File & Folder Knowledge Forensics - SOC Analyst Cheatsheet

Practical Guide for User Activity & Data Access Investigation


Quick Reference: File/Folder Artifacts Matrix

Artifact
What Files
When Accessed
Where From
Deleted Files
User Attribution
Retention

Recent Files

βœ“

βœ“

βœ“

βœ“

βœ“ (Per-user)

Last 150 files

LNK Files

βœ“

βœ“

βœ“

βœ“

βœ“ (Per-user)

Persistent

Shell Bags

Folders only

βœ“

βœ“

βœ“

βœ“ (Per-user)

Persistent

Recycle Bin

βœ“

βœ“ (Deletion)

βœ“

βœ“

βœ“ (Per-user)

Until emptied


Investigation Priority Matrix

Priority
Artifact
Best For
Live/Dead
Key Value

CRITICAL

LNK Files

File access proof, USB/network files

Both

Survives file deletion

CRITICAL

Recycle Bin

Deleted file recovery

Both

Actual file content

HIGH

Recent Files

Recent user focus

Both

Last 150 files

HIGH

Shell Bags

Folder navigation

Both

Network shares, USB paths


Core Investigation Questions

Primary Questions:

  1. What files did the user access? (File identification)

  2. When were files accessed? (Timeline construction)

  3. Where were files located? (Local, USB, network share)

Secondary Questions:

  1. What files were deleted? (Evidence destruction)

  2. What folders were browsed? (User navigation patterns)

  3. Were external devices used? (Data exfiltration vector)


SOC Investigation Workflows

Workflow 1: Data Exfiltration Investigation (CRITICAL)

Scenario: Suspected data theft via USB or network transfer

Investigation Priority Order:

Step 1: Check Recent File Access (Last 150 Files) Why first: Shows what user was recently focused on

Registry Location:

PowerShell - Parse Recent Files:

Red Flags in Recent Files:

  • βœ— Sensitive documents (HR, financial, confidential)

  • βœ— Large number of similar files (bulk access)

  • βœ— Files from restricted folders

  • βœ— Database exports (.csv, .xlsx, .sql)

  • βœ— Configuration files (.conf, .cfg, .ini)

  • βœ— Credential files (passwords.txt, accounts.xlsx)


Step 2: Analyse LNK Files (Detailed File Access) Why second: Provides precise timestamps, file paths, volume info

Location:

PowerShell - List Recent LNK Files:

Using LECmd (Zimmerman Tool) - RECOMMENDED:

Critical LNK Metadata:

  • Target file path (including USB/network paths)

  • Volume serial number (links to specific USB device)

  • Volume type (Fixed, Removable, Network)

  • Target file timestamps (Created, Modified, Accessed)

  • File size

  • Network share information (\server\share)

  • MAC address (network shares)

Red Flags in LNK Files:

  • βœ— Volume Type = "Removable" β†’ USB/external drive access

  • βœ— Network paths (\server\share) β†’ Data copied to network

  • βœ— Recently deleted files β†’ LNK persists after deletion

  • βœ— Large files β†’ Potential data exfiltration

  • βœ— Multiple similar files β†’ Bulk data access

  • βœ— Personal storage paths β†’ OneDrive, Dropbox, Google Drive

Data Exfiltration Indicators:


Step 3: Check Shell Bags (Folder Navigation) Why third: Shows folders browsed, including external/network locations

Registry Location:

File Location:

Using SBECmd (Zimmerman Tool):

Shell Bags Forensic Value:

  • Folder names and full paths

  • Folder interaction timestamps (last accessed)

  • Network share paths (\server\share\folder)

  • USB device paths (E:\SecretData)

  • Zip files, ISOs, mounted containers

  • Folders even if now deleted

Red Flags in Shell Bags:

  • βœ— Access to HR/Finance/Confidential folders

  • βœ— Browsing of network shares (lateral movement)

  • βœ— USB drive folder navigation

  • βœ— Temp/staging folders (C:\Temp\ToExfil)

  • βœ— Cloud sync folders (OneDrive, Dropbox)

  • βœ— Deleted folder paths (folder no longer exists)

Data Exfiltration Pattern:


Step 4: Examine Recycle Bin (Deleted Files) Why fourth: May contain actual deleted files or evidence of deletion

Location:

File Structure:

  • $I######.ext - Metadata (original path, filename, deletion time)

  • $R######.ext - Actual file contents

Quick Command - Browse Recycle Bin:

PowerShell - Enumerate Recycle Bin:

Using RBCmd (Zimmerman Tool):

Recycle Bin Metadata:

  • Original filename and path

  • Deletion timestamp

  • File size

  • Actual file contents (in $R file)

Red Flags in Recycle Bin:

  • βœ— Recently deleted sensitive documents

  • βœ— Deletion during incident timeframe

  • βœ— Large files deleted (covering tracks)

  • βœ— System/log files deleted

  • βœ— Evidence of bulk deletion

Important Notes:


PowerShell Script: Comprehensive File Access Investigation


Workflow 2: Insider Threat Investigation

Scenario: Employee suspected of stealing company data before resignation

Investigation Checklist:

Timeline Window: Focus on 30 days before resignation date

Phase 1: Document Access Pattern

Phase 2: External Device Usage

Phase 3: Network Activity

Phase 4: Evidence Destruction

Suspicious Timeline Pattern:


Workflow 3: Malware File Analysis

Scenario: Malware downloaded and executed, need to trace file origin

Investigation Steps:

Step 1: Identify Malware File Access

Step 2: Trace File Origin

Step 3: Related File Activity

Step 4: Post-Infection Activity


Cross-Artifact Correlation Techniques

Technique 1: USB Data Exfiltration Timeline

Combine:

  1. USBSTOR Registry β†’ Device connected

  2. Shell Bags β†’ Browsed USB folders

  3. LNK Files β†’ Files copied to/from USB (Volume Serial Number match)

  4. Recent Files β†’ What files were accessed before USB use

Example Timeline:


Technique 2: Network Share Data Theft

Combine:

  1. Shell Bags β†’ Network share browsed

  2. LNK Files β†’ Files copied to network share

  3. MountPoints2 Registry β†’ Share connection details

  4. Recent Files β†’ Files accessed before copy

Example Timeline:


Technique 3: File Deletion Investigation

Combine:

  1. Recycle Bin β†’ Deleted files list

  2. LNK Files β†’ Proof file existed (LNK survives deletion)

  3. Recent Files β†’ File was recently accessed

  4. $R file in Recycle Bin β†’ Actual file content (if not emptied)

Investigation Value:


Zimmerman Tools Command Reference

LECmd (LNK File Parser)

Single File:

Directory:

All Users:

With File Content Display:

Key CSV Output Columns:

  • SourceFile - LNK filename

  • TargetPath - Original file location

  • VolumeSerialNumber - Drive/USB serial

  • DriveType - Fixed, Removable, Network

  • VolumeLabel - Drive name

  • TargetCreated - File creation time

  • TargetModified - File modification time

  • TargetAccessed - File access time

  • FileSize - Target file size

  • MachineName - Computer name

  • NetworkPath - UNC path (if network)


RBCmd (Recycle Bin Parser)

Single $I File:

User's Recycle Bin:

All Users:

Key CSV Output Columns:

  • FileName - Original filename

  • FileSize - Size in bytes

  • DeletedOn - Deletion timestamp

  • OriginalPath - Full original path

  • $IFile - Metadata file

  • $RFile - Content file


SBECmd (Shell Bags Parser)

Single User:

All Users:

Live System (Current User):

Key CSV Output Columns:

  • Path - Full folder path

  • FirstInteracted - First access time

  • LastInteracted - Last access time

  • ShellType - Folder, Zip, Network, etc.

  • MRUPosition - Most recently used order


Detection Patterns & Red Flags

Data Exfiltration Indicators

Pattern 1: USB Data Theft

Pattern 2: Network Share Transfer

Pattern 3: Cloud Storage Exfiltration

Pattern 4: Evidence Destruction


File Type Risk Assessment

File Type
Risk Level
Typical Use
Exfiltration Value

.xlsx, .csv

HIGH

Financial, customer data

Very High

.docx, .pdf

HIGH

Intellectual property, reports

High

.sql, .bak

CRITICAL

Database dumps

Critical

.pst, .ost

HIGH

Email archives

High

.txt, .cfg

MEDIUM

Configurations, credentials

Medium-High

.zip, .7z, .rar

HIGH

Compressed archives (bulk theft)

Very High

.jpg, .png

LOW-MEDIUM

Images (may contain sensitive info)

Low-Medium


Common Investigation Scenarios

Scenario 1: Employee Downloaded Sensitive Data

Evidence Chain:

Key Artifacts:

  • Recent Files: HR_Salaries_2024.xlsx, Customer_List.xlsx

  • LNK Files: Copies to C:\Users\Alice\Downloads\ToTake\

  • Shell Bags: Browsed E:\CompanyData\

  • Recycle Bin: Original files deleted

  • USBSTOR: USB device serial number


Scenario 2: Malware Downloaded and Executed

Evidence Chain:

Key Artifacts:

  • LNK File: C:\Users\Alice\Downloads\invoice.exe.lnk

  • Recent Files: invoice.exe accessed

  • Prefetch: INVOICE.EXE-*.pf execution

  • Recent Files: Malware accessed system files

  • Recycle Bin: Malware file deleted


Scenario 3: Lateral Movement File Access

Evidence Chain:

Key Artifacts:

  • Shell Bags: \VICTIM-PC\C$\Windows\Temp\

  • LNK Files: \VICTIM-PC\C$\Windows\Temp\tools.exe

  • Recent Files: Remote executable accessed

  • MountPoints2: \VICTIM-PC\C$ connection


SOC Quick Reference Commands

Rapid Triage

List Recent LNK Files:

Check Recycle Bin:

Export Recent Files Registry:

Quick Suspicious File Check:


Collection Script (Batch)


Investigation Best Practices

Live Response

βœ… DO:

  • Collect LNK files immediately (minimal footprint)

  • Export registry keys before analysis

  • Document collection timestamp

  • Hash all collected artifacts

  • Use write-protected USB for tools

❌ DON'T:

  • Open files in Recent folder (updates access time)

  • Delete items from Recycle Bin

  • Browse folders (updates Shell Bags)

  • Run excessive tools (creates new LNK files)


Offline Analysis

βœ… DO:

  • Parse all artifacts to CSV for correlation

  • Build comprehensive timeline

  • Cross-reference multiple artifacts

  • Check file existence (LNK target may be deleted)

  • Validate volume serial numbers

❌ DON'T:

  • Rely on single artifact

  • Ignore timezone offsets

  • Skip deleted file recovery attempts

  • Forget to check Office Recent folder


Timeline Construction

Best Practice:

  1. Parse all artifacts to CSV

  2. Merge timelines in Excel/TimelineExplorer

  3. Add columns: Artifact Source, Action Type

  4. Sort by timestamp

  5. Filter by incident window

  6. Identify correlated events

  7. Build narrative

Example Timeline Entries:


Investigation Checklists

Data Exfiltration Investigation

  • [ ] Parse Recent Files for sensitive document access

  • [ ] Analyse LNK files for USB/network transfers

  • [ ] Check Shell Bags for external device browsing

  • [ ] Review Recycle Bin for evidence destruction

  • [ ] Correlate USB device serial numbers

  • [ ] Build timeline of file access β†’ copy β†’ deletion

  • [ ] Document external storage paths

  • [ ] Cross-reference with network logs

  • [ ] Check cloud storage folder access

Insider Threat Investigation

  • [ ] Identify resignation/termination date

  • [ ] Focus on 30 days before exit

  • [ ] Analyse Recent Files for bulk access

  • [ ] Check LNK files for USB usage

  • [ ] Review network share access

  • [ ] Examine Recycle Bin for deletions

  • [ ] Look for anti-forensic tool usage

  • [ ] Document access patterns over time

  • [ ] Correlate with HR records

Malware File Analysis

  • [ ] Identify malware file in Recent Files

  • [ ] Check LNK file for download path

  • [ ] Review browser download artifacts

  • [ ] Analyse post-infection file access

  • [ ] Check for file deletion attempts

  • [ ] Cross-reference with execution artifacts

  • [ ] Document file origin and timestamps

  • [ ] Look for related malicious files


Tools & Resources

Essential Tools

Zimmerman Tools (Free):

  • LECmd - LNK file parser

  • RBCmd - Recycle Bin parser

  • SBECmd - Shell Bags parser

  • TimelineExplorer - Timeline viewer

  • RegistryExplorer - Registry viewer

Download: https://ericzimmerman.github.io/

Alternative Tools:

  • NirSoft LnkParser - LNK viewer

  • FTK Imager - Evidence collection

  • X-Ways Forensics - Commercial suite

  • Magnet AXIOM - Commercial suite


Summary: Critical Takeaways

Artifact Strengths

LNK Files:

  • βœ“ Survives file deletion

  • βœ“ Precise timestamps

  • βœ“ Volume serial numbers (USB tracking)

  • βœ“ Network path information

  • βœ“ File size and attributes

Recent Files:

  • βœ“ Shows user focus/interest

  • βœ“ Last 150 files accessed

  • βœ“ Organised by file type

  • βœ“ Recent folders list

Shell Bags:

  • βœ“ Folder navigation history

  • βœ“ Network share access

  • βœ“ USB device paths

  • βœ“ Survives folder deletion

Recycle Bin:

  • βœ“ Actual file content (if not emptied)

  • βœ“ Deletion timestamp

  • βœ“ Original file path

  • βœ“ Per-user attribution

Investigation Strategy

  1. Start with Recent Files (what was user interested in)

  2. Analyse LNK Files (detailed access, USB/network)

  3. Check Shell Bags (folder navigation)

  4. Examine Recycle Bin (deletions, recovery)

  5. Correlate all artifacts (build timeline)

  6. Cross-reference with execution/USB artifacts

Key Principle

File access artifacts persist after file deletion and provide crucial evidence of user knowledge, intent, and data handlingβ€”essential for data exfiltration and insider threat investigations.


Remember: LNK files are your best friendβ€”they survive file deletion and prove the file existed, was accessed, and can link to specific USB devices or network shares through volume serial numbers.


Last updated