OLE structured storage, Registry as log file,
124
OpenSaveMRU key, user hives,
150–151
OpenSavePidMRU key, user hives,
150–151
Open-source tools (general)
See also specific tools
analysis system set-up,
24
pre-infection intelligence collection,
173–174
Operational logs
WLAN-AutoConfig example,
92f
Order of volatility, definition,
11
OSession.evt, timeline creation on XP,
233–234
P
Packed files
Packet sniffers, incident response data collection,
41
Pagefile
ParentIDPrefix value, device mapping,
126
Parse::Win32Registry Perl module,
282
events file creation,
244b
Log2timeline framework,
213
malware persistence mechanism,
175–176
malware propagation mechanism,
173–174
NTFS $I30 Index Attributes,
85
timeline creation on Windows,
8,
234
Partition table
Payment card industry (PCI)
Data Security Standards (DSS),
47
incident response example,
31
PDF files, initial infection vector,
172–173
Peer-to-peer (P2P) file sharing
initial infection vector,
172
PEiD tool
packed file malware detection,
193
Perl Package Manager (PPM),
232b
Perl script listing
analysis system set-up,
24
Event Log file extraction,
87
Event Log file parsing,
88
events file additions,
248f
events file creation,
244b
file system tunneling example,
84
INFO2 file extraction,
95
Internet activity analysis,
205–206
LEGACY_IMDISK LastWrite time,
140–141
Log2timeline framework,
213
prefetch file parsing,
98–99
Registry data and TLN creation,
239–242
time stomping example,
82
USB external drive analysis,
135
Windows Event Log parsing,
95
Persistence mechanism (malware),
177
file system startup locations,
177–178
networked environments,
178
PGPDisk volume, MountedDevices key,
130,
130f
Phishing attacks, training for,
173b
Physical Disk Emulator (PDE) module,
60
Physical memory
incident preparation questions,
32
Platform-as-a-service (PaaS),
21
Plugin Browser, Registry analysis,
164,
165f
Point of contact (PoC), incident preparation,
29
Portable executable (PE) files
application file prefetching,
97
incident response data collection,
44
installed AV applications,
186
NTOSBOOT-BOODFAAD.pf,
100
speculation issues,
12–13
PrefetchParameters key,
97
Previous Versions shell extension,
51,
51f
Process Monitor (ProcMon),
14
Process Registry key (XP),
5–6
ProDiscover
analysis system set-up,
24
dropdown menu example,
205f
Internet History Viewer,
205f
Windows 7 .job file,
102f
ProDiscover Basic Edition (BE),
24,
66b,
68
ProDiscover Incident Response Edition (IR)
Internet activity analysis,
204
time stamp display,
77,
78f
VSCs in acquired images,
71
ProfileGuid value, NetworkList,
147
ProfileList subkey, timeline analysis,
223–224
Profiles key, NetworkList,
147
Propagation mechanism (malware)
ProScript, analysis system set-up,
23
Psexec.exe, interesting artifact searches,
90
PSExecSvc service, malware detection,
206
Pwdump7.exe, Registry analysis,
122
Python script listing
Python scripts
analysis system set-up,
24
Android device application files,
116
NTFS $I30 Index Attributes,
85
$SIA and $FNA extraction,
80,
82
Q
Questions
incident preparation,
30–33
malware persistence mechanism,
177
R
as Registry information source,
162
Registry
camera image file analysis,
117
installed AV applications,
186
malware persistence mechanism,
175–176
ProDiscover Basic Edition,
24
EMDMgmt subkey values,
132f
evidence eliminators,
162b
historical Registry data,
152b
Plugin Browser interface,
164,
165f
RegIdleBackup key values,
149f
Unmanaged subkey values,
146f
System hive
testing for malware execution,
208
USB drive/disk signature,
134f
USBStor and USB subkeys,
134f
USBStor device subkey properties,
127f
c6d3bf33.Windows.XP.Mode key,
161f
tracking user activity,
154b
UserAssist historical data,
160b
Registry Editor tool (RegEdit.exe),
123f,
126
Registry hives
file analysis example,
76
incident response data collection,
44
speculation issues,
12–13
System Restore Points,
50
timeline analysis case study,
248
Windows version comparison,
5
event parsing into timeline,
246
malware persistence mechanism,
175–176
Registry as log file,
124
Registry nomenclature,
123
Registry values (general)
Application Event Logs,
184
Registry as log file,
124
Registry nomenclature,
123
analysis system set-up,
24
events file creation,
244b
LEGACY_IMDISK LastWrite time,
140–141
Registry data and TLN creation,
240
timeline analysis case study,
248
USB external drive analysis,
135
VSC access automation,
70
Remote administration tool (RAT),
197
Remote Desktop Client, jump list parsing,
109
Remote Desktop Connection, jump list information,
107
Remote Desktop Protocol (RDP),
35,
221
Remote systems
VSC access
Root key
Rootkits
malware persistence mechanism,
175
Rot-13 translation cipher, UserAssist subkeys,
158
Rpcall.exe, timeline analysis case study,
249
Run key
malware persistence mechanism,
175–176
timeline analysis case study,
248
S
Safari (Apple), malware persistence mechanism,
177
Safe Mode, malware persistence mechanism,
175–176
SAM hive
System Restore Points,
50
SAM Registry hive file,
282
SANS Investigative Forensic Toolkit (SIFT)
analysis system set-up,
22–25
incident response acquisition process,
43–44
Registry data and TLN creation,
239–240
VSCs in acquired images,
68b
Windows Event Log parsing,
93
AppleSoftwareUpdate task,
101f
at.exe
vs. schtasks.exe,
103
RegIdleBackup key values,
149f
timeline analysis data sources,
215
Windows 7 .job file,
102f
XP Scheduled Task Wizard,
101f
Schuster, Andreas,
93,
236
Secevent.evt, XP/2003 systems,
90
events file creation,
244b
interesting artifact searches,
90
timeline creation on Windows,
8,
244
Ultimate Windows Security Event Log site,
88–89
Security hive
events file creation,
244b
Security identifier (SID)
Seeded sites, malware detection,
207–208
Servers, auditing functionality,
37–38
Service set identifier (SSID),
146
ServiceName value, NetworkCards key,
148
Services Event Log, characteristics,
91
Setup Event Log, characteristics,
91
SHA-25 algorithm, scheduled tasks,
150
ShadowExplorer v0.8, interface example,
55f
Shell link files, jump lists,
106
The Sleuth Kit (TSK) tools
SIFT VM usage example,
22
Smart phones
Sniper Forensics (Pogue),
7
Software-as-a-service (SaaS),
21
malware persistence mechanism,
175–176
Process Registry key,
5–6
RegIdleBackup key values,
149f
Unmanaged subkey values,
146f
Software Registry hive
VSC access automation,
124
Solid-state drive (SSD),
98
Source value, timeline analysis,
222–223
Spear phishing, definition,
173–174
Speculation, analysis principles,
12
Squid, Log2timeline framework,
213
Ssdeep hash, MBR infectors,
202
$STANDARD_INFORMATION attribute ($SIA)
file system tunneling example,
84–85
file/directory records,
77
time stomping example,
83
Start value, Windows services analysis,
139–140
Startup location, malware persistence mechanism,
177–178
Sticky Notes files, Registry as log file,
124
Strings.exe
analysis system set-up,
24–25
Structured storage, Registry as log file,
124
Suspicious processes, Carbon Black log example,
39,
39f
Svchost.exe, malware detection,
203
Symantec antivirus (AV) products,
234
Sysevent.evt, XP/2003 systems,
90
timeline creation on Windows,
8,
244
System field, timeline analysis,
223
System hive
U3-enabled device analysis,
125
VSC access automation,
124
System Properties dialog,
53f
indirect artifacts,
15–16
timeline analysis case study,
250
timeline analysis via visualization,
246
timeline data volume,
243b
XP system “noisiness,”,
17–18
System time change, detecting,
264–265
System-level privileges
Internet activity analysis,
15,
204
T
Tablet devices, ubiquitousness,
1–2
Task Scheduler
indirect artifacts,
15–16
Windows version differences,
5
TaskCache\TasksGUID key, values example,
149f
TaskCache\Tree subkeys, via WRR,
149f
Temp directory
VSCs and Registry keys,
52
Temporal proximity
Temporary files, Registry keys,
52
Temporary Internet Files (TIF),
100,
204
Terminal Server Client key, UserAssist subkeys,
160
Threat intelligence,
272b
file system tunneling example,
84
file/directory records,
77
Log2timeline framework,
213
values from other file,
82–83
Time stomping
Timeline (TLN) analysis
analysis system set-up,
23
events file additions,
248f
events file creation,
244
non-time-stamped data sources,
242
Timeline (TLN) creation
image partition table,
231f
Timestamping
timeline analysis data sources,
214–215
TimeZoneInformation key,
222b
Tool validation myth-odology, analysis prinicples,
9–11
Tools
vs. process, analysis principles,
9
Training
incident preparation,
45–46
Trojans
Process Registry key,
5–6
TrueCrypt encrypted volumes,
257
TrueCrypt volume, MountedDevices key,
130,
130f
Trusted advisor, incident response,
42
U
U3-enabled devices, Registry analysis,
125
Ultimate Windows Security Event Log site,
88–89,
90
Unallocated space
Unicode format
prefetch file parsing,
98–99
Unique instance ID key
USB external drive analysis,
134
Unmanaged subkey, values,
146,
146f
Update sequence number (USN),
85–86
deleted Registry keys,
138b
EMDMgmt subkey values,
132f
USBStor device subkey properties,
127f
USBStor subkey LastWrite times,
133b
USB devices, Windows shortcuts and,
255–257
USB external drives
drive/disk signature,
134f
USBStor and USB subkeys,
134f
USB thumb drive
initial infection vector,
173
USBStor key
U3-enabled device analysis,
126b
USB external drive analysis,
134
USBStor subkeys
USB external drive analysis,
134f
User activity tracking, expert tips,
154b
User field, timeline analysis,
223–224
User hives
c6d3bf33.Windows.XP.Mode key,
161f
tracking user activity,
154b
UserAssist historical data,
160b
Virtual PC key path,
161f
UserAssist information,
245
UserAssist subkey data,
265
timeline analysis case study,
248
Software hive application analysis,
145
USRCLASS.DAT hive file,
257,
259
event parsing into timeline,
245
file system tunneling example,
84
LEGACY_IMDISK LastWrite time,
140–141
USB external drive analysis,
135
V
Vhdmount, VSCs in acquired images,
61
Virtual machine (VM)
analysis system set-up,
22
F-Response VSC demo set-up,
57
Virtual memory, direct artifacts,
13
Virtual PC (VPC)
concealing artifacts,
20–22
VSCs in acquired images,
61
Virtual private network (VPN),
35,
57
Virtual Server, VSCs in acquired images, 00003#p0405
Virtualization
Visualization, timeline analysis,
246–247
VMWare (.vmdk)
analysis system set-up,
24
VMWare Workstation, VSCs,
65,
67,
67f
Volatility Framework
Registry analysis of memory,
163–164
Volume serial number, EMDMgmt key,
132–133
Volume shadow copies (VSCs),
257
Volume Shadow Copy Service (VSS)
timeline analysis data sources,
242–243
Volume Shadow Copy (VSC)
analysis system set-up,
23
historical Registry data,
152b
indirect artifacts,
15–16
live systems
as Registry information source,
162–163
ShadowExplorer v0.8 interface,
55f
system files System Restore Points,
51b
timeline analysis via visualization,
246
UserAssist historical data,
160b
XP System Restore Points,
50f
Volume Shadow Service,
52–53
W
Wardriving, WiFi geolocation mapping,
146
Warez server, intrusions,
17
Warnings
Application Event Logs,
184
at.exe
vs. schtasks.exe,
103
Googled malware information,
192
“knowing what to look for,”,
198
mixing protection mechanisms,
188
multiple persistence mechanisms,
180
Perl module installations,
232
USBStor subkey LastWrite time,
133b
Windows Event Log parsing,
237
Web history analysis, expert tips,
143b
Web sites, initial infection vector,
173–174
Wevtutil.exe, Event Log conversion,
93
WiFi geolocation mapping, expert tips,
146b–147b
Window of compromise
initial infection vector,
173
LEGACY_IMDISK LastWrite time,
140–141
alternate Registry sources,
161
Apple product application files,
115
application prefetching,
181
Applications/Services logs,
91
Audit Policy settings,
38f
Explorer shell searches,
5
F-Response VSC demo set-up,
57b
historical Registry data,
152b
malware persistence mechanism,
177–178
prefetch files and TLN creation,
238–239
Previous Versions shell extension,
51f
Volume Shadow Copies (VSCs),
120
Registry as log file,
124
Software hive application analysis,
143,
145
SSD drive prefetch settings,
98
Task Scheduler applet,
103f
U3-enabled device analysis,
125
USB external drive analysis,
134
Windows Defender logs,
186
Windows 8
application prefetching,
181
prefetch files and TLN creation,
238
Security Event Logs,
88–89
Windows 2008
analysis system set-up,
23
application prefetching,
181
prefetch files and TLN creation,
238
Security Event Logs,
88–89
USB external drive analysis,
135
Windows Explorer shell
malware persistence mechanism,
177
VSCs in acquired images,
61–62
Windows Local Group Policy,
178
Windows Management Instrumentation (WMI),
54b,
198–199
Windows Media Player,
144
Windows Registry Forensics (Carvey),
64
Windows Registry Recovery tool,
282
direct
vs. indirect artifacts,
14b–15b
interesting artifact searches,
90
Internet activity analysis,
204
Internet history information,
14b–15b
Windows shortcuts and USB devices,
255–257
analysis system set-up,
22–25
Apple product application files,
115
application prefetching,
97
auditing functionality,
37–38
event parsing into timeline,
243–244
events file creation,
244b
file format diversity,
76
file system tunneling,
84
indepth malware detection techniques,
192–193
logs and incident response,
36–41
malware persistence mechanism,
175–176
Registry analysis checklists,
125b
system “noisiness,”,
17–18
timeline analysis data sources,
215,
242
timeline analysis via visualization,
246
timeline time formats,
222
tracking user activity,
154b
VSC access automation,
70
Windows Vista
analysis system set-up,
23
application prefetching,
181
Explorer shell searches,
5
prefetch files and TLN creation,
238
Security Event Logs,
88–89
Windows Defender logs,
186
Apple product application files,
115
application prefetching,
181
Carbon Black log example,
39
Event Logs, timeline creation,
233–235
Explorer shell searches,
5
prefetch files and TLN creation,
238
Process Registry key,
5–6
Scheduled Task Wizard,
101f
Security Event Logs,
88–89
system files in System Restore Points,
51
system “noisiness,”,
17–18
System Restore Points,
50f
timeline data volume,
243b
VSS implementation,
9,
50
Windows Defender logs,
186
C6d3bf33.Windows.XP.Mode key,
160,
161f
Windows XP SP3 system
file system tunneling example,
84
time stomping example,
82–83
WLAN-AutoConfig log, event example,
92f
Worms, early Internet,
17–18
Write-blockers, hard drive imaging,
4
X
Y
Yara project, malware detection,
194
Z