Forensic Analysis of Anti-Forensic Activities
Common Information
Type Value
UUID c71a4151-8503-478d-8f50-868e43ce6649
Fingerprint 3618993b5aa00e40
Analysis status DONE
Considered CTI value 0
Text language
Published Sept. 28, 2016, 6:18 p.m.
Added to db Jan. 18, 2023, 7:48 p.m.
Last updated Nov. 18, 2024, 1:38 a.m.
Headline DFIR and Threat Hunting
Title Forensic Analysis of Anti-Forensic Activities
Detected Hints/Tags/Attributes 36/1/11
Attributes
Details Type #Events CTI Value
Details File 1
qggya123.exe
Details File 306
services.exe
Details File 1
add.exe
Details File 2127
cmd.exe
Details File 1018
rundll32.exe
Details File 1
sioctl.sys
Details IPv4 1
112.101.64.179
Details IPv4 1
112.101.64.219
Details IPv4 1
112.101.64.209
Details Pdb 1
c:\\add\\add\\sys\\objchk_win7_x86\\i386\\sioctl.pdb
Details Yara rule 1
rule add {
	strings:
		$a = "p_remoteIP = 0x"
		$b = "p_localIP = 0x"
		$c = "p_addrInfo = 0x"
		$d = "InetAddr = 0x"
		$e = "size of endpoint = 0x"
		$f = "FILE pointer = 0x"
		$g = " /tcpCon "
		$h = "Bytes allocated for fake Proc = "
		$i = "EPROC pool pointer = 0x"
		$j = "qggya123.exe"
		$k = "add.exe" wide
		$l = "c:\\add\\add\\sys\\objchk_win7_x86\\i386\\sioctl.pdb"
		$m = "sioctl.sys"
		$n = "\\private"
	condition:
		any of them
}