System Files Tricks For Forensic Investigations and Incident Response
System Files Tricks For Forensic Investigations and Incident Response
https://belkasoft.com
Belkasoft US customers
https://belkasoft.com
Customers from other countries
www.belkasoft.com
https://belkasoft.com
What is Belkasoft Evidence Center (BEC)
https://belkasoft.com
01 Today’s agenda
Today’s agenda
https://belkasoft.com
02 Why system files analysis?
Why system files analysis?
https://belkasoft.com
03 System files: Forensic
artifacts
Forensic artifacts supported by Belkasoft
• Jumplists
• Windows 10 Timeline
• Importance of SQLite forensics
• Registry forensics
• macOS system configuration files
• Other artifacts:
• TOAST notifications
• Thumbnails
• Event logs
• Prefetch
• Link files (LNK)
• etc.
https://belkasoft.com
Jumplists and Timeline
• Jumplists
• Introduced in Windows Vista
• C:\Users\%USERNAME%\AppData\Roaming\Microsoft\Windows\Recent\
AutomaticDestinations\*.automaticDestinations-ms
• Whenever a file is opened in a default app, Windows remembers that
• Stored forever, not known by a regular user
• Can be carved if deleted
• Cleared jumplists are pretty suspicious
https://belkasoft.com
Windows 10 Timeline
• Timeline
• Introduced in Windows 10 April 2018 update
• User perspective: WinKey + Tab
• “Jumplist on steroids”
• Stores every switch to an app along with duration of that app usage
• SQLite database!
• Freelists, WAL can be found in every Timeline database
• Not yet supported by many forensic tools
https://belkasoft.com
Registry forensics
https://belkasoft.com
macOS system configuration analysis with Belkasoft
https://belkasoft.com
04 System files: Incident
response artifacts
Incident response artifacts supported by Belkasoft
• Registry
• AppInit DLLs
• Logon Scripts
• Startup
• Change default file association
• Services
• Scheduled Tasks
• BAM/DAM
• Remote connections (RDP, TeamViewer and others)
• Non-standard registry files
• Syscache
• Amcache
• Explorer programs
• Non-registry
• System Event Log
• Prefetch
• Team Viewer
• WMI Event Subscription
https://belkasoft.com
Registry-based (persistence)
https://belkasoft.com
Registry-based (persistence), continued
https://belkasoft.com
Registry-based (execution)
https://belkasoft.com
Registry-based (remote connections)
https://belkasoft.com
Non-standard registry files
• Syscache
• Not clear purpose
• Stores data of SRP (Software Restriction Policies) and AppLocker
• Amcache
• Stores data about executed apps
• https://www.andreafortuna.org/2017/10/16/amcache-and-
shimcache-in-forensic-analysis/
https://belkasoft.com
WMI Event Subscription
• Fileless malware
• https://www.blackhat.com/docs/us-15/materials/us-15-
Graeber-Abusing-Windows-Management-Instrumentation-WMI-
To-Build-A-Persistent%20Asynchronous-And-Fileless-Backdoor-
wp.pdf
https://belkasoft.com
Demo of building infected computer timeline
https://belkasoft.com
Is this it?
https://belkasoft.com
Test it yourself
• Visit our booth at the end of the hall opposite main entrance
• Free T-Shirts and baseball caps
• Chance to win a full license of Belkasoft Evidence Center
https://belkasoft.com
Questions? Comments?