
Please access this website using a laptop / desktop or tablet for the best experience
Search Results
498 results found with an empty search
- Linking USB Devices to User Accounts and using Microsoft-Windows-Partition/Diagnostic.evtx for Device Profiling"
Linking USB Devices to User Accounts If the d evice you’re profiling is a mass storage class USBSTOR device , you can go a step further and try to tie the device to a specific user account. This is where the NTUSER.DAT registry hive comes into play. ------------------------------------------------------------------------------------------------------- Why NTUSER.DAT Matters Each user on a system has an NTUSER.DAT hive , which keeps track of their personal settings and activity. When a user logs in, their NTUSER.DAT hive is loaded into memory . Inside this hive, there’s a key called: NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2 This key logs details about: Mounted volumes (like USB devices) Network shares accessed by the user If the Volume GUID you identified earlier from the SYSTEM\MountedDevices key appears in this MountPoints2 key, it means: The user was logged in when the device was connected. Or, it was the last account logged in before the device was introduced. ------------------------------------------------------------------------------------------------------- How to Check for User Activity Load NTUSER.DAT hives: Load all NTUSER.DAT hives for suspected users into Registry Explorer. Search for the Volume GUID: Use the Find tool in Registry Explorer and search for the GUID (e.g., 7560496c-3102-11e8-9eb7-9eb6d0dc1465). Verify matches: If you find a sub-key matching the GUID, that user’s account interacted with or was active while the device was connected. The last write timestamp of the sub-key can give you an idea of the last time the device was connected. ------------------------------------------------------------------------------------------------------- Important Notes Be cautious! If a user logs out or reboots the system while the device is still connected, Windows may incorrectly attribute the device to the last logged-in account. This issue is common in older versions of Windows. To confirm user activity, cross-reference with: Logon/logoff events from Windows Event Logs. Other artifacts like browser history or shell items. Multiple accounts: Don’t forget to check all NTUSER.DAT hives for matches if there are multiple users on the system. Non-USBSTOR devices: If you’re profiling a device that isn’t a USB storage device, this method won’t work . Instead, use connection timestamps and Event Logs to link device usage to user activity. ------------------------------------------------------------------------------------------------------- Beyond USB Devices: Network Shares The MountPoints2 key doesn’t just track USB devices ; it also logs network shares accessed by the user. This can be helpful for: Tracking lateral movement in an investigation. Identifying systems accessed by an attacker or malicious insider. Example: A share named Ubuntu-24.04 was accessed by the user on the system #wsl.localhost# ------------------------------------------------------------------------------------------------------- Microsoft-Windows-Partition/Diagnostic.evtx for Device Profiling (Win10+) Windows 10 introduced a valuable custom log, Microsoft-Windows-Partition/Diagnostic.evtx , which records detailed information about connected and disconnected devices. This log, particularly Event ID 1006 , is a game-changer for investigating mass storage class (MSC) devices. What Event ID 1006 Captures Each Event ID 1006 entry logs detailed data when an MSC device is connected or disconnected , including: Device Details: Manufacturer, Model, Vendor ID (VID), and Product ID (PID). Disk capacity. SCSI Serial Number (labeled as "SerialNumber"). iSerialNumber (found in the "ParentId" field). Partition Data: Contents of the Master Boot Record (MBR) . Volume Boot Records (VBRs) f or up to three partitions. These logs provide historical records of device usage, including internal devices like SSD drives. Connection vs. Disconnection Events Capacity Field: Populated for connection events (records the device’s capacity). Displays " 0" for disconnection events . Pro Tip: Be mindful of events triggered by sleep/hibernation or shutdown . For instance: If a device remains connected during sleep mode, a new connection event will be logged upon resumption , creating back-to-back connect events without a corresponding disconnect event in between. Strengths and Limitations Advantages: Tracks every device connection and disconnectio n with comprehensive data. Provides timestamps for all events, helping to establish device activity timelines. Far surpasses earlier removable device logging capabilities. Limitations: The log may be cleared during major Windows updates , retaining only post-update data. Initially displays the message "For internal use only" in the Event Viewer, but the XML Details view reveals all the detailed information. Pro Tip: Start with This Log If you're profiling devices on Windows 10 or later, begin your investigation with Microsoft-Windows-Partition/Diagnostic.evtx . It provides a wealth of data upfront, saving time and effort in the profiling process. While additional details like user accounts and drive letters may require further investigation, this log is an exceptional resource for building a foundational understanding of device activity . -------------------------------------------------------Dean------------------------------------
- Auditing Files and Folders on External Media || Tools for USB Device Analysis
When investigating external media connected to a system, determining what files and folders were accessed on the media is critical. This can be achieved by linking LNK files and Jump List shell items to device details using the Volume Serial Number (VSN) . ------------------------------------------------------------------------------------------------------------ What Is a Volume Serial Number (VSN)? Found in the Volume Boot Record (VBR) of FAT, exFAT, and NTFS file systems. Captured in LNK files and Jump List entries for every file or folder accessed on the device. Matching the VSN between a removable device and a shell item confirms the source of the accessed files or folders. How to Retrieve a Device’s VSN VSN can be retrieved through Windows artifacts , such as: 1. Microsoft-Windows-Partition/Diagnostic.evtx What it records: The Master Boot Record (MBR) and Volume Boot Records (VBR) for up to three partitions. Detailed data like disk signature, partition structure, and Volume Serial Numbers. How to extract VSN from raw data: Hex offsets: FAT: Offset 0x43 exFAT: Offset 0x64 NTFS: Offset 0x48 Important: Convert the Little Endian byte order to the correct format. Tools to simplify this process: Partition-4DiagnosticParser : Maps raw hex data to human-readable output. USB Detective: Extracts VSN and other device details automatically. ------------------------------------------------------------------------------------------------------------ 2. EMDMgmt Registry Key Location: SOFTWARE\Microsoft\Windows NT\CurrentVersion\EMDMgmt Details captured: Manufacturer, iSerialNumber, Volume Name, and Volume Serial Number (in decimal form). Note: Convert the decimal VSN to hex to match shell item records. This key may not be available on systems with SSDs , as it was o riginally tied to the now-defunct ReadyBoost feature. ----------------------------------------------------------------------------------------------------------------------------- Key Insights About VSNs VSN Changes: A device’s VSN changes every time the partition is reformatted. If the same iSerialNumber appears with different VSNs , it indicates the device was reformatted. U se timestamps from the Partition/Diagnostic log or EMDMgmt key to estimate when formatting occurred. Non-Windows File Systems: VSN data is not recorded for Mac, Linux, or GPT partitions. ----------------------------------------------------------------------------------------------------------------------------- Tools for USB Device Analysis 1. USB Detective What it offers: Automates the USB forensics process, pulling data from various sources: Registry keys (e.g., DeviceMigration, EMDMgmt). Event Logs (e.g., Microsoft-Windows-Partition/Diagnostic.evtx). Shell items (e.g., LNK files, Jump Lists, ShellBags). Volume Shadow Copies for historical analysis. Strengths: Provides an intuitive interface and links data to original sources for easy validation. Consolidates and simplifies device activity audits. First screenshot: 2nd Screenshot: 3rd After Processing Output: 2. parseUSBs.py ( https://github.com/khyrenz/parseusbs ) An open-source Python script by Kathryn Hedley. Parses registry hives and outputs findings in CSV format. Strengths: Simple and efficient for written reports. Useful for quick analyses. Limitations: Less comprehensive than USB Detective. Thank you for taking the time to dive into this deep exploration of USB device forensics and the critical tools and techniques that can simplify the process. By mastering these methods, you'll be equipped to uncover valuable insights during investigations efficiently. See you in the next article, where we'll explore more cutting-edge forensic strategies and tools. Until then, happy investigating! 🚀 --------------------------------------------Dean--------------------------------------------
- Tracking Drive Letters and Volume GUIDs : A Forensic Guide
When investigating devices connected to a computer, every small detail can help. Identifying Drive letter: For instance, the v olume name used by a device can link it to files like LNK files , which store volume name The drive letter assigned to the device can lead us to other artifacts like Prefetch files, RecentDocs, Jump Lists, ShellBags, and more. But there’s a catch: drive letter info isn’t always available . Windows only keeps records of the last device assigned to a specific drive letter. Also, the same drive letter can be reused for multiple devices(This can be problematic in because most recent device and its associated information will be recorded). Still, certain artifacts, especially in newer Windows versions (10 and 11), tend to stick around longer, even after system updates. ------------------------------------------------------------------------------------------------------------ Let’s look at two key places where you can dig for drive letter and volume name info: VolumeInfoCache and MountedDevices . 1. VolumeInfoCache: A Quick and Easy Check If you're using Windows 7 or later, this is your starting point. The VolumeInfoCache is located at: SOFTWARE\Microsoft\Windows Search\VolumeInfoCache This key contains sub-keys for each drive letter (like C:, D:, E:, etc.). Each sub-key has a VolumeLabel value, which tells you the volume name of the last device connected to that drive letter. Why use it? Quick and simple: It’s easier to read compared to other registry keys. Good for SCSI drives and VHDs: Especially useful for modern devices like virtual hard drives or USB drives using UASP mode. Limitations: Only records the last device assigned to each drive letter. Timestamps here (the “last write time” of sub-keys) aren’t always reliable for figuring out exactly when the device was connected. 2. MountedDevices: A More Detailed Look If VolumeInfoCache doesn’t give you what you need, try checking SYSTEM\MountedDevices : This key tracks drive letters and the devices mounted to them. It’s especially useful for USB thumb drives ( USBSTOR devices). How it works: Look for values like \DosDevices\E: (where "E:" is the drive letter). Inside the value data, search for the device's iSerialNumber . This links the drive letter to the specific device. Things to keep in mind: Devices can be mounted with different drive letters over time, so check all drive letter values. You might not find a match if another device was mounted at the same drive letter later. ------------------------------------------------------------------------------------------------------------- Special Cases: Hard Drives and Partition Types Hard drives and SSDs (especially those with multiple partitions) are trickier to profil e. Here’s how they work based on the partition scheme: GPT Partitions: Values start with DMIO:ID. The last 16 bytes in the value are the Unique Partition GUID . Search for this GUID in the registry to find keys tied to the original device. For MBR Partitions: If you do not see DMIO:ID at the start of a drive letter value , and do not see a USBSTOR Device ID and iSerialNumber , you are likely looking at partition data from a device using the older Master Boot Record (MBR) partition scheme The first 4 bytes represent the Disk Signature . Search for this Disk Signature in the registry to uncover related keys that identify the device ------------------------------------------------------------------------------------------------------------- Why This Matters Understanding where and how to find drive letter and volume name info can make all the difference in your investigation. While VolumeInfoCache is a fast and easy starting point, SYSTEM\MountedDevices gives you a deeper dive , especially for older or more complex devices. With these tools, y ou’ll be able to connect devices to their artifacts and uncover the story behind what was plugged in and when. ------------------------------------------------------------------------------------------------------------- What’s a Volume GUID? A Volume GUID (Globally Unique Identifier) is Windows’ way of identifying a specific volume or partition on a device. It’s a unique name enclosed in curly braces \??\Volume{???????-????-????-????-??????} For devices like USB flash drives ( MSC USBSTOR ), this Volume GUID can help us track down user activity tied to the device in later steps. How to Find Volume GUIDs for USB Devices If you’re profiling a USB flash drive, check the value data of Volume GUID entries within the MountedDevices key. Look for the device’s iSerialNumber (the unique serial number). If it matches, you’ve found the Volume GUID for that device. Why Is This Step Important? This step lets you: Tie the device to a GUID: This helps you match the device with its associated user account in later steps. Track user activity: You’ll need this Volume GUID to dive deeper into the behavior of the device and its user. Special Note: This method only works for MSC USBSTOR devices, like USB flash drives. For other device types, y ou’ll need to rely on Windows Event Logs to identify which user account was active at the time the device was connected or used. ------------------------------------------------------------------------------------------------------ I know this is alot of information and I want to make thing wasy for you So you ready lets start Lets say you +you’ve identified a unique identifier for your device, such as the iSerialNumber . Registry explorer lets you search across all loaded registry hives at once, saving you a lot of time. How to Search for Device Information Load the right hives Make sure you’ve loaded the SYSTEM , SOFTWARE , and user NTUSER.DAT hives in Registry Explorer. These hives contain most of the data related to devices. Use the Find option: Go to Tools > Find and search for the device’s iSerialNumber (or another unique identifier diskid ). Review the results: If the device information is still present in the registry, you’ll likely see many search hits. Not all of them will be relevant, so focus on keys needed for device profiling. What to Look For Search results will typically include keys that provide: Device ID Last Mountpoint Drive Letter Volume GUID You may also find hits in less common locations, like Windows Portable Devices , which could provide additional details. Double-click any result of interest to jump directly to that registry key within Registry Explorer. Work Smarter, Not Harder While it’s possible to manually comb through the registry to profile a device, this process can be incredibly time-consuming—especially if you’re dealing with multiple devices. By using unique identifiers and leveraging tools like Registry Explorer’s search function, you can dramatically speed up the process. -----------------------------------------------Dean-------------------------------------------------
- Profiling Device Volume Names in the Windows Registry
Volume Name When performing a forensic examination of connected devices, one of the key pieces of information we aim to gather is the volume name associated with the device. However, it’s important to note that not all device types maintain volume names, and these names are not always mandatory. In some cases, if a device does not have a volume name, Windows will record the last mounted drive letter instead. Windows Portable Devices registry key This key stores valuable information about each device connected to the system , including the Device ID and iSerialNumber for each device . If a device has a volume name, it will be recorded here under the FriendlyName value. SOFTWARE\ Microsoft\Windows Portable Devices\Devices You can also grab the Volume Name and GUID , which can be handy for future reference. As i was doing analysis I recommend noting down iserial number as well diskid to match information in windows portable device My Personal recommendation use registry explorer this tool do all work for you --------------------------------------------------------------------------------------------------------- Different Device Classes Different device classes (e.g., USBSTOR , MSC , MTP ) store varying amounts of data in the registry. USBSTOR devices are typically the most complete, providing Device ID , iSerialNumber , and FriendlyName . For other devices like smartphones using MTP , or UASP drives, less information might be available. If you encounter a device that’s missing critical information, dig into the raw sub-keys where you might find additional identifiers like VID (Vendor ID), PID (Product ID), or even DiskID for certain devices. --------------------------------------------------------------------------------------------------------- Handling SD Cards Interestingly, SD cards can also be tracked in this registry key, even though they are not USB devices . If an SD card is connected through an SD card reader, you might find its associated volume name under the Windows Portable Devices key as well . For instance, you could see a volume name like "SD_FILES" for the attached SD card, which could be valuable for profiling purposes. --------------------------------------------------------------------------------------------------------- LNK Files to the Rescue Even if the drive letter isn't directly mapped, don't lose hope! Many LNK files include the Volume Name, sometimes alongside the drive letter. With timestamp analysis and LNK file correlation, you can often deduce the potential drive letter. --------------------------------------------------------------------------------------------------------- Conclusion When profiling devices through the Windows registry, the volume name can be a critical piece of evidence, especially when tracking devices that are used for malicious purposes or when identifying artifacts left behind by terminated employees. By focusing on the FriendlyName value under the Windows Portable Devices key, you can gather valuable information about the device, including its volume name, which can later be used to cross-reference other data and build a complete profile of the device’s activity on the system. -------------------------------------------Dean-------------------------------------------
- Audit USB Devices on Windows : USBSTOR and USB
Updated on Jan 24, 2025 USB devices play a crucial role in digital forensics and IT security. Whether you're investigating a security incident, checking for unauthorized device usage, or simply maintaining logs, auditing USB device history is essential. One of the best places to start is the Windows Registry, specifically the SYSTEM\CurrentControlSet\Enum\USB key. Let’s break it down in an easy-to-follow manner. ----------------------------------------------------------------------------------------------------------- USB Registry Key Understanding the USB Registry Key The SYSTEM\CurrentControlSet\Enum\USB key tracks all USB devices that have been connected to the system. USBSTOR (Mass storage devices like flash drives and external hard drives) UASP (Advanced storage devices) MTP/PTP (Smartphones, digital cameras) HID (Keyboards, mice, game controllers) USB Hubs (External USB hubs for multiple connections) This registry key gives investigators a broad overview of USB activity on a machine, helping to track down unauthorized or suspicious devices. ----------------------------------------------------------------------------------------------------------- What Information Can You Extract? When auditing USB devices, the following information is critical: Device Type: Identifies whether it's a storage device, keyboard, webcam, etc. Vendor ID (VID): Represents the manufacturer of the device. Product ID (PID): Identifies the specific product. Device iSerialNumber: A unique identifier for tracking devices across different registry keys and logs. ParentIdPrefix (for UASP devices): Helps associate devices with their storage controllers. Under each iSerialNumber sub-key, you’ll find key attributes like: DeviceDesc – Provides a user-friendly description of the device. Service – Indicates the type of service associated with the device. These values can be cross-referenced with databases like the USB IDs Repository or DeviceHunt to determine the manufacturer and device type. As u can see this screenshot Service is UBSTOR( There are multiple services avaible which help you determined what type of device connected) Understanding Service Types Common Service types are:******* Important to understand type of device****** USBSTOR (MSC USBSTOR) UASPSTOR (MSC UASP SCSI) HidUSB (HID input device) WUDFWpdMtp (MTP device like smartphone) usbvideo (Video device like webcam) usbaudio (Microphone) USBHUB3 (USB hub) BTHUSB (Bluetooth) vmusb (Vmware USB device pass-through) usbccgp (Composite USB device - a peripheral that has combined functionality from one or more device class. A keyboard with combined mouse input is one example) ----------------------------------------------------------------------------------------------------------- ********************************** With the arrival of USB 3.0, a new and improved transfer protocol called USB Attached SCSI Protocol (UASP) was introduced. UASP allowing for much faster and multi-threaded data transfers. It was primarily designed to handle high-speed solid-state drives (SSDs) and to maximize the faster data rates of USB 3.0. UASP works with USB 3.x SuperSpeed, Thunderbolt, and even USB4. Kindly Note: Modern systems using UASP don’t store their information there! Instead, UASP devices are logged under a different registry key called SCSI. This means that if you only look at USBSTOR, you could be missing some crucial evidence. ********************************** ----------------------------------------------------------------------------------------------------------- Real-World Example Let’s say you find a device with: VID: 1058 PID: 25A2 Service: USBSTOR (Indicating it’s a mass storage device) Looking up these values online,( https://devicehunt.com/ ), ( http://www.linux-usb.org/usb.ids ) you can even find images of the exact device model. This level of detail can be invaluable in investigations. Yeah its true my Hardrive is belong to this vendor name ----------------------------------------------------------------------------------------------------------- Making this easy for you! Manually going through each registry key can be time-consuming, especially on systems with numerous USB connections. Tools like Registry Explorer come with plugins that can extract and present USB audit data in a structured format. Best Practices: Sort by Device Name to quickly find the devices of interest. Sort by Timestamp (last write time of VID/PID key) to track activity within a specific investigation window. Be cautious: Registry timestamps may not always reflect the last usage time accurately. Cross-check with Event Logs for more precise data. ----------------------------------------------------------------------------------------------------------- USBSTOR Registry Key For mass storage devices (MSC USBSTOR) , additional details are available under SYSTEM\\Enum\USBSTOR. This key contains subkeys named after the Device ID , with one or more subkeys representing iSerialNumbers . By matching an iSerialNumber from USB to USBSTOR, we can extract further details such as: Device ID (Stored in the USBSTOR sub-key name) FriendlyName (Human-readable name of the device) First Time Device Connected Last Time Device Connected Last Removal Time Additionally, each USBSTOR entry contains a DiskId value located at: The DiskId correlates with Microsoft-Windows-Partition/Diagnostic.evtx , which provides further metadata and timestamps. Conclusion Whether investigating unauthorized access, tracking lost data, or analyzing security threats, this method provides a solid foundation for USB audits. Stay tuned for the next article, where we will analyze USB time tracking in greater detail! ----------------------------------------------Dean--------------------------------------------------
- Unlocking ShellBags Analysis with ShellBags Explorer (SBE) / SBECmd.exe
ShellBags can provide invaluable insights into a user’s activity— helping forensic analysts reconstruct deleted folders, track accessed directories, and correlate timestamps with other evidence. While parsing ShellBags manually is complex and tedious , ShellBags Explorer (SBE) by Eric Zimmerman simplifies this process , offering a comprehensive, automated, and user-friendly way to extract and analyze these artifacts. ----------------------------------------------------------------------------------------------------------- What is ShellBags Explorer (SBE)? ShellBags Explorer is a free, all-in-one forensic tool designed to parse ShellBags artifacts effortlessly. It eliminates the need for laborious manual steps, automates the decoding of registry data, and helps investigators visually reconstruct a user’s directory structure. Whether dealing with deleted folders or hidden user activity , SBE makes ShellBags analysis more efficient and insightful. SBE is available in both GUI and command-line versions , making it adaptable for different forensic workflows. The command-line version is particularly useful when scripting or integrating analysis into a broader forensic pipeline. ----------------------------------------------------------------------------------------------------------- Understanding the SBE Interface SBE is designed to be intuitive, especially for those familiar with forensic GUI tools . The interface consists of three main sections: 🔹 Tree View (Left Panel): Displays a hierarchical representation of identified folders, directly sourced from the BagMRU registry key. 🔹 Table View (Right Panel): Shows metadata for child folders, including timestamps (First Interacted, Last Interacted) and additional Shell Item details. Sorting and filtering make it easier to pinpoint critical evidence. 🔹 Details & Summary View (Bottom Panel): Provides in-depth insights into selected folders, including the full file path, registry key locations, NodeSlot references, and timestamps. ----------------------------------------------------------------------------------------------------------- How ShellBags Store Information The BagMRU key is responsible for maintaining a list of child folders and an MRU (Most Recently Used) list , which records the order in which folders were interacted with. One crucial aspect of ShellBags analysis is that the most recently accessed folder (MRU Position #0) is often referred to as the "Last Interacted" time , tells us the last time the user interacted with that folder. However, this creates a significant limitation: If a parent folder contains multiple child folders, only the most recently accessed one can be assigned a timestamp. The other child folders remain without a definitive timestamp , making it impossible to determine when they were last interacted with. Example Breakdown Let's take a practical example to better understand how this works. Suppose we have three folders under a parent folder, as seen in forensic tools like ShellBags Explorer . Only one folder (e.g., "Windows") has a "Last Interacted" timestamp. That folder is also positioned as MRU Position #0 in the MRU list. we can see the following MRU sequence: Position 0 (most recently accessed) → Folder: "Windows" Position 1 → Folder: "Users" Position 2 → Folder: "Program data" The registry key timestamp of the parent folder (e.g., 2023-03-24 18:14:00.598 UTC ) is assigned only to MRU Position #0 , confirming that " Windows" was the last folder interacted with. Why This Matters in Forensics Understanding this timestamp limitation is crucial when reconstructing user activity. Investigators must be aware that: Not all accessed folders will have timestamps. Only the most recently interacted folder within a parent directory will. Correlating with other forensic artifacts is necessary . Combining ShellBags analysis with other sources like Windows Event Logs, USN Journal, or Prefetch data can provide a more complete timeline of user activity. ----------------------------------------------------------------------------------------------------------- First Interacted Timestamps in ShellBags First Interacted timestamps are identified differently than Last Interacted times. Here's how it works: When a folder is added to BagMRU for the first time , a registry key is created. The last write time of that key becomes the First Interacted timestamp . If no subfolders unde r that key are later accessed , this timestamp remains unchanged. Why This Matters in Forensics Understanding both First and Last Interacted timestamps is crucial when reconstructing user activity. Investigators should remember: Only folders without subfolders have First Interacted timestamps. L ast Interacted timestamps are reassigned when new folders are accessed within a parent directory. Correlating with other forensic artifacts like Windows Event Logs or USN Journal enhances timeline accuracy. ----------------------------------------------------------------------------------------------------------- Target Timestamps in ShellBags Created: Records when the folder was first created . Modified: Reflects when a file was last added or deleted within the folder . Accessed: (If enabled in Windows) Indicates the last time a file was opened from the folder. These timestamps are recorded during the first interaction with the folder and typically do not get updated later . This makes them crucial in forensic investigations, especially if the folder was deleted, located on a removable device, or stored on a remote system . Example Use Cases: Detecting suspicious folder creation on a USB drive on the day an employee was terminated. Identifying folders modified during a known external intrusion . ----------------------------------------------------------------------------------------------------------- MFT Entry and File System Identification in ShellBags ShellBags store the MFT Entry Number / File System for a folder, which can be viewed in ShellBags Explorer. This can help forensic analysts match folder metadata with specific storage devices (e.g., network shares, USB drives). Why is this important? *****Helps distinguish between removable media and system drives (system drives are not formatted as FAT or exFAT)***. Allows precise correlation between ShellBags data and specific devices. ----------------------------------------------------------------------------------------------------------- Indicators of User Interaction with folder in ShellBags Vincent Lo's research revealed that actions such as deleting, copying, and renaming a folder can create ShellBags entries. This is why the t erm "interacted" is preferred over "accessed" when analyzing ShellBags data. User Interaction David Cowen and Eric Zimmerman found that the presence of settings values within a folder’s Bags key is a strong indicator that a user has explored that folder . The ShellBags Explorer tool automatically detects this and marks such folders in the "Has Explored" column. A checkmark in this column suggests that at least two settings values exist, i ncreasing the likelihood that the user accessed the folder. However, modern operating systems are complex , and r are cases may exist where a folder has Bags settings data without direct user interaction . For critical forensic conclusions , it’s best to corroborate ShellBags findings with other artifacts, such as LNK files showing file access from that folder. ----------------------------------------------------------------------------------------------------------- SBECmd Command Line This tool offers the same capabilities and data extraction functionalities but in a command-line format, making it particularly useful for automation and large-scale forensic investigations . Running SBECmd Against Mounted Triage Images When working with a mounted forensic image , you can run SBECmd against the entire Users folder or a specific user's folder Since Eric Zimmerman's tools support recursive searching , SBECmd will automatically scan subdirectories to locate and parse: NTUSER.DAT UsrClass.dat Each parsed hive will generate a separate CSV file containing the extracted ShellBags data. Example Command Usage The following SBECmd command extracts ShellBags data and saves the output in CSV format: SBECmd.exe -d G:\G --csv "E:\Output for testing\Website investigation" --csvf shellbags.csv Output: ----------------------------------------------------------------------------------------------------------- Reference: ----------------------------------------------------------------------------------------------------------- Conclusion: ShellBags are a powerful forensic artifact that provide critical insights into user activity on a Windows system. Because ShellBags store historical user activity , they are incredibly useful in intrusion investigations, insider threat cases, and digital forensic analysis . However, understanding and parsing them manually can be complex. Use Tool like SBECmd.exe and Shellbag explorer Thanks for staying with me on this journey see u in next article—so stay tuned! 🚀
- Understanding ShellBags: A Forensic Goldmine in Windows Investigations
When investigating user activity on a Windows system, ShellBags are one of the most powerful yet misunderstood forensic artifacts. They provide proof that a folder or virtual object was accessed , even if it has been deleted, moved, or no longer exists . However, ShellBags can be complex to analyze, which often makes them intimidating for investigators. ------------------------------------------------------------------------------------------------------ 📌 What Are ShellBags? ShellBags are Windows registry entries that store user preferences for how folders are displayed in File Explorer . However, beyond user preferences, these keys provide valuable forensic insights. Investigators can use ShellBags to answer critical questions such as: ✔ Did a user browse a folder before deleting it? ✔ Were external USB drives or cloud storage folders accessed? ✔ Did the user open password-protected or encrypted drives? ✔ What files and folders existed before deletion? But here’s the key forensic takeaway: 📌 If a ShellBag exists for a folder, it proves a user interacted with it via the Windows GUI (File Explorer). This means even if the folder is deleted or stored on a removable drive , ShellBags may still contain evidence of its existence. ------------------------------------------------------------------------------------------------------ How Do ShellBags Work? ShellBags track more than just regular folders. Windows also treats ZIP archives, mobile device filesystems, control panel applets , and more as folders. Notably, starting with Windows 11 22H2 , support was expanded to include 7-Zip, RAR, TAR, and Gzip archives. This is particularly relevant because attackers frequently use archived files to evade detection. With these updates, forensic analysts now have a new source of evidence in investigations. ShellBags store data in two main registry subkeys: BagMRU – Maintains the hierarchy and names of folders interacted with. Bags – Stores configuration details f or each folder. By examining timestamps stored in ShellBags, investigators can determine when a folder was first and last accessed , correlating this with other forensic artifacts. ------------------------------------------------------------------------------------------------------ 🗂 Where Are ShellBags Stored? ShellBags are registry entries found in different locations depending on the Windows version: 📌 Windows 7 and later NTUSER.DAT\Software\Microsoft\Windows\Shell\BagMRU NTUSER.DAT\Software\Microsoft\Windows\Shell\Bags USRCLASS.DAT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU USRCLASS.DAT\Local Settings\Software\Microsoft\Windows\Shell\Bags 📌 Windows XP (Older storage format) NTUSER.DAT\Software\Microsoft\Windows\Shell\Bags NTUSER.DAT\Software\Microsoft\Windows\Shell\BagMRU NTUSER.DAT\Software\Microsoft\Windows\ShellNoRoam\Bags NTUSER.DAT\Software\Microsoft\Windows\ShellNoRoam\BagMRU NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\StreamMRU 💡 Tip: The NTUSER.DAT and USRCLASS.DAT registry hives store this information per user . So, ShellBag entries are unique for each Windows account ------------------------------------------------------------------------------------------------------ ⏳ Timestamp Analysis in ShellBags One of the most important forensic aspects of ShellBags is their timestamps . ✔When a user first accessed a folder (First Interacted time). ✔ When the folder settings were last modified (Last Interacted time). . 📌 Key Takeaway: This is especially useful for tracking user activity across removable storage devices, encrypted volumes, or cloud-based folders . ------------------------------------------------------------------------------------------------------ Making ShellBags Analysis Easier ShellBags analysis can be complex, but tools automate the parsing process, making it easier to focus on results rather than raw registry data . In my next article, I'll walk you through using automated tools to parse ShellBags , allowing you to focus solely on analysis rather than manual extraction. To better understand ShellBags in action, I highly recommend watching 13Cubed’s YouTube episode on the topic: Watch here ------------------------------------------------------------------------------------------------------ 💡 Real-World Forensic Use Cases of ShellBags 1️⃣ Case Study: Investigating a Deleted Folder A suspect claims they never accessed a sensitive folder that has since been deleted . 📌 Solution: Investigate ShellBags! ✔ The folder still exists in the registry . ✔ The timestamps show when it was last accessed. ✔ The folder was stored on a USB drive , proving removable storage was used. 2️⃣ Case Study: Proving Data Theft A company suspects an employee copied files to an external drive before resigning. 📌 Solution: ✔ ShellBags reveal the USB drive name & letter .✔ The timestamps show when folders on the USB were accessed. ✔ Jump Lists confirm that files from these folders were opened. 📢 Conclusion: Even if files were deleted, ShellBags provide concrete evidence of their existence! ------------------------------------------------------------------------------------------------------ 🔍 Final Thought: ShellBags might seem complex, but once you understand how they work, they become a powerful weapon in digital forensic investigations. Whether tracking deleted evidence, removable storage access, or user activity , they provide an invaluable historical record of what happened on a system. ----------------------------------------------Dean---------------------------------------------
- Windows Taskbar Jump Lists: A Forensic Goldmine
Jump Lists are one of the most overlooked yet powerful artifacts in Windows forensic investigations. Introduced in Windows 7 , they provide users with quick access to recently or frequently used files, websites, and applications directly from the taskbar or Start menu . But for forensic analysts, Jump Lists offer something even more valuable: a deep history of user activity , revealing files and folders accessed, websites visited, and applications frequently used—often persisting even after deletion or file wiping. ---------------------------------------------------------------------------------------------------------- How Jump Lists Work: Destinations vs. Tasks Jump Lists are made up of two main components: 1️⃣ Destinations – These track user interactions with files, folders, and websites . 2️⃣ Tasks – These represent application-specific actions , such as opening a private browsing session or launching a virtual machine. According to Microsoft’s Windows Software Development Kit (SDK): Destinations (t hings users interact with, such as files or folders ). Tasks act ( actions that apply to all users, such as "Open New Tab" in a browser ). Because Destinations track user behavior , they hold significant forensic value. ---------------------------------------------------------------------------------------------------------- Types of Jump Lists: Automatic vs. Custom Jump Lists are categorized into two types: 🔹 AutomaticDestinations Jump Lists (Forensically Rich) These are automatically generated by Windows for each application, storing up to 2,000 entries per application. They use a structured storage format (OLE CF) —essentially a container storing multiple data streams , including LNK files (shortcut files). Each entry in an Automatic Jump List contains: ✅ Full file path and filename ✅ Timestamps (creation, modification, last accessed) ✅ File size and attributes ✅ Storage device information (drive serial number, network path, MAC address, etc.) ✅ MRU (Most Recently Used) order 📌 Forensic Insight: Even if a file is deleted or wiped from the system, its Jump List entry may still exist , providing proof of prior access. 🔹 CustomDestinations Jump Lists (Application-Specific) These are manually created by application developers for custom functionality , such as: ✅ Favorite files or frequently visited websites ✅ Recently closed tabs in browsers ✅ Cloud file access history Custom Jump Lists u se a simpler format than Automatic Jump Lists, consisting of concatenated LNK files without additional metadata. 📌 Forensic Insight: Since Custom Jump Lists are managed by applications , they don’t always follow predictable timestamp patterns. Analysts should be cautious when interpreting their data. ---------------------------------------------------------------------------------------------------------- Jump List Storage Locations Jump Lists are stored in the same location as user LNK files , under the user’s Recent Items folder : 🔹 AutomaticDestinations Jump Lists: C:\Users\[Profile]\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations Each file inside this folder corresponds to an application , using an AppID-based filename (e.g., 5f7b5f1e01b83767.automaticDestinations-ms). 🔹 CustomDestinations Jump Lists: C:\Users\[Profile]\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations Similar to Automatic Jump Lists, each file represents an application using an AppID-based filename . ******************************************************************************************************************** Jump Lists and Recent Items Folder Visibility in Windows 10/11 If you're looking for .lnk files (shortcut files) and Jump Lists in Windows 10 or 11 , you might notice a d ifference in how they appear in File Explorer versus other tools . File Explorer View: Navigate to: C:\Users\{Username}\AppData\Roaming\Microsoft\Windows\ You will see Recent Items instead of Recent . This folder contains shortcut files (.lnk), but Jump Lists (AutomaticDestinations, CustomDestinations) may not be visible. PowerShell & Forensic Tools: KAPE and other forensic tools can still extract these artifacts, confirming that they are present. Key Takeaway Even if you don’t see Jump Lists in File Explorer , they are still there and accessible through forensic methods. This is likely due to system behavior changes in newer Windows versions. ****************************************************************************************************************** Analyzing Jump Lists for Digital Forensics 1️⃣ Extracting Data from AutomaticDestinations Jump Lists Because Automatic Jump Lists use OLE CF structured storage , specialized tools are required to extract their contents. E ach entry contains a linked LNK file , providing valuable metadata. 🛠 Tools for Analysis: ✅ JumpList Explorer / JLECmd – Parses Automatic Jump Lists and extracts LNK data. ✅ LECmd (by Eric Zimmerman) – Processes Jump List LNK files for timestamp analysis. ✅ Forensic Suites (e.g., Autopsy, X-Ways) – Some forensic tools have built-in Jump List parsers. 📌 Key Findings: Identify frequently accessed files (even if deleted). Track external device use (USB, network shares). Establish a timeline of file usage using MRU lists. ------------------------------------------------------------------------------------------------------------- 2️⃣ Analyzing CustomDestinations Jump Lists Because CustomDestinations Jump Lists concatenate LNK files togethe r , they are simpler to analyze but lack MRU ordering and additional timestamps . 📌 Key Findings: Identify favorite or recently closed items (e.g., browser history, cloud files). Review application-generated data (e.g., remote desktop connections). Cross-reference with Automatic Jump Lists for verification. 🛠 Tools for Analysis: ✅ LECmd – Extracts individual LNK files from concatenated lists. ✅ Hex Editors – Manually inspect for unique artifacts (such as website URLs). ------------------------------------------------------------------------------------------------------------- Jump Lists are an essential artifact in Windows forensic investigations , helping analysts track user activity, file access, and application usage. However, one of the biggest challenges with Jump Lists is their naming convention —instead of being named after applications, they are stored under unique Application Identifiers (AppIDs) . 1b4dd67f29cb1962.automaticDestinations-ms What Are Jump List AppIDs? Every application that utilizes J ump Lists is assigned a unique AppID , which is derived from the full installation path of the application. This ensures that even different versions of the same application (e.g., Microsoft Word 2013 vs. Word 365) have separate Jump Lists and do not interfere with each other. Key Characteristics of AppIDs: ✅ Universally Consistent – The same AppID for an application is used across all Windows systems. ✅ Path-Dependent – If an application is installed in a non-standard location , its AppID may differ. ✅ Persistent After Uninstallation – Jump Lists can remain on a system even after an application is removed , providing forensic evidence of prior use. Finding and Identifying Jump List AppIDs Since Windows does not label Jump Lists with application names , forensic analysts need to use other methods to determine which AppID corresponds to which application. 1️⃣ Checking Publicly Available AppID Lists Several repositories maintain AppID lookup tables , including: 📌 https://github.com/EricZimmerman/JumpList/blob/master/JumpList/Resources/AppIDs.txt These l ists allow investigators to match known AppIDs with common application s. 2️⃣ Using JLECmd for Automatic Identification JLECmd by Eric Zimmerman is a f orensic tool that automatically matches Jump List AppIDs to known applications using a built-in databas e. 📌 If the AppID is recognized, JLECmd will display the application name. 📌 If the AppID is unknown, the analyst will need to manually determine its origin. AppIDs in Automatic vs. Custom Jump Lists Both Automatic and Custom Jump Lists use the same AppID algorithm . However, there are key differences in their behavior: Jump List Type Location Metadata Stored Forensic Value Automatic AutomaticDestinations MRU order, timestamps, LNK files High (rich data, timestamps) Custom CustomDestinations Concatenated LNK files, limited metadata Moderate (useful but lacks MRU order) 📌 Since Custom Jump Lists are optional , they are often fewer in number and may not exist for all applications. 📌 Example: CCleaner has been observed to create Custom Jump Lists without an Automatic Jump List , emphasizing the need to check both folders . ------------------------------------------------------------------------------------------------------------- Forensic Case Study: Tracking User Activity with Jump Lists 🔍 Scenario: A company suspects an employee exfiltrated sensitive documents via a USB drive before resigning. 🛠 Investigation Steps: 1️⃣ Extract AutomaticDestinations Jump Lists Locate files in AutomaticDestinations. Parse with JumpList Explorer /JLECmd to identify recently accessed documents . Extract linked LNK files to reveal USB storage details . 2️⃣ Review CustomDestinations Jump Lists Inspect CustomDestinations for browser history or cloud storage access . Identify recently closed web page s (possible file uploads). 3️⃣ Cross-Check with Other Artifacts Compare Jump List entries with RecentDocs registry keys. Analyze the Recycle Bin for deleted files. Correlate USB serial numbers with those from registry artifacts (USBSTOR). 📌 Key Findings: ✅ Employee accessed "Confidential_Plan.pdf" from the company’s drive. ✅ LNK metadata reveals it was copied to a USB drive (serial number: ABC123) . ✅ Custom Jump Lists show Dropbox was accessed , suggesting potential cloud uploads . 🚀 Outcome: Jump Lists helped prove data exfiltration , strengthening the case against the employee. ------------------------------------------------------------------------------------------------------------- Preventing Data Loss: Disabling Jump Lists Jump Lists store a massive amount of historical user activity , which can be a security risk. Organizations can disable Jump Lists via: 1️⃣ Control Panel: Personalization -> Start -> "Show recently opened items in Jump Lists on Start or the taskbar" [Disable] 2️⃣ Group Policy (for enterprises): Computer Configuration -> Administrative Templates -> Start Menu and Taskbar -> Do not use the search-based method when resolving shell shortcuts. 📌 Note: Disabling Jump Lists wipes existing records but does not prevent recovery from unallocated disk space . ------------------------------------------------------------------------------------------------------------- Final Thoughts: Why Jump Lists Matter in Forensics Jump Lists are an invaluable resource for forensic investigators , offering a historical record of file access, browsing activity, and application usage . Their persistence—even after file deletion—makes them a crucial artifact for proving user intent and reconstructing events . ✅ Key Takeaways: Automatic Jump Lists store detailed metadata and MRU lists . Custom Jump Lists track browser and cloud activity . Even deleted files can leave traces in Jump Lists . Jump List analysis is essential for insider threat investigations . -------------------------------------------------------------------------------------------------------------
- OneDrive Forensics : Investigating Cloud Storage on Windows Systems
Microsoft OneDrive is the most widely used cloud storage service, thanks to its default integration in Windows and its enterprise adoption via Microsoft 365 . Understanding OneDrive forensic artifacts is crucial for investigations involving data exfiltration, insider threats, or deleted cloud files . We will cover: ✅ How to locate and analyze OneDrive data on a Windows system ✅ Key forensic artifacts, including logs, databases, and registry entries ✅ How to determine OneDrive activity, authentication, and file synchronization history ✅ How OneDrive’s new sync model affects forensic investigations ✅ Tracking cloud-only files & deleted data ✅ Using OneDrive’s forensic artifacts to recover missing evidence ---------------------------------------------------------------------------------------------------------- 1️⃣ Locating OneDrive Files on a Windows System By default, synced OneDrive files are stored in: %UserProfile%\OneDrive 💡 Important: If a user changes the default storage location , the original OneDrive folder remains empty . The true OneDrive folder location can be found in the Windows registry . Registry Key to Identify OneDrive Folder Location NTUSER\Software\Microsoft\OneDrive\Accounts\Personal This key contains: UserFolder → The actual OneDrive sync folder location cid/UserCid → A unique Microsoft Cloud ID UserEmail → The email used for the Microsoft account LastSignInTime → Last authentication timestamp (Unix epoch format) 💡 Why This Matters: If OneDrive is enabled , this registry key must exist . Investigators can track user activity even if OneDrive files have been moved or deleted. ---------------------------------------------------------------------------------------------------------- 2️⃣ Analyzing OneDrive File Metadata & Sync Database OneDrive stores metadata and sync information in: %UserProfile%\AppData\Local\Microsoft\OneDrive\settings This folder contains key artifacts, including: 📌 SyncEngineDatabase.db (Main OneDrive Database) Tracks both local and cloud-only files Lists file names, folder structure, and metadata Provides timestamps for file sync operations 💡 Why This Matters: Even cloud-only files (not only stored locally) are recorded here . Investigators can track deleted or moved files that no longer exist on the device. ---------------------------------------------------------------------------------------------------------- 3️⃣ OneDrive Logs: Tracking Uploads, Downloads, & File Changes OneDrive keeps detailed logs of file sync activities in: %UserProfile%\AppData\Local\Microsoft\OneDrive\logs These logs store up to 30 days of data and record: ✅ File uploads & downloads ✅ File renames & deletions ✅ Shared file access events 💡 Forensic Insight: Log files can reveal file activity , even if the user deleted local copies . Timestamps in .odl logs can correlate file transfers with other system activity. ---------------------------------------------------------------------------------------------------------- 4️⃣ OneDrive for Business: Additional Registry Artifacts Users with OneDrive for Business (Microsoft 365) will have a separate registry key: NTUSER\Software\Microsoft\OneDrive\Accounts\Business1 This key includes: UserFolder : Location of root of OneDrive local file storage UserEmail : Email tied to Microsoft cloud account LastSignInTime : Date and time of last authentication (Unix epoch time) ClientFirstSignInTimestamp : Time of first authentication of the account (Unix epoch time) SPOResourceID : SharePoint URL for OneDrive instance 💡 Why This Matters: Business OneDrive accounts store work-related data —a key forensic focus. The SPOResourceID can link OneDrive for Business files to a SharePoint instance . ---------------------------------------------------------------------------------------------------------- 5️⃣ Investigating Shared Files & Synced Data from Other Users OneDrive supports file sharing and folder synchronization across multiple accounts . Shared folders are tracked under: NTUSER\Software\Microsoft\OneDrive\Accounts\Personal\Tenants NTUSER\Software\Microsoft\OneDrive\Accounts\Business1\Tenants This key logs shared folders synced to OneDrive . It tracks files shared via Microsoft Teams & SharePoint . 💡 Forensic Insight: Shared folders may not be stored in the default OneDrive folder . Investigators should check all Tenant folders to avoid missing critical evidence . ---------------------------------------------------------------------------------------------------------- 6️⃣ SyncEngines Key: Advanced OneDrive Tracking A final high-value artifact for OneDrive investigations is: NTUSER\Software\SyncEngines\Providers\OneDrive It contains: MountPoint → Local file storage location (useful for tracking shared folders) UrlNamespace → Specifies whether the folder belongs to OneDrive, SharePoint, or Teams LastModifiedTime → The last time the folder was updated 💡 Why This Matters: Identifies all folders being synced , even if they are not in the default OneDrive location . Correlates data across Microsoft cloud services (OneDrive, Teams, SharePoint) . ---------------------------------------------------------------------------------------------------------- 7️⃣ Tracking OneDrive Web Access (Cloud-Only Activity) If a user accessed OneDrive through a web browser (instead of the local app), artifacts may appear in: Browser History (Edge, Chrome, Firefox) Windows Event Logs Cloud Access Logs (if available from Microsoft 365) OneDrive web access URLs look like this: https[:]/onedrive.live.com/?cid=310ff47e40c97767&id=310ff47e40c97767!145750 💡 Forensic Insight: The cid value in the URL matches the UserCid in registry keys —helpful for tracking multiple accounts . The res id parameter refers to specific files or folders accessed via the web client. ---------------------------------------------------------------------------------------------------------- 🛑 Key Challenges in OneDrive Forensics 🚨 1. Cloud-Only Files May Not Be Stored Locally Files accessed via " Files on Demand" may never be fully downloaded . Investigators must analyze metadata & sync logs to track cloud-only data. 🚨 2. Remote Deletions Can Hide Evidence Files deleted in OneDrive sync across all devices . Investigators may need Volume Shadow Copies or Microsoft 365 logs to recover data. 🚨 3. Personal & Business OneDrive Accounts Can Be Mixed Users often log into both accounts on the same system. Check registry keys to differentiate personal vs. business data . ---------------------------------------------------------------------------------------------------------- OneDrive as a Crucial Forensic Artifact Microsoft OneDrive leaves behind substantial forensic evidence , even for files that no longer exist locally . We will explore more about OneDrive in the next article (Advanced OneDrive Forensics: Investigating Cloud-Only Files & Synchronization) , so stay tuned! See you in the next one. --------------------------------------------Dean-------------------------------------------------
- Mastering JLECmd for Windows Jump List Forensics
Windows Jump Lists are a goldmine for forensic investigators, offering detailed insights into file access, user activity, and application usage . To efficiently analyze these artifacts, JLECmd , developed by Eric Zimmerman, provides comprehensive parsing of Jump List data , ensuring no valuable evidence is overlooked . ------------------------------------------------------------------------------------------------------------- 📁 Understanding Jump Lists: AutomaticDestinations vs and CustomDestinations Jump Lists are stored in a user’s Recent folder , but there are two different types: Jump List Type Location Metadata Stored Forensic Value Automatic AutomaticDestinations MRU order, timestamps, LNK files, file paths High (detailed tracking) Custom CustomDestinations Concatenated LNK files, limited metadata Moderate (useful but lacks MRU order) 🔹 Automatic Jump Lists are system-generated for frequently used applications. 🔹 Custom Jump Lists are application-defined and may store favorites, pinned items, or recent actions. Since Automatic Jump Lists contain far more forensic data , they are prioritized in most investigations . ------------------------------------------------------------------------------------------------------------- 🛠 How to Use JLECmd for Jump List Analysis 1️⃣ Parsing a Single Jump List JLECmd.exe -f "G:\C\Users\Akash's\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\1c7a9be1b15a03ba.automaticDestinations-ms" 🚀 Use Case: If investigating whether Microsoft Word 2016 opened a sensitive file, JLECmd reveals when it was last accessed and from which system location . 2️⃣ Running JLECmd on an Entire User's Recent Folder To extract ALL Jump Lists for a user , run: JLECmd.exe -d G:\C\ --csv "E:\Output for testing\Website investigation" -q --csvf jlcmd.csv 🚀 Use Case: In a data theft investigation , sorting by last accessed timestamps may uncover unauthorized file access from network shares or external USB devices. ------------------------------------------------------------------------------------------------------------- Single File Output Analysis: Key Points from JLECmd Output: AppID Identification: The top-left section of the output shows the AppID and its description. If no match is found, it may return Unknown AppID , requiring manual inference. DestList Information(Metadata): Automatic Jump Lists include metadata like the expected vs. actual number of entries . Discrepancies between these values may indicate missing or uncorrelated entries. The DestList version changes across Windows versions, requiring updates to forensic tools. (DestList Entries) Timestamps & Interaction Tracking: Created time is linked to the Birth DROID timestamp (often before the actual file creation). (Can be ignored) Last modified time is more relevant as it tracks the l ast access of a file or URL . (Very important)**** Newer Jump Lists include an interaction count that records file openings. Deep Parsing with JLECmd: By default , JLECmd limits displayed .lnk data . Using --fd enables full .lnk details (timestamps, paths, volume info). The --dumpTo option extracts shell items into individual .lnk files for deeper analysis. Automatic vs. Custom Jump Lists: Automatic Jump Lists contain DestList data, timestamps, and interaction counts. Custom Jump Lists store fewer details and lack DestList information. ------------------------------------------------------------------------------------------------------------- Multiple File Output Analysis: (Request Use Excel its easy to analyse there) Filter out Important columns which u should keep for investigation: AppId, AppIdDescription, MRU, LastModified(Also called Last opened), Path, InteractionCount ,TargetCreated,TargetModified , FileSize , DriveType , VolumeSerialNumber LocalPath Last Opened time stamp is :---- Jump List Metadata (When this file was last opened as per Jump List) File in question created and modified is :---- NTFS Metadata (File System Metadata (When the file was originally created/modified) ------------------------------------------------------------------------------------------------------------- Extracting Detailed LNK Data with JLECmd Now, JLECmd does not parse most .lnk details during single Jump List parsing . For example, an Automatic Jump List may include hundreds of .lnk files , which can be overwhelming. How to Extract Full LNK Data Use the --fd option in JLECmd to parse full shell item information , including: Target timestamps File size and attributes Absolute path and volume details Extra block information Command: .\JLECmd.exe -f "G:\C\Users\Akash's\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\1c7a9be1b15a03ba.automaticDestinations-ms" --fd | more ***Due to the large amount of data, redirect the output to a text file or html for better readability****. Command: .\JLECmd.exe -f "G:\C\Users\Akash's\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\fb3b0dbfee58fac8.automaticDestinations-ms" --fd --html "E:\Output for testing\Website investigation\out.html" -q Way: For extracting all .lnk files fir particular automatic destination, use the --dumpTo option. This allows you to analyze them with other forensic tools. Command: .\JLECmd.exe -f "G:\C\Users\Akash's\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\fb3b0dbfee58fac8.automaticDestinations-ms" --dumpTo "E:\Output for testing\Website investigation" Once you open the folder You will see all the .lnk files extracted, allowing you to analyze them using any tool, such as LNK Tool . ------------------------------------------------------------------------------------------------------------- The best alternative tool for analyzing Jump Lists and .lnk files, created by Eric Zimmerman, is JumpList Explorer (JLE) . Why Use JumpList Explorer? Unlike JLECmd, which requires command-line parsing, JumpList Explorer provides a graphical interface that makes it easier to understand and analyze Jump List data. If u click on any Lnk file at right hand side bottom: If you need a GUI-based tool for easier .lnk and Jump List analysis, JumpList Explorer is the best option! 🚀 ------------------------------------------------------------------------------------------------------------- 🚀 Quick Reference: Analysis 🚀 Quick Reference: Essential JLECmd Commands Command Purpose JLECmd.exe -f [JumpListPath] Parse a single Jump List JLECmd.exe -d [RecentFolder] --csv/json/html [OutputDir] Parse all Jump Lists for a user JLECmd.exe -f [JumpListPath] --fd Extract full LNK (shell item) data JLECmd.exe -f [JumpListPath] --dumpTo [Folder] Extract all shell items as individual LNK files ------------------------------------------------------------------------------------------------------------- 🚀 Get Started with JLECmd Today! 🔹 Download JLECmd as part of the Zimmerman Tools 🔹 Test it on a sample Jump List to see how much forensic evidence you can extract! Need help with a Jump List investigation? Let me know! I’m here to guide you through it. 🔍🚀 ----------------------------------------Dean----------------------------------------------
- Windows LNK Files: A Hidden Treasure for Forensic Investigators
When investigating digital forensics on a Windows system, LNK (shortcut) files serve as one of the most valuable sources of user activity . Even if a user never explicitly creates a shortcut, Windows does— automatically tracking files, folders, and devices accessed . These artifacts are incredibly useful for proving file access, tracking external devices, and even recovering traces of deleted files . --------------------------------------------------------------------------------------------------------- What Are LNK Files and Why Do They Matter? LNK files, or Windows shortcuts , are automatically created when a user opens, interacts with, or saves a file . Unlike regular files that contain user data, LNK files store metadata about the original file , including: ✅ Full file path – The original location of the accessed file ✅ Timestamps – When the file was first accessed, last accessed, and modified ✅ Volume information – Drive letter, network path, and even USB device details ✅ File extension and type – Identifies the kind of file opened ✅ MAC address (for network shares) – Provides forensic evidence of file access across shared drives These characteristics make LNK files a goldmine for forensic analysts, especially in cases where users have deleted files, accessed removable media, or interacted with files stored on network shares . --------------------------------------------------------------------------------------------------------- Where Are LNK Files Stored? LNK files are stored in each user's "Recent" folder , automatically tracking recent file activity. Their locations differ slightly based on Windows versions: 📌 Windows 7, 8, 10, 11: C:\Users\\AppData\Roaming\Microsoft\Windows\Recent\ C:\Users\\AppData\Roaming\Microsoft\Office\Recent\ (Office-specific shortcuts) 📌 Windows XP: C:\Documents and Settings\\Recent\ These Recent folders store shortcuts for non-executable files, including documents, images, and media files . However, command-line access does not generate LNK files , making them primarily useful for GUI-based user actions. --------------------------------------------------------------------------------------------------------- How LNK Files Help in Forensics 1️⃣ Proving File Access (Even if Deleted) One of the biggest forensic advantages of L NK files is that they persist even after the original file is deleted . 🚀 Example: A user opens "akash.docx" from a USB drive. Even if the user later deletes "akash.docx , the LNK file remains in the Recent folder. The LNK file contains USB details , proving that the file was accessed from external storage. 🔍 Forensic Insight: Investigators can reconstruct deleted file activity using LNK metadata. --------------------------------------------------------------------------------------------------------- 2️⃣ Tracking USB Devices and External Drives When a file is opened from a USB drive or external storage , Windows not only creates an LNK file for the file but also for the parent folder on the device . 🚀 Example: A user accesses a folder from a USB drive (D:\data). An LNK file is generated for the folder itself. The metadata includes the USB device serial number and volume label . 🔍 Forensic Insight: This allows forensic analysts to determine which USB devices were used on a system, even if they are no longer connected. --------------------------------------------------------------------------------------------------------- 3️⃣ Understanding User Navigation and Folder Access LNK files also provide information on f olders frequently accessed by the user . 🚀 Example: A u ser accesses a folde r containing illegal files (C:\open\tools) Even if no specific file is opened , an LNK file for the folder itself is created. 🔍 Forensic Insight: This helps track which folders a user frequently interacts with , even if no direct file evidence remains. --------------------------------------------------------------------------------------------------------- ***Changes to LNK Files in Windows 10 & 11*** Microsoft has made several updates to LNK file behavior , improving forensic usefulness: 1️⃣ LNK files are now created when a file is first saved (not just when opened). Before Windows 10, LNK files were only created after a file was opened. Now, saving a file using "Save As" generates an LNK file immediately. 2️⃣ More detailed folder tracking. If a user creates a new folder, LNK files are also created for its parent and grandparent folders . 3️⃣ LNK file storage limits have changed. Windows historically stored only 149 LNK files per user. In newer Windows 10/11 versions, 300+ LNK files can be found via forensic tools. 4️⃣ File extensions may now be included in LNK names. Example: secret.pdf.lnk (helpful for quick identification). 5️⃣ Multiple LNK files for the same folder can now exist. Instead of just tracking the first and last time a folder was accessed, Windows now creates new LNK files for repeated access , giving more timestamps to analyze . 🔍 Forensic Insight: These updates provide more data points for forensic analysts, making LNK files even more powerful for investigations. --------------------------------------------------------------------------------------------------------- Best Practices for Investigating LNK Files ✅ Check unallocated space for deleted LNK files. Older LNK files may still be recoverable from disk slack space . ✅ Correlate LNK timestamps with system logs. Cross-check with Windows Event Logs and Prefetch data. ✅ Use forensic tools for deeper analysis. Tools like Eric Zimmerman's LECmd can extract and parse LNK metadata efficiently. ✅ Look for USB drive metadata in LNK files. This can help prove external storage use in data theft or insider threat cases . ✅ Use command-line tools to bypass GUI limitations. The Windows GUI hides extra LNK files , but they can still be accessed via command-line or forensic software. --------------------------------------------------------------------------------------------------------- Conclusion LNK files are one of the oldest yet most powerful forensic artifacts in Windows investigations. Whether you're tracking accessed files, proving USB activity, or reconstructing deleted evidence , these automatically generated shortcuts hold a wealth of forensic intelligence . With Windows 10 and 11 introducing new behaviors , investigators now have even more data points to work with—if they know where to look. Parsing Lnk files step-by-step guide in next article --------------------------------------------------Dean-----------------------------------------------------
- LECmd: A Powerful Tool for Investigating LNK Files
This article have been updated on 22 January 2025 When investigating user activity on a Windows system, LNK (shortcut) files serve as a vital source of evidence. However, analyzing them manually or with incomplete tools can result in missing key data. Enter LECmd (LNK Explorer Command Line Edition) —a tool developed by Eric Zimmerman to fully decode and extract every bit of information from LNK files. ----------------------------------------------------------------------------------------------------- Why LECmd? A Tool That Doesn't Hide Data Many forensic tools process LNK files, but not all of them extract every available piece of metadata . Some tools selectively drop or ignore certain data structures without notifying the examiner. LECmd was created to ensure that all metadata from an LNK file is preserved and presented to the investigator. Even if certain data structures appear irrelevant in most cases. ----------------------------------------------------------------------------------------------------- What Does LECmd Extract from an LNK File? LNK files contain a wealth of metadata about accessed files and folders. LECmd extracts and organizes this information into several key sections: 1️⃣ Header Information The header contains essential details about the file, including: ✅ File Timestamps – Creation, modification, and last access times. ✅ File Attributes & Flags – File properties like hidden, system, or read-only status. ✅ File Path & Size – The original location of the file and its size. ✅ Working Directory & Relative Path – The folder the file was stored in and its location relative to system paths. 🔍 Forensic Insight: The creation time of an LNK file represents the first time a user accessed that file , while the modification time indicates the last time the file was opened . On Live System: (Can be used for collected lnk files) ----------------------------------------------------------------------------------------------------- 2️⃣ Link Information The Link Information section reveals how the file was accessed: ✅ Drive Type – Whether the file was on a local drive, removable USB, or network share .✅ Volume Serial Number – Unique identifier for the storage device ✅ UNC Path (if applicable) – Network location if the file was accessed via a shared drive. 🔍 Forensic Insight: If an LNK file points to a USB drive , forensic analysts can match the volume serial number with known USB devices to track data transfers. ----------------------------------------------------------------------------------------------------- 3️⃣ Target ID Information**** This section contains shell items similar to those found in Windows ShellBags , including ✅ Master File Table (MFT) Information – Links to the file’s original NTFS metadata ✅ Timestamps for Folders & Files – Indicates when each part of the file path was created and accessed. 🔍 Forensic Insight: The absolute path in this section can reconstruct the full location of a file or folder , even if it was moved. --------------------------------------------------------------------------------------------------------- 4️⃣ Extra Blocks Information LNK files often contain additional undocumented metadata , stored in Extra Blocks . This data includes: ✅ Console Properties – Information about terminal activity. ✅ Property Store Structures – Additional file metadata, sometimes including user interaction details . 🔍 Forensic Insight: Some Extra Blocks store remnants of file paths or folder interactions , even if they are no longer in use. --------------------------------------------------------------------------------------------------------- How to Use LECmd for Large-Scale Investigations 🔍 Parsing a Single LNK File To extract all metadata from a single LNK file, use: LECmd.exe -f "C:\Users\Akash's\AppData\Roaming\Microsoft\Windows\Recent\Microsoft Edge.lnk" 🔍 Forensic Insight: This command provides the most detailed breakdown of a single LNK file , useful when analyzing a specific file of interest . --------------------------------------------------------------------------------------------------------- 🔍 Parsing an Entire Directory of LNK Files For bulk analysis , u se the -d option to parse all LNK files in a folder: LECmd.exe -d G:\G\Users --csv "E:\Output for testing" --csvf lnkfile.csv 🔍 Forensic Insight: This is the best method for quickly reviewing user activity , as i t produces a CSV report containing timestamps, file paths, and device details. --------------------------------------------------------------------------------------------------------- Using Timestamps to Uncover User Activity LNK files contain two sets of timestamps : 1️⃣ Source Timestamps (LNK file timestamps) Indicate when the shortcut was created or last updated (i.e., when the user first and last opened the file). 2️⃣ Target Timestamps (File metadata timestamps) Indicate the original file’s creation, modification, and last accessed times . 🔍 Forensic Insight: By comparing source and target timestamps , investigators can determine if a file was copied or moved . 🚀 Example: A file is copied from a USB drive (D:) to the local system (C:) . The target creation timestamp on the C: drive will be newer than the target modification timestamp from the D: drive. This proves the file was copied from the USB drive rather than created locally. --------------------------------------------------------------------------------------------------------- Example: Tracking USB File Transfers with LECmd Imagine an employee is suspected of stealing company documents using a USB drive. I nvestigators could use LECmd to analyze their LNK files and reveal when and where files were accessed . 🚀 Case Study Walkthrough 1️⃣ Run LECmd on the suspect’s user profile Recent folder: 2️⃣ Review the CSV output and look for references to the USB drive (e.g., D: or E:). Target ID Section may include a Volume Serial Number linked to a specific USB. T arget Creation Timestamp s may indicate when files were copied to the device . 3️⃣ Confirm that sensitive files were accessed just before removal of the USB. If L NK timestamps align with the suspect's departure time , the case for data theft strengthens. --------------------------------------------------------------------------------------------------------- Conclusion: Why LECmd is a Must-Have Forensic Tool LECmd provides deep insight into user activity on a Windows system. By fully decoding every piece of metadata from LNK files, investigators can: ✅ Track accessed files and folders ✅ Identify USB devices and removable media use ✅ Prove file movement and copying activity ✅ Analyze timestamps to reconstruct user actions Whether conducting an insider threat investigation, data exfiltration case, or simply tracking user activity , LECmd is an essential tool for forensic professionals. --------------------------------------------Dean------------------------------------------------------ Example of Output Source File Source Created Source Modified Source Accessed Target Created Target Modified Target Accessed Drive Type Target ID Absolute Path File Size Working Directory Volume Serial Number Local Path Target MFT Entry Number Machine ID Machine MAC Address G:\G\Users\Jean-Luc\Desktop\Microsoft Edge.lnk 24-03-2023 17:20 24-03-2023 17:22 21-01-2025 19:41 11-04-2022 18:47 21-03-2023 18:47 24-03-2023 17:22 Fixed storage media (Hard drive) This PC\C:\@shell32.dll,-21817\Microsoft\Edge\Application\msedge.exe 4055968 C:\Program Files (x86)\Microsoft\Edge\Application 60562114 C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe 0x18207 xspace2197 44:e5:17:ed:50:3e







