Step-by-step artefact collection & analysis guide // Windows endpoints + network infrastructure
Log sources • Event IDs • MFT/USN • Registry • Memory • Network • Threat Actor TTPs
Live triage modifies timestamps, pagefile, and memory. Always document your actions. Collect volatile data first. Never run tools directly from suspect media.
Security.evtx%SystemRoot%\System32\winevt\Logs\Security.evtxSystem.evtxApplication.evtxMicrosoft-Windows-PowerShell%4Operational.evtxMicrosoft-Windows-PowerShell%4Analytic.etlMicrosoft-Windows-Sysmon%4Operational.evtx — Process create, network conn, file create, registry, DNS queries, pipe eventsWBEM\Repository binariesMicrosoft-Windows-TaskScheduler%4Operational.evtx%SystemRoot%\System32\Tasks\Microsoft-Windows-TerminalServices-LocalSessionManager%4Operational.evtx — session connect/disconnect/reconnectMicrosoft-Windows-Windows Defender%4Operational.evtx — detections, real-time protection state, exclusions addedMicrosoft-Windows-Bits-Client%4Operational.evtx — BITS used for stealthy downloads (living-off-the-land)%AppData%\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt
1 Process create 2 File creation time change 3 Network connection 5 Process terminated 6 Driver loaded 7 Image (DLL) loaded 8 CreateRemoteThread (injection) 10 Process access (credential dump) 11 File create 12/13/14 Registry 15 File stream create (ADS) 17/18 Named pipe 22 DNS query 23 File delete 25 Process tampering 26 File delete detected
The Master File Table is the definitive record of every file on an NTFS volume. Each MFT entry stores timestamps ($STANDARD_INFORMATION and $FILE_NAME), file size, attributes, and file existence even post-deletion (until overwritten). Tool: MFTECmd, Autopsy, KAPE.
MFTECmd.exe -f $MFT --csv output_dir%TEMP%, %AppData%\Roaming, C:\ProgramData, C:\Windows\Temp, C:\Users\Public, Recycle Binstreams.exe -s C:\ or Get-Item * -Stream * in PS. Sysmon EID 15. Zone.Identifier stream indicates downloaded files$I / $R recordsThe Update Sequence Number journal records every file system operation (create, rename, delete, write, extend, security change) with a timestamp. It acts as a near-complete filesystem activity log. Persists independently of file deletion. Essential for proving file lifecycle. Tool: MFTECmd, fsutil usn.
MFTECmd.exe -f $J --csv output_dirinvoice.pdf → invoice.pdf.exe, LOLBINs renamed to benign namesC:\Windows\Prefetch\*.pf — Tool: PECmd.exeC:\Windows\AppCompat\Programs\Amcache.hve — stores SHA-1 hash of executables. Tool: AmcacheParser.exeHKLM\SYSTEM\CurrentControlSet\Control\Session Manager\AppCompatCache — evidence of execution (server 2012+). Tool: AppCompatCacheParser.exeC:\Windows\System32\sru\SRUDB.dat — records per-app CPU, memory, network usage for 30-60 days. Proves execution even if no prefetch. Tool: SrumECmd%AppData%\Microsoft\Windows\Recent\ — stores MAC timestamps of target file at time of access. Tool: LECmd.exe%AppData%\Microsoft\Windows\Recent\AutomaticDestinations\ — per-app recent file access. Tool: JLECmd.exeUSRCLASS.DAT\Local Settings\Software\Microsoft\Windows\Shell\BagMRU — records folders opened even from deleted/external media. Tool: SBECmd%LocalAppData%\Google\Chrome\User Data\Default\History%LocalAppData%\Microsoft\Edge\User Data\Default\History — SQLite DBsC:\$Recycle.Bin\[SID]\ — $I file stores original path, deletion timestamp, file size. $R contains actual file contentHKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunHKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\RunHKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnceHKLM\SYSTEM\CurrentControlSet\Services — malicious services with ImagePath pointing to payloads. Check for recently modified entriesHKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\WinlogonUserinit, Shell, Notify values for appended executables
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options — Debugger value redirects binary execution (accessibility feature abuse: sethc.exe, utilman.exe)HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows\AppInit_DLLs — Should be empty in legitimate environmentsHKCU\Software\Classes\CLSID\ — user-writable COM registrations that override system defaults. Used for UAC bypass and persistenceHKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RecentDocsHKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\RunMRU — commands run via Win+R
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2 — records connected network shares including UNC paths to attacker infrastructureHKCU\SOFTWARE\Microsoft\Internet Explorer\TypedURLs — useful if malware infrastructure accessed via browserHKLM\SYSTEM\CurrentControlSet\Enum\USBSTOR — device VID/PID, serial, first/last connectionHKLM\SOFTWARE\Microsoft\Windows Portable Devices\Devices
HKLM\SAM — local user accounts (access requires SYSTEM). HKLM\SECURITY\Cache — cached domain credentials (DCCACHE). Requires offline parsing: secretsdump, impacketMemory must be captured before any reboot or shutdown. Use: WinPmem, DumpIt, Magnet RAM Capture, or EDR built-in. Hash immediately. Memory analysis tools: Volatility 3, Rekall.
vol3 -f dump.raw windows.pslist / windows.pstreevol3 windows.psscan — scans pool tags rather than walking EPROCESS list. Processes in psscan but not pslist = rootkit hidingvol3 windows.malfind — identifies VAD regions that are executable, not mapped to disk, and contain PE headers or shellcode. High-confidence injection indicatorvol3 windows.dlllist — compare against ldrmodules to find DLLs present in VAD but not in PEB loader lists (reflective DLL injection)vol3 windows.handles --pid [PID] — reveals C2 socket handles, staging file handles, mutex names (malware fingerprints)vol3 windows.netstat — shows established connections with associated process. Identify C2 IPs and ports active at acquisition timevol3 windows.lsadump / check for LSASS minidumps on disk (C:\Windows\Temp\lsass.dmp)vol3 windows.cmdline / windows.cmdscan — recover commands from console hosts, including those not written to diskvol3 windows.strings — extract readable strings. Run YARA rules against raw dump for known malware signatures, C2 domains, API key stringsvol3 windows.dumpfiles --pid [PID] — extract process executables and DLLs for AV scanning, hashing, OSINT lookup on VirusTotalMozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0). PowerShell WinHTTP, curl-style strings from svchost are suspicious/node:[TARGET], impacket wmiexec. Look for: wmiprvse.exe spawning cmd.exe on targetMSSE-*-server, postex_*), shellcode in injected processes, sleep masking (stomped memory), characteristic HTTP/S malleable C2 profiles, default ports (50050 team server)sekurlsa::logonpasswords strings in memory, LSASS dump files, mimilib.dll in SYSTEM32
BTOBTO (psexec), randomised service names, RemCom strings, SMB file writes of *.exe to ADMIN$impacket strings in network traffic
rclone.exe, mega.exe. Config files: %AppData%\rclone\rclone.conf. Large sustained HTTPS transfers to cloud storage CDN IPs-EncodedCommand, -ExecutionPolicy Bypass, -WindowStyle Hidden, -NonInteractiveIEX (New-Object Net.WebClient).DownloadString(), Invoke-Expression
certutil -decode, certutil -urlcache -split -f [URL] — used to fetch and decode payloads. Check prefetch and 4688 command linemshta http://, wscript C:\Temp\. Common initial access post-phishing payload deliveryrundll32 shell32.dll,ShellExec_RunDLL, regsvr32 /s /n /u /i:http:// (Squiblydoo)wmic /node:[TARGET] process call create "[cmd]" for lateral movement. wmic shadowcopy delete for ransomware VSS deletionbitsadmin /transfer for persistent background downloads. curl -o payload delivery. Leaves BITS job entries and BITS operational log eventsvssadmin delete shadows /all /quiet, wmic shadowcopy delete, bcdedit /set {default} recoveryenabled no