Forensic analysis of recently accessed files - jumplist analysis
When it comes to detect recently accessed files, Windows offers wide variety of artifacts which may be helpful for enlighting forensic investigations. As there are many items -so called artifacts- exist for that particular reason, one of those artifacts, which is automatically created by Windows is called jumplist.
Jumplists are system artifacts that are created to keep track of recently accessed files. As those files can be viewed typing "recent" on the run command, the list which comes up might be the whole thing. Especially during forensic investigations, it is important to make sure that all the available information is collected completely. For that very reason, all jumplist files must be reached from the custodian's computer and inspected throughly.
Two types of jumplists are created when user opens up a file; automatic (.automaticDestinations-ms) file and custom (.customDestinations-ms) file. The main difference between is that while automatic destinations folder includes wide variety of last accessed items such as apps, documents and files, custom destinations folder usually includes items containing web browser and media player activities.
Locating jumplists manually
Depending changing number of computer users, number of jumplists contained inside pc might vary.In this case, we should make sure to detect the right jumplist file for the correct user.
Both automatic destinations and custom destinations files can be found following the path given below.
Automatic Destinations: C:\Users\%UserProfile%\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations
Custom Destinations:
C:\Users\%UserProfile%\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations
Note that both file paths can only be reached using internet browsers as they are hidden. After typing correct path on the browser, both folders that are containing relevant jumplist files will show up.
Locating and extracting jumplists using EnCase
In case we are working on a case on EnCase, we can use pre-created EnPacks to locate the jumplist files existing on the computer. For that purpose, we can use the following EnPack to detect and extract relevant files in excel format, which makes it easier to analyze jumplist content compared to analyzing manually extracted automatic and custom destination files.
After running the EnPack given above, EnCase creates an excel file as an output, which displays intersected version of both automatic destinations files and destlist file which exists within the same ms file. The output is in tab delimited spreadsheet format, which includes recently accessed files list including path of file, creation and last accessed time, volume serial number and drive type information helping to understand where the recently accessed data resides.
Analyzing jumplist files manually using JumpListExt
JumpListExt is a tool that allows us to parse jumplist files which later on can be extracted and opened in SQLite.
When a jumplist file is opened in JumpListExt, 2 sub-files can be seen, which are called as LinkFile and DestList files. Those 2 files contains following informations about recent accessed folders respectively:
LinkFile: Information on last modified date, last accessed date (Basically MFT file meta data), device type (removable or fixed drive), file path and etc.
DestList: Information on last recorded access date, access count, file path and etc.
Here we can see how jumplists containing LinkFile and DestList is looks when it is opened in JumpListExt:
As it is given as LinkFile and DestList file above, jumplists give wide variety of information about where recent files and documents are located, when the contents of those files and documents are changed, how many times those files are reached.
Jumplist files also play crucial role at possible data leakage investigations as it contains useful information on target data path and target drive volume name.


Yorumlar
Yorum Gönder