DIGITAL FORENSIC REPORT
Sample Solution
Objective: Analyze the HKCU registry hive for the "vibranium" user on the "nromanoff" system to investigate potential unauthorized access and data exfiltration.
Tools:
- Registry Explorer by Eric Zimmerman (provided in Virtual Lab)
- Investigation 01 Sample Evidence (provided in Virtual Lab)
Procedure:
-
Import NTUSER.DAT: Launch Registry Explorer and import the "NTUSER.DAT" file from the Investigation 01 Sample Evidence, representing the HKCU hive for the "vibranium" user.
-
Windows Search History:
- Navigate to:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Windows Search - Examine values under the "Search" key. The most recently searched keyword will be the last value name (e.g., "value name" = "TopSecretPlans").
- Navigate to:
-
Excel Usage:
- Navigate to:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU - The "Excel.exe" value will indicate how many times excel.exe was run.
- The timestamp associated with the value will reflect the last time it was run.
- Navigate to:
-
Typed URLs:
- Navigate to:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\TypedURLs - Examine the value names under the "TypedURLs" key. The most recent URL will be the last value name.
- Navigate to:
-
Recent Document Access:
- Navigate to:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs - Examine the value names under the "RecentDocs" key. These represent the most recently accessed files in the order they were accessed. The timestamp associated with the value will reflect the access time.
- Navigate to:
Analysis:
1. Most Recent Keyword Searched:
By examining the values under HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Windows Search, we can identify the most recent keyword searched using Windows Search.
2. Excel Usage:
The number of times "excel.exe" was run and the last run time can be determined by examining the values and timestamps under HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RunMRU.
3. Most Recent Typed URL:
The most recent URL visited by the "vibranium" user can be found by examining the value names under HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\TypedURLs.
4. Last Five Accessed Files:
The last five accessed files, along with their access times, can be identified by examining the value names and timestamps under HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs.
Note: Due to the limitations of the sample evidence being a static file, it's not possible to provide specific results like file names or timestamps. However, the provided steps outline the process to uncover this information during an actual forensic examination.
Deliverables:
The final report should include:
- Details of the forensic process undertaken.
- Findings for each of the questions investigated, including the most recent search term, excel.exe usage statistics, most recent URL, and a list of the last five accessed files with timestamps (if possible).
- Any additional observations or potential indicators of unauthorized access based on the registry entries.
Disclaimer: This analysis simulates a forensic examination and should not be considered a substitute for a professional investigation.