Parsia's Den

Because no one wants to be the other guy from Wham!

Aug 1, 2015 - 8 minute read - Comments - Traffic

Network Traffic Attribution on Windows

Thick client assessments come in different flavors. Most of our work is on consumer applications where consumer means either the customer or an employee of our client. But these applications usually have network communications.

When looking at thick client applications from a network traffic perspective, we face two big challenges:

  1. Traffic Attribution or Where does this traffic come from?: How to we identify application’s traffic? The operating system (in this case Windows) is running many applications and services. Each of them may have network connectivity.

  2. Proxying Traffic or How do I look view/modify traffic?: This is more challenging and involves capturing, modifying and in a lot of cases decrypting/decoding target application’s traffic. This could be as easy as setting up Burp via an application setting (EZ-mode) or as hard as setting up your own access point to capture a device’s traffic then developing your own decryption plugin for your proxy tool (good luck).

In this post, I will be talking about the much easier first challenge. I will be talking about some of the tools and techniques that I use to accomplish this. This is not a groundbreaking post ;). We will use a simple application, in this case notepad++.

1. Our Setup

I am using Windows 7 VM running via VirtualBox. You can probably use anything newer than Windows XP. You can get VMs from Microsoft at [][modern-ie]. These VMs have 90 day activation periods and are for testing different versions of IE but they are enough for our purpose. One downside is the huge virtual disk drive (110GB) that can be shrinked (from inside Windows) in half. Hard drive is still dynamically located but if you do not watch out, it wills tart filling up your hard drive (especially if you are making snapshots).

2. List of Tools

  1. Microsoft Network Monitor (Netmon):
  2. Wireshark:
  3. Process Monitor (Procmon): Part of Microsoft Sysinternals Suite:

3. Test Application

I will be using Notepad++ it was the current version at the time of writing but by the time I got to publishing this post it has been updated to version 6.8. You can download it from Install Notepad++ but make sure to select Auto Updater and Plugin Manager during installation. Do not run the application at the end of the installation process.

4. Traffic Attribution

Run Netmon, Wireshark and Procmon (as Administrator) then run Notepad++.

Procmon Note: Never select Drop Filtered Events in the Filter menu. It will discard all events that are not shown by your filters. There is no going back to viewing filtered events.

4.1 Netmon

We can see a bunch of traffic in Netmon. See this handy tree view to the left? That is why we are using it ;).

Click on notepad++.exe in the tree view to view all of its traffic. We can see that it is communicating with and over HTTP gasp. You may observe a different endpoint depending on your location (because Source forge).

Notepad++ traffic in Netmon Notepad++ traffic in Netmon

There’s another suspicious process up there. Select gup.exe and we can see it is also related to Notepad++ as it’s creating a TLS connection to

gup.exe traffic in Netmon gup.exe traffic in Netmon

But wait, there’s more. There may be traffic that is not correctly attributed due to the way that Netmon identifies traffic. We may be able to find some extra stuff there.
Here’s a Catch-22, there may be traffic related to our application that Netmon wasn’t able to correlate back to the process but how can we identify it if we do not know the endpoints. We will be using Procmon to compile a more comprehensive endpoint collection later.

4.1.1 How to search in Netmon?

Contains is a filter that allows us to do case-insensitive searchs for strings. For example we can use this filter to search for packets with destinations containing the string sourceforge. We can use the following filters (they both do the same thing):

  • Contains(property.Destination, "sourceforge")
  • Destination.Contains("sourceforge")

Be sure to select All Traffic in the tree-view when applying filters search in all traffic.

Contains(property.Destination, 'sourceforge') Contains(property.Destination, 'sourceforge')

We can search in different columns, one of the most common columns is property.description. Description is a column with a lot of information and is usually our best bet. For example if we want to see all GET request we can use the following filters (again they both do the same thing):

  • Contains(property.Description,"GET")
  • Description.Contains("GET")
Contains(property.Description,'GET') Contains(property.Description,'GET')

We can also see Windows checking for certificate revocation lists over HTTP zomg.

To search for binary data use ContainsBin. For example to search for the CRLF binary string in frame data use this filter:

  • ContainsBin(FrameData, HEX, "0D 0A")
ContainsBin(FrameData, HEX, '0D 0A') ContainsBin(FrameData, HEX, '0D 0A')

We can also search for strings using ContainsBin by using ASCII. But remember this search is case-sensitive. To replicate our previous search for sourceforge we can use the following filter:

  • ContainsBin(FrameData, ASCII, "sourceforge")

4.2 Procmon

Procmon does not display traffic but it’s a great tool to identify enpoints. Stop the Procmon capture. It is time to add Procmon filters.

I am in the process of writing a longer blog entry about using Procmon but that is for another day. For now we will discuss some filters related to network endpoint discovery.

Procmon has a lot of filters but we will be using only a few of them. The first filter is ProcessName. Using this filter we can see only events belonging to specific process(es). Select Filter from the Filter menu or press Ctrl+L. Now create this filter ProcessName is Notepad++.exe. Note that Procmon will show you all processes with events in the drop down menu.

Creating a filter Creating a filter

And we can see all events for notepad++.exe in Procmon. Take a note of ProcessID (PID) for notepad++.exe. In this case PID is 3964.

ProcessName is notepad++.exe ProcessName is notepad++.exe

But we want to look at spawned processes too. Let’s remove this filter and find all child processes for notepad++.exe using another filter. The new filter is Parent PID is 3964and it will show captured events for gup.exe.

ProcessName is Parent PID is 3964 ProcessName is Parent PID is 3964

Doubleclick on the first line (Process Start) to view command line parameters and other details for gup.exe. Note that the gup.exe application was ran with parameter -v6.792 (version of Notepad++). So theoretically we can pretend that we are any version. It would be nice to look at this request and play with it.

ProcessName is gup.exe and ProcessStart ProcessName is gup.exe and ProcessStart

An alternate way to get the same results is to use these two filter:

  • ProcessName is notepad++.exe
  • Operation is Process Create

If we want to make sure that we have identified all processes, we have to go one level deeper and check if gup.exe spawned any other processes.

We have two options:

  1. ProcessName is gup.exe and Operation is Process Create
  2. Parent PID is 3992 (pid of gup.exe)

But as expected both filters return nothing. gup.exe did not spawn anything.

Now we can add both notepad++.exe and gup.exe as filters to view all events related to our application in Procmon.

In order to watch network traffic we can use the handy Operation is TCP Send filter. Note there are other operations (i.e. UDP ones). TCP Connect will also work if you just want endpoints and less noise.

We use the following filters:

  1. ProcessName is notepad++.exe
  2. ProcessName is gup.exe
  3. Operation is TCP Send
  4. Operation is TCP Connect
Operation is TCP Connect and TCP Send Operation is TCP Connect and TCP Send

We have already seen but is new.

If we ping it, we can see that the corresponding IP address is We can filter the results in Netmon by using this filter IPv4.Address == to view traffic related to his IP address.

IPv4.Address == IPv4.Address ==

It is Try pinging to get

That was easy wasn’t it?

What did we do? We used Netmon and Procmon to identify the endpoints that an specific application communicates with and isolate traffic belonging to that application. I told you this is nothing ground breaking :).


But what about Microsoft Message Analyzer (MMA)?

It is a good tool. But I do not like its UI but I saw an interesting feature in it to decrypt SSL traffic. I will be looking at that feature soon. It is also much more resource intensive than Netmon.

For more information:

But I want to use Wireshark

Sure, go ahead. Use Procmon and filters to identify the endpoints and then add filters in Wireshark. Another good thing is that Netmon’s export format (*.cap files) can be opened in Wireshark. If you prefer Wireshark’s UI, you can isolate traffic by process in Netmon, save it and then open the resulting cap file in Wireshark.

Where are DNS requests? I do not see them in process traffic in Netmon

Select all traffic and use the filter DNS. Due to the way Netmon associates traffic with processes, DNS requests may be in Unknown or System.


Note that while we had a DNS query for, we never connected to it so we did not see a TCP Connect event for it in Procmon.

5. Exercise:

Run the tools again and install a plugin. This can be accomplished by going to Plugins > Plugin Manager > Show Plugin Manager. Try to locate the endpoints and traffic in this case. See what process is spawned by notepad++.exe this time.

This time, it will not be as easy as last time because Netmon did not associate all packets with the process but you can find the endpoints via Procmon and filter them in Netmon.

I hope this was useful. If you have any questions, you know where to find me.