Theme 3: Analysis Flashcards
(30 cards)
Preliminary Investigation
a scientific, structured stage for identifying and organising core investigations to form the groundwork of a defensible, logical case
Stages of Preliminary Investigation
- Preparation: Prepare hardware, software, tools. Tools must be tested to function as expected and that the process is reliable
- Validate Image: Confirm evidential provenance and integrity (imaging report, disk hash)
- Understand Disk Layout: Create partition map. Identify gaps, suspicious patterns
- Operating Systems: Note the version, system name, installation date etc.
- Identify User Accounts: Actions can be linked to accounts
- Note Additions: Identify software installed by the user
- Investigate Connected Hardware: Understand storage and peripherals
- Understand Activity: Build a timeline from programs run, files accessed
Failure to do Preliminary Investigation
context may be lost and inability to defend findings in court
Case-driven Analysis
Case-driven analysis contextualises information by corroborating artefacts and connecting supplementary data to understand the case
Corroborating Data
Supports other evidence
Supplementary Data
Adds context
What is a core operating system artefacts
system-level records created by the operating system that can be used to reconstruct user activity and build timelines to support/refute claims
Core OS Artefact: Registry Store
User and system settings useful for understanding user habits
Core OS Artefact: Recent Files List
Useful for timeline and intent reconstruction
Core OS Artefact: System Logs
Logs system and user events for a reliable timeline
Core OS Artefact: Clipboard History
Short-lived data
Core OS Artefact: Shellbags
Windows feature, preferences of folder views and settings. Shows navigation
Core OS Artefact: Print History
Logs print jobs to prove intent to share
Core OS Artefact: Swap/Page File
Extends RAM to disk. Contains snapshot of volatile data
Core OS Artefact: Thumbnail Cache
Stores image previews, including those of deleted files
Core OS Artefact: Recycle Bin
Holds ‘deleted’ files and can be used to recover data
Core OS Artefact: Browser History
Web activity for intent, research, and external communication
Core OS Artefact: App Launch Data
Execution of programs, can prove malware execution
Core OS Artefact: Restore Points
Backups of OS state and files
Core OS Artefact: Connected Devices
USB and hardware connections
Core OS Artefact: Scheduled Tasks
Automate system and user tasks. For attempting alibi or for malware to maintain control
Altering Artefacts
- Timestomping: Altering metadata to mislead timelines
- Log Clearing: Manual deletion of logs
- System Restore Abuse: Rollback artefacts
Windows Thumbnail Cache
The Windows thumbnail cache stores thumbnail images generated by the OS to provide previews of files.
The cache shows residual evidence of a file’s existence even after the file is deleted. They also can contain useful metadata.
Limitations of Thumbnail Cache
The OS can generated thumbnails automatically, they are not enough alone to prove access of a file