Microsoft Forensics
Looking for:
Forensic Artifact
Program Execution
Prefetch, ShimCache, AmCache, UserAssist, SRUM
File Opening
Shortcut files, Jump Lists, ShellBags, Prefetch, OpenSaveMRU
File Knowledge
WordWheelQuery, Last Visited MRU, Shortcut Files, Recycle Bin, Types Paths
Event Logs
User Logons, RDP Activity, RunAs events, Process Tracking, PowerShell Logs
Browser Usage
History, Cookies, Cache, Session Restore, TypedURLs
Forensics locations:
Object
Location
# Post 2008 R2
C:\Windows\System32\winevt\logsC:\windows\tasks
C:\windows\System32\Tasks
C:\windows\sysWOW64\Tasks# User files
C:\Users\[username]\AppData\Roaming\Microsoft\Windows\Recent\
C:\Users[username]\AppData\Local\Microsoft\Windows\FileHistory\Data
# Office Files:
C:\Users\AppData\Roaming\Microsoft\Office\Recent\
# Recent File cache
%systemroot%\AppCompat\Programs\RecentFileCache.bcfCookies
C:\Users\*\AppData\Local\Microsoft\Windows\INetCookies
C:\Users\*\AppData\Roaming\Microsoft\Windows\Cookies
C:\Users\*\AppData\Roaming\Microsoft\Windows\Cookies\LowHibernation File
%SystemDrive%/hiberfil.sys
# Can be used to get memory of a powered off imagePage File
%SystemDrive%/pagefile.sys
# Can be used to get memory of a powered off imageMemory Dump
%WinDir%/MEMORY.DMPC:\Windows\PrefectchC:\Users\<USERNAME>\NTUSER.DAT
C:\Users\<USERNAME>\NTUSER.DAT.LOG1
C:\Users\<USERNAME>\NTUSER.DAT.LOG2
C:\Users\<USERNAME>\AppData\Local\Microsoft\Windows\UsrClass.dat
C:\Users\<USERNAME>\AppData\Local\Microsoft\Windows\UsrClass.dat.LOG1
C:\Users\<USERNAME>\AppData\Local\Microsoft\Windows\UsrClass.dat.LOG2C:\Windows\AppCompay\Programs\Amcache.hveC:\Windows\System32\config\SAM
C:\Windows\System32\config\SYSTEM
C:\Windows\System32\config\SECURITY
C:\Windows\System32\config\SOFTWARE
C:\Windows\System32\config\SAM.LOG1
C:\Windows\System32\config\SAM.LOG2
C:\Windows\System32\config\SYSTEM.LOG1
C:\Windows\System32\config\SYSTEM.LOG2
C:\Windows\System32\config\SECURITY.LOG1
C:\Windows\System32\config\SECURITY.LOG2
C:\Windows\System32\config\SOFTWARE.LOG1
C:\Windows\System32\config\SOFTWARE.LOG2Use magnet to check if a disk is encrypted (edd.exe - https://www.magnetforensics.com/resources/encrypted-disk-detector/)
Main forensics artifacts:
To get the custom Triage extract using CyLR (https://github.com/orlikoski/CyLR) use:
CyLR.exe -c config.txt
CyLR config file:
C:\$Recycle.Bin
C:\$LogFile
C:\Windows\Tasks
C:\Windows\Prefectch
C:\Windows\inf\setupapi.dev.log
C:\Windows\Appcompat\Programs
C:\Windows\System32\sru
C:\Windows\System32\winevt\logs
C:\ProgramData\Microsoft\Search\Data\Applications\Windows\
C:\Users\<USERNAME>\AppData\Roaming\Microsoft\Windows\Recent
C:\Users\<USERNAME>\AppData\Local\Microsoft\Windows\ExplorerLast updated