6 DF
6 DF
In this chapter we will focus on Windows and we will learn how to:
2
Windows Forensics
What can we learn from a Windows computer?
Application use: what applications were used, when, by whom?
Content, file creation, modification and deletion ..
Connected devices, thumb drives, network connections ..
Online behavior: visited websites, downloaded content, emails, social media
interaction....
….
3
Some of the sources of evidence on a Windows computer
Volatile sources:
6
RAM Memory Forensics
RAM is an important source of information for the forensic investigation, it contains traces of recent
activities including:
Running processes (including malicious ones) and threads,
Network connections,
Running applications and Malware (if any),
Opened files and media,
Encryption keys, passwords, etc.
8
RAM Memory Forensics
Memory analysis using Volatility
Homework for the next Lab:
How to acquire a memory dump with Dumpit and then analyze it with volatility:
https://www.youtube.com/watch?v=mHhQ63juojg
How to analyze a memory dump with Volatility 2 and 3, along with some interesting plugins:
https://www.youtube.com/watch?v=EiETpyPgloQ
https://www.youtube.com/watch?v=g1niQ3rp3-s
9
Windows Crash Dump
Windows stores a copy of the RAM content when it crashes
(after running into a critical error), it is called crash dump file.
You can check the dump file using DumpChk which is part of
the Win Debugger tool
URL: https://learn.microsoft.com/en-us/windows-
hardware/drivers/debugger/
10
This feature should be first enabled
Windows Registry
Microsoft defines the registry as a central hierarchical database. It stores configuration information
about all hardware devices and applications as well as user-specific settings.
This information is organized into a number of keys and subkeys, which are similar to folders and are
themselves organized into five main branches called hives which make up the registry.
hive
key
subkey value
11
Windows Registry
What can the investigator learn from the registry?
List of user accounts,
Installed applications, when they were used last time,
Installed hardware devices,
Applications that start automatically when the system boots,
USB activities,
Network information (e.g. networks, ports, ),
…
By analyzing this information the investigators can understand the incident and reconstruct its timeline.
12
Windows Registry
HKEY_LOCAL_MACHINE It contains configuration information for all
hardware and software components of the computer.
Non Volatile
HKEY_USERS: Contains the details of all user accounts present on the system and
their configuration settings.
13
Windows Registry
The information stored in the hives are stored across four files (SAM, SECURITY, SOFTWARE, SYSTEM)
located in the folder: %SYSTEMROOT%\System32\Config
There is an additional file, NTUser.dat, which is stored in the root of the user profile.
14
Windows Registry – Some interesting information
Computer Name:
Use the RegEdit to access the key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\ComputerName\ActiveComputerName
15
Windows Registry – Some interesting information
Windows information: version, number, owner, ID, installation date
Use the RegEdit to access the key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion
16
Windows Registry – Some interesting information
Last Shutdown time and time zone:
Use the RegEdit to access the key:
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Windows
Install the Dcode to convert the time
https://www.digital-detective.net/dcode
17
Windows Registry – Some interesting information
Shares (shared folders on the network):
Use the RegEdit to access the key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\LanmanServer\Shares
18
Windows Registry – Some interesting information
Wireless Networks:
Use the RegEdit to access the key:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles
19
Windows Registry – Some interesting information
Autostart programs:
Use the RegEdit to access the key:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
20
Windows Event Logs
Windows OS logs information about the various actions occurring on the computer and categorizes them into:
Event logs can be very helpful in finding data related to the incident and can help investigators build a timeline
analysis of events relating to it. 21
Windows Event Logs
Examples of System Events: Launch Event Viewer and search for the following events:
6013 and 4624
22
Windows Event Logs
Examples of System Events: What is happening here?
23
Windows Event Logs
Examples of System Events: What is happening here?
24
Windows Event Logs
Some interesting events:
25
Windows ShellBags
Shellbags are a set of registry keys that remember the (display) size and locations of
the folders and libraries that the user has accessed on the computer.
From a forensic point of view, we can discover:
Folders that have been recently accessed.
External media (e.g. hard disks, USB disks, CD) that had been used and accessed
Zip files that had been accessed
26
Windows ShellBags – Demo
Let’s see now if we can find traces of the following actions in ShellBags
27
Source: https://library.mosse-institute.com/articles/2022/05/windows-shellbags-in-digital-forensics/windows-shellbags-in-digital-forensics.html#windows-shellbags-in-digital-forensics
Source: https://library.mosse-institute.com/articles/2022/05/windows-shellbags-in-digital-forensics/windows-shellbags-in-digital-forensics.html#windows-shellbags-in-digital-forensics
28