When conducting an investigation on a Windows machine there are 8 phase to go through, today we’ll discuss the first ‘Collecting Volatile Information’, and the rest will be explained in future topics
Volatile information refers to data that is lost when a system is turned off; it is typically stored in system registry, cache, and RAM.
During live data acquisition, volatile information can be acquired. The evidence gathered from volatile data can assist forensic investigators in malware analysis, inspect log and cache files, dedicate passwords, and so on. All of these can be used as evidence during a forensic investigation.
Ps: install pstools before starting this process, otherwise, you can install the whole sysinternals package in case it’s not installed already
time /t & date /t
before doing any evidence collection, we need to be sure that the system time/date is accurate because the perpetrators can change it; a simple thing can result a chaos
psloggedon
net sessions
logonsessions [-p]
It displays the active logon sessions and, if the -p option is used (for loggonsessions), the processes that are running in each session.
nbtstat [-c]
To resolve NetBios (NetBT) cache
net file
· NetworkOpenedFiles (nirsoft.net)
netstat [-ano]
Ipconfig [/all]
PromiscDetect (Vidstrom)
Promqry (Microsoft)
Task Manager (GUI) Process Explorer (sysinternals)
tasklist [/v] [/svc]
pslist [-x] listdlls handle
Netstat -ano
Process Explorer (sysinternals)
ProcDump (sysinternals)
Process Dumper (github)
- Examine .SPL and .SHD files inside C:\Windows\System32\spool\PRINTERS
using a hex editor (free Hex Editor Neo)
net share
The ‘$’ sign in the results means that the resource is accessed locally
Check the clipboard memory (paste its content to a text file)
wmic service list brief
doskey /history
The command history get wiped when the command prompt is closed, unlike Linux OSs.
Investigators must be conscious that the utilities they are using to collect other volatile information can alter the contents of the memory. Investigators can define the user(s) logged in, the timeline of a security event, the software and libraries involved, the files accessed and shared during a suspicious incident, and other details such as network information, open files, process-to-port mapping, mapped drives, command history, process information, clipboard contents, and so on based on the volatile information gathered.