layout | permalink |
---|---|
default |
/windows-artifacts |
In the simplest terms, this key tracks files that have been opened or saved within a Windows shell dialog box. This happens to be a big data set, not only including web browsers like Internet Explorer and Firefox, but also a majority of commonly used applications.
- XP NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSaveMRU
- Win7/8/10 NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePIDlMRU
- The “*” key – This subkey tracks the most recent files of any extension input in an OpenSave dialog
- .??? (Three letter extension) – This subkey stores file info from the OpenSave dialog by specific extension
The e-mail industry estimates that 80% of e-mail data is stored via attachments. Email standards only allow text. Attachments must be encoded with MIME/ base64 format.
- XP %USERPROFILE%\Local Settings\ApplicationData\Microsoft\Outlook
- Win7/8/10 %USERPROFILE%\AppData\Local\Microsoft\Outlook
MS Outlook data files found in these locations include OST and PST files. One should also check the OLK and Content.Outlook folder, which might roam depending on the specific version of Outlook used. For more information on where to find the OLK folder this link has a handy chart: http://www.hancockcomputertech.com/blog/2010/01/06/find-the-microsoft-outlook-temporary-olk-folder
- Skype history keeps a log of chat sessions and les transferred from one machine to another
- This is turned on by default in Skype installations
- XP C:\Documents and Settings<username>\Application\Skype<skype-name>
- Win7/8/10 C:%USERPROFILE%\AppData\Roaming\Skype<skype-name>
Each entry will have a date/time value and a Skype username associated with the action.
Not directly related to “File Download”. Details stored for each local user account. Records number of times visited (frequency).
- IE8-9 %USERPROFILE%\AppData\Roaming\Microsoft\Windows\IEDownloadHistory\index.dat
- IE10-11 %USERPROFILE%\AppData\Local\Microsoft\Windows\WebCache\WebCacheV*.dat
- v3-25 %userprofile%\AppData\Roaming\Mozilla\Firefox\Profiles<random text>.default\downloads.sqlite
- v26+ %userprofile%\AppData\Roaming\Mozilla\Firefox\Profiles<random text>.default\places.sqlite Table:moz_annos
- Win7/8/10 %USERPROFILE%\AppData\Local\Google\Chrome\UserData\Default\History
Many sites in history will list the les that were opened from remote sites and downloaded to the local system. History will record the access to the le on the website that was accessed via a link.
Firefox and IE has a built-in download manager application which keeps a history of every file downloaded by the user. This browser artifact can provide excellent information about what sites a user has been visiting and what kinds of files they have been downloading from them.
- XP %userprofile%\Application Data\Mozilla\Firefox\Profiles<random text>.default\downloads.sqlite
- Win7/8/10 %userprofile%\AppData\Roaming\Mozilla\Firefox\Profiles<random text>.default\downloads.sqlite
- IE8-9 %USERPROFILE%\AppData\Roaming\Microsoft\Windows\IEDownloadHistory\
- IE10-11 %USERPROFILE%\AppData\Local\Microsoft\Windows\WebCache\WebCacheV*.dat
Downloads will include:
- Filename, Size, and Type
- File Save Location
- Download from and Referring Page
- Application Used to Open File
- Download Start and EndTimes
Starting with XP SP2 when files are downloaded from the “Internet Zone” via a browser to a NTFS volume, an alternate data stream is added to the file. The alternate data stream is named “Zone.Identifier.”
Files with an ADS Zone.Identifier and contains ZoneID=3 were downloaded from the Internet
- URLZONE_TRUSTED = ZoneID = 2
- URLZONE_INTERNET = ZoneID = 3
- URLZONE_UNTRUSTED = ZoneID = 4
GUI-based programs launched from the desktop are tracked in the launcher on a Windows System.
NTUSER.DAT HIVE
NTUSER.DAT\Software\Microsoft\Windows\Currentversion\Explorer\UserAssist{GUID}\Count
All values are ROT-13 Encoded
-
GUID for XP
- 75048700 Active Desktop
-
GUID for Win7/8/10
- CEBFF5CD Executable File Execution
- F4E57C4B Shortcut File Execution
-
Program Locations for Win7 Userassist
- ProgramFilesX64 6D809377-...
- ProgramFilesX86 7C5A40EF-...
- System 1AC14E77-...
- SystemX86 D65231B0-...
- Desktop B4BFCC3A-...
- Documents FDD39AD0-...
- Downloads 374DE290-...
- UserProfiles 0762D272-...
Tracks the specific executable used by an application to open the files documented in the OpenSaveMRU key. In addition, each value also tracks the directory location for the last file that was accessed by that application.
Example:
Notepad.exe was last run using the C:%USERPROFILE%\Desktop folder
- XP NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedMRU
- Win7/8/10 NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
Tracks the application executables used to open files in OpenSaveMRU and the last file path used.
Whenever someone does a Start -> Run command,it will log the entry for the command they executed.
NTUSER.DAT HIVE
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU
The order in which the commands are executed is listed in the RunMRU list value. The letters represent the order in which the commands were executed.
- Windows Application Compatibility Database is used by Windows to identify possible application compatibility challenges with executables.
- Tracks the executables file name, file size, last modified time, and in Windows XP the last update time
- XP SYSTEM\CurrentControlSet\Control\SessionManager\AppCompatibility
- Win7/8/10 SYSTEM\CurrentControlSet\Control\Session Manager\AppCompatCache
Any executable run on the Windows system could be found in this key. You can use this key to identify systems that specific malware was executed on.
In addition, based on the interpretation of the time-based data you might be able to determine the last time of execution or activity on the system.
- Windows XP contains at most 96 entries
- LastUpdateTime is updated when the les are executed
- Windows 7 contains at most 1024 entries
- LastUpdateTime does not exist on Win7 systems
- The Windows 7 task bar (Jump List) is engineered to allow users to “jump” or access items they have frequently or recently used quickly and easily. This functionality cannot only include recent media files; it must also include recent tasks.
- The data stored in the Automatic Destinations folder will each have a unique file prepended with the AppID of the associated application.
- Win7/8/10 C:%USERPROFILE%\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations
- First time of execution of application.
- Creation Time = First time item added to the AppID file.
- Last time of execution of application w/ file open.
- Modification Time = Last time item added to the AppID file.
- List of Jump List IDs -> <http://www.forensicswiki.org/wiki/List_of_ Jump_List_IDs>
Increases performance of a system by pre-loading code pages of commonly used applications. Cache Manager monitors all files and directories referenced for each application or process and maps them into a .pf file. Utilized to know an application was executed on a system.
- Limited to 128 files on XP and Win7
- Limited to 1024 files on Win8
- (exename)-(hash).pf
- WinXP/7/8/10 C:\Windows\Prefetch
- Each .pf will include last time of execution, number of times run, and device and file handles used by the program
- Date/Time file by that name and path was first executed
- Creation Date of .pf file (-10 seconds)
- Date/Time file by that name and path was last executed
- Embedded last execution time of .pf file
- Last modification date of .pf file (-10 seconds)
- Win8+ will contain last 8 times of execution
ProgramDataUpdater (a task associated with the Application Experience Service) uses the registry file RecentFilecache.bcf to store data during process creation
- Win7/8/10 C:\Windows\AppCompat\Programs\Amcache.hve (Windows 7/8/8.1)
- Win7 C:\Windows\AppCompat\Programs\RecentFilecache.bcf
- RecentFileCache.bcf – Executable PATH and FILENAME and the program is probably new to the system
- The program executed on the system since the last ProgramDataUpdated task has been run
- Amcache.hve – Keys = Amcache.hve\Root\File{Volume GUID}#######
- Entry for every executable run, full path information, File’s $StandardInfo Last Modification Time, and Disk volume the executable was run from
- First Run Time = Last Modi cation Time of Key
- SHA1 hash of executable also contained in the key
In the simplest terms,this key tracks files that have been opened or saved within a Windows shell dialog box.This happens to be a big data set, not only including web browsers like Internet Explorer and Firefox, but also a majority of commonly used applications.
- XP: NTUSER.DAT\Software\Microsoft\Windows\CurrentWindows\Explorer\ComDlg32\OpenSaveMRU
- Win7/8/10: NTUSER.DAT\Software\Microsoft\Windows\CurrentWindows\Explorer\ComDlg32\OpenSavePIDlMRU
- the "*" key - This subkey tracks the most recent files of any extension input in an OpenSave dialog
- .??? (Three letter extension) – This subkey stores file info from the OpenSave dialog by speci c extension
Tracks the specific executable used by an application to open the files documented in the OpenSaveMRU key. In addition, each value also tracks the directory location for the last file that was accessed by that application.
Example
Notepad.exe was last run using the C:\Users\Rob\Desktop folder
- XP NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedMRU
- Win7/8/10 NTUSER.DAT\Software\Microsoft\ Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
Tracks the application executables used to open files in OpenSaveMRU and the last file path used.
Registry Key that will track the last les and folders opened and is used to populate data in “Recent” menus of the Start menu. Location: NTUSER.DAT NTUSER.DAT\Software\Microsoft\Windows\ CurrentVersion\Explorer\RecentDocs Interpretation: • RecentDocs – Overall key will track the overall order of the last 150 les or folders opened. MRU list will keep track of the temporal order in which each le/ folder was opened.The last entry and modi cation time of this key will be the time and location the last le of a speci c extension was opened. • .??? – This subkey stores the last les with a speci c extension that were opened. MRU list will keep track of the temporal order in which each le was opened. The last entry and modi cation time of this key will be the time and location of the last le of a speci c extension was opened. • Folder – This subkey stores the last folders that were opened. MRU list will keep track of the temporal order in which each folder was opened. The last entry and modi cation time of this key will be the time and location of the last folder opened.
Office Recent Files
Description:
MS Of ce programs will track their own Recent Files list to make it easier for users
to remember the last le they were editing.
Location:
NTUSER.DAT\Software\Microsoft\ O ice\VERSION
• 14.0 = Of ce 2010 • 12.0 = Of ce 2007 • 11.0 = Of ce 2003
• 10.0 = Of ce XP
NTUSER.DAT\Software\Microsoft\ O ice\VERSION\UserMRU\LiveID_####
FileMRU
• 15.0 = Of ce 365
Interpretation:
Similar to the Recent Files, this will track the last les that were opened by each MS Of ce application. The last entry
added, per the MRU, will be the time the last le was opened by a speci c MS Of ce application.
Shell Bags
Description:
•Which folders were accessed on the local machine, the network,
and/or removable devices. Evidence of previously existing folders after deletion/overwrite.
When certain folders were accessed.
Location:
Explorer Access
• USRCLASS.DAT\Local Settings\ Software\Microsoft\Windows\ Shell\Bags
• USRCLASS.DAT\Local Settings\ Software\Microsoft\Windows
Shell\BagMRU
Desktop Access
• NTUSER.DAT\Software\ Microsoft\Windows\Shell
BagMRU
• NTUSER.DAT\Software\ Microsoft\Windows\Shell\Bags
Interpretation:
Stores information about which folders were most recently browsed
by the user.
Shortcut (LNK) Files Description: • Shortcut Files automatically created byWindows - Recent Items
- Opening local and remote data les and documents will generate a shortcut le (.lnk)
Location:
XP
• C:%USERPROFILE%\Recent Win7/8/10
• C:%USERPROFILE%\AppData\Roaming\Microsoft\Windows\ Recent
• C:%USERPROFILE%\AppData\Roaming\Microsoft\O ice\ Recent
Note these are primary locations of LNK les.They can also be found in other locations. Interpretation: • Date/Time le of that name was rst opened - Creation Date of Shortcut (LNK) File • Date/Time le of that name was last opened - Last Modi cation Date of Shor tcut (LNK) File • LNKTarget File (Internal LNK File Information) Data:
- Modi ed, Access, and Creation times of the target le -Volume Information (Name,Type,Serial Number) - Network Share information Original Location - Name of System
Jump Lists
Description:
•TheWindows 7 task bar (Jump List) is engineered to allow users to “jump” or
access items have frequently or recently used quickly and easily. This functionality cannot only include recent media les; it
must also include recent tasks.
• The data stored in the AutomaticDestinations folder will each
have a unique le prepended with the AppID of the association application and
embedded with LNK les in each stream.
Location:
Win7/8/10
C:%USERPROFILE%\AppData\Roaming\ Microsoft\Windows\Recent
AutomaticDestinations
Interpretation:
• Using the Structured Storage Viewer, open up one of the AutomaticDestination jumplist les.
• Each one of these les is a separate LNK le. They are also stored numerically in order from the earliest one (usually 1) to
the most recent (largest integer value).
Prefetch Description: • Increases performance of a system by pre-loading code pages of commonly used applications. Cache Manager monitors all les and directories referenced for each application or process and maps them into a .pf le. Utilized to know an application was executed on a system. • Limited to 128 les on XP and Win7 • Limited to 1024 les on Win8 • (exename)-(hash).pf Location: WinXP/7/8/10 C:\Windows\Prefetch Interpretation: • Can examine each .pf le to look for le handles recently used • Can examine each .pf le to look for device handles recently used
Index.dat le:// Description: •A little known fact about the IE History is that the information stored in the history les is not just related to Internet browsing. The history also records, local, removable, and remote (via network shares) le access giving us an excellent means for determining which les and applications were accessed on the system, day by day. Location: Internet Explorer: • IE6-7 %USERPROFILE%\Local Settings\ History\ History.IE5 • IE8-9 %USERPROFILE%\AppData\Local\ Microsoft\Windows\History\ History.IE5 • IE10-11 %USERPROFILE%\AppData\Local\ Microsoft\Windows\WebCache\ WebCacheV*.dat Interpretation: • Stored in index.dat as: le:///C:/directory/ lename.ext • Does not mean le was opened in browser
Description: You can search for a wide range of information through the search assistant on a Windows XP machine. The search assistant will remember a user's search terms for filename, computers, or words that are inside a file. This is an example of where you can find the "Search History" on the Windows system
Location
NTUSER.DAT HIVE
NTUSER.DAT\Software\Microsoft\Search Assistant\ACMru####
• Search the Internet – ####=5001 • All or part of a document name – ####=5603 • A word or phrase in a le – ####=5604 • Printers, Computers and People – ####=5647
Description: Keywords searched for from the START menu bar on a Windows 7 machine. Location: Win7/8/10 NTUSER.DAT Hive NTUSER.DAT\Software\Microsoft\ Windows\CurrentVersion\ Explorer\WordWheelQuery Interpretation: Keywords are added in Unicode and listed in temporal order in an MRUlist
Description
Tracks the speci c executable used by an application to open the les documented
in the OpenSaveMRU key. In addition, each value also tracks the directory location for the last le that was accessed by that application.
Location:
XP
NTUSER.DAT\Software\Microsoft\ Windows\CurrentVersion\Explorer\ ComDlg32\LastVisitedMRU
Win7/8/10
NTUSER.DAT\Software\Microsoft\ Windows\CurrentVersion\Explorer
ComDlg32\LastVisitedPidlMRU
Interpretation:
Tracks the application executables used to open les in OpenSaveMRU and the last le
path used.
Description: Hidden le in directory where pictures on Windows XP machine exist. Catalogs all the pictures and stores a copy of the thumbnail even if the pictures were deleted. Location: Each directory where pictures resided that were viewed in thumbnail mode. Many cameras also will auto-generate a thumbs. db le when you view the pictures on the camera itself. Interpretation: Include: • Thumbnail Picture of Original • Last Modi cation Time • Original Filename
Description: On Vista/Win7 versions of Windows, thumbs.db does not exist. The data now sit under a single directory for each user of the machine located in their application data directory under their home directory. Location: C:%USERPROFILE%\AppData\Local\Microsoft\ Windows\Explorer Interpretation: • These are created when a user switches a folder to thumbnail mode or views pictures via a slide show. As it were, our thumbs are now stored in separate database les. Vista/Win7 has 4 sizes for thumbnails and the les in the cache folder re ect this:
- 32 -> small - 96 -> medium
- 256 -> large - 1024 -> extra large • The thumbscache will store the thumbnail copy of the picture based on the thumbnail size in the content of the equivalent database le.
Description: The recycle bin is a very important location on a Windows le system to understand. It can help you when accomplishing a forensic investigation, as every le that is deleted from a Windows recycle bin aware program is generally rst put in the recycle bin. Location: Hidden System Folder Windows XP • C:\RECYCLER” 2000/NT/XP/2003 • Subfolder is created with user’s SID • Hidden le in directory called “INFO2” • INFO2 Contains Deleted Time and Original Filename • Filename in both ASCII and UNICODE Interpretation: • SID can be mapped to user via Registry Analysis • Maps le name to the actual name and path it was deleted from
Description: The recycle bin is a very important location on a Windows le system to understand. It can help you when accomplishing a forensic investigation, as every le that is deleted from a Windows recycle bin aware program is generally rst put in the recycle bin. Location: Hidden System Folder Win7/8/10 • C:$Recycle.bin • Deleted Time and Original Filename contained in separate les for each deleted recovery le Interpretation: • SID can be mapped to user via Registry Analysis • Win7/8/10
- Files Preceded by $I###### les contain • Original PATH and name • Deletion Date/Time
- Files Preceded by $R###### les contain • Recovery Data
Description:
A little-known fact about the IE History is that the information stored in the history les is not just related
to Internet browsing. The history also records local and remote (via network shares) le access, giving us
an excellent means for determining which les and applications were accessed on the system, day by day.
Location:
Internet Explorer:
IE6-7 %USERPROFILE%\LocalSettings
History\History.IE5
IE8-9 %USERPROFILE%\AppData\Local\Microsoft\ WindowsHistory\History.IE5
IE10-11 %USERPROFILE%\AppData\Local\Microsoft\ Windows\WebCache\WebCacheV*.dat
Interpretation:
• Stored in index.dat as:
le:///C:/directory/ lename.ext
• Does not mean le was opened in browser
Description: Identi es the current system time zone. Location: SYSTEM Hive SYSTEM\CurrentControlSet\Control\ TimeZoneInformation Interpretation: • Time activity is incredibly useful for correlation of activity • Internal log les and date/timestamps will be based on the system time zone information •You might have other network devices and you will need to correlate information to the time zone information collected here.
Description: • Identify networks that the computer has been connected to • Networks could be wireless or wired • Identify domain name/intranet name • Identify SSID • Identify Gateway MAC Address Location: Win7/8/10 SOFT WARE HIVE • SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Signatures\Unmanaged • SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Signatures\Managed • SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Nla\Cache
Interpretation: • Identifying intranets and networks that a computer has connected to is incredibly important • Not only can you determine the intranet name, you can determine the last time the network was connected to based on the last write time of the key
•This will also list any networks that have been connected to via aVPN • MAC Address of SSID for Gateway could be physically triangulated
Description
Cookies give insight into what websites have been visited and what activities may have taken place there.
Location:
Internet Explorer
• IE6-8 %USERPROFILE%\AppData\Roaming\Microsoft\Windows\Cookies
• IE10 %USERPROFILE%\AppData\Roaming\Microsoft\Windows\Cookies • IE11 %USERPROFILE%\AppData\Local\Microsoft\Windows
INetCookies
Firefox
• XP %USERPROFILE%\Application Data\Mozilla\Firefox
Pro les<random text>.default\cookies.sqlite
• Win7/8/10 %USERPROFILE%\AppData\Roaming\Mozilla\Firefox\ Pro les<randomtext>.default\cookies.sqlite
Chrome
• XP %USERPROFILE%\Local Settings\ApplicationData\Google
Chrome\User Data\Default\Local Storage
• Win7/8/10 %USERPROFILE%\AppData\Local\Google\Chrome\User Data\Default\Local Storage
Description:
Records websites visited by date and time. Details stored for each local user account. Records number of times visited
(frequency). Also tracks access of local system les. This will also include the website history of search terms in search engines.
Location:
Internet Explorer
• IE6-7 %USERPROFILE%\Local Settings\History\History.IE5
• IE8-9 %USERPROFILE%\AppData\Local\Microsoft\Windows\ History\History.IE5
• IE10-11 %USERPROFILE%\AppData\Local\Microsoft\Windows\ WebCache\WebCacheV*.dat
Firefox
• XP %userpro le%\Application Data\Mozilla\Firefox
Pro les<randomtext>.default\places.sqlite
• Win7/8/10 %userpro le%\AppData\Roaming\Mozilla\Firefox\ Pro les<randomtext>.default\places.sqlite
Description: Track USB devices plugged into a machine. Location: • SYSTEM\CurrentControlSet\Enum\USBSTOR • SYSTEM\CurrentControlSet\Enum\USB Interpretation: • Identify vendor, product, and version of a USB device plugged into a machine • Identify a unique USB device plugged into the machine • Determine the time a device was plugged into the machine • Devices that do not have a unique serial number will have an “&” in the second character of the serial number.
Description: Determine temporal usage of speci c USB devices connected to a Windows Machine. Location: First Time • Plug and Play Log Files XP C:\Windows\setupapi.log Win7/8/10 C:\Windows\inf\setupapi.dev.log Interpretation: • Search for Device Serial Number • Log File times are set to local time zone Location: First, Last, and Removal Times (Win7/8/10 Only) System Hive \CurrentControlSet\Enum\USBSTOR\Ven_ Prod_Version\USB iSerial #\Properties{83da6326-97a6-4088-9453- a1923f573b29}#### 0064 = First Install (Win7/8) 0066 = Last Connected (Win8 only) 0067 = Last Removal (Win 8 only)
Description: Find User that used the Unique USB Device. Location: • Look for GUID from SYSTEM\MountedDevices • NTUSER.DAT\Software\Microsoft\ Windows\CurrentVersion\Explorer\ MountPoints2 Interpretation: This GUID will be used next to identify the user that plugged in the device. The last write time of this key also corresponds to the last time the device was plugged into the machine by that user. The number will be referenced in the user’s personal mountpoints key in the NTUSER.DAT Hive.
Description: Discover theVolume Serial Number of the Filesystem Partition on the USB (NOTE: This is not the USB Unique Serial Number, that is hardcoded into the device rmware.) Location: • SOFTWARE\Microsoft\WindowsNT\CurrentVersion\ ENDMgmt • Use Volume Name and USB Unique Serial Number to nd • Last integer number in line • Convert Decimal Serial Number into Hex Serial Number Interpretation: • Knowing both the Volume Serial Number and the Volume Name you can correlate the data across SHORTCUT File (LNK) analysis and the RECENTDOCs key. •The Shortcut File (LNK) contains theVolume Serial Number and Name • RecentDocs Registry Key, in most cases, will contain the volume name when the USB device is opened via Explorer
Description: Discover the last drive letter of the USB Device when it was plugged into the machine. Location: XP • Find ParentIdPre x
- SYSTEM\CurrentControlSet\Enum\USBSTOR • Using ParentIdPre x Discover Last Mount Point - SYSTEM\MountedDevices Win7/8/10 • SOFTWARE\Microsoft\Windows Portable Devices\Devices • SYSTEM\MountedDevices
- Examine Drive Letter’s looking at Value Data Looking for Serial Number Interpretation: Identify the USB device that was last mapped to a speci c drive letter. This technique will only work for the last drive mapped. It does not contain historical records of every drive letter mapped to a removable drive.
Description: Shortcut les automatically created byWindows • Recent Items • Open local and remote data les and documents will generate a shor tcut le (.lnk) Location: XP • %USERPROFILE%\Recent Win7/8/10 •%USERPROFILE%\AppData\Roaming\Microsoft\Windows\Recent • %USERPROFILE%\AppData\Roaming\Microsoft\O ice\Recent Interpretation: • Date/Time le of that name was rst opened - Creation Date of Shortcut (LNK) File • Date/Time le of that name was last opened
- Last Modi cation Date of Shortcut (LNK) File • LNKTarget File (Internal LNK File Information) Data:
- Modi ed, Access, and Creation times of the target le
- Volume Information (Name,Type, Serial Number) - Network Share information
- Original Location - Name of System
Description: When a Plug and Play driver install is attempted, the service will log an ID 20001 event and provide a Status within the event. It is important to note that this event will trigger for any Plug and Play-capable device, including but not limited to USB, Firewire, and PCMCIA devices. Location: System Log File Win7/8/10 %system root%\System32\winevt\logs\ System.evtx Interpretation: • Event ID: 20001 – Plug and Play driver install attempted • Event ID 20001 • Timestamp • Device information • Device serial number • Status (0 = no errors)
Description: Lists the local accounts of the system and their equivalent security identi ers. Location: • C:\windows\system32\con g\SAM • SAM\Domains\Account\Users Interpretation: • Only the last login time will be stored in the registry key
Description: Lists the last time the password of a speci c user has been changed. Location: • C:\windows\system32\con g\SAM • SAM\Domains\Account\Users Interpretation: • Only the last password change time will be stored in the registry key
Description: Determine which accounts have been used for attempted logons. Track account usage for known compromised accounts. Location: XP %system root%\System32\con g\SecEvent.evt Win7/8/10 %system root%\System32\winevt\logs\Security.evtx Interpretation: • XP/Win7/8/10 - Interpretation • Event ID - 528/4624 – Successful Logon • Event ID - 529/4625 – Failed Logon • Event ID - 538/4634 – Successful Logoff • Event ID - 540/4624 – Successful Network Logon (example: le shares)
Description: Logon Events can give us very speci c information regarding the nature of account authorizations on a system if we know where to look and how to decipher the data that we nd. In addition to telling us the date, time, username, hostname, and success/failure status of a logon, Logon Events also enables us to determine by exactly what means a logon was attempted.
Location: XP Event ID 528 Interpretation: Win7/8/10 Event ID 4624 Logon Type 2 3 4 5 7 8 9 10 11 12 13 Explanation Logon via console Network Logon Batch Logon Windows Service Logon Credentials used to unlock screen Network logon sending credentials (cleartext) Different credentials used than logged on user Remote interactive logon (RDP) Cached credentials used to logon Cached remote interactive (similar toType 10) Cached unlock (similar toType 7)
Description: Track Remote Desktop Protocol logons to target machines. Location: Security Log XP %SYSTEM ROOT%\System32\con g\SecEvent.evt Win7/8/10 %SYSTEM ROOT%\System32\winevt\logs\ Security.evtx Interpretation: • XP/Win7/8/10 - Interpretation - Event ID 682/4778 – Session Connected/Reconnected - Event ID 683/4779 – Session Disconnected • Event log provides hostname and IP address of remote machine making the connection • On workstations you will often see current console session disconnected (683) followed by RDP connection (682)
Description: • Analyze logs for suspicious services running at boot time • Review services started or stopped around the time of a suspected compromise Location: All Event IDs reference the System Log 7034 – Service crashed unexpectedly 7035 – Service sent a Start/Stop control 7036 – Service started or stopped 7040 – Start type changed (Boot | On Request | Disabled) Interpretation: • A large amount of malware and worms in the wild utilize Services • Services started on boot illustrate persistence (desirable in malware) • Services can crash due to attacks like process injection
Description
Records websites visited by date and time. Details stored for each local user account. Records number of times visited (frequency). Also tracks access of local system les.
Location:
Internet Explorer
• IE6-7 %USERPROFILE%\Local Settings\History\History.IE5
• IE8-9 %USERPROFILE%\AppData\Local\Microsoft\Windows\ History\History.IE5
• IE10-11 %USERPROFILE%\AppData\Local\Microsoft\Windows\ WebCache\WebCacheV*.dat
Firefox
• XP %USERPROFILE%\Application Data\Mozilla\Firefox
Pro les<random text>.default\places.sqlite
• Win7/8/10 %USERPROFILE%\AppData\Roaming\Mozilla\Firefox\ Pro les<random text>.default\places.sqlite
Chrome
• XP %USERPROFILE%\Local Settings\Application Data
Google\Chrome\User Data\Default\History
• Win7/8/10 %USERPROFILE%\AppData\Local\Google\Chrome\ User Data\Default\History
Description
Cookies give insight into what websites have been visited and what activities may have taken place there.
Location:
Internet Explorer • IE8-9 %USERPROFILE%\AppData\Roaming\Microsoft\ Windows\Cookies • IE10 %USERPROFILE%\AppData\Roaming\Microsoft\ Windows\Cookies • IE11 %USERPROFILE%\AppData\Local\Microsoft\Windows\ INetCookies
Firefox • XP %USERPROFILE%\Application Data\Mozilla\Firefox\ Pro les<random text>.default\cookies.sqlite
• Win7/8/10 %USERPROFILE%\AppData\Roaming\Mozilla\ Firefox\Pro les<randomtext>.default\cookies.sqlite
Chrome
- XP %USERPROFILE%\Local Settings\Application Data\ Google\Chrome\User Data\Default\Local Storage
• Win7/8/10 %USERPROFILE%\AppData\Local\Google\Chrome\ User Data\Default\Local Storage\
Description
• The cache is where web page components can be stored locally to speed up subsequent visits • Gives the investigator a “snapshot in time” of what a user was looking at online - Identi es websites which were visited
- Provides the actual les the user viewed on a given website - Cached les are tied to a speci c local user account
- Timestamps show when the site was rst saved and last viewed Location:
• IE8-9 %USERPROFILE%\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5 • IE10 %USERPROFILE%\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5 • IE11 %USERPROFILE%\AppData\Local\Microsoft\Windows\INetCache\IE
Firefox • XP %USERPROFILE%\Local Settings\ApplicationData\Mozilla\Firefox\Pro les\ .default\Cache
• Win7/8/10 %USERPROFILE%\AppData\Local\Mozilla\Firefox\Pro les<randomtext>.default\Cache
Chrome
• XP %USERPROFILE%\Local Settings\Application Data\Google\Chrome\User Data\Default\Cache\ - data_# and f_######
• Win7/8/10 %USERPROFILE%\AppData\Local\Google\Chrome\User Data\Default\Cache\ - data_# and f_######
Description: Automatic Crash Recovery features built into the browser. Location: Internet Explorer • Win7/8/10 %USERPROFILE%/AppData/Local/ Microsoft/Internet Explorer/Recovery
Firefox
• Win7/8/10 %USERPROFILE%\AppData\Roaming\Mozilla\Firefox\Pro les<randomtext>. default\sessionstore.js
Chrome
• Win7/8/10 %USERPROFILE%\AppData\Local\Google\ Chrome\User Data\Default\ Files = Current Session, Current Tabs, Last Session, Last Tabs
Interpretation: • Historical websites viewed in each tab • Referring websites • Time session ended • Modi ed time of .dat les in LastActive folder • Time each tab opened (only when crash occurred) • Creation time of .dat les in Active folder
Description: Local Stored Objects (LSOs), or Flash Cookies, have become ubiquitous on most systems due to the extremely high penetration of Flash applications across the Internet. They tend to be much more persistent because they do not expire, and there is no built-in mechanism within the browser to remove them. In fact, many sites have begun using LSOs for their tracking mechanisms because they rarely get cleared like traditional cookies. Location: Win7/8/10 %APPDATA%\Roaming\Macromedia\FlashPlayer# SharedObjects<randompro leid> Interpretation: • Websites visited • User account used to visit the site • When cookie was created and last accessed
Description: Google Analytics (GA) has developed an extremely sophisticated methodology for tracking site visits, user activity, and paid search. Since GA is largely free*, it has a commanding share of the market, estimated at over 80% of sites using traf c analysis and over 50% of all sites.
__utma – Unique visitors • Domain Hash • Visitor ID • Cookie Creation Time •Time of 2nd most recent visit • Time of most rcent visit • Number of visits
__utmb– Session tracking • Domain hash • Page views in current session • Outbound link clicks •Time current session started
__utmz– Tra c sources • Domain Hash • Last Update time • Number of visits • Number of different types of visits • Source used to access site • Google Adwords campaign name • Access Method (organic,referral,cpc,email,direct) • Keyword used to nd site (non-SSL only)
https://digital-forensics.sans.org/media/poster-windows-forensics-2016.pdf