BFT
Description
Files
➜ ls
Directory: ~\VBoxShare\BFT\C
Mode LastWriteTime Length Name
---- ------------- ------ ----
----- 07.07.2023 11:48 322437120 $MFTMFT Structure and Function
Advantages of MFT in NTFS
How the MFT Works
MFT in Data Recovery
Tools
Tasks
1. Simon Stark was targeted by attackers on February 13. He downloaded a ZIP file from a link received in an email. What was the name of the ZIP file he downloaded from the link?

Task 2. Examine the Zone Identifier contents for the initially downloaded ZIP file. This field reveals the HostUrl from where the file was downloaded, serving as a valuable Indicator of Compromise (IOC) in our investigation/analysis. What is the full Host URL from where this ZIP file was downloaded?

Task 3. What is the full path and name of the malicious file that executed malicious code and connected to a C2 server?

Task 4. Analyze the $Created0x30 timestamp for the previously identified file. When was this file created on disk?

Task 5. Finding the hex offset of an MFT record is beneficial in many investigative scenarios. Find the hex offset of the stager file from Question 3.


Task 6. Each MFT record is 1024 bytes in size. If a file on disk has smaller size than 1024 bytes, they can be stored directly on MFT File itself. These are called MFT Resident files. During Windows File system Investigation, its crucial to look for any malicious/suspicious files that may be resident in MFT. This way we can find contents of malicious files/scripts. Find the contents of The malicious stager identified in Question3 and answer with the C2 IP and port.

Last updated