Beruflich Dokumente
Kultur Dokumente
available at www.sciencedirect.com
abstract
Keywords: Built into Microsoft Windows is the ability for the operating system to track user window
Digital forensics viewing preferences specific to Windows Explorer. This information, which is called
Event reconstruction ‘‘ShellBag’’ information, is stored in several locations within the Windows Registry in the
Windows XP Windows Operating System. This paper introduces a novel method to examine ShellBag
ShellBag information analysis information within Registry snapshots to reconstruct user activities. It compares different
Registry snapshots analysis states of ShellBag information within consecutive Registry snapshots in order to detect
ShellBag-related user actions. Nine detection rules are proposed on the basis of analyzing
the causality between user actions and updated ShellBag information. This approach can
be used to prove that certain interactions between the user and system must have, or must
not have happened during a certain time period.
ª 2009 Digital Forensic Research Workshop. Published by Elsevier Ltd. All rights reserved.
5
This research was funded by the Science Foundation Ireland under Research Frontiers Programme 2007 grant CMSF575.
* Corresponding author.
E-mail address: yuandong.zhu@ucd.ie (Y. Zhu).
1742-2876/$ – see front matter ª 2009 Digital Forensic Research Workshop. Published by Elsevier Ltd. All rights reserved.
doi:10.1016/j.diin.2009.06.009
S70 digital investigation 6 (2009) S69–S77
marked as the most recently used item within the BagMRU The same experiment was performed with a folder that is
key. In the final step the system found the target folder’s not located on the Desktop. It is observed that the user action
Display key and read values from the Shell key under this did not create any new ShellBag information as the previous
Display key. experiment, but it updated the target folder’s ancestors’ MRU
Experiment 2: Closing a folder that currently has associ- items’ position. The updating process began from the BagMRU
ated ShellBag information and is located on the Desktop. key and ended when it did not find any existing items within
The second experiment involves closing a previously the MRU key matching the target folder.
opened folder, which is a direct sub-folder of the Desktop, Experiment 6: Closing a folder that currently does not have
while monitoring changes to the Registry. associated ShellBag information.
Log analysis: The process began by enumerating the MRU The system will not create any new ShellBag information
items within the BagMRU key and updating the ‘‘MRUListEx’’ for a new folder when it is first opened. Because of this it is
value to ensure the target folder’s MRU item is the most recent expected that this information is created when the folder is
item in this key. The remaining Registry actions wrote the closed. This experiment was conducted to test this theory. It
folder’s display settings to the Shell key under target folder’s was performed twice: one time for the folder that was located
Display Key. directly on the Desktop, and the other time for the folder
Experiment 3: Opening a folder that currently has associ- which was located in a sub-directory of the Desktop folder.
ated ShellBag information and is not located on the Desktop. Log analysis: When closing a folder on the Desktop, the
As mentioned earlier, the Desktop is the hierarchical system enumerated the BagMRU key, to find an existing item
staring point of the BagMRU key. The third experiment matching the target folder. After the system did not find
examines the changes to the Registry when the target folder is a matching item, a request was sent to the Registry to create
located in the sub-folder of the Desktop. a new item in the BagMRU key and a new sub-key associated
Log analysis: By opening an existing folder, which is not with this folder under the BagMRU key. The newly created
directly located on the Desktop, the system updated the MRU item contains the target folder’s name and timestamp
BagMRU key first. The position of the MRU item that is asso- information. The system also updated the BagMRU key’s
ciated with the target folder’s ancestor folder was updated in ‘‘MRUListEx’’ value which moved the newly created item to
the sequence value ‘‘MRUListEx’’ of the BagMRU key. The the most recently used position. The remaining log informa-
system then updated this ancestor folder’s MRU key, down the tion shows the process of creating the new Display key for the
hierarchy, until it reached the target folder’s parent’s MRU target folder and writing the display settings values to its Shell
key. The whole updating process made each ancestor folder sub-key.
and the target folder become the most recently used item in When the same experiment is performed to the folder that
their parent’s MRU key. is not located on the Desktop, the ShellBag information is also
Experiment 4: Closing a folder that currently has associ- created when the folder is closed. In addition, not only this
ated ShellBag information and is not located on the Desktop. folder’s MRU item’s position was changed, all its ancestors’
Like the previous experiment, a test for determining user MRU items’ position was marked as the most recent item in
action associated with non-Desktop folders was performed. This the corresponding ‘‘MRUListEx’’ value.
time focusing on Registry changes when the folder was closed. Experiment 7: Deleting a folder that currently has associ-
Log Analysis: Here the result shows that when closing ated ShellBag information.
a folder, which is not directly under the Desktop folder, the The objective of this experiment is to monitor whether the
MRU key updating process also started from the BagMRU and ShellBag information of the target folder will be deleted when
ended when it reached this target folder’s parent’s MRU key. the folder is deleted.
The Shell sub-key under the folder’s Display key was then Log analysis: The resulting log shows that the target folder
updated. and its ancestors’ MRU items’ position was updated as other
Experiment 5: Opening a folder that currently does not actions, but there was no registry deleting operation related to
have associated ShellBag information. ShellBag information executed in the process of deleting the
This experiment is designed to observe whether the new folder. The deleted folder’s ShellBag information remained in
MRU key, MRU item and Display key will be created when the the Registry.
user performs an opening operation on folder that does not Experiment 8: Opening a newly created folder with the
yet have associated ShellBag information. This experiment same name as a previously deleted folder that has associated
was performed twice: one time for the folder that was located ShellBag information.
directly on the Desktop, and the other time for the folder A new folder is created with the same name and location as
which was located in a sub-directory of the Desktop folder. a previously deleted folder. The deleted folder has associated
Log analysis: When opening a folder on the Desktop, the ShellBag information stored in the Registry. Because of this,
Registry operation logs show that the process began by the goal of this experiment is to understand how the ShellBag
enumerating current items in the BagMRU key. At this point, information will update for this newly created folder.
because the system did not find any existing items matching Log Analysis: The result shows that when this folder was
this folder’s information, it did not proceed to the MRU key opened it inherited the previously removed folder’s ShellBag
updating operation, and the whole process terminated. No information. Repeating the tested operations on this new
new ShellBag information was created because of this action; folder will update the already existing ShellBag information,
the Registry maintained the same ShellBag information as which is now associated with the new folder. Additionally, the
before the folder was opened. binary data stored within the associated MRU item was not
digital investigation 6 (2009) S69–S77 S73
updated. The timestamp information within the MRU item User Actions System Operations
still remains the same.
Experiment 9: Closing a folder that currently does not have Action Type 1 Update MRU items’ position
associated ShellBag information when the Registry contains
the maximum number of Display keys.
Log Analysis: When the folder was closed, the system first Action Type 2 Update (Create) MRU items’ position
created an MRU item and an MRU key associated with the target
folder. Unlike experiment 6, the system did not create a new
Display key for the target folder but assigned the NodeSlot value Update (Create) Display key and its
Shell sub-key
under the folder’s MRU key to ‘‘1’’, and updated the Shell Key
‘‘Bags\1\Shell’’. When we performed user actions on another
folder assigned a NodeSlot value ‘‘1’’, it updated the same Action Type 3 No updates
‘‘Bags\1\Shell’’ key. In other words, both of these two folders are
associated with the Display key ‘‘Bags\1’’.
Fig. 6 – The link between user actions and system
operations.
3.1. Other experiments
6. Case study
7. Conclusion
Dr. Pavel Gladyshev is a lecturer at the University College Gladyshev also serves as an invited expert to the Interpol
Dublin’s School of Computer Science and Informatics, where working party on IT Crime (Europe).
he is directing the GDip/MSc programme in Forensic
Computing and Cybercrime Investigation – an international Mr. Joshua James is a research student in the Centre for
distance learning programme for the law enforcement officers Cybercrime Investigation at University College Dublin,
specializing in cybercrime investigations. Dr. Gladyshev’s Ireland. Coming from a background in Network Security and
research interests are in the area of Information Security and Administration, his focus is now on automatic digital
Digital Forensics. His current work is focusing on the logical evidence identification and correlation. He is specifically
foundation of digital forensic analysis and its applications to working in the area of rigorous automated investigation and
investigations of cybercrimes. Dr. Gladyshev serves on the analysis techniques for digital investigations with emphasis
editorial boards of the International Journal of Digital Evidence, of ease of use. To this end, he has started the open source
the International Journal of Digital Crime and Forensics, and project titled Rapid Evidence Acquisition Project for Event
on the Board of Referees of the Digital Investigation Journal. Dr. Reconstruction (http://CybercrimeTech.com).