EZ Tools
Kapeabilities
Last updated
Kapeabilities
Last updated
Given a Kape forensics capture can you solve these questions?
After getting the file the first thing, we need to do in to extract it with 7zip or WinRAR.
Once the File is extracted on a windows system we can right click and mount the drive to browse the contents.
In this drive we have the M folder which contains basically the C drive of a windows pc. The excel files are created from the KAPE tool and the long file names contains a list of files that are over a certain number of characters (most likely 256).
Let’s start off by jumping into the Event logs in the following location: E:\M\Windows\system32\winevt\logs
Open up the System logs to get the first flag.
There are three local administrators on this system: Administrator, Assessor and our question.
For this one go back to File Explorer and go to the following location: E:\M\users
I would grab the script to install the tools as we will need a few others for later questions.
For this one in particular we are going to run the RegistryExplorer
We will load the ntuser.dat file which is the HKUser hive for Silver Smurfer.
The registry key we are looking for is under ROOT\Software\Microsoft\Internet Explorer\TypedURLs
We see that since they used Internet Explorer, we have their history and the answer to this question.
For this one we will go back to the event logs. For this we will use Zimmermans EvtxEmd.exe command.
This will read all the event logs and put it into a CSV file that will make it easier to parse the results.
From the folder of EvtxEcmd.exe run the following command: .\EvtxECmd.exe -d E:\M\Windows\system32\winevt\logs\ --csv c:\temp\zimmerman
This will read all the log files from the drive and output to c:\temp\zimmerman\<date>_EvtxECmd_Output.csv
From here click on a cell and do Control + A to select all and go to insert Table with headers. This will make filter take no time at all.
First Filter Channel -> deselect all and select only Security
Next Filter EventID -> deselect all and select 4688 or New Process Creation
Next we will go to Column V: ExecutableInfo Click on V to highlight the whole column -> Insert -> Pivot Table -> Dump the column into a new sheet. This will give us a unique list of all processes started.
We look at Silver Smurfer we can see that there is an odd looking lssas.exe file launched from there.
For this one we will go back to the main sheet in our event log dump.
We will filter out the Column V for lssas.exe executable that we found and the answer jumps out.
For this remove the filter for lssas.exe from question 5. Do a search for lssas and look at the events surrounding the search.
find.exe and tasklist.exe
For this we will do the same as question 6, only we will look for the next instance of cmd.exe in the executable info (not the parent process).
C:\Windows\System32\svchost.exe
For this question we will go back to the M drive and go to the Tasks Folder: E:\M\Windows\system32\Tasks
Here we see a task called SystemCheck that we need to look at.
Open this up in Notepad:
We see that this is calling a bat file. There is a repetition check enabled so this is persistence.
For this question we will be using Zimmerman’s MFTExplorer program to look at the MFT table located: E:\M
Load the $MFT table on the M drive.
Since we know that Silver Smurfer is the user we want to focus on from all the previous questions, and we have a bat file coming from their appdata folder, let’s start our search there.
Compared to the appdata folder on the M drive
We see that there is a sneaky folder in there.
Sticking with question 9 we can say that the following is the path
C:\users\Silver Smurfer\AppData\sneaky
We look on the bottom right corner to of the MFTExplorer to find this info.
For this we will move to another Zimmerman tool PECmd.exe.
Run this command to dump the contents to a csv in the c:\temp location
.\PECmd.exe -d e:\M --csv c:\temp\prefetch
Open the Output CSV and put it into a table: Control + A -> Insert -> Table
Next we will search on Firefox and see what accessed the file.
We have two items that opened the file, Certutil.exe and firfoxanalyzer.exe
This file is located at: \VOLUME{01d5be0528ae8f8c-1628d43c}\WINDOWS\SYSTEM32\CERTUTIL.EXE
A more in-depth look into the EZ tools used here will be in the future.
For this next one we are going to look at the ntuser.dat file for Silver Smurfer, to do this we need a tool from Eric Zimmerman: