Windows - Forensics Building Lab and Essential Investigation
Windows - Forensics Building Lab and Essential Investigation
1. Go to the Registry folder location > open cmd > dir > attrib * > attrib –h NTUSER>DAT > attrib –h
UserClass.dat
2. For /r %i in (*) do (C:\Tools\RegRipper\rip.exe –r %i –a > %i.txt).
3. Show in Registry folder text file automatic created then after all file selected and edit with Notepad++ and show
the all detail of target system.
Execute the command for create the text file of
registry hives.
Show the all text file of
registry hives.
Open any file with Notepad++ and
collect all detail about particular
hives.
Show any
information
using plugin.
User Accounts and SIDs Overview
Analysis of user accounts , groups and profiles
All Hives load in Registry Explorer and open SAM hive and click the on the user folder.
Open this file in
timeline explorer
this file in Time
Go to the Get-Zimmerman tools and show the timeline
explorer and open it.
Show the detail about
Target system user.
SAM file open with
notepad++
Show the user detail
using Notepad++.
RecentDocs Analysis
Information about the files that were recently opened/saved and the
folders that were opened are maintained in the RecentDocs registry
key.
## Load the Ntuser.dat hive on Registry Explorer. And open Recent Doc.
Open the Registry Explorer. And
load the Ntuser.dat file.
Open Ntuser.dat file in Notepad++.
ShellBags Analysis
NT file system (NTFS), which is also sometimes called the New Technology File System, is a
process that the Windows NT operating system uses for storing, organizing, and finding files
on a hard disk efficiently
MFT(Master File Table) records
Master File Table (MFT) MFT or $MFT can be considered one of the most important files in
the NTFS file system. It keeps records of all files in a volume, the files' location in the
directory, the physical location of the files in on the drive, and file metadata.
Analysis of MFT Records with MFTECmd
B - (Birth) / Creation
Finding Evidence of deleted filed with USN Journal analysis
MFTFcmd open
Autorun and run keys are registry entries that allow programs to
execute automatically when a device is connected or a user logs
on. Malicious actors can use them to launch malware, bypass
security controls, and maintain persistence on compromised hosts.
You can insert the NTUSER hives in Registry Explorer
and then search run.
You can insert the Software hive in Registry Explorer
and search run and show the autorun activities.
NTUSER hives open with
Notepad++.
Fine the run
command in All
current documents.
Find the run command in
software hives in current all
documents.
Startup Folder Analysis
1. C:\Cases\F\ProgramData\Microsoft\Windows\Start Menu
2. C:\Cases\F\Users\Denisha\AppData\Roaming\Microsoft\Windows
Open the given file location with ubuntu linux and use mnt directory , show mnt.csv file and using grep command
show startup folders and scripts.
Show the bat script in target
system
Windows Services
A Windows service is an application that usually serves a core operating system function
running in the background and has no user interface.
Loaded the system hives in
Registry Explorer
System hives edit with Notepad++
and Find the services on target system
and show the given output.
Detecting and Analyzing scheduled tasks
4624 event id use for login detail which by filtering we can see
all login details same but same time same login details have
different login id. If the event log is viewed by filtering the
login ID , it will show any Malicious activity like user joined a
Administrator group, Any user is created , Any other user
change the credential details etc.
Filter with
login ID
Same login ID
and details
show different
Same login
ID and
details show
different
5. Windows Event logs Power shell
overview,Analyse Malicious Activity.
Source Event IDs Description
Windows PowerShell 400 Engine state is changed from None to Available
Windows Power shell stored all logs about the command base
execution like run the any script , install the any applications , etc.
Load the windows
power shell logs on
explorer
Memory Analysis
Setting up the Volatility3 in the Ubuntu that open the link https://bluecapesecurity.com/build-your-forensic-
workstation/
Show the instruction linux based tools.
What is memory Analysis
A detailed timeline of everything that occurred on a system, also known as a Super Timeline, can be
extremely beneficial in determining what took place in a digital investigation.
Reporting Considerations
3. Alternative Explanations.
4. Actionable Information.
Types of Reporting