Windows Forensic Artifacts – Investigation Workflow & Cheatsheet
🎯 Master Investigation Workflow
Phase 1: Evidence Identification & Scoping
1. Define Investigation Parameters
├─ Incident type (malware, data theft, insider threat, etc.)
├─ Timeline of interest
├─ Systems and users involved
└─ Initial indicators of compromise (IOCs)
2. Determine Artifact Priority
├─ Volatile artifacts (Prefetch, memory)
├─ Execution evidence
├─ User activity evidence
├─ Persistence mechanisms
└─ File system artifactsPhase 2: Systematic Artifact Collection
Collection Order (by Volatility & Importance)
Priority 1: VOLATILE DATA
├─ Prefetch files (overwritten at 1024 limit)
└─ Live registry (if live response)
Priority 2: EXECUTION EVIDENCE
├─ Amcache.hve
├─ ShimCache (SYSTEM hive)
├─ UserAssist (NTUSER.DAT)
├─ Jump Lists
└─ LNK Files
Priority 3: USER ACTIVITY
├─ ShellBags (USRCLASS.DAT, NTUSER.DAT)
├─ Recent Documents (RecentDocs registry)
├─ Last Visited MRU
└─ Recycle Bin
Priority 4: FILE SYSTEM ARTIFACTS
├─ $MFT
├─ $J (USN Journal)
├─ $LogFile
└─ Alternate Data Streams
Priority 5: PERSISTENCE
└─ AutoStart Extension Points (ASEPs)Phase 3: Artifact Analysis Framework
📂 1. EXECUTION EVIDENCE ARTIFACTS
🔹 Prefetch Analysis
🔹 Amcache Analysis
🔹 ShimCache (AppCompatCache) Analysis
🔹 UserAssist Analysis
📂 2. USER ACTIVITY ARTIFACTS
🔹 Jump Lists Analysis
🔹 LNK (Shortcut) Files Analysis
🔹 ShellBags Analysis
🔹 Recycle Bin Analysis
🔹 Last Visited MRU Analysis
📂 3. FILE SYSTEM ARTIFACTS
🔹 Master File Table ($MFT) Analysis
🔹 USN Journal ($J) Analysis
🔹 $LogFile Analysis
🔹 Alternate Data Streams (ADS) Analysis
📂 4. PERSISTENCE MECHANISMS
🔹 AutoStart Extension Points (ASEP) Analysis
🔍 CROSS-ARTIFACT ANALYSIS MATRIX
Evidence Correlation Table
🎯 Artifact Combination Strategies
Maximum Confidence Combinations
🚨 INVESTIGATION RED FLAGS MASTER LIST
Execution-Based Indicators
🛠️ TOOL COMMAND REFERENCE LIBRARY
Zimmerman Tools Suite
KAPE (Kroll Artifact Parser and Extractor)
Sysinternals Tools
FTK Imager
PowerShell Commands
Command Prompt Commands
📊 ARTIFACT RELIABILITY MATRIX
🔑 KEY TAKEAWAYS
Critical Rules to Remember
📞 QUICK REFERENCE CARD
Top 5 Evidence of Execution Artifacts
Top 5 User Activity Artifacts
Top 5 File System Artifacts
Top 5 Zimmerman Tools
Top Investigation Commands
PreviousAccount Usage Investigation Workflow & CheatsheetNextEnhanced Windows Event Log Investigation Guide
Last updated