DFIR/DTR Tip:- File history Value for Forensic Team

DFIR/DTR Tip:- File history Value for Forensic Team

Who’s during the investigation looking for file history backup? since this feature is turned off by default. ?But if it is turned on there are multiple interesting values to Investigators This if we can set is as one of forensic artifacts, it’s was starting shows from Windows 8 Operating system, they have introduced file history backup which changes the way that backups were previously used. In previous versions of windows, backups could only be maintained and restored using the default system. But Within windows 8 this solution is more robust and allows backups to be stored both on removable media and remote network shares. By default this will backup folders such as Music, Documents, Videos, Contacts and Favorites. There are a few artifacts that are established when file history is turned on so it’s includes File History folder, Registry Value, and Windows Events. The file history folder located at :-

C:\Users\<username>\AppData\Local\Microsoft\Windows\FileHistory

within this folder there is a configuration folder and a data folder.

  1. The data folder is a temporary staging directory for the files that are to be backed up.
  2. The Configuration folder contains at least 2 files, they are an EDB file named Catalog.edb and a XML file names Config These files are created both Locally and on the drive being used as backup. for more value details and explore the EDB file used the PowerShell script created by the Grzegorz Tworek :- https://github.com/gtworek/PSBits/blob/master/docs/filehistory.mdAnd

Note :- If the File History option has been turned on there is also a registry key that is created, this key is only found on users that have turned on this feature. The Registry key can be found HKU\Software\Microsoft\Windows\CurrentVersion\FileHistory

Within this directory there is a key named "ProtectedUpToTime" that shows the last time this process backed up

The files area good to have look up to gathering more information about File History is within the System Events it is provide us with auditing information related to the File History:

  • FileHistory-Catalog
  • FileHistory-ConfigManager
  • FileHistory-Core
  • FileHistory-Engine
  • FileHistory-EventListener
  • FileHistory-Service

Links :-

https://github.com/gtworek/PSBits/blob/master/docs/filehistory.mdAnd

https://www.sciencedirect.com/science/article/abs/pii/S2666281721000329

https://www.computerworld.com/article/3658132/how-to-use-file-history-windows-10-windows-11.amp.html

The specific details about the location of key files and registry entries add practical insights for those engaged in digital forensic incident response. Mohammed's recommendation of Grzegorz Tworek's PowerShell script further enhances the tip, providing a practical resource for investigators.

the reference to Grzegorz Tworek's PowerShell script for exploring the EDB file adds a useful tool to the investigator's toolkit. Overall, a well-structured and informative tip for digital forensic incident response professionals.

Mohammad Hasan Hashemi

Entrepreneurial Leader & Cybersecurity Strategist

11 个月

The explanation of file history artifacts, including the File History folder, Registry Value, and Windows Events, provides a comprehensive overview for investigators to consider. The mention of specific locations such as the Configuration folder and the Registry key adds practical details for forensic teams

Hassnain J.

SOC Analyst @ TMB/Easy Paisa | EDR | XDR | SIEM | PAM | Top 2% @TryHackMe | Cyber Threat Intelligence | Tracking APT Groups Targeting Pakistan | Pursing Masters in Computer Network and Security @ FAST ISB

11 个月

Thank you for sharing

要查看或添加评论,请登录

社区洞察

其他会员也浏览了