As promised, I have done my best to write up the
process I went through to
successfully identify the file behind the TC volume.
Find it here:
Thanks,
Adam
On Fri, Aug 17, 2012 at 5:55 PM, Tom Yarrish <tom(a)yarrish.com> wrote:
Please let us know when it's up, I'd like to add it to my "notes" for
future reference.
Tom
On Fri, Aug 17, 2012 at 10:06 AM, Adam Bridge <adam.bridge(a)yahoo.com>
wrote:
> Ok, I'm delighted to say that I've solved it!
>
> I was able to work with the list of File objects from handles --pid=4
> and
> really narrow it down to one likely file on a particular device.
> Went and dug that device out of the store and voila, there was the file
> and
> it is indeed a TC volume.
>
> Chuffed to bits. Thanks everyone for your help.
>
> I shall do my best to write it up over the weekend and post it on the
> web
> somewhere.
>
> Thanks again!
>
>
> On Fri, Aug 17, 2012 at 3:45 PM, Jamie Levy <jamie.levy(a)gmail.com>
> wrote:
>>
>> Try this filescan patch and see if it helps:
>>
>>
http://code.google.com/p/volatility/issues/detail?id=325
>>
>>
>>
>> On Fri, Aug 17, 2012 at 8:22 AM, Adam Bridge <adam.bridge(a)yahoo.com>
>> wrote:
>> > Today I've been able to work on the actual case rather than my test
>> > case.
>> > I've mainly been making use of handles and symlinkscan.
>> > Again, my goal is to try and find the "file" which is the TC
volume.
>> >
>> > I've put my rough notes here:
http://bridgey.co.uk/vty-tc.txt.html
>> > If I'm actually successful I shall write them up with a more
>> > tutorial-like
>> > approach.
>> >
>> > I'm pretty much at a point where I'm saying the TC volume is
either
>> > the
>> > entire attached Seagate device or at least a file on that device.
>> > If the latter, I have no idea which file!
>> >
>> > Any comments, suggestions, flames or mother-based insults welcome!
>> >
>> >
>> > On Fri, Aug 17, 2012 at 8:33 AM, Adam Bridge <adam.bridge(a)yahoo.com>
>> > wrote:
>> >>
>> >> Thanks again for all the comments all. I assume people are
>> >> suggesting
>> >> Registry keys such as shellbags and MRUs to look for file from the
>> >> T:?
>> >> That
>> >> might give me some clue as to usage.
>> >> My primary goal here is to identify the file which is the TC volume.
>> >>
>> >> @MHL
>> >> You're absolutely right - the focus should be on
>> >> \Device\TrueCryptVolumeT
>> >> as I really only know bout \Device\HarddiskVolume10 because I
>> >> "cheatingly"
>> >> know the name of the TC volume (MyTrueCryptVolume).
>> >> In my real case, I don't know the name. The problem I've got is
that
>> >> I've
>> >> run into a bit of a dead end with \Device\TrueCryptVolumeT with
>> >> respect
>> >> to
>> >> identifying the file behind it.
>> >>
>> >> Adam
>> >>
>> >>
>> >> On Thu, Aug 16, 2012 at 11:55 PM, Michael Hale Ligh
>> >> <michael.hale(a)gmail.com> wrote:
>> >>>
>> >>> Adam,
>> >>>
>> >>> Shouldn't you be looking for references to
>> >>> \Device\TrueCryptVolumeT\
>> >>> instead of (or at least in addition to)
>> >>> \Device\HarddiskVolume10\MyTrueCryptVolume? The TrueCryptVolumeT
>> >>> location is
>> >>> what's actually mapped at T: as shown by symlinkscan.
>> >>>
>> >>> The fact that MyTrueCryptTextFile.txt doesn't show up in the
>> >>> notepad.exe
>> >>> handles output is normal. Basically what notepad does is opens the
>> >>> file,
>> >>> maps it into memory, displays the contents in the GUI, then closes
>> >>> handle
>> >>> (so as not to needlessly consume handles when they're not
being
>> >>> used).
>> >>> Thus
>> >>> by the time you acquire memory, the handle is already closed. When
>> >>> you
>> >>> modify the text file and click Save, the process re-opens a
handle,
>> >>> flushes
>> >>> the changes, and closes the handle again.
>> >>>
>> >>> If you want to test that, use Process Monitor and set up a filter
>> >>> for
>> >>> notepad.exe. Then open your MyTrueCryptTextFile.txt file and
review
>> >>> the APIs
>> >>> being called. You'll see CreateFile followed by
CreateFileMapping,
>> >>> and
>> >>> finally CloseHandle. This probably varies per application (for
>> >>> example
>> >>> maybe
>> >>> Microsoft Word always retains an open handle to the document being
>> >>> modified).
>> >>>
>> >>> MHL
>> >>>
>> >>> On Thu, Aug 16, 2012 at 5:24 PM, Adam Bridge
>> >>> <adam.bridge(a)yahoo.com>
>> >>> wrote:
>> >>>>
>> >>>> The only references to HarddiskVolume10 in the handles output
are:
>> >>>>
>> >>>> 0xfffffa80021a63c0 4 0x2a1c
0x12019f
>> >>>> File
>> >>>> \Device\HarddiskVolume10\MyTrueCryptVolume
>> >>>> 0xfffffa8003992420 2700 0xba8
0x100081
>> >>>> File
>> >>>> \Device\HarddiskVolume10\
>> >>>> 0xfffffa8004672940 2700 0xd3c
0x100081
>> >>>> File
>> >>>> \Device\HarddiskVolume10\
>> >>>>
>> >>>> PID 4 being SYSTEM and 2700 being explorer. I'm assuming
you only
>> >>>> knew
>> >>>> it was HarddiskVolume10 because of
'MyTrueCryptVolume'?
>> >>>> In my real case, I don't know the name of the T/C volume.
>> >>>>
>> >>>> Great thinking about userassist. In my test case I did indeed
>> >>>> double-click a txt file (MyTrueCryptTextFile.txt) which was
within
>> >>>> the T/C
>> >>>> volume but sadly it doesn't appear in the userassist
output
>> >>>> (entirely
>> >>>> unrelated to this T/C stuff, it's fascinating what does
tho!)
>> >>>> Interestingly,
>> >>>> the txt file also doesn't appear in the handles output -
even
>> >>>> though
>> >>>> it was
>> >>>> open at the time I captured the memory?! (On the test system it
is
>> >>>> in
>> >>>> the
>> >>>> Notepad jump list.)
>> >>>>
>> >>>> Thanks so much for the comments all - I'm learning so much
- it's
>> >>>> awesome!
>> >>>>
>> >>>> On Thu, Aug 16, 2012 at 10:10 PM, Jamie Levy
>> >>>> <jamie.levy(a)gmail.com>
>> >>>> wrote:
>> >>>>>
>> >>>>> Are there any files (from handles output) that are on
>> >>>>> \Device\HarddiskVolume10 ? In your output this is the
location
>> >>>>> of
>> >>>>> the
>> >>>>> TrueCrypt volume.
>> >>>>>
>> >>>>> If they double clicked a document or something from that
volume,
>> >>>>> an
>> >>>>> entry for its LNK file might show up in the UserAssist key,
you
>> >>>>> can
>> >>>>> run the userassist plugin just to see what shows up in
there.
>> >>>>>
>> >>>>>
>> >>>>>
>> >>>>> On Thu, Aug 16, 2012 at 4:28 PM, Adam Bridge
>> >>>>> <adam.bridge(a)yahoo.com>
>> >>>>> wrote:
>> >>>>> > Thanks so much for the email - extremely useful
already.
>> >>>>> > I'm taking notes so that I can do my best at
writing it up at
>> >>>>> > the
>> >>>>> > end.
>> >>>>> >
>> >>>>> > So, with pslist I found one instance of TrueCrypt.exe
which had
>> >>>>> > a
>> >>>>> > PID
>> >>>>> > of
>> >>>>> > 4920.
>> >>>>> >
>> >>>>> > With handles --pid=4920 there was nothing useful - all
very
>> >>>>> > much
>> >>>>> > T/C
>> >>>>> > stuff.
>> >>>>> > So I did handles without the --pid.
>> >>>>> > Now, with my test data I of course know the name of
the T/C
>> >>>>> > volume
>> >>>>> > file and
>> >>>>> > sure enough I could see it:
>> >>>>> >
>> >>>>> > Offset(V) Pid Handle
Access
>> >>>>> > Type
>> >>>>> > Details
>> >>>>> > ------------------ ------ ------------------
------------------
>> >>>>> > ---------------- -------
>> >>>>> > 0xfffffa8002193b30 4 0x269c
0x2a
>> >>>>> > Process
>> >>>>> > TrueCrypt.exe(4920)
>> >>>>> > 0xfffffa80021a63c0 4 0x2a1c
0x12019f
>> >>>>> > File
>> >>>>> > \Device\HarddiskVolume10\MyTrueCryptVolume # Here!
>> >>>>> > 0xfffffa8002193b30 796 0x6c0
0x1fffff
>> >>>>> > Process
>> >>>>> > TrueCrypt.exe(4920)
>> >>>>> > 0xfffffa8002193b30 836 0xc28
0x1478
>> >>>>> > Process
>> >>>>> > TrueCrypt.exe(4920)
>> >>>>> > 0xfffffa8002193b30 1144 0xd4c
0x1478
>> >>>>> > Process
>> >>>>> > TrueCrypt.exe(4920)
>> >>>>> > 0xfffffa8001b4f070 2700 0x1084
0x100081
>> >>>>> > File
>> >>>>> > \Device\TrueCryptVolumeT\
>> >>>>> > 0xfffffa8002c7d1c0 2700 0x1118
0x100081
>> >>>>> > File
>> >>>>> > \Device\TrueCryptVolumeT\
>> >>>>> > 0xfffffa8001e51f20 4920 0x324
0x100080
>> >>>>> > File
>> >>>>> > \Device\TrueCrypt
>> >>>>> > 0xfffffa80038e4680 4920 0x330
0x1f0001
>> >>>>> > Mutant
>> >>>>> > TrueCryptTaskBarIcon
>> >>>>> > 0xfffffa8004d5a8d0 3384 0xc
0x100020
>> >>>>> > File
>> >>>>> > \Device\TrueCryptVolumeT\
>> >>>>> >
>> >>>>> > In my real case I don't know the name of the file
- so I
>> >>>>> > wouldn't
>> >>>>> > know it if
>> >>>>> > I saw it - especially if it had an innocent name like
>> >>>>> > "school_work.doc".
>> >>>>> >
>> >>>>> > I now know my T/C volume is mounted as T:
>> >>>>> > I notice that there are 2 PIDs accessing the T:
>> >>>>> > Look them up in the plist data and they're
explorer and notepad
>> >>>>> > (which is
>> >>>>> > correct, I'd opened a txt file from the T/C
volume).
>> >>>>> >
>> >>>>> > So, pretending I hadn't seen
'MyTrueCryptVolume' I tried
>> >>>>> > symlinks
>> >>>>> > and
>> >>>>> > grep'd
>> >>>>> > for TrueCrypt:
>> >>>>> >
>> >>>>> >
>> >>>>> > Offset(P) #Ptr #Hnd Creation time
From
>> >>>>> > To
>> >>>>> > ------------------ ------ ------
------------------------
>> >>>>> > --------------------
>> >>>>> >
------------------------------------------------------------
>> >>>>> > 0x0000000026b33c80 1 0 2012-08-16 19:12:51
>> >>>>> > Volume{3d...10a7e8a} \Device\TrueCryptVolumeT
>> >>>>> > 0x0000000037f51b10 1 0 2012-08-16 18:14:48
>> >>>>> > TrueCrypt
>> >>>>> > \Device\TrueCrypt
>> >>>>> > 0x0000000052ececb0 1 0 2012-08-16 19:12:51
T:
>> >>>>> > \Device\TrueCryptVolumeT
>> >>>>> > 0x000000006131c9d0 1 0 2012-08-16 19:12:51
T:
>> >>>>> > \Device\TrueCryptVolumeT
>> >>>>> >
>> >>>>> > So, definitely T: then.
>> >>>>> >
>> >>>>> > So I know there's a T/C volume mounted, I know
that it's
>> >>>>> > mounted
>> >>>>> > as
>> >>>>> > the T:
>> >>>>> > and I know that explorer and notepad have both got
handles to
>> >>>>> > it.
>> >>>>> > I've got one last hurdle to clear: how do I find
out the file
>> >>>>> > which
>> >>>>> > is
>> >>>>> > behind \Device\TrueCryptVolumeT?
>> >>>>> >
>> >>>>> > I filtered handles for File objects from
>> >>>>> > \Device\HarddiskVolume*
>> >>>>> > but
>> >>>>> > that
>> >>>>> > left me with ~130 files and without knowing the file
name how
>> >>>>> > would I
>> >>>>> > identify it?
>> >>>>> >
>> >>>>> > Thanks again for all the suggestions so far!
>> >>>>> >
>> >>>>> >
>> >>>>> > On Thu, Aug 16, 2012 at 8:04 PM, Andrew Case
<atcuno(a)gmail.com>
>> >>>>> > wrote:
>> >>>>> >>
>> >>>>> >> Hello,
>> >>>>> >>
>> >>>>> >> So I will assume you are using the latest release
of
>> >>>>> >> Volatility,
>> >>>>> >> which
>> >>>>> >> means the 2.1 command reference will give you
information
>> >>>>> >> about
>> >>>>> >> every
>> >>>>> >> plugin we have:
>> >>>>> >>
>> >>>>> >>
http://code.google.com/p/volatility/wiki/CommandReference21
>> >>>>> >>
>> >>>>> >> The next thing I would do is run the handles
plugin [1] and
>> >>>>> >> look
>> >>>>> >> for
>> >>>>> >> any reference to the open file. You can filter
with the -p
>> >>>>> >> option
>> >>>>> >> to
>> >>>>> >> be only the TrueCrypt process that you found in
pslist, but if
>> >>>>> >> you
>> >>>>> >> do
>> >>>>> >> not see any encrypted container referenced there
then you may
>> >>>>> >> want
>> >>>>> >> to
>> >>>>> >> run it across all processes (the default) because
we have seen
>> >>>>> >> where
>> >>>>> >> files opened by drivers end up in other
processes' handles
>> >>>>> >> (e.g.
>> >>>>> >> SYSTEM).
>> >>>>> >>
>> >>>>> >> I think handles would be more helpful to determine
if any
>> >>>>> >> files
>> >>>>> >> were
>> >>>>> >> opened b/c it will show you exactly what truecrypt
had open
>> >>>>> >> when
>> >>>>> >> the
>> >>>>> >> machine hibernated. With filescan you would have
to already
>> >>>>> >> know
>> >>>>> >> the
>> >>>>> >> name of the encrypted container to see if it was
ever opened.
>> >>>>> >>
>> >>>>> >> Also, MHL suggested using the symlink scan command
[2] as this
>> >>>>> >> will
>> >>>>> >> map drive letters to physical device paths. Here
is some
>> >>>>> >> sample
>> >>>>> >> output
>> >>>>> >> for the command:
>> >>>>> >>
>> >>>>> >> $ python vol.py -f win7x64cmd.dd
--profile=Win7SP1x64
>> >>>>> >> symlinkscan
>> >>>>> >> Volatile Systems Volatility Framework 2.2_alpha
>> >>>>> >> Offset(P) #Ptr #Hnd Creation time
From
>> >>>>> >> To
>> >>>>> >> ------------------ ------ ------
------------------------
>> >>>>> >> --------------------
>> >>>>> >>
------------------------------------------------------------
>> >>>>> >> 0x0000000007331840 1 0 2011-12-30
08:26:15
>> >>>>> >> Global
>> >>>>> >> \Global??
>> >>>>> >> 0x0000000013d6a930 1 0 2012-01-10
18:35:28 Z:
>> >>>>> >>
>> >>>>> >>
\Device\LanmanRedirector\;Z:0...000003b08d\10.1.47.238\setup
>> >>>>> >> 0x0000000023bc0140 1 0 2011-12-30
08:25:30 A:
>> >>>>> >> \Device\Floppy0
>> >>>>> >> 0x000000002ab23430 1 0 2011-12-30
08:25:30 D:
>> >>>>> >> \Device\CdRom0
>> >>>>> >> 0x000000002d3b8c90 1 0 2011-12-30
08:25:26 C:
>> >>>>> >> \Device\HarddiskVolume2
>> >>>>> >>
>> >>>>> >> And you can see, C: is mapped to HarddiskVolume2.
From there
>> >>>>> >> you
>> >>>>> >> can
>> >>>>> >> run handles and filter specifically to files
opened on that
>> >>>>> >> device
>> >>>>> >> like this:
>> >>>>> >>
>> >>>>> >> $ python vol.py -f win7x64cmd.dd
--profile=Win7SP1x64 handles
>> >>>>> >> -t
>> >>>>> >> File
>> >>>>> >> | grep HarddiskVolume2
>> >>>>> >> Volatile Systems Volatility Framework 2.2_alpha
>> >>>>> >> 0xfffffa800248e5a0 4 0x5c
>> >>>>> >> 0x12008b
>> >>>>> >> File
>> >>>>> >>
>> >>>>> >>
\Device\HarddiskVolume2\Windows\System32\wfp\wfpdiag.etl
>> >>>>> >> 0xfffffa800267f300 4 0xa4
>> >>>>> >> 0x13019f
>> >>>>> >> File
>> >>>>> >>
>> >>>>> >>
>> >>>>> >>
>> >>>>> >>
>> >>>>> >>
\Device\clfs\Device\HarddiskVolume2\$Extend\$RmMetadata\$TxfLog\$TxfLog
>> >>>>> >> 0xfffffa800267b540 4 0xa8
>> >>>>> >> 0x12019f
>> >>>>> >> File
>> >>>>> >>
>> >>>>> >>
>> >>>>> >>
>> >>>>> >>
>> >>>>> >>
\Device\clfs\Device\HarddiskVolume2\$Extend\$RmMetadata\$TxfLog\$TxfLog
>> >>>>> >> 0xfffffa8002671350 4 0xac
>> >>>>> >> 0x13019f
>> >>>>> >> File
>> >>>>> >>
>> >>>>> >>
>> >>>>> >>
>> >>>>> >>
>> >>>>> >>
\Device\clfs\Device\HarddiskVolume2\$Extend\$RmMetadata\$TxfLog\$TxfLog
>> >>>>> >> 0xfffffa80026794e0 4 0xb0
>> >>>>> >> 0x12019f
>> >>>>> >> File
>> >>>>> >>
>> >>>>> >>
>> >>>>> >>
>> >>>>> >>
>> >>>>> >>
\Device\HarddiskVolume2\$Extend\$RmMetadata\$TxfLog\$TxfLogContainer00000000000000000002
>> >>>>> >> 0xfffffa8002679c30 4 0xb4
>> >>>>> >> 0x1
>> >>>>> >> File
>> >>>>> >> \Device\HarddiskVolume2
>> >>>>> >>
>> >>>>> >>
>> >>>>> >> If the combination of handles and symlinkscan does
not answer
>> >>>>> >> your
>> >>>>> >> question please write back. Also, it would be
interesting if
>> >>>>> >> you
>> >>>>> >> documented your process through this (assuming you
can), as I
>> >>>>> >> am
>> >>>>> >> sure
>> >>>>> >> many other people will encounter this situation.
>> >>>>> >>
>> >>>>> >>
>> >>>>> >> [1]
>> >>>>> >>
>> >>>>> >>
>> >>>>> >>
http://code.google.com/p/volatility/wiki/CommandReference21#handles
>> >>>>> >> [2]
>> >>>>> >>
>> >>>>> >>
>> >>>>> >>
>> >>>>> >>
http://code.google.com/p/volatility/wiki/CommandReference21#symlinkscan
>> >>>>> >>
>> >>>>> >>
>> >>>>> >>
>> >>>>> >>
>> >>>>> >> ....
>> >>>>> >>
>> >>>>> >> On Thu, Aug 16, 2012 at 8:41 AM, Adam Bridge
>> >>>>> >> <adam.bridge(a)yahoo.com>
>> >>>>> >> wrote:
>> >>>>> >> > Hello All,
>> >>>>> >> >
>> >>>>> >> > I'm new to Volatility but am a reasonably
experienced
>> >>>>> >> > forensic
>> >>>>> >> > examiner.
>> >>>>> >> >
>> >>>>> >> > I'm working on a hiberfil.sys from a
WIN7SP1x64 machine and
>> >>>>> >> > am
>> >>>>> >> > trying to
>> >>>>> >> > determine whether a TrueCrypt volume was
mounted and, for
>> >>>>> >> > bonus
>> >>>>> >> > points,
>> >>>>> >> > the
>> >>>>> >> > path to the TrueCrypt volume file.
>> >>>>> >> >
>> >>>>> >> > I've used devicetree and found:
>> >>>>> >> >
>> >>>>> >> > DRV 0x23ea15de0 \Driver\truecrypt
>> >>>>> >> > ---| DEV 0xfffffa800946f080 TrueCryptVolumeG
>> >>>>> >> > FILE_DEVICE_DISK
>> >>>>> >> > ---| DEV 0xfffffa8007127ac0 TrueCrypt
FILE_DEVICE_UNKNOWN
>> >>>>> >> >
>> >>>>> >> > So a good start.
>> >>>>> >> >
>> >>>>> >> > Question: Does that tell me that there _IS_ a
TrueCrypt
>> >>>>> >> > volume
>> >>>>> >> > mounted
>> >>>>> >> > as
>> >>>>> >> > the G drive or there _WAS_ a TrueCrypt volume
mounted as the
>> >>>>> >> > G
>> >>>>> >> > drive, or
>> >>>>> >> > that there's no way of knowing one way or
the other?
>> >>>>> >> >
>> >>>>> >> > filescan shows two entries for
\TrueCrypt.exe. The only
>> >>>>> >> > difference
>> >>>>> >> > between
>> >>>>> >> > the two (besides a slight difference in #Ptr)
is that one
>> >>>>> >> > has
>> >>>>> >> > access of:
>> >>>>> >> >
>> >>>>> >> > R--rwd
>> >>>>> >> >
>> >>>>> >> > and the other:
>> >>>>> >> >
>> >>>>> >> > R--r-d
>> >>>>> >> >
>> >>>>> >> > What should I be discerning from this? Why
does one have a
>> >>>>> >> > write
>> >>>>> >> > permission
>> >>>>> >> > that the other does not?
>> >>>>> >> >
>> >>>>> >> > And finally, pslist shows me that
TrueCrypt.exe was started
>> >>>>> >> > but
>> >>>>> >> > has no
>> >>>>> >> > exit
>> >>>>> >> > time.
>> >>>>> >> >
>> >>>>> >> > I'm just not really sure where to go
next?
>> >>>>> >> > Can anybody suggest anything?
>> >>>>> >> >
>> >>>>> >> > More than happy for someone to tell me to go
read X! Just
>> >>>>> >> > can't
>> >>>>> >> > find a
>> >>>>> >> > helpful X to read.
>> >>>>> >> >
>> >>>>> >> > Thank you all,
>> >>>>> >> > AB
>> >>>>> >> >
>> >>>>> >> >
_______________________________________________
>> >>>>> >> > Vol-users mailing list
>> >>>>> >> > Vol-users(a)volatilityfoundation.org
>> >>>>> >> >
http://lists.volatilityfoundation.org/mailman/listinfo/vol-users
>> >>>>> >> >
>> >>>>> >
>> >>>>> >
>> >>>>> >
>> >>>>> > _______________________________________________
>> >>>>> > Vol-users mailing list
>> >>>>> > Vol-users(a)volatilityfoundation.org
>> >>>>> >
http://lists.volatilityfoundation.org/mailman/listinfo/vol-users
>> >>>>> >
>> >>>>>
>> >>>>>
>> >>>>>
>> >>>>> --
>> >>>>> PGP Fingerprint: 2E87 17A1 EC10 1E3E 11D3 64C2 196B 2AB5
27A4
>> >>>>> AC92
>> >>>>
>> >>>>
>> >>>>
>> >>>> _______________________________________________
>> >>>> Vol-users mailing list
>> >>>> Vol-users(a)volatilityfoundation.org
>> >>>>
http://lists.volatilityfoundation.org/mailman/listinfo/vol-users
>> >>>>
>> >>>
>> >>
>> >
>> >
>> > _______________________________________________
>> > Vol-users mailing list
>> > Vol-users(a)volatilityfoundation.org
>> >
http://lists.volatilityfoundation.org/mailman/listinfo/vol-users
>> >
>>
>>
>>
>> --
>> PGP Fingerprint: 2E87 17A1 EC10 1E3E 11D3 64C2 196B 2AB5 27A4 AC92
>
>
>
> _______________________________________________
> Vol-users mailing list
> Vol-users(a)volatilityfoundation.org
>
http://lists.volatilityfoundation.org/mailman/listinfo/vol-users
>