DFIR-Notes
Windows Forensics
Windows Forensics
  • windows Memory Forensics
  • Windows Registry Forensics
  • Windows Registry Forensics with RegRipper
  • Windows Powershell Forensics
  • Incident Response Eventhoods
  • Incident Response splunk filters
  • LNK Files (Shortcut Files) Forensics
  • Jump List Forensics
  • Prefetch Files Forensics
  • Living off the Land Binaries (LOLBins)
  • COM (Component Object Model)
  • Key Email Headers for SOC Analysts and DFIR
  • Distributed Component Object Model (DCOM)
  • legitimate Windows processes
  • UserAssist Keys
  • Application Compatibility Cache (Shim Cache)
  • CIDSizeMRU
  • Start Menu Run MRUs
  • MUI Cache
  • BAM (Background Activity Moderator)
  • SRUM (System Resource Usage Monitor)
  • Master File Table (MFT), NTFS, $LogFile, and $UsnJrnl: Forensics
  • 🔹 Windows System Processes
Powered by GitBook
On this page
  • 1.Startup and Persistence Plugins
  • 2.User Activity
  • 3.Networking Plugins
  • 4.Malware Indicators
  • 5.System Information Plugins
  • 6.Registry Usage and Last Access
  • 7.Browser History and Internet Activity
  • 8.File Access and Recent Documents
  • 9.Security and Logon Information
  • 10.USB and Device History
  • 11.Scheduled Tasks and Job Settings
  • 12.Miscellaneous Plugins

Windows Registry Forensics with RegRipper

usage : rip -r c:\case\ntuser.dat -p <plugin>

1.Startup and Persistence Plugins

    run: Parses the Run key to show programs that are configured to start automatically for the user.
    runonce: Similar to run, but shows programs that run only once at startup.
    services: Extracts information from the Services key, which contains services that might be used for persistence.
    winlogon: Examines the Winlogon key for programs that may execute during the logon process.
    drivers: Checks for drivers that load automatically, as malicious drivers may be used for persistence

2.User Activity

   userassist: Retrieves the UserAssist keys, which show applications the user has recently run via the GUI.
   muicache: Displays entries of programs recently executed by the user.
   shellbags: Shows recently accessed folders and directory history, which can indicate where a user or malware navigated.
   typedurls: Displays URLs typed into Internet Explorer’s address bar.
   recentdocs: Lists recently accessed files.
   recentapps: Shows recently run applications, which can reveal suspicious programs executed on the system.
   lastvisitedmru: Displays the list of recently accessed network shares or remote files.
   openwithlist: Shows applications recently used to open specific file types

3.Networking Plugins

networklist: Extracts data on networks the machine has connected to, useful for tracking IPs and locations.
mappeddrives: Shows mapped network drives, which might indicate connections to remote resources.
network: Examines various network settings, including wireless and recent connections.

4.Malware Indicators

    shimcache: Analyzes the AppCompatCache (Shimcache), which tracks executables run on the system.
    amcache: Parses Amcache.hve for entries of recently executed programs.
    prefetch: Checks for prefetch data indicating previously run applications.
    appcompatflags: Retrieves information from AppCompatFlags, which may contain compatibility settings for executed     applications.
    msxml: Looks at MSXML versions and locations, which can sometimes be exploited by malware

5.System Information Plugins

    timezone: Provides timezone information of the machine, which can be useful for correlating event times.
    computername: Shows the computer’s name.
    profilelist: Displays user profiles on the machine, indicating all registered users.
    networkcards: Lists network interface cards, which may reveal additional network information.
    osversion: Shows the OS version and build number.

6.Registry Usage and Last Access

    recentapps: Shows the recently used applications by the user.
    lastloggedonuser: Shows the most recent user that logged onto the system.
    lastlogontimestamp: Lists timestamps for users who last logged in, helping to track logon activity.
    mountdev2: Reveals information about mounted devices, such as USB storage devices.
    mountpoints2: Shows previously mounted devices and drive letters associated with them

7.Browser History and Internet Activity

    typedurls: Displays URLs typed into the address bar of Internet Explorer.
    intcache: Checks the Internet Cache for records of visited websites and other cached internet data.
    firefoxdownloads: Retrieves Firefox download history, useful for tracking file downloads.
    firefoxrecentdocs: Displays Firefox’s recently accessed documents

8.File Access and Recent Documents

    recentdocs: Lists documents the user recently accessed, based on the RecentDocs key.
    openwithprogids: Lists applications used to open specific files, which can help identify recently accessed files and their         associated applications.
    openwithlist: Shows applications recently used to open files

9.Security and Logon Information

    lsa_secrets: Dumps LSA secrets, which might contain stored passwords or cached credentials.
    logon: Displays information on user logons and failed logon attempts.
    rdphint: Shows RDP (Remote Desktop Protocol) connection information, useful for identifying remote access attempts.
    samparse: Parses the SAM hive to retrieve information about local accounts, including creation and last logon times

10.USB and Device History

    usb: Displays connected USB devices.
    usbdevs: Lists devices connected via USB, along with information such as the first and last connection times.
    mountdev: Lists mounted devices, which might reveal external storage used during the infection

11.Scheduled Tasks and Job Settings


sptaskbar: Shows scheduled taskbar notifications, which may be used by malware to display alerts or execute tasks.
scheduledtasks: Lists scheduled tasks configured on the system, commonly used for persistence

12.Miscellaneous Plugins

    timezone: Extracts timezone settings, useful for forensic timelines.
    sysinfo: General information about the system from multiple keys.
    software: Parses software information, including installed programs and update details.
    pendingfilerename: Shows files that are pending rename or deletion upon reboot.

PreviousWindows Registry ForensicsNextWindows Powershell Forensics

Last updated 6 months ago