System, Users and Network Information
Key Registry Artifacts for Forensic Analysis
The Windows Registry contains critical artifacts that can provide invaluable insights during forensic investigations. Below is a detailed breakdown of essential registry hives, key paths, and their forensic applications.
1. User Information
Registry Hive: SAM
Key Path:
SAM\Domains\Account\Users
Details:
Active Users: Lists all currently active user accounts on the system.
Deleted Accounts: Tracks previously deleted accounts, which could indicate attacker activity.
Names Subkey: Links usernames with their corresponding SIDs.
Use Case:
Identify Unauthorized Users: Detect accounts created by attackers to maintain persistence.
Track Deleted Accounts: Investigate potential insider threats or compromised accounts that were deleted to cover tracks.
2. System Information
Registry Hives: SYSTEM
and SOFTWARE
Key Paths:
Control Sets:
SYSTEM\ControlSet001
(Current configuration)SYSTEM\ControlSet002
(Last known good configuration)SYSTEM\CurrentControlSet
(Live configuration visible in Regedit)
Operating System Details:
SOFTWARE\Microsoft\Windows NT\CurrentVersion
Details:
Control Sets: Compare configurations across different control sets to troubleshoot system failures or analyze configuration changes.
OS Information: Provides details such as OS version, build number, and system architecture.
Use Case:
Troubleshooting Failures: Compare configurations to understand what might have caused system failures or misconfigurations.
Vulnerability Assessment: Determine the OS version and architecture to identify potential vulnerabilities or targeted exploits.
3. Network Information
Registry Hives: SYSTEM
and SOFTWARE
Key Paths:
Network Connections:
SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList
Tracks connected networks:
SSID
Connection Type
First/Last Connection Timestamps
Router MAC Address
Open Network Shares:
SYSTEM\CurrentControlSet\Services\LanmanServer\Shares
Lists all shared folders accessible over the network.
TCP/IP Configuration and Interfaces:
SYSTEM\CurrentControlSet\Services\Tcpip\Parameters
SYSTEM\CurrentControlSet\Services\Tcpip\Parameters\Interfaces
Details:
Network History: Provides insights into Wi-Fi networks the system has connected to.
Shared Folders: Identifies shared folders that might have been used for lateral movement or data exfiltration.
Network Configuration: Retrieves IP addresses, DNS configurations, and active interfaces.
Use Case:
Unauthorized Connections: Track connections to suspicious or unauthorized networks.
Lateral Movement Analysis: Investigate shared resources that might have been exploited by attackers.
Network Misconfigurations: Review current network settings to identify vulnerabilities or improperly secured interfaces.
Practical Forensic Applications
These registry artifacts can help investigators:
Trace Unauthorized Users: Pinpoint unauthorized accounts or deleted profiles indicative of malicious activity.
Analyze Network Connectivity: Investigate whether the system connected to known malicious networks or rogue access points.
Investigate Lateral Movement: Examine shared folders and network activity logs for evidence of data exfiltration or attacker movement.
Identify Misconfigurations: Spot vulnerabilities in system or network settings that could have been exploited.
Next Steps
In the next lessons, we'll explore using tools like Registry Explorer and RegRipper to automate the analysis of these key registry artifacts, streamlining the forensic investigation process.
Last updated