Notifications
Clear all

Event ID for 'Hide Folders'

8 Posts
6 Users
0 Likes
2,127 Views
sjw64
(@sjw64)
Posts: 3
New Member
Topic starter
 

Hi

I have a case where most of the evidence are in folders that have been set to 'hidden'.

Does anyone know if there is an Event ID or even a registry key that will show when this was set.

OS is Windows 8

Thanks

 
Posted : 07/06/2017 2:25 pm
MDCR
 MDCR
(@mdcr)
Posts: 376
Reputable Member
 

I'm 99.99% sure file system attributes never touch registry.

Anything closely related to FS events is usually never logged by anything, more so when it comes to FS meta like attributes. MS have some built in FS object event logging (turned off by default ) but it is horrible, generates a tonne of data that is useless and non-specific, and was probably written by an alien from Alpha Centauri

Haven't heard if any forensics suites can dig this up from somewhere deep within the MFT or somesuch, but if anyone knows, please let us know in this thread.

 
Posted : 07/06/2017 3:16 pm
minime2k9
(@minime2k9)
Posts: 481
Honorable Member
 

I think you would get an entry in the USNjrnl for attribute change. Not sure if you can use this to determine what the change was (i.e. to hidden rather than say read only).

 
Posted : 07/06/2017 6:07 pm
joakims
(@joakims)
Posts: 224
Estimable Member
 

Such an event would certainly be logged in the $LogFile. You can extract it and then parse it with https://github.com/jschicht/LogFileParser to see. The file have limited history though, but you may be lucky. Assuming the Windows 8 installation is on the default FS (NTFS).

 
Posted : 08/06/2017 12:11 am
joakims
(@joakims)
Posts: 224
Estimable Member
 

And if you can't find it in the current volume, you can grab $LogFile from shadow copies if present. You can even find $LogFile transactions in the hibernation file (hiberfil.sys), but don't extract that file from a shadow copy as it will not contain its original data there.

 
Posted : 08/06/2017 12:16 am
(@athulin)
Posts: 1156
Noble Member
 

I have a case where most of the evidence are in folders that have been set to 'hidden'.

Does anyone know if there is an Event ID or even a registry key that will show when this was set.

The only way to be sure is to test it. Which means getting hold of Process Monitor from Sysinternals (it's free), learn how to use it (there are some videos in the 'Learn More' part that introduce the tool), and then set it up to report relevant system log or registry operation from all the programs that may be involved when you change the attribute (which are at least Explorer.exe, and the console command ATTRIB.EXE, but may be just anything, depending on your set-up).

Then let ProcMon run while you toggle the hidden attribute in all the ways that are interesting, and see if that changes registry or writes a log file entry in any way.

If it does (or appears to do so), you may need to add further testing to ensure that it's your action that does it, and not something else. But you're at least getting close.

If it doesn't, … it probably doesn't affect registry or logs in any way, but again you may want to consider if your experiment was correctly set up. (Like enabling event logging, etc.)

For example, if you are considering tracing $LogFile events with Procmon, you need to disable the predefined exclusion of $LogFile-related events

 
Posted : 08/06/2017 11:58 am
MDCR
 MDCR
(@mdcr)
Posts: 376
Reputable Member
 

Page 10-14 is interesting in this document
http//forensicinsight.org/wp-content/uploads/2013/07/F-INSIGHT-Advanced-UsnJrnl-Forensics-English.pdf

Also, take a look at the tool on page 9.

 
Posted : 08/06/2017 2:00 pm
kacos
(@kacos)
Posts: 93
Trusted Member
 

Page 10-14 is interesting in this document
http//forensicinsight.org/wp-content/uploads/2013/07/F-INSIGHT-Advanced-UsnJrnl-Forensics-English.pdf

Also, take a look at the tool on page 9.

Thank you - quite useful )

 
Posted : 08/06/2017 2:24 pm
Share: