Investigating reconnaissance techniques
As you'll remember, one of the main goals of threat actors is to encrypt as many hosts as possible, so they need to collect information about the network they got into. They may just scan it to obtain information about remote hosts, or use various Active Directory reconnaissance tools, such as AdFind or ADRecon.
Network scanning
Through the analysis of SRUM artifacts, we already collected information about an executable named netscan.exe
. Based on this information, we may already suspect that this file was used by ransomware affiliates for network scanning.
First, we need to understand where it is located. We already have $MFT parsed, so let's start from it. MFT analysis allows you to understand better which artifacts may be useful for further investigation and look at the attack from a filesystem perspective.
Now we can see that netscan.exe...