Forensics Tools by Windows Artefact

svch0st
3 min readJul 8, 2019

--

I’ve organised the tools I normally go to by the artefact it’s used for. Of course these are my personal preference, so try as many tools as you can or better yet, make them from scratch yourself. The better you understand the artefact, the more you will get out of tools.

Summary

UserAssist

HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist

Registry Explorer/RECmd — A versatile registry tool by Eric Zimmerman. It’s GUI has a builtin parser to display the entries in their un-ROT13 form.

Shimcache

HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\AppCompatCache\AppCompatCache

Registry Explorer/RECmd — The less tools the better. Registry Explorer has an AppCompatCache viewer all while still being a fast application. It even bookmarks them for you when you load the hives!

Amcache.hve

C:\Windows\AppCompat\Programs\Amcache.hve

AmcacheParser — There has been a lot of research on this artefact and as it contains the SHA1 hash executables, it’s one of my favourites. Please read Eric’s intro blog about the tool as it has some very helpful command line switches

System Resource Usage Monitor (SRUM)

C:\Windows\system32\sru\SRUDB.dat

srum-dump — This python based tool can dump the database to CSV so you can easily calculate usages by process.

Prefetch

C:\Windows\Prefetch\*.pf

PECmd — You can run it per prefetch file, or just recursively on a directory containing multiple prefetch files.

Event Logs

C:\Windows\System32\winevt\Logs\*.evtx

Event Log Explorer — Quick lightweight event log view that is much easier to search and filter through compared to the built-in viewer. Free Personal Use License.

USN Journal

c:\$Extend\$UsnJrnl:$J

To Obtain: ExtractUsnJrnl — jschicht created a smart tool that grabs only what you need from the $J alternate data stream of the $UsnJrnl and keeps the output file size small.

To Parse: UsnJrnl2Csv — as seen above jschicht has great forensic tools and his *2Csv tools are no different.

MFT

c:\$MFT

To Obtain: RawCopy — I use this generally for anything that is locked by the system. It also supports sending the data to a remote system.

To Parse: MFTDump.exe — I’ve use a few MFT parsers but this one seems to handle deleted files the best and has all the timestamp fields.

Here is an awesome blog detailing the difference between a few MFT tools so you can make up your own mind. It doesn’t include my 2nd favourite, MFT2Csv, which even has a GUI!

Thanks for reading! — @7a616368

--

--

No responses yet