USB Device Redux, with Timelines

This article has been indexed from

Windows Incident Response

If you ask DFIR analysts, “What is best in life?“, the answer you should hear is, “…creating timelines!” After all, industry luminaries such as Andrew said, “Time is the most important thing in life, and timelines are one of the most useful tools for investigation and analysis.“, and Chris said, “The timeline is the central concept of all investigative work.

My previous blog post addressed USB-connected devices, but only from the perspective of Windows Event Logs. In this blog post, I wanted to include data from the Registry, incorporated in a timeline so that the various data sources could be viewed through a common lens, in a single pane of glass. 
I stated by using wevtutil.exe to export current copies of the five Windows Event Logs to a central location. I then used reg.exe to do the same thing for the System hive. I then used my timeline process (outlined in several of my books) to create the events file from the six data sources; I used wevtx.bat to parse the Windows Event Logs, and three newly created RegRipper Pro plugins to parse the relevant data from the System hive. The specific keys, values and data parsed from the hive were based largely on Yogesh’s blog post, and this academic paper posted at the ResearchGate site. I created the initial plugins, and then modified them to display TLN-format output, for inclusion in timelines.
For this research, there where three specific devices I was interested in…my iPod, my iPhone, and a SanDisk Cruzer USB thumb drive. After creating the overall events file, I used the “type” and “find” commands to look for events associated specifically with those devices, isolated each into their own individual “overlay” events file, and then created timelines from each of those events files. This approach makes it easy to “see” what’s

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

Read the original article: