CCST 2015 7389685
CCST 2015 7389685
CCST 2015 7389685
Abstract—The rise of malware attack and data leakage is The growing need of digital forensics has sparked heated
putting the Internet at a higher risk. Digital forensic examiners debates about tools, terminology, definitions, standards, and
responsible for cyber security incident need to continually update other aspects. It should come as no surprise that this study
their processes, knowledge and tools due to changing technology. reflects the issue of access original data in the terminology
These attack activities can be investigated by means of Digital debate. Examiners need quick examination or analysis within a
Triage Forensics (DTF) methodologies. DTF is a procedural short period of time. Investigating the entire computer is
model for the crime scene investigation of digital forensic impossible in limited hours [4]. An organization may have lots
applications. It takes place as a way of gathering quick of computer and other digital devices. Lots of information is
intelligence, and presents methods of conducting pre/post-blast
stored on a single computer. There are simply too much
investigations. A DTF framework of Window malware forensic
computers and information. In some circumstances, the
toolkit is further proposed. It is also based on ISO/IEC 27037:
2012 - guidelines for specific activities in the handling of digital
following traditional digital forensics approaches are no longer
evidence. The argument is made for a careful use of digital appropriate [18]: seizing a media, transporting it to the lab,
forensic investigations to improve the overall quality of expert making a forensic image, and searching the entire system for
examiners. This solution may improve the speed and quality of potential evidence.
pre/post-blast investigations. By considering how triage solutions This study is organized as follows. Studies of digital
are being implemented into digital investigations, this study forensics, Digital Triage Forensics (DTF), ISO/IEC
presents a critical analysis of malware forensics. The analysis
27037:2012 and its follow-up ISO/IEC 27043:2015 are
serves as feedback for integrating digital forensic considerations,
and specifies directions for further standardization efforts.
discussed in Section 2. The proposed three stages and periods
in DTF framework, which is based on ISO/IEC 27037:2012,
Keywords—digital forensics; digital triage forensics; ISO/IEC are presented in Section 3 and Section 4. Three periods in DTF
27037; cybercrime; malware, hacker (key words) framework are also analyzed from the viewpoints of people,
process, and technology. The Window malware forensic toolkit
of DTF framework is further discussed and analyzed in Section
I. INTRODUCTION
5. Future research is presented in Section 6. Conclusions are
Malware is short for malicious software, which broadly given in Section 7.
provide unauthorized access or perform unauthorized actions
on a system. Security breaches become a part of life nowadays. II. REVIEWS
As society becomes increasingly digitalized, it also becomes
necessary to optimize the forensic examination process. A. Digital Forensics and DTF
Hackers have often destroyed evidence by modifying logs,
overwriting files, or encrypting incriminating data. Examiners, 1) Digital Forensics
such as system administrators, incident response specialists, Digital forensics is a branch of forensic science to
and forensic laboratory managers, are rarely presented with a encompass the investigation of data in digital devices [14]. It
perfect incident scene. They are called to an incident after a focuses on the recovery and analysis of raw data in electronic
victim has taken steps to remediate an incident [1]. This creates devices. It is a maturing science that needs to be continuously
investigative difficulty and legal challenges to prove the held to higher standards [16]. Digital forensics is separated by
evidence is authentic and reliable. In order to ensure that the dead forensics and live forensics, which identify that the
evidence is admissible in court, examiners should closely system is power-on or power-off at that time. If the system is
follow some rigorous procedures or recommendations. boot then it called live forensics. Dead forensics may lose data
Forensics is intangible by nature. It is essential for digital or information due to shutdown of digital device or removal the
examiners to develop appropriate skills. Forensics is plug [5]. Current attitudes towards the process of digital
heterogeneous and digital forensics is no exception to this. forensic investigations are examined to improve the speed of
Certifications are a good way to develop examiners’ skills. pre/post-blast investigations. Once the initial incident scene
examination is concluded, the media can be transported back to
a lab for a detailed examination.
217
2) Destructive Challenge in Digital Forensics standards are intended to give fundamental principles or
The tests of DNA or fingerprint are destructive. Traditional guidance on the investigation of information security incidents,
forensic disciplines of DNA or fingerprint analysis show that and to ensure that tools, techniques, and methods can be
measure of forensic soundness does not require the original to selected appropriately.
be left unaltered. Despite the changes that occur in data
processing, these methods are considered forensically sound.
DNA evidence is regularly admitted as evidence [6]. Some
practitioners of digital forensics think that a method of
preserving or examining digital evidence is only forensically
sound if it does not alter the original evidence source in any
way [5]. However, preserving everything but change nothing is
almost impossible in malware, cloud or mobile forensics.
Postulating the above unaltered principle as a best practice only
opens digital evidence to criticisms. It is also impossible to
conform to such a principle at the incident scene. The main
reasons are [5, 6, 7]: (1) many cases are handled at the same
period for law enforcement agents; (2) many computers are
found at the incident scene; (3) the time is limited in data
processing; (4) the man-power is limited in forensic lab; (5)
less information can be recorded from the first responder; (6)
inconsistent principles are listed with other forensic disciplines
(i.e., fingerprint process or DNA analysis); (7) some volatile
data will be lost in some circumstances; (8) The backlog of
digital evidence processing is obvious in a legal context.
Fig. 1. Core Processes in ISO/IEC 27037:2012
3) The Gathering Quick Intelligence Need for DTF
As digital forensics is still an immature science, scientific 1) Identification: Essential Logs
processes are integrated into investigations in order to make The identification process involves the recognition of
digital evidence acceptable in court. Digital Triage Forensics digital evidence. It identifies electronic storage devices, which
(DTF) is a procedural model of digital forensic applications for may contain digital evidence in an incident. As far as the
the initial assessment of an incident. DTF determines its digital forensics process is concerned, some elemental sources
severity, prioritizes resources and sets the direction for further of auditing logs (e.g. IP address, date-time stamp, digital
action of crime investigation [15]. By considering how the action, and response message) should be identified.
solution of DTF can be implemented into digital investigations,
this study presents a critical review of gathering quick 2) Collection: Evidence Process
intelligence in the proposed DTF framework. With the rise of The collection process includes documenting the handling
challenges in the forensic investigation field, some problems approach and packaging mobile phones, laptops and other ICT
interesting are looming on the horizon for both victims and devices [12]. The evidence of collecting digital evidence at the
examiners. Digital forensics is the science of recovering digital incident scene is a topic constantly under debate, and no single
evidence from a digital source under forensically sound right answer exists.
conditions using scientifically derived and proven methods [8].
3) Acquisition: Evidence Copy
It is no longer sufficient to collect the non-volatile data of
The acquisition process involves producing a digital
digital evidence when examiners pull the plug and take the
evidence copy (e.g. complete hard disk, partition, or selected
computer back to the lab. Different approaches and tools are
files) and documenting the decision for using a particular
required, depending on the state of the device [11]. The
method, appropriate tool or performed activities. The examinerʳ
appearance of DTF meets this need.
should adopt a suitable acquisition method based on the
situation, cost and time.
B. ISO/IEC 27037:2012 and Its Follow-up ISO/IEC
27043:2015 4) Preservation: Necessary Information
Many digital forensics tools have been designed to resolve The preservation process involves the safeguarding of
the existing challenges of forensic investigation. The purpose digital devices and their evidence. When first responders
of this study is to compare the performance of the popular evaluate the scene, they should [12]: (1) leave all electronic
tools, which follow with the criteria of ISO/IEC 27037:2012 devices off if they are already turned off; (2) ensure no
[9]. It mainly involves the identification, collection, unauthorized person has access to any electronic devices at the
acquisition, and presentation of digital evidence processing scene; (3) secure all electronic devices.
(Fig. 1). The scope of this International Standard relates only to
the core handling process of digital evidence although the III. PROPOSED THREE STAGES IN DTF FRAMEWORK
complete digital evidence handling activities in ISO/IEC Reconstructing an event is a necessary process in forensics
27043:2015 include plan, prepare, respond, identify, collect, investigations [13]. This section shows some ways in advance,
acquire, preserve, understand, report, and close [10]. These at scene and in lab to support or refute that certain actions took
218
place on a computer system. The proposed DTF framework is The identification process is essential in the scope of legal
divided into three stages which are highlighted below (Fig. 2): authority. Some paperwork is necessary to take photos, take
prepare tools in advance, perform investigation at scene, and notes, tag evidence items and document the taken steps at
analyze evidence in lab. scene.
Login User Whoami, net accounts, userdump, net user, net localgroup,
psloggedon, Joa, UserProfilesView /stext
Autorun Autorunsc, net start, WhatInStartup /stext
Table route print -4, route print -6, arp –a
Information
219
2) Analysis: Cross-validated Results in Data Analysis Numerous mistyped commands or unsuccessful login
A third-party forensic tool evolution is needed to facilitate attempts can be signs of SQL injection or brute-force intrusion
malware analysis [7]. The analysis process evaluates potential attempts. These signs can indicate a potential area of concern.
digital evidence and assesses its relevance to the investigation The toolkits in Table I and Table II can be valuable in helping
[10]. The analysis should describe tool version numbers, system administrators conduct ongoing assessments of network
techniques and their results, and the results can be cross- status, and distinguish between normal and abnormal activities
validated by another examiner. Enough information is crucial over a given period.
for another examiner to confirm/dispute the findings.
3) Technology: Security Management
3) Report: Quality Assurance in Legal Issues Sometimes administrators cannot afford to remove the
The report should be written in simple language and should computer from the network, and a traditional forensic
be clear, concise, unambiguous and understandable for a wide duplication cannot be acquired in its place. Immediate attention
audience in its statements [10]. Examiners need to focus on and proper preparation can facilitate smooth execution and
what they can do, why they do it and what they have found. include [12]: (1) establish an information security policy to
They can offer opinions and conclusions in court within their ensure available services; (2) maintain an approach to handle
areas of expertise. an incident; (3) collect the related information to detect
hackers; (4) report an incident to the authority.
IV. PROPOSED THREE PERIODS IN DTF FRAMEWORK
B. Incident Period: Incident Response Specialists Perform
As the cybercrime increases in the modern society, there is Live Forensics for Fact Finding
an urgent need to set up a standard of evidence collection [4].
Live forensics is complementary to dead forensics in the 1) People: Incident Response Specialists
modern era of computing. Live forensics primarily targets the If first responder specialists find it necessary to access the
volatile data which can only be collected from a running original data on a computer or on storage media, they must be
system, and which cannot be extracted from a dead system competent to do so and be able to explain the relevance and the
whose power cord is pulled out [2]. When a computer is implications of their actions [2]. However, every operation may
involved in an incident, there are several choices to proceed modify the computer status and can impede the forensic
during an investigation. Three periods in DTF framework are analysis. Changing the system as little as possible is standard
discussed below (Table III): prelusion, incident, and aftermath practice.
periods. Each period should be performed in order, and be 2) Process: Live Forensics
analyzed from the viewpoints of people, process, and The process of live forensics becomes an important issue in
technology. This section provides a framework for directing a security breach. It is impossible to ignore the volatile data of
and managing a digital forensic job [16]. computer memory in performing digital evidence collection
and acquisition. Live forensics allows recovering and analyzing
A. Prelusion Period: System Administrators Collect Evidence memory content, processes and data without shutting down the
for Security Management system [15, 17]. Live forensics can be considered as the first
Prelusion period includes identifying where the incident step towards an incident response scenario [16]. This live
begins and how system administrators find an incident at the forensic methodology can extract volatile data, system running
very beginning. processes, cached processes, network connections, and opened
ports.
TABLE III. PROPOSED THREE PERIODS IN DTF FRAMEWORK 3) Technology: Fact Finding
If victims have filled complaints to prosecute hackers,
Period Stage People Process Technology
examiners should document all the steps and hash the acquired
Prepare Tools in System Evidence Security data to vouch for the validity of the collected data.
Prelusion
Advance Administrators Collection Management
Perform
Incident Investigation at
Incident Response Live
Fact Finding C. Aftermath Period: Forensic Laboratory Managers
Specialists Forensics Perform Dead Forensics for Forensic Conclusion
Scene
Forensic Aftermath period includes identifying how to recover from
Analyze Dead Forensic
Aftermath Laboratory
Evidence in Lab
Managers
Forensics Conclusion the incident, and how to get back to normal business sooner.
1) People: Forensic Laboratory Managers
1) People: System Administrators If first responders forward all media on to lab without any
System administrators are responsible for the reliable exploitation attempts at scene, and make the forensic laboratory
operation and security maintenance of computer systems. They managers responsible for all processing, it becomes back
seek to ensure the performance of the computers can quickly logged very quickly by the sheer volume of data that must be
recover from a security incident. Administrators often know analyzed. This backlog can be completely erased by
when a program is running exceptionally slow, or when there is implementing the DTF procedures [15].
something odd.
2) Process: Dead Forensics
2) Process: Evidence Collection
220
In dead forensics, it is much easier for examiners to been potentially compromised, the native programs may be
minimize system modification when working with a copy of a modified. When they conduct live forensics it is essential to
write-protected drive. implement trusted toolkits and linked libraries to acquire data
from the examined system. Incident period includes identifying
3) Technology: Forensic Conclusion potential evidence. Hackers often look for known weaknesses
The conclusions of the investigation must be fairly or exploits in the Operating System or any application
supported by the fair and reasonable depiction of what the programs. At the start of any investigation, several questions
overall evidence will show [19]. Each incident response team must be answered by first responders and system
had to evolve the truth from a mass of confused evidence. administrators immediately. Are there any file deletion
Examiners should always offer objective opinions and activities? If so, incident response specialists must pull the
conclusions that are supported by facts, and facts alone. power cable out of the wall. This will freeze the computer and
its network [6, 12]. Let the forensic laboratory managers to
V. DISCUSSIONS AND ANALYSES IN WINDOW MALWARE obtain potential evidence later. The entire scenario usually
FORENSIC TOOLKIT dictates the next steps an examiner takes.
Defending against malware has focused on intrusion 2) Volatile and Non-volatile Data in Malware Forensic
detection, content filtering, detecting and blocking malware, Toolkit
and other reactive technologies. The Window malware forensic This proposed toolkit presents a malware forensic toolkit to
toolkit of DTF framework is discussed and analyzed below [1, capture evidence from computer memory. When the collection
3, 6, 11, 12]. tools are stored on a CD-ROM, the collected information of
volatile and non-volatile data can be recorded in other
A. Characteristics in Malware Forensic Toolkit removable disk. The collected data consists of two main
The analysis of malware forensic toolkit can put some subsets: volatile and non-volatile data. This volatile data would
information all together and analyze the following two lose if examiners were to rely on the traditional analysis
characteristics: class and individual. Class and individual methods of forensic duplications. The volatile data will not be
characteristics can be found in Table I and Table II. present if examiners shut down a computer.
1) Class Characteristics C. Malware Forensic Toolkit in Digital Forensics
Class characteristics help the examiners narrow the pattern
down to specific malware patterns. It is impossible to be 1) Case-oriented Difference
familiar with every kind of malware in all of its various forms As hacker attacks become sophisticated, malware continues
[1]. Better investigative efforts include a comparison of to advance and automate effective attack techniques. The
unknown malware with known samples in their patterns or impact of malware ranges from minor system performance
behaviors. issues to remote control of a system by an attacker. As ICT
devices continue to update, examiners must adopt new
2) Individual Characteristics principles, methods or tools to keep in good status of handling
Individual characteristics may establish the uniqueness of cybercrime issues [11]. This is applicable especially in
an object. When individual characteristics are determined, the malware investigation. It is problematic that the accused can
malware can be identified. With the help of the collected data use this malware defense strategy to camouflage his/her
on the target computer, the examiners are able to determine if a crimes. Every case may differ from each other. The collected
sample of malicious code or code pattern is consistent with the evidences may vary in their time, relationship or function.
unknown sample found at the scene. When the modification of digital data is unavoidable, the
procedure and the changes must be documented [19].
B. Command Line Interface in Malware Forensic Toolkit Examiners can use video, photography, notes or sketches to
Examiners need to continually perform digital evidence help convey or reconstruct the details of the scene later [12].
analysis using various tools. Digital forensic tools generally fall 2) Put Data All Together
into one of two categories: Command Line Interface (CLI) and Volatile or non-volatile data are often putted together in a
Graphical User Interface (GUI). A GUI is a human-computer batch file to get a picture of what happened after examiners
interface that uses windows, icons and menus by a mouse. On sincerely parse the stored data, analyze the relevant
the other hand, a CLI uses only text by a keyboard. To have a information, and interpret their relationship. Those data can
simple and easy way in collecting batch information, this study provide certain action indications which were performed by
presents a malware forensic toolkit in CLI tools (Table I and malware or a user. Mutual comparison among different
Table II). Some tools use ‘/stext’ parameter to export the evidential sources becomes an essential part to support or
retrieved data to a text file. Multi-operations can be performed refute a malware defense.
much faster than in GUI tools.
3) Need for Malware Forensic Toolkit
1) Implement Trusted Toolkit A malware forensic toolkit is essential to collect
If hackers have broken in and achieved administrator rights, information from the Windows system for volatile and non-
examiners must prepare some trusted tools to quickly analyze volatile data (Table I and Table II). That toolkit can [3]: (1)
the compromised machine. Examiners should never trust the acquire memory contents for forensic analysis; (2) parse data
compromised computer. Because the examined system has from the physical memory; (3) reduce data size; (4) look into
221
the large volumes of data for analysis; (5) monitor the running Technology of the Republic of China under the Grants MOST
program. 103-2221-E-015-003-.
222