Module 4 - Sysinternals
Module 4 - Sysinternals
Sysinternals Suite
▪ Sysinternals
▪ PeStudio
▪ Windows Registry
https://download.sysinternals.com/files/SysinternalsSuite.zip
• Applications – The user can see them; these can be OS applications such as Word or
PowerPoint or third-party applications that we downloaded.
• Background processes – Applications that are not displayed to the user. Instead, such
as system services, antivirus, etc.
• OS processes – Applications that exist for the purpose of keeping the system running
smoothly.
• A tool for managing processes in the OS that displays all currently running processes,
whether displayed to the user or in the background.
• Go to the main folder of Sysinternals and search for the following files:
Top Menu
• File – running processes, exporting processes to text files, restarting.
• Options – activating the tool upon system activation, checking passwords, virus total, etc.
• View – displaying system processes, setting system refresh period, and adding fields to the main
window.
● Process – stopping a single process or process tree, restarting, suspending, preferences, internet
searching.
● Users – displaying the user: connecting to the station, sending a message, disconnecting the user.
Top Menu
• File – running processes, exporting processes to text files, restarting.
• Options – activating the tool upon system activation, checking passwords, virus total, etc.
• View – displaying system processes, setting system refresh period, and adding fields to the main
window.
Main Menu
● All system processes are displayed here
● Next to each running process you can see its icon, process identifier, description,
signature of the company that created the running application, and details about the
use of system resources.
• For example:
• Windows Title, User Name.
• Open the main Sysinternals folder and search for the following files:
• Click on procmon and run the tool. The following window should pop up:
• The upper menu – system filters, data export, and opening recording files
• In the Process tab, information will be displayed regarding the actual event:
• Full path of the application
• Version
• How it is running
• Which modules loaded it
• Run time
• Identifier
• Go to the main Sysinternals folder and search for the following files:
• Click on TCPVIEW, run the tool, after which the following window will open:
• The upper menu – system filters, data exports, and recording files.
• It displays the applications that start automatically with the OS and are organized
according to category.
• It enables you to open the registry to find the relevant value that was created and
allows you to display the application that it is connected to.
• Go to the main Sysinternals folder and search for the files related to autoruns. Click
on Autoruns, run the tool, you will se the following window will open.
• It allows you to investigate the malware without running it and to receive large
amounts of information to determine whether the file is malicious.
• This tool does not require installation. It can be downloaded from the following link:
https://www.winitor.com/features
• Activation
• Open the folder that appeared and activate the highlighted file.
• After activation, a gray window will open, onto which you can drag any file you
wish to investigate.
• The first bytes on the hexadecimal base, which can reveal the file type.
• When a value begins with 4D 5A, you can conclude it is an executable file (exe) intended
for a Windows OS.
• The Strings tab displays information regarding readable strings that are present in
the file.
• The Version tab displays information regarding the file’s type, language, name,
description, and version.
• The Windows Registry is a hierarchical database containing all the configurations and settings used by
components, services, applications, and almost everything in Windows.
• The registry has two basic concepts to be aware of: Keys and Values.
• Root-level keys - The exciting thing that most people do not know is that three of the five items on the
root level are not actually located there. They are links to items further down in one of the other keys.
• Task Scheduler is a built-in utility in Windows that allows users to schedule and automate certain tasks,
such as running programs or scripts, at specified times or in response to certain events.
• It can be used to schedule tasks to run automatically, even when the user is not logged on to the
computer.
• This can be useful for tasks such as running backups, sending emails, or performing other maintenance
tasks.
• An attacker may use the task scheduler to establish persistence on a compromised system by creating a scheduled
task that runs a malicious payload or script on a regular basis.
• This allows the attacker to maintain access to the system even if their initial methods of entry are discovered and
removed.
• There are several ways an attacker can use the task scheduler to establish persistence on a
compromised system:
• Creating a scheduled task: An attacker can create a new scheduled task that runs a malicious payload
or script on a regular basis. This can be done using the "schtasks" command-line utility or the Task
Scheduler GUI.
• Modifying an existing task: An attacker can also modify a scheduled task to run a malicious payload or
script. This can be done by modifying the command or script associated with the task.