These plugins were developed as a result of this article posted to Medium by Zach, aka, "svch0st". The article is fascinating, in that Zach found that there're Registry keys that appear to track the applications that access the microphone and webcam on a Windows system. In addition, there are values that specify the last start and stop times for the applications using those devices. Zach then takes the article a step further by illustrating what it looks like when a RAT is used to access and record audio from the mic.
Running the consentstore.pl plugin against a hive extracted from one of my own systems, I can see the following:
microphone
C:#Users#harlan#AppData#Roaming#Zoom#bin#Zoom.exe
LastWrite time 2020-05-05 23:06:16Z
LastUsedTimeStart 2020-05-05 23:00:52Z
LastUsedTimeStop 2020-05-05 23:06:16Z
webcam
C:#Users#harlan#AppData#Roaming#Zoom#bin#Zoom.exe
LastWrite time 2020-05-05 23:05:24Z
LastUsedTimeStart 2020-05-05 23:01:30Z
LastUsedTimeStop 2020-05-05 23:05:24Z
As you can see from the above information, the key LastWrite times correspond to the final time stamp, or the "LastUsedTimeStop".
The consentstore_tln.pl plugin outputs the same information in the 5-field TLN format, illustrated
1588719652|REG|||ConsentStore microphone "C:\Users\harlan\AppData\Roaming\Zoom\bin\Zoom.exe" LastUsedTimeStart
1588719976|REG|||ConsentStore microphone "C:\Users\harlan\AppData\Roaming\Zoom\bin\Zoom.exe" LastUsedTimeStop
1588719690|REG|||ConsentStore webcam "C:\Users\harlan\AppData\Roaming\Zoom\bin\Zoom.exe" LastUsedTimeStart
1588719924|REG|||ConsentStore webcam "C:\Users\harlan\AppData\Roaming\Zoom\bin\Zoom.exe" LastUsedTimeStop
Because the full name of the key is included in the timeline output, albeit with the "#" translated to back slashes, searches run across the timeline looking for pivot points (such as AppCompatCache or AmCache entries, user profile paths, etc.) will result in positive 'hits'. For example, in Zach's article, the RAT used to access the microphone was found in the path "dev\shell.exe". If an analyst found an entry for "dev\shell.exe" in the AppCompatCache or AmCache data, and then using that as a pivot point found something similar to the above, the analyst would not only have the insight that the file was on the system, but also what it had been used for. As such, this also serves to extend the "program execution" artifact category a bit, because know we not only know that the file was executed, but we now also have insight into what it was used for, or what it did.
In addition, this information provides us with some very useful artifacts, particularly when viewed as part of an overall artifact constellation. For example, this provides a view into "humanness", or indications of human interaction with the system. I most instances when engaging with applications such as Zoom, the user has an option to use the mic and webcam on the local system, and has to click a button/make a choice to do so.
Further, as this is a "new" location of sorts, it is not yet covered/addressed by counter-forensics techniques. From the above information retrieved from the Software hive, we can see that Zoom was launched from the user's profile path, and the dates and times that it ran, providing insight into user activity in the face of counter-forensics activities, even the entire user profile being deleted.
So, thanks to Zach for sharing the information, and providing the opportunity for me to view this information and create these two plugins. Keep up the great work, Zach, and I'm going to keep watching to see what further topics you tackle.
AppCompatFlags
Not a new plugin, but I updated the appcompatflags.pl plugin based on the content provided by Christopher at TrustedSec, which looks like the AppCompatFlags key is another useful persistence location.
4 comments:
Thanks for sharing this.
Do you have source code of the plugins - consentstore_tln consentstore, consentstore_tln and appcompatflags.pl? Where can I download it?
For appcompatflags.pl, if you downloaded the RR repo, you have it. Otherwise:
https://github.com/keydet89/RegRipper3.0/blob/master/plugins/appcompatflags.pl
For the consentstore* plugins, this blog post was published in June; as there seemed to be no interest in the plugins, I removed them from the repo in order to reduce confusion.
Thanks!
Thanks for quick response.
I monitored the ConsentStore registry path on my office machine. There is no key create/update activity when I start the voice call using Skype/Teams etc.
Any idea what could be the reason? Maybe my organization somehow disabled it?
Any idea what could be the reason?
Sorry, no...I don't have enough information to work with. For example, I don't which version/build of Windows you're using.
Post a Comment