Windows Registry Forensics

IN this Section I am going to talk about the important aspects of Windows Registry

HKEY_LOCAL_MACHINE (HKLM)

Scope: System-wide settings and configurations.
Purpose: This key contains configuration data for the entire computer and affects all users on the system. It holds information related to hardware, operating system settings, and software configurations that apply universally across all user accounts.

Common Subkeys:
    HKLM\SYSTEM: Contains system configuration data, such as boot configuration, drivers, services, and system devices.
    HKLM\SOFTWARE: Stores software-related settings that apply to all users on the machine, including installed programs, their settings, and system software configurations.
    HKLM\SECURITY: Contains security-related data.
    HKLM\HARDWARE: Contains information detected at startup about the system's hardware

HKEY_USERS (HKU)


Scope: User-specific settings for all users on the computer.
Purpose: HKU stores individual user profile information, including personalized settings, desktop configurations, environment variables, and application preferences for each user on the system.

Common Subkeys:
    Each user profile on the system has a subkey within HKU named after the Security Identifier (SID) associated with that user.     These keys store user-specific configurations.
    HKU.DEFAULT: Contains settings applied to the default profile and is used as a template for new users.

the following map provides a detailed and visually structured map of Windows Registry paths and keys as well , designed to assist incident responders, SOC analysts, and cybersecurity professionals in monitoring, detecting, and investigating security incidents , go to this link then download the html file

Here is photo of the content above

SAM (Security Account Manager) - SAM.dat

SYSTEM - SYSTEM.dat

NTUSER - NTUSER .dat

USERCLASS - USERCLASS.dat

SOFTWARE - SOFTWARE.dat

SECURITY - SECURITY.dat

Browser Artifacts

Here are categories of Registry paths , If you wanna divides into categories

1. User Communications

  • Registry Paths:

  • Email accounts: HKEY_CURRENT_USER\Software\Microsoft\Office\<version>\Outlook\Profiles

  • Skype: HKEY_CURRENT_USER\Software\Microsoft\Skype\

  • Teams: HKEY_CURRENT_USER\Software\Microsoft\Office\Teams

  • Messaging apps: Search for app-specific paths under HKEY_CURRENT_USER\Software

2. File Download

  • Registry Paths:

    • Recent downloads: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU

    • Firefox: HKEY_CURRENT_USER\Software\Mozilla\Firefox\Profiles

    • Internet Explorer: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TypedURLs

    • Chrome/Edge: Check browser-specific paths, like AppData logs

    • Temporary files:

      • Temporary Internet files: %USERPROFILE\AppData\Local\Microsoft\Windows\INetCache

    • Download history via Windows Defender:

      • HKEY_LOCAL_MACHINE\Software\Microsoft\Windows Defender\Threats

3. Program Execution

  • Registry Paths:

    • Run/RunOnce: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

    • Prefetch: Analyze %SystemRoot%\Prefetch\

    • Recently used programs: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist

    Scheduled tasks:

    • Task Scheduler settings: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Schedule\TaskCache

4. File Opening/Creation

  • Registry Paths:

    • MRU (Most Recently Used): HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs

    • ShellBags: HKEY_CURRENT_USER\Software\Microsoft\Windows\Shell\Bags

    • File access/creation details:

      • NTFS File System (last access/write): Use $MFT from forensic tools.

      • RecentApps (Apps that opened files): HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Search\RecentApps

    • Windows Jump Lists:

      • File usage via Taskbar/Start Menu: %APPDATA\Microsoft\Windows\Recent\AutomaticDestinations

5. File Knowledge

  • Registry Paths:

    • File extensions: HKEY_CLASSES_ROOT\.<extension>

    • Open with history: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts

    Known folders:

    • Downloads, Documents: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders

6. Physical Interaction

  • Registry Paths:

    • USB devices: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USBSTOR

    • Mounted devices: HKEY_LOCAL_MACHINE\SYSTEM\MountedDevices

7. USB Key Usage

  • Registry Paths:

    • USB activity: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USB

    • Removable media settings: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer

8. Account Usage

  • Registry Paths:

    • Last logon: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI

    • USB serial numbers: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USBSTOR

    • User accounts: HKEY_LOCAL_MACHINE\SAM\SAM\Domains\Account\Users

9. Browser Usage

  • Registry Paths:

    • Internet Explorer history: HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main

    • Chrome/Edge/Firefox: AppData paths like AppData\Local\Google\Chrome\User Data.


Last updated