Intro to digital forensics, rapid traige examination and analysis

During our examination of the USN Journal within Timeline Explorer, we observed “uninstall.exe”. The attacker subsequently renamed this file. Use Zone.Identifier information to determine its new name and enter it as your answer. any hints on this one

did you solve it bro? i am struck too

no its not :unamused:

stuck as well.

parse the MFT open it in time line viewer and look for the zoneID for uninstall.exe, then there is a file name column that will show the original file name.

thanks, i have done that already, i am at last module in soc analyst, appreciate your response

1 Like

To determine the new name of the “uninstall.exe” file, check the Zone. Identifier information linked to it in Timeline Explorer. Look for any renaming events associated with the file.
Is it useful for you?

1 Like

You need to define a new file name “uninstall.exe” using the information from Zone.Identifier. It is important to extract this information and continue the analysis without discussing the methods for obtaining it.

1 Like

saw those clues in the timeline explorer but still can’t find the new name in mft explorer

Managed to solve?
Do you have any idea how to do this?

Well, I got stuck there for a while. Let me help you to get out there:

:information_source: Make sure to parse to csv the $MFT File, don’t spend a lot of time analyzing $J (USN).

Using the Time Explorer, instead of filter by the Entry ID, do it by the file name (uninstall.exe). You will notice a couple of downloads of the file with ZoneIdentifier 3.

From there, just analyze the File Name column, good luck! :slight_smile:

2 Likes

i saw several. like discord.exe, and other but all are wrong. any hint.

Ine other Question, the DRP host is so slow. When I try to click or type some letter it needs more then 3seconds for one click :frowning:
someone has an aproch to speed this up?

one day later, works as expected.

solution, i quite simple, read the instruction careful, use the PS script, search with the Timeline Explorer for the uninstall.exe and then have a look to the “FileName” Column

Pls I’m still a bit stuck, I have followed the process in parsing the MTF file



to csv but on loading it to timeline explorer all I can get it’s a zonal id content of ip&name (uninstall.exe) I made my research and found that zonal identifier doesn’t change but on my quest to correlate it with the one that hve same zonal id its where im stuck all the uninstall entries that tally with rename its hidden im analysing the wrong file or what. Pls i need help

Pls I need a hint on the task 3
Examine the contents of the file located at “C:\Users\johndoe\Desktop\forensic_data\APMX64\discord.apmx64” using API Monitor. “discord.exe” performed process injection against another process as well. Identify its name and enter it as your answer.

Hello Cipher,
Wish I had the time or remember exactly how I got the answer :sweat_smile:

But, if you follow my steps, in the Time Explorer you should search for somenting like [Hint] “microsoft.windowskits*…”

I hope you find it helpful!

Follow the instructions of the module when API Monitor is used step by step.
Then play with discord.exe in API Monitor.

[HINT] The answer contains “cmd”

1 Like

Tbh I don’t knw if it’s from my own end the our out of my MFT csv it’s limited to this interface in the screenshot I can’t access even the discord.exe that people made mention of and the one that has the zone identification it’s just a two out out making stuck on where to correlate on