Defence Evasion Assessment

Description: Forensically investigating defence evasion involves understanding and identifying attackers' methods to avoid detection and bypass security measures on workstations and server systems. Defence evasion is a critical tactic in the MITRE ATT&CK framework, and it includes techniques like disabling security software, deleting logs, obfuscation, rootkits, privilege escalation, and more.

1. Understanding Defence Evasion Techniques

  • Disabling Security Software: Check for evidence of disabled or tampered antivirus, firewalls, or other security tools.

  • Log Tampering: Look for signs of altered or deleted logs.

  • Obfuscation and Encoding: Identify the use of obfuscation in scripts and commands to evade detection.

  • Rootkits: Search for evidence of rootkits that hide malicious activity.

  • File Deletion and Hiding: Investigate techniques to hide or delete files.

  • Privilege Escalation: Ascertain if the elevation of privileges was part of the evasion strategy.

2. Data Collection and Preservation

  • Forensic Imaging: Create complete images of affected systems using tools like FTK Imager or dd.

  • Memory Capture: Use tools like WinPmem or Magnet RAM Capture for memory imaging.

  • Log Collection: Gather all relevant logs, including security, system, and application logs.

3. Investigation of Security Software Tampering

  • Antivirus and EDR Logs: Check the logs of antivirus or EDR solutions for signs of deactivation or bypass.

  • Firewall Configuration: Review firewall settings for unauthorised changes.

  • Windows Defender: Look for changes in Windows Defender settings, especially using PowerShell commands or Group Policy modifications.

4. Log Analysis

  • Event Logs: Examine Windows Event Logs for evidence of cleared logs (Event ID 1102 for Windows security log clearance).

  • SIEM Systems: If a SIEM system is in use, analyse it for gaps or inconsistencies in log data.

  • Security Log Review: Examine logs for signs of clearing or tampering (e.g., Windows Event ID 1102 indicates security log clearance).

  • Audit Log Settings: Verify if audit settings were altered to evade detection.

  • File Access Logs: Check logs for access to sensitive files or logs by unauthorised users or processes.

5. Investigating Obfuscation Techniques

· Script Analysis: Examine any found scripts for obfuscation techniques like base64 encoding, concatenation, or use of uncommon scripting languages. · Command-Line Analysis: Review command-line history for obfuscated or encoded commands.

6. Rootkit Detection

  • Rootkit Scanners: Utilize rootkit detection tools like GMER or Rootkit Revealer.

  • Memory Analysis: Analyse system memory for signs of kernel-level rootkits.

7. Analysis of File and Directory Changes

  • File Integrity Monitoring Tools: Review reports from file integrity monitoring solutions.

  • Recycle Bin Analysis: Check the Recycle Bin for recently deleted files.

  • Alternate Data Streams: Search for hidden data in NTFS Alternate Data Streams.

8. Network Traffic Analysis

  • Network Monitoring Tools: Use tools like Wireshark or Tcpdump to analyse network traffic for signs of data exfiltration or C2 communication.

  • DNS Query Logs: Review DNS logs for unusual or repeated queries, which could indicate covert channels.

9. Use of Specialised Forensic Tools

  • Forensic Suites: Tools like EnCase, AXIOM Cyber, Binalyze-Air or Autopsy for comprehensive system analysis.

  • Sysinternals Suite: Tools like Process Explorer, Autoruns, and TCPView for detailed system analysis.

10. Documentation and Reporting

  • Detailed Documentation: Keep a detailed record of all findings, tools used, and methods applied.

  • Forensic Report: Prepare a comprehensive report detailing the evasion techniques identified and their impact.

11. Post-Investigation Actions

  • Remediation and Mitigation: Implement security measures to counter the identified evasion techniques.

  • Recovery: Restore systems from clean backups if necessary.

  • Security Posture Enhancement: Update security policies and tools based on findings.

12. Tools and Techniques

  • Digital Forensics:

    • Specialised tools for evidence collection and analysis:

      • OpenText EnCase Forensics (commercial tool)

      • FTK (Forensic Toolkit)

      • Volatility (memory forensics)

      • Autopsy (open-source)

      • Cyber Triage (commercial tool)

      • Binalyze AIR (commercial tool)

      • Belkasoft (commercial tool)

      • Oxygen Forensics (commercial tool)

      • X-ways Forensics (commercial tool)

      • The Sleuth Kit (open-source tool)

      • Eric Zimmerman Tools (open-source tool)

    • Techniques include timeline analysis, file recovery, and reverse engineering.

  • Incident Response:

    • Tools for monitoring, containment, and eradication:

      • SIEM (Splunk, QRadar, Microsoft Sentinel, Sumo Logic, Graylog, Elastic Security, LogRhythm, Datadog, Exabeam)

      • EDR (CrowdStrike, SentinelOne, Defender for Endpoint, Cortex XDR, FortiEDR)

      • Firewalls and IDS/IPS systems

    • Techniques include log analysis, threat containment, and system restoration.

13. Key Considerations

  • Chain of Custody: Maintain an accurate chain of custody for all evidence.

  • Legal and Compliance: Ensure compliance with legal and organisational guidelines during the investigation.

  • Confidentiality and Integrity: Maintain confidentiality and integrity of data throughout the investigation process.

Each case of defence evasion can be unique, requiring a tailored approach depending on the specifics of the incident and the environment.

Last updated