In this post, we will be going over the Stuxnet virus using Volatility.

Pre-Start

A reoccurring piece of information that is needed for this investigation is the image profile. This is done by using the imageinfo command.

Image Info

The suggested profile is WinXPSP2x86.

Part I - Services/Processes

First section is the most basic. Using the psscan and pstree commands we can find the active running processes on the machine.

Process Scan

In this process tree, the red outlined processes seem to be normal (winlogon.exe is the parent of the red lsass.exe). The purple outlined processes are the suspicious ones. The lsass.exe copies in purple have the parent of the services.exe. Process Tree

Looking at these processes the only thing that sticks out is the multiple instances of the lsass.exe. After some research, lsass.exe is the Local Security Authority Subsystem Service. This service is a core service and its only parent should be either winlogon.exe or in Vista and later, it is created by the wininit.exe.$^{[1]}$

The Local Security Authority(LSA) is a protected subsystem that maintains the information about all aspects of local security on a system (collectively known as the local security policy and provides various services for translation between names and identifiers.)

This diagram contains the inner workings of the Local Security Authority Subsystem Service. This could be dated after XP but this is generally how it works. LSA

So we have identified that two suspicious processes through pstree. Both are children of PID 668.

  1. lsass.exe : PID: 868
  2. lsass.exe : PID: 1928

Part II - Process Hashes

Most detected viruses are detected through hash matches, using VirusTotal we can check the hash of a given process and figure out if it is malicious.

To dump the processes and take a look into the hashes we can use the procdump command.

Process Dump

Then we can check the sha256 hashes using sha256sum.

sha256sum

Now we can take a look at these two processes hashes on VirusTotal and see if they are malicious.

VirusTotal: 868

VirusTotal: 1928

References

1 Mark Russinovich: Analyzing the Stuxnet Virus with Sysinternals Tools (Part 1)
2 Mark Russinovich: Analyzing the Stuxnet Virus with Sysinternals Tools (Part 2)
3 Mark Russinovich: Analyzing the Stuxnet Virus with Sysinternals Tools (Part 3)
4 MNIN Security Blog - Coding, Reversing, Exploiting (Stuxnet’s Footprint in Memory with Volatility 2.0)
5 Local Security Authority Subsystem Service - Wikipedia