Mobile Forensics
Mobile Forensics
Mobile Forensics
  • Introduction
  • Preparations
    • Knowledge
    • Safety
    • Trust
    • Backup
  • Methodology
  • Checking Windows Computers
    • Review Programs Launching at Startup
    • Review Running Processes
    • Review Network Connections
    • Extract Data for Further Analysis
  • Checking Mac Computers
    • Review Programs Launching at Startup
    • Review Running Processes
    • Review Kernel Extensions
    • Review Network Connections
    • Review XProtect Logs
    • Extract Data for Further Analysis
  • Checking Smartphones
    • Note: curriculum
    • Smartphone System Architecture
    • Check Devices Linked to Chat Applications
    • Check for Suspicious Messages
    • Monitor Network Traffic
    • Note: Monitoring Network Traffic on Linux
  • Checking Android Devices Basic
    • Review Installed Applications
    • Check Storage
    • Check if the Phone is under Android Device Policy
    • Check if the Phone is Rooted
    • Check if Developer Options is Enabled
    • Analyze Applications
    • Extract Data for Further Analysis
    • Optional : Check for Indicators of Stalkerware Installation
  • Checking Android Devices Advanced
    • Wireshark
    • MVT
    • Other Tools
  • Checking iOS Devices
    • Review iCloud Accounts
    • Review Installed Applications
    • Check for Mobile Device Management Profiles
    • Check for Shortcuts
    • Check for Jailbreaks
    • Enable and Check App Privacy Report
    • Extract Data for Further Analysis
    • Analyzing Extracted Data
    • About Lockdown Mode
  • Checking Devices Remotely
    • Mac Computers
    • Android
  • Concluding a Forensic Gathering
  • References and Further Learning
  • License and Credits
Powered by GitBook
On this page
  • Process Explorer
  • 1. Verify image signatures
  • 2. Look for Scripts
  • 3. Look for running DLLs
  • 4. Look for processes of applications that should be visible
  • Optional: 5. Looking up programs on VirusTotal
  • CrowdInspect
  • Check for any process injections
  1. Checking Windows Computers

Review Running Processes

PreviousReview Programs Launching at StartupNextReview Network Connections

Last updated 4 months ago

A computer infected with spyware should have some malicious processes running at all times, monitoring the system and collecting data to be transmitted to the of the attackers. Therefore, another required step in triaging a suspected Windows computer is to extract the list of running processes and find if any of them display suspicious characteristics.

There are a couple of tools available in order to do this.

Warning: more sophisticated spyware might be capable of evading this tool by either hiding its own entries from the tree, or by perhaps terminating immediately if they observe any of these tools being launched. In this guide we provide some initial methodology and suggestions to perform an initial assessment. A clean process list is not necessarily a guarantee of a clean system.

Before proceeding with this check, it is advisable that you close all visible running applications, in order to reduce the outputs of the tools you will run to the bare minimum.

Process Explorer

is another tool from the by Microsoft, and it lists all the processes running on the system in a tree:

1. Verify image signatures

2. Look for Scripts

Attackers these days often make use of Microsoft Windows scripting capabilities, such as PowerShell and Windows Script Host, because of their flexibility and even ability to evade detection. These scripting engines are commonly used by enterprise customers to automate configurations of internal systems. It is less common to see consumer applications use them, therefore any related processes running should be further inspected.

These processes normally would be called powershell.exe or wscript.exe.

Following is an example of Process Explorer displaying an obviously malicious PowerShell script running on the system:

Hovering with the cursor over the process name shows the command-line arguments where we can clearly see the script is attempting to download and execute some additional code. Notice also the use of variating lower and upper case, such as "doWnLoAdfile": this is a very basic trick attackers use to evade equally basic detection patterns by security software.

3. Look for running DLLs

Look out for any of those processes running, and try to determine what DLL file they are executing. For example, in the screenshot below, we can see an infected Windows system running a malicious DLL file located under C:\Users\<Username>\AppData\ using regsvr32.exe.

4. Look for processes of applications that should be visible

For exampe, if you see a running iexplore.exe process, when there is obviously no open Internet Explorer window, you should consider this a worrying sign.

Optional: 5. Looking up programs on VirusTotal

CrowdInspect

Check for any process injections

CrowdInspect will alert you of any injected processes by displaying a visible red dot under the "Inject" column. Injected processes are generally a very good indicator that there might be an active infection on the tested computer.

The methodology to check for suspicious running processes is somewhat similar to what we described in the section.

Similarly to Autoruns, Process Explorer also allows to verify signatures of applications running by clicking Options and enabling "Verify Image Signatures". The same considerations and warnings we described in the apply here too. Even more so with running processes, the fact that a process application is signed does not necessarily mean it is safe. Malware often makes use of techniques such as or in order to execute code from inside the context of a legitimate and signed application in order to thwart detection.

Malware sometimes also comes in the form of a which, opposite to a standalone application (in other words, a .exe file), needs to be launched by a loader. Windows provides a few programs to launch DLLs, commonly regsvr32.exe and rundll32.exe, which are signed by Microsoft.

Among the many techniques often used by attackers there is, for example, . Process Hollowing consists in launching a legitimate application (such as Internet Explorer or Google Chrome), emptying its memory and replacing it with malicious code, which will then be executed. This is normally done to hide the malicious code, make it appear as a legitimate application (which would then only be an empty shell), evade applications firewall and perhaps evade some other security products.

Similarly to section, Process Explorer also offers to look-up running processes on VirusTotal by searching the cryptographic hash of the respective executable files. This can be enabled by clicking Options > VirusTotal.com and enabling Check VirusTotal.com.

Please note: the same considerations and warnings explained in the apply here too. Make sure to read them before proceeding.

is a tool produced by the American security company CrowdStrike. CrowdInspect is very similar to Process Explorer, but it has some advantages. Firstly, the information presented tends to be more compact. Secondly, it does not only show currently live processes, but it also can show processes that have terminated since it launch (that you might have perhaps missed because they executed too quickly). Lastly, it performs a number more checks that Process Explorer currently does not support.

Probably the most interesting feature CrowdInspect introduces, is the ability to identify any . Process injection is a category of techniques whose objective is run malicious code within the context of a separate, generally legitimate, application (such as explorer.exe). Process injection is often used by malware authors in order to obtain additional privileges on the system or, for example, to evade detection.

Review Programs Launching at Startup
previous section
Process Hollowing
DLL Sideloading
Dynamic Link Library (DLL)
Process Hollowing
Autoruns
previous section
CrowdInspect
injected processes
Command & Control server
Process Explorer
Sysinternals Suite
A screenshot of the Sysinternals Process Explorer. It diplays a list of processes. Some are not highlighted at all, whereas others are highlighted in red, with their sub-processes highlighted in cyan blue, dark grey, light purple, or not lighted at all. The explorer also shows how much CPU each process utilizes, how many private bytes it has, its working set, PID, description, company name, and VirusTotal score.
Another screenshot of Process Explorer. Somebody opened the Options menu and is selecting the Verify Image Signatures menu item therein.
A screenshot of Process Explorer. It is displaying a tooltip over powershell.exe and its sub-process conhost.exe. The tooltip displays obfuscated PowerShell code, along with a URL that has been blanked out by its author.
A screenshot of Process Explorer. It is displaying a tooltip over regsvr32.exe. The tooltip displays a shell command to load a DLL.
A screenshot of Process Explorer. A process that is called explore.exe and which has the Internet Explorer logo is selected.
Another screenshot of Process Explorer. Somebody opened the Options menu, floated over the VirusTotal.com submenu, and is selecting the 'Check VirusTotal.com' menu item.
A screenshot of CrowdInspect. It has several options highlighted, including TCP, UDP, Localhost, System, and Full Path. It displays a host of data about processes, including their names, PIDs, types of network connections, local and remote IP addresses.
A screenshot of CrowdInspect, with a process called iexplore.exe selected, which has a red dot in the column marked Inject.