Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124

Disk Analysis
The SOC team got an alert regarding some illegal port scanning activity coming from an employee’s system. The employee was not authorized to do any port scanning or any offensive hacking activity within the network. The employee claimed that he had no idea about that, and it is probably a malware acting on his behalf. The IR team managed to respond immediately and take a full forensic image of the user’s system to perform some investigations.
There is a theory that the user intentionally installed illegal applications to do port scanning and maybe other things. He was probably planning for something bigger, far beyond a port scanning!
It all began when the user asked for a salary raise that was rejected. After that, his behavior was abnormal and different. The suspect is believed to have weak technical skills, and there might be an outsider helping him!
Your objective as a soc analyst is to analyze the image and to either confirm or deny this theory.
The computer name can be found in SYSTEM Registry Hive:
SYSTEM\<CurrentControlSet>\Control\ComputerName\ComputerName

So the computer name is :
4ORENSICS
IP Address can be found in the following in SYSTEM Registry Hive:
SYSTEM\<CurrentControlSet>\Services\Tcpip\Parameters\Interfaces

So the IP Address is:
10.0.2.15
The LeaseObtainedTime can be found also in the same registry key:
SYSTEM\<CurrentControlSet>\Services\Tcpip\Parameters\Interfaces

So the LeaseObtainedTime is:
2016-06-21 12:58:06
The Computer SID can be found in the SOFTWARE Hive:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion \ProfileList

So the Computer SID is:
S-1-5-21-2489440558-2754304563-710705792-1001
The Operating System (OS) Version can be found in SOFTWARE Hive:
SOFTWARE\Microsoft\Windows NT\CurrentVersion

So the Operating System (OS) Version is:
8.1
Timezone can be found in SYSTEM Hive:
SYSTEM\CurrentControlSet\Control\TimeZoneInformation
The timezone found is:
Pacific Standard Time

Transforming it on Google, we find it is:
UTC-07:00
The number of times the user logged in can be found in the SAM Registry Hive, in users registry key:
SAM\Domains\Account\Users

The user logged in:
3 times
The last login time can be found in the SAM Registry Hive, in users registry key:
SAM\Domains\Account\Users

The last login time was:
2016-06-21 01:42
Looking inside users\Hunter, we found .zenmap:

We can analyze the prefetch for zenmap. Using PECmd.exe, we find:

In nmapscan.xml, we find at the end of the file when the port scan ended:

In nmapscan.xml, we find 1000 ports were scanned:

In the same file we can find the open ports:

22, 80, 9929, 31337
In the same file, we can find it was version 7.12:

Skype keeps it data in main.db locate at:
D:\c16-Hunter_NONAME [NTFS]\[root]\Users\Hunter\AppData\Roaming\Skype\hunterehpt

In messages table, we can see that they agreed on using team viewer:

We can find the email address in contacts table:

The name of the deleted diagram is:
home-network-design-networking-for-a-single-family-home-case-house-arkko-1433-x-792.jpg

In user’s documents, we find Ryan_VanAntwerp_thesis that contains data exfiltration techniques:

Crypto Swap can be found in
C:\Program Files (x86)\Jetico\BCWipe\Uninstall.log

We can find both serial numbers in USBSTOR:
SYSTEM\CurrentControlSet001\Enum\USBSTOR

Jetco BCWipe, that can be found in Prefetch:

We filter on PF Files in (filtering out 0kb files):
D:\c16-Hunter_NONAME [NTFS]\[root]\Windows\Prefetch
We find 174 files
Analyzing BCWipe’s prefetch in PowerShell:
& "C:\Users\abdal\Desktop\Cyber Defenders\Tools\ZimmermanTools\PECmd.exe" `
-f "C:\Users\abdal\Desktop\BCWIPE.EXE-36F3F2DF.pf" `
-o "C:\Users\abdal\Desktop"
We find it was executed 5 times:

Analyzing the prefetch again, we find:

The JAR can be found in:
C:\Users\Hunter\Downloads\burpsuite_free_v1.7.03.jar
There is a .PST file in user’s documents\Outlook Files:

Opening the .PST file using SysTools Outlook PST Viewer:

We find an email with “Pictures.7z” as attachment
Using ShellBagExplorer run as admin, we can find the exfiltration folder (Analyze USRCLASS.DAT):

C:\Users\Hunter\Pictures\Exfil
In Recycle bin, we have two $R files corresponding to 2 deleted files:

I exported both files, and analyzed both using online exif tool. I found that $RP3TBNW.jpg have a 1920 x 1200 resolution:

C:\Users\Hunter\Pictures\Exfil

Its name is:
ws_Small_cute_kitty_1920x1200.jpg
Jump lists automatic items are located in:
C:\Users\[Profile]\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations
So the name of the directory is AutomaticDestinations
We can find this AppID in custom destinations:

Exporting it using FTK Imager and then opening it using JumpList Explorer:

We get it is related to Firefox.exe, which is located in:
C:\Users\Hunter\Desktop\Tor Browser\Browser
