Post

Digital Forensics: Investigating the 2020JimmyWilson.E01 Disk Image

A detailed walkthrough on DFIR on 2020JimmyWilson based on a coursework assignment. This documents my full investigation process using tools like Autopsy, Sleuthkit, and custom scripts

Digital Forensics: Investigating the 2020JimmyWilson.E01 Disk Image

1. What is the destination time zone offset in from UTC for the following email received by Jimmy Wilson “447018D5-00000006.eml”

An offset means difference in time so the question ask for the difference in by from UTC for the email received by Jimmy Wilson The receved header for 447018D5-00000006.em is Message:Raw-Header:X-Received: by 10.236.89.11 with SMTP id b11mr22181676yhf.16.1392573313406; Sun, 16 Feb 2014 09:55:13 -0800 (PST)

and 9:55 PST converted to UTC 0 is 5:55 PM UTC -8 also -0800 in the message header means UTC -8 link to converter used

2. What is the total capacity in bytes (decimal) of the partition labeled “J. Wilson” found in

the System.vhd file?

How i got the answer is by extracting the virtual disk system.vhd located at /img_2020JimmyWilson.E01/vol_vol6/Windows/System32/config/SYSTEM.vhd then i doubled click on the system.vhd file to mount it after mounting it i found a couple of partitions with their label including the one labeled “J.wilson” using windows cmd diskpart list of commands i used

1
2
3
4
5
6
7
8
9
diskpart
list disk
select disk 2
list volume
#volume 5 shows label J. Wilson with Ltr G
exit
#use fsutil to get disk details
fsutil volume diskfree g:

i opened the J.wilson volume and it contains the truecrypt directory and in autopsy the volume containing truecrypt is vol7, so this is a solid evidence that vol7 is the vol with the label and to get the bytes in size we use the vol lenght in sectors which is 1433600 multiply it by 512 the product is 734,003,200

The answer is E Select one: a. 253,755,392 b. 209,715,200 c. 230,686,720 d. 681,574,400 e. 734,003,200

3. What was the date and time the following email received by Jimmy Wilson "447018D5-00000006.eml" was originally sent?

According to the header The email was created dcterms:created: 2014-02-16T17:55:09Z which means February - 16 - 2014- 17:55:09 where Z is a suffix for the aviation code for UTC 0 so 17:55 - 5 = 12:55 UTC -05:00 so the answer is c. Sun, 16 February 2014 12:55:09 -05:00

4. The physical disk contains a Virtual Hard Drive which is greater than 10MB in size, the full name of the file is: system.vhd:

The system.vhd virtual hard disk file location path in the physical drive is Windows/System32/config/SYSTEM.vhd which is suspicious as vhd files don’t belong to system32\config directory this indicates hiding of data

The disk physical file size is 89208320bytes which is 85.08mb (89208320bytes / 1,048,576bytes(mib) =85.07 MB) > 10Mb

and The Virtual Disk size is 2147483648 which is 2Gb (2147483648/1,048,576(mib) = 2048MB) > 10 mb both the physical file size of the system.vhd virtual disk and the logical virtual size are greater than 10mb The answer is true

4. The disk GUID (in hex) of the physical disk is: 6FAE8D386C441743AE3298C4BDE04830 Select one:

using a custom script to get the guid The answer is True

5. What is the cluster size in bytes within the second partition of the physical disk? Select one:

using a command line tool called efwmount(Expert Witness Format Forensic Images)

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
# Create mount point in home directory
mkdir -p ~/e01_mount

# Mount the E01 file using ewfmount
ewfmount /mnt/VM/300l-prep/Forensic_CASES/001-2020JimmyWilson-raviheima/Images/2020JimmyWilson.E01 ~/e01_mount

# Display partition table using mmls (Memory Management Layer System)
mmls ~/e01_mount/ewf1

# Get cluster size for partition 2 (offset 65664)
fsstat -o 65664 ~/e01_mount/ewf1 | grep -i "cluster"

# Unmount the E01 image
fusermount -u ~/e01_mount

# Optional: Remove mount point directory
rmdir ~/e01_mount

First and second partition The cluster size is 4096 The answer is A 4096

6. On February 20, 2014 @ 17:02:35 UTC -00:00, what was the system up time in

seconds is: 9,634 To answer this question we have to first extract the windows event log file located at /Windows/System32/winevt/Logs/System.evtx You need a windows VM or Machine to complete this tasks after extracting file to your Windows host machine, then open the extracted file with windows event viewer Locate event ID 6013 with date 2/20/2014: 6:02:35 PM 17:02 = 5:02 (UTC 0) The answer is True based on the image

7. The MD5 hash value of the pdf.pdf file is: C1F95108A34228535A9262085E784D7C3E27FC68

The pdf.pdf file is located in the system.vhd Virtual Hard Disk Vol8 partition full path is SYSTEM.vhd/vol_vol8/pdf.pdf

The answer is false

8. The user account Jimmy Wilson has his logon password enabled and the password hint is safeone.

The answer is true To find this You click on OS Accounts in autopsy then navigate to User JimmyWilson

9. What is the partitioning format (Schema) of the physical disk?

The Answer is GPT using the sleuthkit tool mmls we are able to get the Partition Table which is, GPT (GUID Parition Table)

10. The final destination IP Address for the following email received by Jimmy Wilson “447018D5-00000006.eml” is: 10.221.48.196

1
2
3
4
5
6
7
8
9
10
11
12
13
14
uthor: Robert Ripoff <robert.ripoff@gmx.com>
Content-Type: message/rfc822
Creation-Date: 2014-02-16T17:55:09Z
Message-From: Robert Ripoff <robert.ripoff@gmx.com>
Message-To: wilsonjimmy807@gmail.com
Message:From-Email: robert.ripoff@gmx.com
Message:From-Name: Robert Ripoff
Message:Raw-Header:Authentication-Results: mx.google.com;       spf=pass (google.com: domain of robert.ripoff@gmx.com designates 74.208.4.200 as permitted sender) smtp.mail=robert.ripoff@gmx.com
Message:Raw-Header:Delivered-To: wilsonjimmy807@gmail.com
Message:Raw-Header:MIME-Version: 1.0
Message:Raw-Header:Message-ID: <20140216175509.190490@gmx.com>
Message:Raw-Header:Received: by 10.221.48.196 with SMTP id ux4csp77384vcb;        Sun, 16 Feb 2014 09:55:13 -0800 (PST)
Message:Raw-Header:Received-SPF: pass (google.com: domain of robert.ripoff@gmx.com designates 74.208.4.200 as permitted sender) client-ip=74.208.4.200;
Message:Raw-Header:Return-Path: <robert.ripoff@gmx.com>
1
The answer is true

11. The 2nd partitions unique GUID (in hex) of the physical disk is: 423FDC8AA701EE46AF5A70C06738E819

The answer is true

12. What is the logical size in bytes (decimal) of the pdf.pdf file?

The answer is b 43399

13. The User account BillyBob sent the following files to the $recyclebin: New Price List.txt and New Price List Encoded.

i. The `New Price List encoded is located at

1
/img_2020JimmyWilson.E01/vol_vol6`/`$`RECYCLE.BIN/S-1-5-21 1171287513-3642516788-2358256967-1004/$R3TS6GA/New Price List Encoded.TXT

ii.The New Price list is located at

1
/img_2020JimmyWilson.E01/vol_vol6/$RECYCLE.BIN/S-1-5-21-1171287513-3642516788-2358256967-1004/$R3TS6GA/New Price List.txt

so The answer is True

14. What is the logical file size in bytes (decimal) of the PLEAS.txt file?

The pleas.txt file is located at /img_SYSTEM.vhd/vol_vol10/PLEAS.txt The Answer is B 12236

15. Provide the full name of the User that has the RID number 0x3EB:

To identify the user with RID number 0x3EB: Click On Os Accounts in autopsy In the Name entry the users are identified using their Security Indetifier

1
2
3
4
5
6
7
S-1-5-21-1171287513-3642516788-2358256967-1003
│ │ │ │  │────────────────────────────────│ │
│ │ │ ���              Domain              │ RID
│ │ │ └─ NT Authority                    │
│ │ └─── Security Authority (5 = SECURITY_NT_AUTHORITY)
│ └───── Revision Level
└─────── "S" indicates it's a SID

And the RID is the last number after a dash 1003 converting 1003 to hex results in 0x3eb The answer is C: Joe T. Nameless

16. When was the last log-in date and time for the User “Jimmy Wilson”?

JImmy wilson last Login was 2014-02-19. 14:30:58 WAT: which is UTC+1 and 13:30:58 PM in UTC 0 so the answer is D none of the answer are correct.

17. The following individuals: jose.Badguy@hushmail.com, robert.ripoff@gmx.com sent emails to the User Jimmy Wilson?

It’s Evident that Jimmy received emails from jose. and robert The answer is True

18. What program did the User Jimmy Wilson have set to run when he logged on to the

computer? To find out we’ll open to registry located at /img_2020JimmyWilson.E01/vol_vol6/USERS/Jimmy Wilson/NTUSER.DAT Then navigate to Software → Microsoft → Windows → CurrentVersion → Run → RESTART_STICKY_NOTES The answer is C: stinky Notes

19. The SHA1 hash value for the AISB08.pdf file is: BDEBF09E8B2D404D1C483C3EBFB8AD37C780D909

The answer is True

20. What encryption programs were used on this computer? The Encryption Programs used on this computer are

Bcrypt/TrueCrypt As they were the only Encryption Programs found in the system aside from bitlocker which is installed by default and BCTextEncoder was Found to be used in encryption of files in the system e.g the encoded new prices list

22. The SHA1 hash value for the Card Printers.htm file is: F6CF04DB3D1BA828E375BBFE988876CE06164126:

1
2
3
	The `Card Printers.htm` file is located at  `/img_SYSTEM.vhd/vol_vol8/Card Printers.htm`
	![5cc79f2cbe67ba27affa288f01bd50ef.png](/assets/images/2020jimmywilson/5cc79f2cbe67ba27affa288f01bd50ef.png)
	The answer is True

23. What search engine did the User “Jimmy Wilson” use to search for: how to steal identities?

There’s only one search query with how to steal Identities and the search engine used was bing.com so the Answer is B: bing

24. What is the last Date/Time the User “Jimmy Wilson” last ran the Windows Mail Application?

To find this Go to the user registry ( NTUSER.dat) located at /img_2020JimmyWilson.E01/vol_vol6/USERS/Jimmy Wilson/NTUSER.DAT Software -> Microsoft -> Windows Mail(Click on windows mail) and by your left the last modified date in the registry is the

Paths Investigated — No Results

1. UserAssist Registry Key

1
2
NTUSER.DAT → Software → Microsoft → Windows →
CurrentVersion → Explorer → UserAssist

Result: No Windows Mail entry found

2. Prefetch Folder

1
/img_2020JimmyWilson.E01/vol_vol6/Windows/Prefetch/

Result: No MSIMN.EXE prefetch file found — prefetch likely disabled

3. LNK / Recent Files

1
/vol_vol6/Users/Jimmy Wilson/AppData/Roaming/Microsoft/Windows/Recent/

Result: Directory not found

4. Jump Lists

1
/vol_vol6/Users/Jimmy Wilson/AppData/Roaming/Microsoft/Windows/Recent/AutomaticDestinations/

Result: Directory not found


Paths That Yielded Results

1. Windows Mail Registry Key (Primary)

1
2
NTUSER.DAT → Software → Microsoft → Windows Mail
Modification Time: 2014-01-25 18:27:51 GMT+00:00

2. Application.evtx — ESENT Event ID 220 (Corroboration)

1
2
3
4
/img_2020JimmyWilson.E01/vol_vol6/Windows/System32/winevt/Logs/Application.evtx
Source: ESENT | Event ID: 220
Timestamp: 1/25/2014 10:27:49 AM PST = 18:27:49 UTC
Description: WinMail database backup operation

Answer is C: ` Sat, 25 January 2014 18:27:51 -00:00 UTC`

25. What is the SHA1 hash value of the Physical Disk?

Select one: using ewfinfo a sleuth kit util to get the hash for the physical disk

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
$ ewfinfo 2020JimmyWilson.E01                                                                                                                                                             [7:28:48]
ewfinfo 20140608

Acquiry information
        Case number:            1
        Description:            Jimmy Wilson
        Examiner name:          CEDONLEY
        Evidence number:        2
        Notes:                  2018 Recertification
        Acquisition date:       Thu Dec 14 11:52:41 2017
        System date:            Thu Dec 14 11:52:41 2017
        Operating system used:  Win 201x
        Software version used:  ADI3.4.2.6
        Password:               N/A

EWF information
        File format:            FTK Imager
        Sectors per chunk:      64
        Compression method:     deflate
        Compression level:      no compression

Media information
        Media type:             fixed disk
        Is physical:            yes
        Bytes per sector:       512
        Number of sectors:      1740800
        Media size:             850 MiB (891289600 bytes)

Digest hash information
        MD5:                    b267fb0cd94645425eee00258d3a9b58
        SHA1:                   a1102c70a50768b588225fdcad6efa5d5d57341b

(hacker-x)
m4d_5c13nt15t@scientist /mnt/VM/300l-prep/Forensic_CASES/001-2020JimmyWilson-raviheima/Images

The answer is a. a1102c70a50768b588225fdcad6efa5d5d57341b

github script used for number 4 and 11

github.com/raviheima