Recycle Bin Artifacts
Introduction
The Windows Recycle Bin plays a vital role in forensic investigations, as it temporarily retains deleted items before they are permanently removed or restored. By analyzing Recycle Bin artifacts, investigators can uncover essential details such as the original location, deletion time, and file size, providing critical insights into user or attacker activities.
Key Artifacts in the Recycle Bin
1. $I Files
These files store metadata about deleted items:
Original File Path: Location of the file before deletion.
Size: The size of the deleted item.
Timestamp of Deletion: Recorded in UTC format.
2. $R Files
These files contain the actual content of deleted items:
Present until the file is permanently deleted.
Allows recovery of the file's original data.
Location of Recycle Bin Artifacts
Recycle Bin artifacts are stored in user-specific SID directories:
{SID}: Represents the Security Identifier associated with each user account.
Analysis Using RBCmd Tool
RBCmd, developed by Eric Zimmerman, is a powerful tool for extracting and analyzing Recycle Bin artifacts.
Steps to Analyze Recycle Bin Artifacts
Acquire Artifacts:
Collect the $Recycle.Bin folder containing $I and $R files from the target system.
Run RBCmd:
-d
: Specifies the directory containing Recycle Bin artifacts.--csv
: Outputs the results in CSV format for detailed analysis.
Load Results in Timeline Explorer:
Open the resulting CSV file in Timeline Explorer for advanced analysis.
Case Example
Scenario:
Using RBCmd, we analyzed a single deletion event.
Parsed Data Highlights:
Deleted File:
document.pdf.exe
Original Location:
C:\Users\Public\Documents\
Deletion Time:
2023-11-01 14:23:45 UTC
File Size:
512 KB
Insights:
The file had a double extension (
.pdf.exe
), a common malware obfuscation technique to trick users.The deletion suggests an attempt to cover tracks, likely following remote access or malware execution.
Forensic Value of Recycle Bin Artifacts
1. Timeline Reconstruction
Recycle Bin artifacts provide timestamps for when critical files were deleted, aiding in the creation of a detailed activity timeline.
2. Attack Behavior
Analyzing deletion patterns can reveal malicious actions, such as:
Dropping and deleting malware.
Attempting to cover tracks post-attack.
3. Original File Context
Artifacts reveal the original file paths, providing insight into the context and intent of user or attacker actions.
Recycle Bin artifacts are an essential component of forensic investigations, offering valuable insights into deleted files and user behavior. By utilizing tools like RBCmd, analysts can efficiently extract and interpret this data to reconstruct events, uncover attack strategies, and build a comprehensive understanding of system activity during insider threats or external attacks.
Last updated