Windows Registry Forensics β SOC Analyst Cheatsheet
Practical Guide for Live Response & Incident Investigation
Quick Reference: Investigation Priority Matrix
Priority
Registry Area
Investigation Type
Key Questions
SOC Investigation Workflows
Workflow 1: Malware Persistence Detection (CRITICAL)
1. Run Keys (Most Common)
2. Winlogon
3. Services
4. Image File Execution Options (IFEO)
5. File Extension Hijacking
6. Command Processor Autorun
7. Browser Helper Objects (BHOs)
PowerShell Script: Comprehensive Persistence Check
Workflow 2: User Activity Investigation (High Priority)
Recent Files & Programs
PowerShell Script: User Activity Timeline
Workflow 3: USB & External Device Investigation
Critical Registry Keys
PowerShell Script: USB & Device Investigation
Workflow 4: Network & Lateral Movement Investigation
Critical Indicators
PowerShell Script: Network Activity Investigation
Workflow 5: System Information (Quick Triage)
Essential System Info
PowerShell Script: System Information Quick Triage
Advanced: Protected Storage & Credentials
Windows Protected Storage
LSA Secrets & Autologon Passwords
SOC Incident Response Cheatsheet
Quick Commands for Live Response
PowerShell One-Liners
Detection Rules & IOCs
High-Confidence Malware Indicators
Common Anti-Forensics Techniques
1. Clearing MRU Lists
2. Registry Key Deletion
3. Timestamp Manipulation
Registry Analysis Tools
Built-in Windows
Forensic Tools
Live Response Tools
Exporting Registry for Analysis
Export Specific Keys
User Registry Hives
PowerShell - Mass Export
Registry Forensics Best Practices
Live System Analysis
Offline Analysis
Documentation
Quick Reference: Registry Hive Locations
System Hives (HKLM)
User Hives
Transaction Logs
Investigation Checklist
Malware/Persistence Investigation
User Activity Investigation
Data Exfiltration Investigation
Lateral Movement Investigation
Common SOC Use Cases
Use Case 1: Ransomware Detection
Use Case 2: Insider Threat
Use Case 3: Credential Theft
Use Case 4: Lateral Movement
Summary: Critical Registry Keys by Investigation Type
Investigation Type
Critical Keys
Last updated