Windows Forensics Flashcards

(36 cards)

1
Q

What is a .lnk file?

A
  • a data object that contains information that can be used to access another data object
  • shortcuts
  • metadata files specific interpreted by the Windows shell
  • 0x4C (4C 00 00 00) at offset 0 within the file
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an important note about .lnk files?

A
  • the absolute path to the file is NOT store in the lnk file
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where are the most common locations to find .lnk files?

A
  • My Recent Documents
    • \%USERPROFILE%\Recent
    • \%USERPROFILE%\Application Data\Microsoft\Office\Recent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

.lnk timestamps?

A
  • when the file is opened, the MAC timestamps of the target file are read and stored within the associated link file
  • FILETIME format using 8 bytes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tools for .lnk forensics?

A
  • Exiftool
  • Windows LNK Parsing Utility
  • LECmd.exe (Eric Zimmerman)
  • WinHex
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Thumbnails

A
  • when the user uses the Thumbnails or Filmstrip vies from Windows folder, a small thumbnail version is created
  • stored in thumbcache.db
  • %USERPROFILE%\AppData\Local\Microsoft\Windows\ Explorer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Volume ShadowCopy Service

A
  • VSS
  • a set of COM APIs that implements a framework to allow volume backups to be performed while applications on a system continue to write to the volumes
  • Windows service that provides snapshots for a specific point back in time
  • aka restore points
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Prefetch Files

A
  • windows cache manager (memory management system)
  • tracks the first 2 minutes of boot process and the first 10 seconds of all other applications startup
  • these results written to prefetch files
  • next time a system boots or a “prefetched” application executes, the cache manager can use these prefetch files like a “cheat sheet” to speed up the loading process
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Prefetch Content for Executables

A
  • executable’s name
  • absolute path to the executable
  • no. of times the program ran w/in the system
  • last time the application ran
  • list of DLLs used by the program
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Location of Prefetch Files

A
  • %SystemRoot%\Prefetch\

- .pf extension

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Prefetch Registry Keys

A
  • settings related to prefetch files are written in the following registry key;
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControl Set\Control\SessionManager\Memory Management\PrefetchParameters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ShimCache

A
  • aka Application Compatibility Cache
  • allows Windows to track executable files and scripts that may require special compatibility settings to properly run
  • it is maintained within kernel memory
  • alternative to Prefetch if disabled
  • can track more items than prefetch
  • amcache.hve
  • %SYSTEMROOT%\AppCompat\Programs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Windows Registry

A
  • special type of file system
  • stores low-level system settings, application settings, and user preferences
  • two categories:
    • system registry files
    • user registry files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Registry Structure

A
  • Hives: contain keys (directories) and values
  • Keys: directories
  • Subkeys: no difference between key and subkey
  • Values: store data (e.g. settings)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Registry Root Keys

A
  1. HKEY_CLASSES_ROOT
  2. HKEY_CURRENT_USER
  3. HKEY_LOCAL_MACHINE
  4. HKEY_USERS
  5. HKEY_CURRENT_CONFIG
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Common Hive Locations

A
  • BCD
  • SYSTEM
  • SAM
  • SECURITY
17
Q

HKLM

A
  • HKEY_LOCAL_MACHINE
  • contains system-wide configuration subkeys, as listed below:
    • BCD
    • HARDWARE
    • SAM
    • SECURITY
    • SOFTWARE
    • SYSTEM
18
Q

BCD

A
  • Boot configuration data replacing boot.ini
19
Q

HARDWARE

A
  • maintains description of the system’s hardware and all hardware device-to-driver mappings
20
Q

SAM

A
  • holds local account and group information
21
Q

SECURITY

A
  • stores system-wide security profiles and user-rights assignments
22
Q

SOFTWARE

A
  • stores system-wide configuration information not needed to boot the system
23
Q

SYSTEM

A
  • contains the system-wide configuration information needed to boot the system
24
Q

What does a Registry Key hold?

A
  • a signature found at offset 0x0
  • last write timestamp
  • major and minor revision numbers
  • the root cell offset
25
What are the registry value types?
- REG_BINARY - REG_DWORD - REG_DWORD_LITTLE_ENDIAN - REG_DWORD_BIG_ENDIAN - REG_EXPAND_SZ - REG_LINK - REG_MULTI_SZ - REG_NONE - REG_QWORD - REG_QWORD_LITTLE_ENDIAN - REG_SZ
26
What is the best tool for Registry Analysis?
- Registry Explorer
27
Which registry key contains system configuration information such as device drivers and services?
- HKEY_LOCAL_MACHINE\SYSTEM
28
What are the most important Registry Artifacts?
- ControlSet No. (device drivers and services) - Time Zone - Windows Product Info - Windows Computer Name - Windows Services - Windows DHCP Config - NTFS Last Accessed - Autoruns - Installed Applications - Windows Firewall - Remote Desktop - Network History
29
What Registry Key contains the Windows Product information?
- SOFTWARE\Microsoft\WindowsNT\CurrentVersion
30
What Registry Key contains the Windows Computer Name?
SYSTEM\ControlSet00#\Control\ComputerName\ComputerName
31
What Registry Key contains the Windows Services?
SYSTEM\ControlSet00#\Service
32
What Registry Key contains the Autruns?
- HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RunOnce - HKLM\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run bzw.\RunOnce - Could also be found under HKCU
33
What are important User registry artifacts?
- Windows Recycle Bin - Last User Logged In - User Sessions - UAC - User Assist Keys - Most Recently Opened (applications and files)
34
Why check User Assist Keys?
- Understand the frequency of program execution - Identify the last time a program was launched - Which items were being launched most often - Evidence of programs after deletion/uninstall - How long a user has interacted with a given program
35
What is "Evidence of Absence?
- when an item is frequently accessed, but it empty - Example: My Documents directory was accessed 333 times, but there are no files there; means there could have recently been something there that was deleted
36
What are ShellBags?
- a set of Windows Registry keys located in NTUser.dat and USRClass.dat registry keys - maintain view, icon, position, and size of folders - can serve as a history into data that was removed from a system