2.1 File and registry monitoring

File and registry changes are one of the important events used to identify malware. Some of the file and registry changes done by malware are explained in Chapter 1, Malware from Fun to Profit. Microsoft Sysinternals have provided regmon and filemon for this purpose. Sysinternal has come up with procmon, which can cover registry and file monitoring. You can download the tool from the Sysinternals website. Here is the link: https://docs.microsoft.com/en-us/sysinternals/downloads/procmon.

Procmon showing file activity for the vssvc.exe process

The previous image shows reading (ReadFile), closing (CloseFile), and file writing (WriteFile) activity by the process vssvc.exe. vssvc.exe creates the file C:UsersamohantaFavoritesMicrosoft WebsitesMicrosoft Store.url.readme_txt and then writes to it and after writing, closes it.

Procmon can also monitor process activities such as thread start and exit, network connections, and a lot more. It's important to filter the activities, as a lot of system processes make continuous changes to the files and registry. You can create a filter using the funnel menu in the menu bar. Another way to create a filter is by right-clicking a row on the top of the entry you want to include or exclude:

Excluding QueryInformationVolume

The preceding image shows how to exclude QueryInformationVolume from the results. Microsoft provides detailed documentation about the usage of procmon. Here is the link: https://blogs.technet.microsoft.com/appv/2008/01/24/process-monitor-hands-on-labs-and-examples/.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.141.193.158