Analysis Notes Template
Analysis Notes Template
Disclaimer: This template has been provided by Blue Cape Security, LLC through the Practical
Windows Forensic (PWF) course. The purpose is to guide the student through the course and the
process of performing digital forensic analysis of various Windows artifacts. It does not
represent an actual template of a forensic report.
System Information
Computername:
Registry: HKLM\System\CurrentControlSet\Control\Computername\
Windows Version:
Registry: HKLM\Software\Microsoft\Windows NT\Currentversion\
Timezone:
Registry: HKLM\System\CurrentControlSet\Control\TimeZoneInformation\
Network Information:
Registry: HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\Interfaces\{interface-name}
Shutdown time:
Registry: HKLM\System\ControlSet001\Control\Windows\ShutdownTime
Defender settings:
Registry: HKLM\Software\Microsoft\Windows Defender\
User Behavior
Practical Windows Forensics (PWF) Analysis Template
UserAssist: Applications opened
RecentDocs: Files and folders opened
Shellbags: Locations browsed by the user
Open / Save MRU: Files that were opened
Last-Visited MRU: Applications used to open files
What was the Entry number for "deleteme_T1551.004" and does it still exist in the MFT?
Execution Artifacts
Background Activity Moderator (BAM)
Registry: HKLM\SYSTEM\CurrentControlSet\Services\bam\UserSettings
Which executables (.exe files) did the BAM record for the IEUser (RID 1000) incl. their last execution
date and time?
• AtomicService.exe:
• mavinject.exe:
Prefetch
Path: C:\Windows\Prefetch\*.pf
Use the Prefetch-Timeline output to produce a timeline of suspicious execution events in the Eric
Zimmerman Timeline Explorer:
POWERSHELL.exe
cmd.exe
NET.exe
REG.exe
SCHTASKS.exe
SC.exe
ATOMICSERVICE.EXE
MAVINJECT.exe
NOTEPAD.exe
Persistence Mechanisms
Auto-Run Keys
Registry:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
What is the full path of the AtomicService.exe that was added to the run keys?
Startup Folder
Paths:
Windows Services
Registry: HKLM\SYSTEM\CurrentControlSet\Services
Scheduled Tasks
Registry:
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tasks
HKLM\Software\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache\Tree
Path:
C:\Windows\System32\Tasks
Which tasks were created by the IEUser and what's the creation time?
Memory Analysis
with Volatility3
powershell.exe <PID>
notepad.exe <PID>
AtomicService.exe <PID>