb
drive,notfromthesuspectsmachine.
TesterNotes:
Thethumbdrivewasfirstconnectedtothemachineafterthesystemhadfinished
bootingtoWindows.Afterthethumbdrivedriversfinishedloading,thetester
navigatedtothethumbdriveandstartedProcessMonitor.
OnceProcessMonitorloaded,andhadbeguncapturingdata,thetesternavigated
tothethumbdriveandranrunner.exe.
StartTime:10:39am
EndTime:10:43am
Immediatelyafterthecompletionofrunner,thetesterstoppedtheProcess
Monitorcaptureandsavedthelogfiletothethumbdrive.Thelogfilewas
examinedlaterfortestingoftheassertionslistedabove.Theresultsoftheanalysis
aredetailedbelow:
Assertion1:
Anexaminationofthethumbdrivesfilesystemindicatedthatalloftheprograms
associatedwiththeNW3CIncidentResponseprofileweresuccessfullycopiedto
thedisk.
AnexaminationoftheProcessMonitorlogsindicatesthatalloftheprograms
41
associatedwiththeNW3CIncidentResponseprofileweresuccessfullyrunduring
thetestingperiod.
Assertion2:
Anexaminationofthecontentsofthethumbdriveindicatesthatrunner.exe
successfullysavedtheoutputfilesonthethumbdrive,andintheappropriate
directories.
Assertion3:
AnexaminationoftheProcessMonitorlogsindicatesthattherewerethreedirect
writesmadetothesuspectsharddrive.ThistestwasdonebyfilteringtheProcess
Monitorlogresultstoshowonlyfilesysteminformation,andsearchingforany
WriteFileoperation.Theresultsindicatethattheprogramhandle.exemade
threewritestothefileC:\WINDOWS\system32\drivers\PROCEXP100.sys
AreferencetothefilePROCEXP100.sysishardcodedwithinhandle.exe,andas
suchitappearsthatitisnotpossibletorestrainhandle.exefromwritingtothisfile.
However,thisfileisspecificallywrittenaspartoftheSysinternalstoolandwould
notbeofevidentiaryinterest.
Assertion4:
AnexaminationoftheProcessMonitorlogsindicatesthattherewere262total
writes/updates/deletionsweremadetotheregistrybyRunneranditsprocesses
(toincludealloftheprogramswithintheselectedprofile).Theseresultswillalso
includeattemptstochangethatwerenotallowed(i.e.,anattempttodeleteakey
thatdoesntexist).ThistestwasdonebyfilteringtheProcessMonitorlogresults
toshowonlyRegistryinformation,andsearchingforanyRegSetValue,
RegDeleteValue,orRegDeleteKeyoperation.Forsimplicitiessake,anychange
madetotheregistrywillbelistedasawritebelow.
Therewere239writesmadetotheregistrykeybelow.Thebreakdownofthe
programsthatupdatedthisregistrykeyisasfollows:arp.exe(8),at.exe(0),
autorunsc.exe(8),getmac.exe(8),handle.exe(0),hostname.exe(8),ipconfig.exe
(8),msinfo32.exe(8),nbtstat.exe(0),net.exe(9),netdom.exe(0),netstat.exe(16),
openfiles.exe(1),psfile.exe(0),pslist.exe(2),psloggedon.exe(0),psservice.exe(1),
pstat.exe(0),psuptime.exe(8),quser.exe(1),route.exe(0),sc.exe(2),sclist.exe
(1),showgrps.exe(1),srvcheck.exe(0),tasklist.exe(8),whoami.exe(0),cmd.exe
(133),andrunner.exe(8).
HKLM\SOFTWARE\Microsoft\Cryptography\RNG\Seed
Inadditiontoanywriteslistedabove,arp.exealsomadeonewritetothefollowing
registrykey:
HKLM\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\
Parameters\TrapPollTimeMilliSecs
Inadditiontoanywriteslistedabove,autorunsc.exealsomadeonewritetoeach
ofthefollowingregistrykeys:
42
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2
\
{ab7c3e54-924c-11de-83b1-00e0b8534ba4}\BaseClass
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2
\
{e727fc90-921e-11de-b2a5-806d6172696f}\BaseClass
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2
\
{e727fc91-921e-11de-b2a5-806d6172696f}\BaseClass
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2
\
{e727fc92-921e-11de-b2a5-806d6172696f}\BaseClass
Inadditiontoanywriteslistedabove,handle.exealsomadeonewritetoeachof
thefollowingregistrykeys:
HKLM\System\CurrentControlSet\Services\PROCEXP100
HKLM\System\CurrentControlSet\Services\PROCEXP100\Enum
HKLM\System\CurrentControlSet\Services\PROCEXP100\ErrorControl
HKLM\System\CurrentControlSet\Services\PROCEXP100\ImagePath
HKLM\System\CurrentControlSet\Services\PROCEXP100\Start
HKLM\System\CurrentControlSet\Services\PROCEXP100\Type
Inadditiontoanywriteslistedabove,ipconfig.exealsomadetwowritestothe
followingregistrykey:
HKLM\SOFTWARE\Microsoft\ESENT\Process\6344\DEBUG\Trace Level
Inadditiontoanywriteslistedabove,ipconfig.exealsomadeonewritetoeachof
thefollowingregistrykeys:
HKLM\System\CurrentControlSet\Services\Eventlog\Application\
ESENT\CategoryCount
HKLM\System\CurrentControlSet\Services\Eventlog\Application\
ESENT\CategoryMessageFile
HKLM\System\CurrentControlSet\Services\Eventlog\Application\
ESENT\EventMessageFile
HKLM\System\CurrentControlSet\Services\Eventlog\Application\
ESENT\TypesSupported
Inadditiontoanywriteslistedabove,netstat.exealsomadetwowritestothe
followingregistrykey:
HKLM\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\
Parameters\TrapPollTimeMilliSecs
Inadditiontoanywriteslistedabove,pslist.exemadetwowritestoeachofthe
43
followingregistrykeys:
HKLM\System\CurrentControlSet\Services\PerfOS\Performance\Error
Count
HKLM\System\CurrentControlSet\Services\PerfProc\Performance\
Error Count
OverallSuccess:
Assertion5:
AnexaminationoftheProcessMonitorlogsindicatethattheprogramsrunaspart
oftheprofilewererunfromthethumbdrive,andnotfromthesuspectshard
drive.
AdditionalTesterNotes:
Whiletherewereseveralwritestothesystemsregistry,theregistrykeysmodified
werenotofanyevidentiaryconcern;inaddition,themodificationswerearesultof
runningthesetoolsonalivemachine,andcouldnotbeavoided.Inaddition,due
tothenatureoftheregistry,determiningiftheregistrychangeswereactually
writtentothedriveisdifficult.
Whiletherewereslightchangestothedriveandregistry,thewriteswereeither
specifictoaprogramrun(handle.exe)orwereunavoidableinattemptingto
retrievethedesiredinformation,theoverallratingforthistestwillbelistedAs
Expected.
AsExpected
44
TestName: RunnerTest011
Date: 26August2009
Description: RunningaCOFEEgeneratedthumbdrivewiththeNW3CVolatileDataProfile(SP2)
TesterName:
MBowser
TestMachine: Paul
AssertionsTested:
1. Allprogramsidentifiedintheprofilewereexecuted.
2. Resultsofthetoolswereproperlystoredontheinvestigatorsthumb
drive.
3. Executingrunner.exedidnotcauseanydirectwritestothesuspectdrive
(FileSystem).
4. Executingrunner.exedidnotcauseanydirectwritestothesuspectdrive
(Registry).
5. Thetoolsexecutedwererunfromthethumbdrive,notfromthesuspects
machine.
UniqueSetup
SystemwasloadedwithMicrosoftWindowsXPServicePack2.
Information:
1GBPNYAttachThumbDrivewiththeNW3CVolatileDataprofileloaded,as
wellasProcessMonitor.
InternalID#:VOL1
DriveSN#0XRVIMHLKSVVY0X8
AsExpected
1. Allprogramsidentifiedintheprofilewere
ResultsBy
Assertion:
executed.
2. Resultsofthetoolswereproperlystoredonthe AsExpected
investigatorsthumbdrive.
AsExpected
3. Executingrunner.exedidnotcauseanydirect
writestothesuspectdrive(FileSystem).
AnomalyDetected
4. Executingrunner.exedidnotcauseanydirect
writestothesuspectdrive(Registry).
AsExpected
5. Thetoolsexecutedwererunfromthethumb
drive,notfromthesuspectsmachine.
TesterNotes:
Thethumbdrivewasfirstconnectedtothemachineafterthesystemhadfinished
bootingtoWindows.Afterthethumbdrivedriversfinishedloading,thetester
navigatedtothethumbdriveandstartedProcessMonitor.
OnceProcessMonitorloaded,andhadbeguncapturingdata,thetesternavigated
tothethumbdriveandranrunner.exe.
StartTime:9:43am
EndTime:9:44am
Immediatelyafterthecompletionofrunner,thetesterstoppedtheProcess
Monitorcaptureandsavedthelogfiletothethumbdrive.Thelogfilewas
examinedlaterfortestingoftheassertionslistedabove.Theresultsofthe
analysisaredetailedbelow:
Assertion1:
Anexaminationofthethumbdrivesfilesystemindicatedthatalloftheprograms
associatedwiththeNW3CVolatileDataprofileweresuccessfullycopiedtothe
disk.
AnexaminationoftheProcessMonitorlogsindicatesthatalloftheprograms
45
associatedwiththeNW3CVolatileDataprofileweresuccessfullyrunduringthe
testingperiod.
Assertion2:
Anexaminationofthecontentsofthethumbdriveindicatesthatrunner.exe
successfullysavedtheoutputfilesonthethumbdrive,andintheappropriate
directories.
Assertion3:
AnexaminationoftheProcessMonitorlogsindicatesthattherewerenodirect
writesmadetothesuspectdrivebyRunneroranyofitsprocesses(toincludeall
oftheprogramswithintheselectedprofile).Thistestwasdonebyfilteringthe
ProcessMonitorlogresultstoshowonlyFilesysteminformation,andsearching
foranyWriteFileoperation.
Assertion4:
AnexaminationoftheProcessMonitorlogsindicatesthattherewere117total
writes/updates/deletionsmadetotheregistrybyRunneranditsprocesses(to
includealloftheprogramswithintheselectedprofile).Theseresultswillalso
includeattemptstochangethatwerenotallowed(i.e.,anattempttodeleteakey
thatdoesntexist).ThistestwasdonebyfilteringtheProcessMonitorlogresults
toshowonlyRegistryinformation,andsearchingforanyRegSetValue,
RegDeleteValue,orRegDeleteKeyoperation.Forsimplicitiessake,anychange
madetotheregistrywillbelistedasawritebelow.
Therewere105writesmadetotheregistrykeybelow.Thebreakdownofthe
programsthatupdatedthisregistrykeyisasfollows:ipconfig.exe(8),nbtstat.exe
(0),net.exe(8),netstat.exe(16),pslist.exe(2),psloggedon.exe(0),quser.exe(1),
sclist.exe(1),showgrps.exe(1),systeminfo.exe(8),whoami.exe(0),cmd.exe(52),
andrunner.exe(8).
HKLM\SOFTWARE\Microsoft\Cryptography\RNG\Seed
Inadditiontoanywriteslistedabove,netstat.exealsomadetwowritestothe
followingregistrykey:
HKLM\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\Parameters\
TrapPollTimeMilliSecs
Inadditiontoanywriteslistedabove,ipconfig.exealsomadetwowritestothe
followingregistrykey:
HKLM\SOFTWARE\Microsoft\ESENT\Process\6898\DEBUG\Trace Level
Inadditiontoanywriteslistedabove,ipconfig.exemadeonewritetoeachofthe
followingregistrykeys:
HKLM\System\CurrentControlSet\Services\Eventlog\
Application\ESENT\CategoryCount
HKLM\System\CurrentControlSet\Services\Eventlog\
46
Application\ESENT\CategoryMessageFile
HKLM\System\CurrentControlSet\Services\Eventlog\
Application\ESENT\EventMessageFile
HKLM\System\CurrentControlSet\Services\Eventlog\
Application\ESENT\TypesSupported
Inadditiontoanywriteslistedabove,pslist.exealsomadetwowritestoeachof
thefollowingregistrykeys:
HKLM\System\CurrentControlSet\Services\PerfOS\
Performance\Error Count
HKLM\System\CurrentControlSet\Services\PerfProc\
Performance\Error Count
OverallSuccess:
Assertion5:
AnexaminationoftheProcessMonitorlogsindicatethattheprogramsrunaspart
oftheprofilewererunfromthethumbdrive,andnotfromthesuspectshard
drive.
AdditionalTesterNotes:
Whiletherewereseveralwritestothesystemsregistry,theregistrykeys
modifiedwerenotofanyevidentiaryconcern;inaddition,themodificationswere
aresultofrunningthesetoolsonalivemachine,andcouldnotbeavoided.In
addition,duetothenatureoftheregistry,determiningiftheregistrychanges
wereactuallywrittentothedriveisdifficult.
Whiletherewereslightchangestotheregistry,thewriteswereunavoidablein
attemptingtoretrievethedesiredinformation,andassuch,theoverallratingfor
thistestwillbelistedAsExpected.
AsExpected
47
TestName: RunnerTest012
Date:
26August2009
Description: RunningaCOFEEgeneratedthumbdrivewiththeNW3CIncidentResponseProfile(SP2)
TesterName:
MBowser
TestMachine:
Paul
Assertions
1. Allprogramsidentifiedintheprofilewereexecuted.
Tested:
2. Resultsofthetoolswereproperlystoredontheinvestigatorsthumbdrive.
3. Executingrunner.exedidnotcauseanydirectwritestothesuspectdrives
FileSystem.
4. Executingrunner.exedidnotcauseanydirectwritestothesuspectdrives
Registry.
5. Thetoolsexecutedwererunfromthethumbdrive,notfromthesuspects
machine.
UniqueSetup
SystemwasloadedwithMicrosoftWindowsXPServicePack2.
Information:
1GBPNYAttachThumbDrivewiththeNW3CIncidentResponseprofileloaded,
aswellasProcessMonitor.
InternalID#:IR1
DriveSN#FAV3RW6Q0RP0L3M7
AsExpected
ResultsBy
1. Allprogramsidentifiedintheprofilewere
Assertion:
executed.
2. Resultsofthetoolswereproperlystoredonthe AsExpected
investigatorsthumbdrive.
AsExpected
3. Executingrunner.exedidnotcauseanydirect
writestothesuspectdrive(FileSystem).
AnomalyDetected
4. Executingrunner.exedidnotcauseanydirect
writestothesuspectdrive(Registry).
AsExpected
5. Thetoolsexecutedwererunfromthethumb
drive,notfromthesuspectsmachine.
TesterNotes:
Thethumbdrivewasfirstconnectedtothemachineafterthesystemhadfinished
bootingtoWindows.Afterthethumbdrivedriversfinishedloading,thetester
navigatedtothethumbdriveandstartedProcessMonitor.
OnceProcessMonitorloaded,andhadbeguncapturingdata,thetesternavigatedto
thethumbdriveandranrunner.exe.
StartTime:9:24am
EndTime:9:26am
Immediatelyafterthecompletionofrunner,thetesterstoppedtheProcessMonitor
captureandsavedthelogfiletothethumbdrive.Thelogfilewasexaminedlaterfor
testingoftheassertionslistedabove.Theresultsoftheanalysisaredetailedbelow:
Assertion1:
Anexaminationofthethumbdrivesfilesystemindicatedthatalloftheprograms
associatedwiththeNW3CIncidentResponseprofileweresuccessfullycopiedtothe
disk.
AnexaminationoftheProcessMonitorlogsindicatesthatalloftheprograms
associatedwiththeNW3CIncidentResponseprofileweresuccessfullyrunduringthe
testingperiod.
48
Assertion2:
Anexaminationofthecontentsofthethumbdriveindicatesthatrunner.exe
successfullysavedtheoutputfilesonthethumbdrive,andintheappropriate
directories.
Assertion3:
AnexaminationoftheProcessMonitorlogsindicatesthattherewerenodirect
writesmadetothesuspectdrivebyRunneroranyofitsprocesses(toincludeallof
theprogramswithintheselectedprofile).ThistestwasdonebyfilteringtheProcess
MonitorlogresultstoshowonlyFilesysteminformation,andsearchingforany
WriteFileoperation.
Assertion4:
AnexaminationoftheProcessMonitorlogsindicatesthattherewere277total
writes/updates/deletionsmadetotheregistrybyRunneranditsprocesses(to
includealloftheprogramswithintheselectedprofile).Theseresultswillalsoinclude
attemptstochangethatwerenotallowed(i.e.,anattempttodeleteakeythat
doesntexist).ThistestwasdonebyfilteringtheProcessMonitorlogresultstoshow
onlyRegistryinformation,andsearchingforanyRegSetValue,RegDeleteValue,
orRegDeleteKeyoperation.Forsimplicitiessake,anychangemadetotheregistry
willbelistedasawritebelow.
Therewere239writesmadetotheregistrykeybelow.Thebreakdownofthe
programsthatupdatedthisregistrykeyisasfollows:arp.exe(8),at.exe(0),
autorunsc.exe(8),getmac.exe(8),handle.exe(0),hostname.exe(8),ipconfig.exe(8),
msinfo32.exe(8),nbtstat.exe(0),net.exe(9),netdom.exe(0),netstat.exe(16),
openfiles.exe(1),psfile.exe(0),pslist.exe(2),psloggedon.exe(0),psservice.exe(1),
pstat.exe(0),psuptime.exe(8),quser.exe(1),route.exe(0),sc.exe(2),sclist.exe(1),
showgrps.exe(1),srvcheck.exe(0),tasklist.exe(8),whoami.exe(0),cmd.exe(133),
andrunner.exe(8).
HKLM\SOFTWARE\Microsoft\Cryptography\RNG\Seed
Inadditiontoanywriteslistedabove,arp.exealsomadeonewritetothefollowing
registrykey:
HKLM\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\
Parameters\TrapPollTimeMilliSecs
Inadditiontoanywriteslistedabove,autorunsc.exealsomadeonewritetoeachof
thefollowingregistrykeys:
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\
{02bb35ea-1621-11da-840f-806d6172696f}\BaseClass
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\
{02bb35eb-1621-11da-840f-806d6172696f}\BaseClass
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\
{02bb35ec-1621-11da-840f-806d6172696f}\BaseClass
49
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2\
{c583de36-925c-11de-b154-000d6119d38a}\BaseClass
Inadditiontoanywriteslistedabove,ipconfig.exealsomadeonewritetoeachofthe
followingregistrykeys:
HKLM\System\CurrentControlSet\Services\Eventlog\Application\
ESENT\CategoryCount
HKLM\System\CurrentControlSet\Services\Eventlog\Application\
ESENT\CategoryMessageFile
HKLM\System\CurrentControlSet\Services\Eventlog\Application\
ESENT\EventMessageFile
HKLM\System\CurrentControlSet\Services\Eventlog\Application\
ESENT\TypesSupported
Inadditiontoanywriteslistedabove,netstat.exealsomadetwowritestothe
followingregistrykey:
HKLM\SOFTWARE\Microsoft\RFC1156Agent\CurrentVersion\
Parameters\TrapPollTimeMilliSecs
Inadditiontoanywriteslistedabove,pslist.exemadetwowritestoeachofthe
followingregistrykeys:
HKLM\System\CurrentControlSet\Services\PerfOS\Performance\Error Count
HKLM\System\CurrentControlSet\Services\PerfProc\Performance\
Error Count
Assertion5:
AnexaminationoftheProcessMonitorlogsindicatethattheprogramsrunaspartof
theprofilewererunfromthethumbdrive,andnotfromthesuspectsharddrive.
AdditionalTesterNotes:
Whiletherewereseveralwritestothesystemsregistry,theregistrykeysmodified
werenotofanyevidentiaryconcern;inaddition,themodificationswerearesultof
runningthesetoolsonalivemachine,andcouldnotbeavoided.Inaddition,dueto
thenatureoftheregistry,determiningiftheregistrychangeswereactuallywritten
tothedriveisdifficult.
Whiletherewereslightchangestotheregistry,thewriteswereunavoidablein
attemptingtoretrievethedesiredinformation,andassuch,theoverallratingforthis
testwillbelistedAsExpected.
OverallSuccess: AsExpected
50
ReportNotes
ThisvalidationwasconductedtotestthefunctionalityofthetwoNW3Cprofilesastheywouldrunona
suspectssystem.ThisisnotavalidationofthefullCOFEEsuite.
AdditionalReferences
LeoDorrendorf,Z.G.(2007).CryptanalysisoftheWindowsRandomNumberGenerator.TheHebrew
UniversityofJerusalem.
Bowser,M&Wykes,J.(2009).COFEEGUICONSOLE.NationalWhiteCollarCrimeCenter.
Glossary
Entropy:Randomdatamouseposition,processorstatistics,localtime,etc.collectedbyan
applicationoroperatingsystemforuseincryptography.
FileSystem:Inrelationtothisdocument,filesystemreferstoactivefilesonthesuspectssystem.
IncidentResponse:Theactionsandapproachestakentoanetworksecuritybreach(suchasasystem
beinghacked).
Registry:Theregistryconsistsofanumberofseparatehivefileswhichstorevarioustypesof
information.Whenasystemispoweredon,theoperatingsystemcombinesthesehivefilesinRAMto
createtheregistry.Whenchangesaremadetotheregistry,thechangesaremadetotheregistrythatis
locatedinRAM.Thepointatwhichthesechangesareactuallywrittentothehivefilesonthediskvaries
dependinguponanumberoffactors;thereforeitisdifficulttodetermineifanyofthechangesmadeto
theregistrybytheprofilesdiscussedinthisreportwouldactuallyaffectthedatastoredonthesuspects
harddrive.Forexample,iftheinvestigatorremovespowerfromthesuspectsmachine(bypullingthe
powercord)immediatelyafterrunningtheVolatileDataprofile,itispossiblethatnoneofthechanges
madetotheregistrywouldhaveactuallybeenstoredtothesuspectsdisk.
VolatileData:Anydatathatislostwhenpowerisremovedfromthesystem.
WindowsRandomNumberGenerator:Apseudorandomnumbergenerator(PRNG)thatusescollected
entropyfromaWindowsmachinetoestablishcryptographickeys.EachWindowsprocesshasitsown
copyofaWRNGinstance.EntropycollectedisusedtogenerateanRC4keythatisstoredinitsinternal
stateforrandomnumbergeneration.EachinstanceoftheWRNGuseseightRC4streams.Entropy
collectionoccurswhenanRC4streamisinitializedoritreachesthe16KBthreshold.Theentire3584
bytesofcollectedentropyarehashedtoproducean80bytedigestwhichisthenfedintoanRC4
algorithmasakey.Thekeyisusedtoencryptthecleartextcontainedinthe
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\RNG\Seedregistrykey.Thiskey
containsthelatestseededvalueobtainedfromWindowsentropysourcesandisusedbyallinstancesof
theWRNGrunonthemachine.Theresultisanother80bytedigestthatisagainfedintoanRC4
51
algorithmthatisusedtoencrypta256byteentropysourcereadfromaWindowsdevicedriver.The
resultofthefinalencryptionisusedasakeyfortheRC4instancethatisusedintheWRNGinternal
state.(LeoDorrendorf,2007)
52