Windows Forensics

10/19/20253 min read

Reported Summary:

"Our client has a newly hired employee who saw a suspicious-looking janitor exiting his office as he was about to return from lunch.

I want you to investigate if there was user activity while the user was away between 12:05 PM to 12:45 PM on the 19th of November 2022. If there are, figure out what files were accessed and exfiltrated externally"

Provided disk image and tools:

You'll be accessing a live system, but use the disk image already exported to the C:\Users\THM-RFedora\Desktop\kape-results\C directory for your investigation. The link to the tools that you'll need is in C:\Users\THM-RFedora\Desktop\tools

Following tools will be used for this project included Registry Explorer, Autopsy and JLECmd.

Q1. What file type was searched for using the search bar in Windows Explorer?

Answer: .pdf

1- Open Registry Explorer

2- Load Hive > Navigate to path: NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\TypedPaths

3- Available bookmarks

4- WordWheelQuery

5- Data interpreter the Data

6- Answer in Strings - Unicode

Window Registry is used to investigating search activity performed by intruder to answer following questions:

Q2. What top-secret keyword was searched for using the search bar in Windows Explorer?

Answer: Continental

Following previous search, answer found inside 1st value.

Q3. What is the name of the downloaded file to the Downloads folder and when was it downloaded?

Answer: 7z2201-x64.exe & 2022-11-19 12:09:19 UTC

Navigate to Data Artifacts, then Web Downloads.

Autopsy is used to gather information from registry, using Logical File data source created using Kape to answer following questions:

Autopsy is a tool used to investigate web and file system activity.

Q3. From the previously downloaded file, a PNG file was opened. When was this file opened?

Answer: 2022-11-19 12:10:21

1- Using Registry Explorer to find recent .png file.

2- Software/Microsft/Windows/CurrentVersion/Explorer/RecentDocs/.png.

3- Switch back to Autopsy.

4- Keyword search for continental.png.

5- Data Artifacts > Date Accessed.

Note: Anaswer can also be found just using Registry Explorer - pay attention to Last write timestamp.

JLECmd is used in Command Prompt (Administrative) to parse files/directories to investigate the Jump Lists to answer following questions:

Jump Lists create a list of the last opened files. This information can be used to identify both the last executed programs and the last opened files in a system.

1- Navigate to tools (cd c:/tools)

2- Parse the directory: JLECmd -d C:\Users\THM-RFedora\Desktop\kape-results\ (Mentioned in beginning of task)

Q4. A text file was created in the Desktop folder. How many times was this file opened and when was the text file from the previous question last modified?

Answer: 2 times - Timestamp: 2022-11-19 12:12:35

Q5. The contents of the file were exfiltrated to pastebin.com. What is the generated URL of the exfiltrated data?

Answer: https://pastebin.com/1FQASAav

Using Autopsy, navigate to Web History.

Note: Autopsy were used for this question to investigate Web Activities.

Thanks for reading...