File & Folder Knowledge Forensics - SOC Analyst Cheatsheet
Practical Guide for User Activity & Data Access Investigation
Quick Reference: File/Folder Artifacts Matrix
Recent Files
β
β
β
β
β (Per-user)
Last 150 files
LNK Files
β
β
β
β
β (Per-user)
Persistent
Shell Bags
Folders only
β
β
β
β (Per-user)
Persistent
Recycle Bin
β
β (Deletion)
β
β
β (Per-user)
Until emptied
Investigation Priority Matrix
CRITICAL
LNK Files
File access proof, USB/network files
Both
Survives file deletion
CRITICAL
Recycle Bin
Deleted file recovery
Both
Actual file content
HIGH
Recent Files
Recent user focus
Both
Last 150 files
HIGH
Shell Bags
Folder navigation
Both
Network shares, USB paths
Core Investigation Questions
Primary Questions:
What files did the user access? (File identification)
When were files accessed? (Timeline construction)
Where were files located? (Local, USB, network share)
Secondary Questions:
What files were deleted? (Evidence destruction)
What folders were browsed? (User navigation patterns)
Were external devices used? (Data exfiltration vector)
SOC Investigation Workflows
Workflow 1: Data Exfiltration Investigation (CRITICAL)
Scenario: Suspected data theft via USB or network transfer
Investigation Priority Order:
Step 1: Check Recent File Access (Last 150 Files) Why first: Shows what user was recently focused on
Registry Location:
PowerShell - Parse Recent Files:
Red Flags in Recent Files:
β Sensitive documents (HR, financial, confidential)
β Large number of similar files (bulk access)
β Files from restricted folders
β Database exports (.csv, .xlsx, .sql)
β Configuration files (.conf, .cfg, .ini)
β Credential files (passwords.txt, accounts.xlsx)
Step 2: Analyse LNK Files (Detailed File Access) Why second: Provides precise timestamps, file paths, volume info
Location:
PowerShell - List Recent LNK Files:
Using LECmd (Zimmerman Tool) - RECOMMENDED:
Critical LNK Metadata:
Target file path (including USB/network paths)
Volume serial number (links to specific USB device)
Volume type (Fixed, Removable, Network)
Target file timestamps (Created, Modified, Accessed)
File size
Network share information (\server\share)
MAC address (network shares)
Red Flags in LNK Files:
β Volume Type = "Removable" β USB/external drive access
β Network paths (\server\share) β Data copied to network
β Recently deleted files β LNK persists after deletion
β Large files β Potential data exfiltration
β Multiple similar files β Bulk data access
β Personal storage paths β OneDrive, Dropbox, Google Drive
Data Exfiltration Indicators:
Step 3: Check Shell Bags (Folder Navigation) Why third: Shows folders browsed, including external/network locations
Registry Location:
File Location:
Using SBECmd (Zimmerman Tool):
Shell Bags Forensic Value:
Folder names and full paths
Folder interaction timestamps (last accessed)
Network share paths (\server\share\folder)
USB device paths (E:\SecretData)
Zip files, ISOs, mounted containers
Folders even if now deleted
Red Flags in Shell Bags:
β Access to HR/Finance/Confidential folders
β Browsing of network shares (lateral movement)
β USB drive folder navigation
β Temp/staging folders (C:\Temp\ToExfil)
β Cloud sync folders (OneDrive, Dropbox)
β Deleted folder paths (folder no longer exists)
Data Exfiltration Pattern:
Step 4: Examine Recycle Bin (Deleted Files) Why fourth: May contain actual deleted files or evidence of deletion
Location:
File Structure:
$I######.ext- Metadata (original path, filename, deletion time)$R######.ext- Actual file contents
Quick Command - Browse Recycle Bin:
PowerShell - Enumerate Recycle Bin:
Using RBCmd (Zimmerman Tool):
Recycle Bin Metadata:
Original filename and path
Deletion timestamp
File size
Actual file contents (in $R file)
Red Flags in Recycle Bin:
β Recently deleted sensitive documents
β Deletion during incident timeframe
β Large files deleted (covering tracks)
β System/log files deleted
β Evidence of bulk deletion
Important Notes:
PowerShell Script: Comprehensive File Access Investigation
Workflow 2: Insider Threat Investigation
Scenario: Employee suspected of stealing company data before resignation
Investigation Checklist:
Timeline Window: Focus on 30 days before resignation date
Phase 1: Document Access Pattern
Phase 2: External Device Usage
Phase 3: Network Activity
Phase 4: Evidence Destruction
Suspicious Timeline Pattern:
Workflow 3: Malware File Analysis
Scenario: Malware downloaded and executed, need to trace file origin
Investigation Steps:
Step 1: Identify Malware File Access
Step 2: Trace File Origin
Step 3: Related File Activity
Step 4: Post-Infection Activity
Cross-Artifact Correlation Techniques
Technique 1: USB Data Exfiltration Timeline
Combine:
USBSTOR Registry β Device connected
Shell Bags β Browsed USB folders
LNK Files β Files copied to/from USB (Volume Serial Number match)
Recent Files β What files were accessed before USB use
Example Timeline:
Technique 2: Network Share Data Theft
Combine:
Shell Bags β Network share browsed
LNK Files β Files copied to network share
MountPoints2 Registry β Share connection details
Recent Files β Files accessed before copy
Example Timeline:
Technique 3: File Deletion Investigation
Combine:
Recycle Bin β Deleted files list
LNK Files β Proof file existed (LNK survives deletion)
Recent Files β File was recently accessed
$R file in Recycle Bin β Actual file content (if not emptied)
Investigation Value:
Zimmerman Tools Command Reference
LECmd (LNK File Parser)
Single File:
Directory:
All Users:
With File Content Display:
Key CSV Output Columns:
SourceFile- LNK filenameTargetPath- Original file locationVolumeSerialNumber- Drive/USB serialDriveType- Fixed, Removable, NetworkVolumeLabel- Drive nameTargetCreated- File creation timeTargetModified- File modification timeTargetAccessed- File access timeFileSize- Target file sizeMachineName- Computer nameNetworkPath- UNC path (if network)
RBCmd (Recycle Bin Parser)
Single $I File:
User's Recycle Bin:
All Users:
Key CSV Output Columns:
FileName- Original filenameFileSize- Size in bytesDeletedOn- Deletion timestampOriginalPath- Full original path$IFile- Metadata file$RFile- Content file
SBECmd (Shell Bags Parser)
Single User:
All Users:
Live System (Current User):
Key CSV Output Columns:
Path- Full folder pathFirstInteracted- First access timeLastInteracted- Last access timeShellType- Folder, Zip, Network, etc.MRUPosition- Most recently used order
Detection Patterns & Red Flags
Data Exfiltration Indicators
Pattern 1: USB Data Theft
Pattern 2: Network Share Transfer
Pattern 3: Cloud Storage Exfiltration
Pattern 4: Evidence Destruction
File Type Risk Assessment
.xlsx, .csv
HIGH
Financial, customer data
Very High
.docx, .pdf
HIGH
Intellectual property, reports
High
.sql, .bak
CRITICAL
Database dumps
Critical
.pst, .ost
HIGH
Email archives
High
.txt, .cfg
MEDIUM
Configurations, credentials
Medium-High
.zip, .7z, .rar
HIGH
Compressed archives (bulk theft)
Very High
.jpg, .png
LOW-MEDIUM
Images (may contain sensitive info)
Low-Medium
Common Investigation Scenarios
Scenario 1: Employee Downloaded Sensitive Data
Evidence Chain:
Key Artifacts:
Recent Files: HR_Salaries_2024.xlsx, Customer_List.xlsx
LNK Files: Copies to C:\Users\Alice\Downloads\ToTake\
Shell Bags: Browsed E:\CompanyData\
Recycle Bin: Original files deleted
USBSTOR: USB device serial number
Scenario 2: Malware Downloaded and Executed
Evidence Chain:
Key Artifacts:
LNK File: C:\Users\Alice\Downloads\invoice.exe.lnk
Recent Files: invoice.exe accessed
Prefetch: INVOICE.EXE-*.pf execution
Recent Files: Malware accessed system files
Recycle Bin: Malware file deleted
Scenario 3: Lateral Movement File Access
Evidence Chain:
Key Artifacts:
Shell Bags: \VICTIM-PC\C$\Windows\Temp\
LNK Files: \VICTIM-PC\C$\Windows\Temp\tools.exe
Recent Files: Remote executable accessed
MountPoints2: \VICTIM-PC\C$ connection
SOC Quick Reference Commands
Rapid Triage
List Recent LNK Files:
Check Recycle Bin:
Export Recent Files Registry:
Quick Suspicious File Check:
Collection Script (Batch)
Investigation Best Practices
Live Response
β DO:
Collect LNK files immediately (minimal footprint)
Export registry keys before analysis
Document collection timestamp
Hash all collected artifacts
Use write-protected USB for tools
β DON'T:
Open files in Recent folder (updates access time)
Delete items from Recycle Bin
Browse folders (updates Shell Bags)
Run excessive tools (creates new LNK files)
Offline Analysis
β DO:
Parse all artifacts to CSV for correlation
Build comprehensive timeline
Cross-reference multiple artifacts
Check file existence (LNK target may be deleted)
Validate volume serial numbers
β DON'T:
Rely on single artifact
Ignore timezone offsets
Skip deleted file recovery attempts
Forget to check Office Recent folder
Timeline Construction
Best Practice:
Parse all artifacts to CSV
Merge timelines in Excel/TimelineExplorer
Add columns: Artifact Source, Action Type
Sort by timestamp
Filter by incident window
Identify correlated events
Build narrative
Example Timeline Entries:
Investigation Checklists
Data Exfiltration Investigation
[ ] Parse Recent Files for sensitive document access
[ ] Analyse LNK files for USB/network transfers
[ ] Check Shell Bags for external device browsing
[ ] Review Recycle Bin for evidence destruction
[ ] Correlate USB device serial numbers
[ ] Build timeline of file access β copy β deletion
[ ] Document external storage paths
[ ] Cross-reference with network logs
[ ] Check cloud storage folder access
Insider Threat Investigation
[ ] Identify resignation/termination date
[ ] Focus on 30 days before exit
[ ] Analyse Recent Files for bulk access
[ ] Check LNK files for USB usage
[ ] Review network share access
[ ] Examine Recycle Bin for deletions
[ ] Look for anti-forensic tool usage
[ ] Document access patterns over time
[ ] Correlate with HR records
Malware File Analysis
[ ] Identify malware file in Recent Files
[ ] Check LNK file for download path
[ ] Review browser download artifacts
[ ] Analyse post-infection file access
[ ] Check for file deletion attempts
[ ] Cross-reference with execution artifacts
[ ] Document file origin and timestamps
[ ] Look for related malicious files
Tools & Resources
Essential Tools
Zimmerman Tools (Free):
LECmd - LNK file parser
RBCmd - Recycle Bin parser
SBECmd - Shell Bags parser
TimelineExplorer - Timeline viewer
RegistryExplorer - Registry viewer
Download: https://ericzimmerman.github.io/
Alternative Tools:
NirSoft LnkParser - LNK viewer
FTK Imager - Evidence collection
X-Ways Forensics - Commercial suite
Magnet AXIOM - Commercial suite
Summary: Critical Takeaways
Artifact Strengths
LNK Files:
β Survives file deletion
β Precise timestamps
β Volume serial numbers (USB tracking)
β Network path information
β File size and attributes
Recent Files:
β Shows user focus/interest
β Last 150 files accessed
β Organised by file type
β Recent folders list
Shell Bags:
β Folder navigation history
β Network share access
β USB device paths
β Survives folder deletion
Recycle Bin:
β Actual file content (if not emptied)
β Deletion timestamp
β Original file path
β Per-user attribution
Investigation Strategy
Start with Recent Files (what was user interested in)
Analyse LNK Files (detailed access, USB/network)
Check Shell Bags (folder navigation)
Examine Recycle Bin (deletions, recovery)
Correlate all artifacts (build timeline)
Cross-reference with execution/USB artifacts
Key Principle
File access artifacts persist after file deletion and provide crucial evidence of user knowledge, intent, and data handlingβessential for data exfiltration and insider threat investigations.
Remember: LNK files are your best friendβthey survive file deletion and prove the file existed, was accessed, and can link to specific USB devices or network shares through volume serial numbers.
Last updated