Defence Evasion Assessment
Description: Forensically investigating defence evasion involves understanding and identifying attackers' methods to avoid detection and bypass security measures on workstations and server systems. Defence evasion is a critical tactic in the MITRE ATT&CK framework, and it includes techniques like disabling security software, deleting logs, obfuscation, rootkits, privilege escalation, and more.
1. Understanding Defence Evasion Techniques
- Disabling Security Software: Check for evidence of disabled or tampered antivirus, firewalls, or other security tools. 
- Log Tampering: Look for signs of altered or deleted logs. 
- Obfuscation and Encoding: Identify the use of obfuscation in scripts and commands to evade detection. 
- Rootkits: Search for evidence of rootkits that hide malicious activity. 
- File Deletion and Hiding: Investigate techniques to hide or delete files. 
- Privilege Escalation: Ascertain if the elevation of privileges was part of the evasion strategy. 
2. Data Collection and Preservation
- Forensic Imaging: Create complete images of affected systems using tools like FTK Imager or dd. 
- Memory Capture: Use tools like WinPmem or Magnet RAM Capture for memory imaging. 
- Log Collection: Gather all relevant logs, including security, system, and application logs. 
3. Investigation of Security Software Tampering
- Antivirus and EDR Logs: Check the logs of antivirus or EDR solutions for signs of deactivation or bypass. 
- Firewall Configuration: Review firewall settings for unauthorised changes. 
- Windows Defender: Look for changes in Windows Defender settings, especially using PowerShell commands or Group Policy modifications. 
4. Log Analysis
- Event Logs: Examine Windows Event Logs for evidence of cleared logs (Event ID 1102 for Windows security log clearance). 
- SIEM Systems: If a SIEM system is in use, analyse it for gaps or inconsistencies in log data. 
- Security Log Review: Examine logs for signs of clearing or tampering (e.g., Windows Event ID 1102 indicates security log clearance). 
- Audit Log Settings: Verify if audit settings were altered to evade detection. 
- File Access Logs: Check logs for access to sensitive files or logs by unauthorised users or processes. 
5. Investigating Obfuscation Techniques
· Script Analysis: Examine any found scripts for obfuscation techniques like base64 encoding, concatenation, or use of uncommon scripting languages. · Command-Line Analysis: Review command-line history for obfuscated or encoded commands.
6. Rootkit Detection
- Rootkit Scanners: Utilize rootkit detection tools like GMER or Rootkit Revealer. 
- Memory Analysis: Analyse system memory for signs of kernel-level rootkits. 
7. Analysis of File and Directory Changes
- File Integrity Monitoring Tools: Review reports from file integrity monitoring solutions. 
- Recycle Bin Analysis: Check the Recycle Bin for recently deleted files. 
- Alternate Data Streams: Search for hidden data in NTFS Alternate Data Streams. 
8. Network Traffic Analysis
- Network Monitoring Tools: Use tools like Wireshark or Tcpdump to analyse network traffic for signs of data exfiltration or C2 communication. 
- DNS Query Logs: Review DNS logs for unusual or repeated queries, which could indicate covert channels. 
9. Use of Specialised Forensic Tools
- Forensic Suites: Tools like EnCase, AXIOM Cyber, Binalyze-Air or Autopsy for comprehensive system analysis. 
- Sysinternals Suite: Tools like Process Explorer, Autoruns, and TCPView for detailed system analysis. 
10. Documentation and Reporting
- Detailed Documentation: Keep a detailed record of all findings, tools used, and methods applied. 
- Forensic Report: Prepare a comprehensive report detailing the evasion techniques identified and their impact. 
11. Post-Investigation Actions
- Remediation and Mitigation: Implement security measures to counter the identified evasion techniques. 
- Recovery: Restore systems from clean backups if necessary. 
- Security Posture Enhancement: Update security policies and tools based on findings. 
12. Tools and Techniques
- Digital Forensics: - Specialised tools for evidence collection and analysis: - OpenText EnCase Forensics (commercial tool) 
- FTK (Forensic Toolkit) 
- Volatility (memory forensics) 
- Autopsy (open-source) 
- Cyber Triage (commercial tool) 
- Binalyze AIR (commercial tool) 
- Belkasoft (commercial tool) 
- Oxygen Forensics (commercial tool) 
- X-ways Forensics (commercial tool) 
- The Sleuth Kit (open-source tool) 
- Eric Zimmerman Tools (open-source tool) 
 
- Techniques include timeline analysis, file recovery, and reverse engineering. 
 
- Incident Response: - Tools for monitoring, containment, and eradication: - SIEM (Splunk, QRadar, Microsoft Sentinel, Sumo Logic, Graylog, Elastic Security, LogRhythm, Datadog, Exabeam) 
- EDR (CrowdStrike, SentinelOne, Defender for Endpoint, Cortex XDR, FortiEDR) 
- Firewalls and IDS/IPS systems 
 
- Techniques include log analysis, threat containment, and system restoration. 
 
13. Key Considerations
- Chain of Custody: Maintain an accurate chain of custody for all evidence. 
- Legal and Compliance: Ensure compliance with legal and organisational guidelines during the investigation. 
- Confidentiality and Integrity: Maintain confidentiality and integrity of data throughout the investigation process. 
Each case of defence evasion can be unique, requiring a tailored approach depending on the specifics of the incident and the environment.
Last updated