An Examination of the Windows™ Registry

Slides:



Advertisements
Similar presentations
Working with Disks and Devices
Advertisements

Operating System Structures
Configuration Files CGS2564. DOS Config.sys Device drivers Memory configuration Autoexec.bat Run programs, DOS commands, etc. Environment settings File.
Application Repackaging - Naushad Ali T Doddamani.
Maintaining Windows Server 2008 File Services
Operating System & Application Files BACS 371 Computer Forensics.
Working with the Windows XP Registry
Mastering Windows Network Forensics and Investigation Chapter 9: Registry Evidence.
1 Chapter Overview Creating User and Computer Objects Maintaining User Accounts Creating User Profiles.
OS and Application Files BACS 371 Computer Forensics.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 14: Problem Recovery.
Users and Groups Security Architecture Editing Security Policies The Registry File Security Auditing/Logging Network Issues (client firewall, IPSec, Active.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Mastering Windows Network Forensics and Investigation Chapter 9: Registry Evidence.
COMP1321 Digital Infrastructure Richard Henson February 2012.
®® Microsoft Windows 7 for Power Users Tutorial 5 Comparing Windows 7 File Systems.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
1 Microsoft Windows Internals, 4 ed Chapter 4. Management Mechanisms The Registry 謝承璋 2008 年 05 月 07 日.
Tutorial 11 Installing, Updating, and Configuring Software
Mastering Windows Network Forensics and Investigation Chapter 12: Windows Event Logs.
Ch 11. Services A service is a specialized program that performs a function to support other programs Many services operate at a very low level – Interacting.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
5. Windows System Artifacts Part 1. Topics Deleted data Hibernation Files Registry.
File System Management File system management encompasses the provision of a way to store your data in a computer, as well as a way for you to find and.
Downloading and Installing Autodesk Revit 2016
Windows Vista Inside Out Chapter 24 – Recovering From an Computer Crash Last modified am.
Week #3 Objectives Partition Disks in Windows® 7 Manage Disk Volumes Maintain Disks in Windows 7 Install and Configure Device Drivers.
Downloading and Installing Autodesk Inventor Professional 2015 This is a 4 step process 1.Register with the Autodesk Student Community 2.Downloading the.
Lesson 3: Migrating and Configuring User Data
IT Essentials 1 Chapter 5 Windows 9x Operating Systems.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Chapter 8: Installing Linux The Complete Guide To Linux System Administration.
ACCESSDATA® FORENSICS Windows 7 Registry Introduction
Registry Forensics COEN 152 / 252. Registry: A Wealth of Information Information that can be recovered include:  System Configuration  Devices on the.
Automating Installations by Using the Microsoft Windows 2000 Setup Manager Create setup scripts simply and easily. Create and modify answer files and UDFs.
Chapter 8 Server Management: Directories & Software Directory Structure Creating A Directory Directory Properties Setup Wizard Registry Installing/Uninstalling.
2Operating Systems  Program that runs on a computer  Manages hardware resources  Allows for execution of programs  Acts as an intermediary between.
1 Remote Installation Service Windows 2003 Server Prof. Abdul Hameed.
Windows Forensic MD Saquib Nasir Khan (JONK) DEA- Data64
Burn ISO Image File to USB Drive From:
Lesson 9: SOFTWARE ICT Fundamentals 2nd Semester SY
Chapter Objectives In this chapter, you will learn:
Getting Started with Application Software
Create setup scripts simply and easily.
Maintaining Windows Server 2008 File Services
Microsoft Windows 7 - Illustrated
Understanding File Management
Introduction To Networking
Introduction to Computers
SYSTEM artifacts SECURITY artifacts SOFTWARE artifacts NTUSER.DAT
File Management.
Registry 101 Registry 201 SAM artifacts
Windows Operating Systems (Cont.)
Exploring the UNIX File System and File Security
Lesson 9 Windows Management
Booting Up 15-Nov-18 boot.ppt.
Starting the computer. Every day we are using an operating system and most specifically a Windows operating system but most of us are not aware of the.
Lesson 16-Windows NT Security Issues
4.6 Attached device analysis
Windows Under the Hood Chapter 13.
Windows Registry: Introduction
COMP1321 Digital Infrastructures
Chapter 2: Operating-System Structures
Modern PC operating systems
Microsoft Office Illustrated Fundamentals
Partitioning & Formatting
Chapter 2: Operating-System Structures
TERMS AND CONDITIONS   These PowerPoint slides are a tool for lecturers, and as such: YOU MAY add content to the slides, delete content from the slides,
Presentation transcript:

An Examination of the Windows™ Registry Windows™ Forensics An Examination of the Windows™ Registry

Windows Registry The Windows Registry Defies easy description. Acts as a “central repository” for the user information and system information. Parts are stored in files and parts are generated on the fly.

Windows Registry Windows Registry (technical) The registry is a persistent storage mechanism for system and user settings that can be accessed through Windows API calls to the HKEY values. This is not entirely useful as a starting definition.

Windows Registry Registry Hives HKEY_LOCAL_MACHINE (HKLM) HKEY_CURRENT_CONFIG (HKCC) HKEY_CLASSES_ROOT (HKCR) HKEY_CURRENT_USER (HKCU)* HKEY_USERS (HKU) *HKCU is actually a symbolic link to the HKU of the user currently logged on.

Windows Registry Registry File Locations %SystemRoot%\System32\config\... SAM, Security Accounts Manager contains passwords for users and groups SYSTEM, system configuration details. USB storage mapping SECURITY, permissions SOFTWARE, installed programs and settings \Users\%user%\ NTUSER.DAT, user data and protected storage

Windows Registry HKLM\SYSTEM\CurrentControlSet\Control\hivelist Lists all the hives present on a system. Volatile Sub-keys Some keys within the hive are composed at boot time. They do not exist on disk. HKLM\HARDWARE HKLM\SYSTEM\Clone

Windows Registry Why Do We Locate the Files? Reason for the question: Windows converts these files into hives that can only be accessed through regedit or similar program. Why not just use hive names? Answer: Static forensics allows us to access these protected files directly.

Windows Registry %Root%\System32\Config\SAM Logon passwords No extension, just the file “SAM” This file is usually extracted for password cracking. It cannot be copied on an active system, but can be copied using other tools.

Windows Registry %Root%\System32\Config\SYSTEM Mounted Devices (drive letter mappings of current and previously attached storage devices) UBSTOR current and previously attached storage devices with serial numbers or GUID. Many, many other system configuration variables. This file is invaluable for intellectual property theft cases.

Windows Registry Mounted Device Storage media that is assigned a drive letter in a Windows system is considered a mounted device. Note: drive letters may change by either user action (device management) or through mounting and unmounting in different order.

Windows Registry Device Signature This value can be found on a storage device with an MBR (Master Boot Record) i.e. NTFS drive. Example: 6a bb 6a bb

Windows Registry Device Signature This value can also be found in the SYSTEM registry file and associated with a mounted device. Example: 6a bb 6a bb is C:\

Windows Registry \Users\%User%\NTUSER.DAT This file is altered when a user logs on—and sometimes in normal use. Contains a user name that can be matched to SID (Secure IDentifier) User Assist Key (programs activated)

Windows Forensics Forensic Value in the Registry Last logged on user HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon Account that last logged onto the system Last key edited by RegEdit HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Applets\Regedit One way to detect interactive registry manipulation

Windows Forensics Registry Forensics Cookbooks and procedures that require an examination of particular registry keys are not supported in sound forensic practice. Any policy that specifies a particular procedure will only serve to bind the examiner and may be used against him/her. Such locations may change with new versions or not be present or useful if the system has been altered.

Windows Forensics Forensic Value in the Registry Attached Devices HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USB List of installed USB devices USB Storage HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USBSTOR External storage used to bring files to a system or remove them

Windows Forensics Entries for each unique device are stored under their unique serial number. The ParentIdPrefix is a serial number for the device and can be associated with a storage volume. Windows writes a Device ClassID that can be checked against the setuapi.dev.log to determine the first connection for that CLASS of device.  If there is one instance of the device, that will be it.  If there are multiple instances of the same device type, it will only tell the first date.  More on the ClassID below.   HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USBSTOR\ creates a class entry to identify the driver.  Within this key, it creates unique instances based on the serial number from the USB controller or a system generated value.  If the unique ID has an ampersand (&) as the second character, it indicates a system generated value.  This value is based on information in the Device Descriptor section from the USB Controller.  It can be read with UVCView (see 1, below), but will not be imaged during normal forensic acquisition.  I have confirmed that the system generated value changes with each system and serial numbers from the USB controller are stable—but not completely reliable.  Serial numbers can easily be reprogrammed, but it is unlikely to happen by accident.  (see 2, below) Over the years, I have found that many USB devices are programmed with a non-unique serial number (especially the cheap ones that DoJ provided from China).  I had a class of LEO’s try at least 30 from one run DoJ distributed and found all had the same serial number.  Name brand devices have always had unique numbers in my experience.  Counterfeits with altered drive sizes tend to have the same serial number too according to the Web and my 2 cases involving that issue. You can match the unique instance to the mounted volume using the ParentIDPrefix.  By drilling down in the Control Set.  The Device GUID identifies the ClassID (the value that contained several unique devices of one type –i.e. using one driver) after the Friendly Name.  The Volume GUID identifies the ParentPrefixID.   The write dates for the GUID keys tells the last attached time. FOOTNOTES There is a utility called UVCview (see https://msdn.microsoft.com/en-us/library/windows/hardware/ff554257(v=vs.85).aspx) from Microsoft that allows you to read the Controller of a USB device.  For a good reference on USB serial numbers and reliability, see https://fixfakeflash.wordpress.com/ Windows 7 changed this a little with Compatible IDs  see https://msdn.microsoft.com/windows/hardware/drivers/install/compatibleid-registry-subkey

Windows Forensics UVCView

Windows Forensics Firewire 1394 is less useful because it does not register unique ID’s.

Windows Forensics Forensic Value in the Registry User Assist Key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USB List of installed USB devices

Windows Forensics User Assist Key This is an obfuscated registry entry that tracks the user interface. For example: programs initiated through Windows Explorer.

Windows Forensics Spotting User Assist Information HRZR_EHACNGU = UEME_RUNPATH User Assist entries are obfuscated with Rot-13.

Windows Forensics Early session shows driver installation. UEME_CTLSESSION Intel Mobile chipset

Windows Forensics This later entry shows the use of the ntbackup utility from the E:\ drive (an external).

Windows Forensics Working with Registry Files Applications that store information to the registry usually do not save their information until they are closed. Users cannot access certain registry files while the system is running (for example SAM) “Live” forensic tools can copy the SAM using the Windows API rather than the File System Object. It is functionally impossible to enumerate all areas of the registry of forensic interest. The nature of the investigation and a basic knowledge of the registry contents may suggest the most productive areas to explore.

Windows Forensics Logs Event logs C:\Windows\System32\config or C:\Windows\System32\winevt\Logs The .evt and evtx files are the system logs SetupAPI Device Log C:\windows\inf\setupapi.dev.log Log that can help confirm when devices are first installed

Windows Forensics Directories Temp folder C:\Users\%User%\AppData\Local\Temp Working space with only user-level privileges is very convenient for malware and attackers Windows Prefetch C:\Windows\Prefetch Windows Prefetch is a feature in Windows that is meant to speed up commonly executed application and boot load times by recording what on the system is accessed. It leaves a prefetch file that can be used to identify executables run on the system.

Windows Registry Intellectual Property Theft In a typical case, an employee may suddenly leave the company and go to work for a contractor or competitor. The investigation is often initiated on a hunch or if clients notify the former employer that they are being solicited. Depending on the company’s policy, an investigator will usually have access to the departing employee’s desktop and laptop.

Windows Registry Intellectual Property Theft Litigation and employee malfeasance are increasingly coming to the attention of corporate leadership. Computer security policies and response plans must now consider these risks. Retaining a departing employee’s hard disk (rather than repurposing) is just as important as changing passwords.

Windows Registry Productive areas for analysis include: Attached storage devices Link files to external devices Evidence of wiping software Use of corporate E-mail system to send confidential files to external addresses (often personal addresses) Webmail accounts References to competitor/contractors regarding employment

Windows Registry The SYSTEM file contains a key called USBSTOR This key contains a list of every USB device that has been attached to that installation of Windows. It also contains the date that the device was last attached. The SYSTEM file also contains keys called 1394 (records Firewire devices) SCSI (records SATA devices on particular bridges). ExpressCard™ eSATA devices do not register in removable devices.

Monkies…lol Yeah, I know, it is an ape technically…whatever.