Windows Registry Forensics
Advanced Digital Forensic Analysis of the Windows Registry
Second Edition
Table of Contents
Copyright
Syngress is an imprint of Elsevier
50 Hampshire Street, 5th Floor, Cambridge, MA 02139, USA
Copyright 2016, 2011 Elsevier Inc. All rights reserved.
No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publishers permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions.
This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein).
Notices
Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary.
Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such information or methods they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.
To the fullest extent of the law, neither the Publisher nor the authors, contributors, or editors, assume any liability for any injury and/or damage to persons or property as a matter of products liability, negligence or otherwise, or from any use or operation of any methods, products, instructions, or ideas contained in the material herein.
British Library Cataloguing-in-Publication Data
A catalogue record for this book is available from the British Library
Library of Congress Cataloging-in-Publication Data
A catalog record for this book is available from the Library of Congress
ISBN: 978-0-12-803291-6
For information on all Syngress publications visit our website at https://www.elsevier.com/
Publisher: Todd Green
Acquisition Editor: Chris Katsaropoulos
Editorial Project Manager: Anna Valutkevich
Project Manager: Priya Kumaraguruparan
Designer: Matthew Limbert
Dedication
To Terri and Kylie; you are my light and my foundation
About the Author
Harlan Carvey is a senior information security researcher with the Dell SecureWorks Counter Threat UnitSpecial Ops (CTU-SO) team, where his efforts are focused on targeted threat hunting, response, and research. He continues to maintain a passion and focus in analyzing Windows systems, and in particular, the Windows Registry.
Harlan is an accomplished author, public speaker, and open source tool author. He dabbles in other activities, including home brewing and horseback riding. As a result, he has become quite adept at backing up and parking a horse trailer.
Harlan earned a bachelors degree in electrical engineering from the Virginia Military Institute and a masters degree in the same discipline from the Naval Postgraduate School. He served in the United States Marine Corps, achieving the rank of captain before departing the service. He resides in Northern Virginia with his family.
About the Technical Editor
Mari DeGrazia is a Senior Security Consultant with the Verizon RISK team, which provides Incident Response services on a global scale. During her tenure with Verizon, Mari has investigated high-profile breach cases and computer security incidents. Prior to Verizon, Mari worked civil and felony criminal cases as a digital forensics examiner which included testimony as an expert witness. Mari has a Bachelors of Science in Computer Science from Hawaii Pacific University as well as various certificates related to Digital Forensics. She is currently pursuing her Masters of Science in Digital Forensics.
Preface
I am not an expert. I dont know everything. In particular, I do not and have never claimed to be an expert at analyzing Windows systems nor in analyzing the Windows Registry. What I have done is taken all that stuff Ive got written down over the years, in different places, as well as stuff Ive found online, stuff Ive found after running malware in a VM and creating a timeline, etc., and put it into what I thought would be a logical structure. I then decided to call some of this stuff chapters, and I sent them to Mari to review and tech edit. She sent them back, I looked at her comments, decided that she was right in most cases, and sent the chapters into Syngress. They made it into a book. Thats a process, and it doesnt make me an expert at anything, especially digital forensic analysis.
When I wrote the first edition of this book, I mentioned in the preface that by 2010, I had met a good number of forensic analysts who had little apparent knowledge of the value that the Windows Registry can hold. As 2015 draws to a close and I am submitting the manuscript for the second edition of the book, the same holds true. Data within the Windows Registry can provide a great deal of context to investigations, illustrating user access to files, devices that have been attached to the system, applications that have been executed, and users that have been added to the system. Configuration settings maintained with the Registry will inform the analyst as to what they can expect to see on the system; did deleted files bypass the Recycle Bin, was the page file cleared at shutdown, and what is the effective audit policy for the system? Ive used information from the Registry to determine that a user intentionally infected a system with a remote access Trojan (RAT) and then attempted to clean up after removing the malware. Prior to sharing my findings, the popular notion was that systems infected with that RAT were the result of spear phishing.
Throughout this book, I have maintained a good deal of information specific to Windows XP and 2003 systems, because they are still out there. However, Ive included more information regarding Windows 7, as well as 8, 8.1, and Windows 10 systems, where possible. There are things that we still dont know about Windows 7 systems, and at the time of this writing, Windows 10 is still somewhat new. However, its likely that by the time the book is published and on the shelves, that holiday season would have resulted in a large number of newly purchased systems arriving with Windows 10 preinstalled. As such, there is still a great deal of research to be done, and even more to discover about Windows 10.
Again, I am not an expert, and I dont know it all; I have simply tried to include some of what Ive encountered and experienced in this book.
Intended Audience