windows 7 forensics event logs-dtl-r3

49
Digital Forensics and Windows 7 Event Logs Troy Larson Principal Forensics Program Manager TWC Network Security Investigations NSINV-R 3 Research|Readiness|Response

Upload: ctin

Post on 22-Jan-2015

7.166 views

Category:

Technology


2 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Windows 7 forensics event logs-dtl-r3

Digital Forensics and Windows 7Event Logs

Troy LarsonPrincipal Forensics Program ManagerTWC Network Security Investigations

NSINV-R3– Research|Readiness|Response

Page 2: Windows 7 forensics event logs-dtl-r3

Introduction

Vista/Windows 7 Event Logging:• New format *.evtx.• More, many more,

event log files.• New system for

collecting and displaying events.

• New security event numbering.

Page 3: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

Before Vista—Event Log.• The big three:

– System.– Security.– Application.

• Binary file, .evt.• \Windows\System32\config• Documented and well known.

http://msdn.microsoft.com/en-us/library/aa363652(v=VS.85).aspx

Vista to present—Windows Event Log.• The big three:

– System.– Security.– Application.– Plus 100+ more event log files.– Binary/xml format—.evtx.*

• C:\Windows\System32\winevt\Logs

• New, documentation growing.

http://msdn.microsoft.com/en-us/library/aa385780(v=VS.85).aspx

*http://computer.forensikblog.de/en/topics/windows/vista_event_log/

Page 4: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

C:\Windows\System32\winevt\Logs

Page 5: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

What is an event log?

Page 6: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

An event log is more than its .evtx file.• The log displayed in the Event Viewer is a compilation of an .evtx

file and components of one or more message DLLs.• The Registry links the .evtx to its message DLLs, which together

create the complete event log presented by the Event Viewer.

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\eventlog

Page 7: Windows 7 forensics event logs-dtl-r3

From *.evtx to Event Log

Event Viewer

*.evtx file

Registry:HKLM\SYSTEM\ControlSet001\services\eventlog

MessageFile.dll

Page 8: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

• Impact on forensics?– Information in an event log often depends on message

DLLs.– To get the message information, one must have the

message DLLs available at the time the logs are-• Collected; or• Read.

– Security events generally consistent within same versions of Windows (message DLLs the same).

– Application logs pose the biggest risk of incompatible or missing message information—as message DLLs depend on the installed applications.

Page 9: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

• Solutions:

– Collect logs live, before shutting down a system.

• For Example:– >psloglist.exe -s -x Application > AppEvent.csv

– >psloglist.exe -s -x System > SysEvent.csv

– >psloglist.exe -s -x Security > SecEvent.csv

– Rebuild registry references to message DLLs on the analysis workstation.

• Generally, not necessary unless there are recorded events that are important and need to be resolved with their corresponding message DLLs.

Page 10: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

• Configuring the analyst workstation for reviewing event logs:

– Identify the missing message DLLs.

• Specified by the registry key for the component with the incomplete event record.

– Copy message DLLs to analyst work station.

– Add registry keys for component to specify location of the message DLLs.

Page 11: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

• Identify missing message DLLs.

– Review system registry hive file of the system from which the event log file was taken.

Page 12: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

• Extract the message DLL(s) from the source system and copy to the analyst’s workstation.

– New location or recreate original path.

Page 13: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

• Recreate the registry services\eventlog key(s) and values on the analyst’s workstation so that they point to the copied message DLL(s). Include all original values.

HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\services\eventlog\Application\Communicator

• The Event Viewer should now pull in the expected message DLL information when the event log is viewed.

Page 14: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

• Event logs in forensic examinations:– Rarely a primary source of information.

• Noisy.• Significant events often only stand out when there are dates,

times, or other items to bring focus to an event.

– Security events are often not significant.• Dependent on the security audit settings.

– Often evidence of compromise is found in the System and Application event logs or one of the new, narrowly focused logs.• System or application crashes.• Errors, warnings, information.

Page 15: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

Working with the Windows 7 Event Viewer

Page 16: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

Page 17: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

Page 18: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

Page 19: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

Filtering is much improved in Windows 7.Filter the event logs to reduce the noise.

Page 20: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

• Start by selecting the event source, as this will populate the other choices.

Page 21: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

• Next, focus on Task categories—here, selecting logon and logoff.

Page 22: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

• Finally, Keywords, here selecting Audit Failure and Audit Success.

Page 23: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

The filtered view.

Page 24: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

And now, the event logs.

Page 25: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

• System Events.

– Logged by Windows and Windows system services, and are classified as error, warning, or information.

– Typical interesting events:

• Time Change.

• Startup and shutdown.

• Services startup, shutdown, failures.

• Startups should be logged, but crashes or errors could prevent logging of shutdown or termination events.

http://windows.microsoft.com/en-US/windows7/What-information-appears-in-event-logs-Event-Viewer

Page 26: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

Page 27: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

Page 28: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

Page 29: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

• Application events.– Program Events are classified as error, warning, or information, depending on

the severity of the event. An error is a significant problem, such as loss of data. A warning is an event that isn't necessarily significant, but might indicate a possible future problem. An information event describes the successful operation of a program, driver, or service.

– Typical interesting events would be those relating to programs that could be relevant to an investigation.

• Application errors.– E.g., BackupExec agent attack.– Antivirus or malware detection events.

• Combined with System events, Application events can show that symptoms of suspected intrusions or compromises could have been long standing system problems.

– Note: application logging is controlled by the applications—so events are defined by the application developers.

– Not all application generate events.

Page 30: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

Page 31: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

Page 32: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

• Security events.– These events are called audits and are described as successful or failed

depending on the event, such as whether a user trying to log on to Windows was successful.

– Depend on audit policy.– Noisy.– Completely different Security event IDs from all versions before Vista.– General Tip: Translate pre-Vista Event ID numbers to the new Vista

event ID numbers by adding 4096.– There are a number of new security events.– Typical events of interest:

• Account logon and logoff.• Failed logon attempts.• Account escalation.• Process execution.

Page 33: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

9 audit categories.

Page 34: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

Clicking on an audit category can provide you with an explanation of what the category audits.

Page 36: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

Page 37: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

http://support.microsoft.com/kb/977519

Page 38: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

Further Information:

http://www.ultimatewindowssecurity.com/securitylog/encyclopedia/default.aspx

http://blogs.msdn.com/b/ericfitz/

Page 39: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

All those other logs.

Page 40: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

Page 41: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

Page 42: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

Page 43: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

Page 44: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

Page 45: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

Page 46: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

Page 47: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

Page 48: Windows 7 forensics event logs-dtl-r3

Windows Event Logs

• Emphasis: Usually on Security Events, but other event logs may have more to offer.

• Event log are not typically the primary evidence.

– Often too noisy.

• Best used when other facts fix times, or implicate specific accounts or computers.

• Often, most useful in a timeline with other items of significance.

Page 49: Windows 7 forensics event logs-dtl-r3

Windows Event Logs