{
    "id": "68b767cc-a1b3-4c25-b831-3bedf6a20397",
    "name": "USB Forensic Analysis",
    "slug": "usb-forensic-analysis",
    "status": "published",
    "lab_type": "pta",
    "is_sample": false,
    "duration_in_seconds": 1800,
    "metadata": {
        "courses": [
            "cd60ce4a-1b83-48c4-8d38-7e6bfeab4a1e"
        ],
        "pta_sdn": "62",
        "pta_namespace": "my.ine",
        "learning_paths": [],
        "has_published_parent": true
    },
    "session": null,
    "company": "a491bc32-c056-4946-9169-cc053387bada",
    "created": "2022-03-30T03:01:29.120826Z",
    "modified": "2024-04-30T14:33:39.255377Z",
    "is_beta": false,
    "lab_objectives": [],
    "main_learning_area": "3e1aa06f-2e9f-4789-b50d-aa027ad8dcfa",
    "learning_areas": [
        {
            "id": "3e1aa06f-2e9f-4789-b50d-aa027ad8dcfa",
            "name": "Cyber Security",
            "slug": "cyber-security"
        }
    ],
    "categories": [],
    "tags": [],
    "difficulty": null,
    "is_web_access": false,
    "is_lab_experience": false,
    "is_featured": false,
    "cve": null,
    "severity": null,
    "year": null,
    "classification": null,
    "external_url": "",
    "solution_video": null,
    "explanation_video": null,
    "description": "# Scenario\n\nGameDevSoft is a software development company which is mainly known for game development. An employee in the main office was seen using his colleague's computer and had plugged in a USB on that computer too. When he was confronted about this incident, he said that he was helping fix an issue and that he never plugged any USB to this computer!\n\nEvidence given: **WindowsRegistry folder** [located at **C:\\\\DFP\\\\Labs\\\\Module6\\\\Lab16\\\\WindowsRegistry**] includes:\n\n-   NTUSER.Dat\n-   SAM\n-   SYSTEM\n-   SOFTWARE\n-   SECURITY\n\n# Goals\n\n-   Prove that a USB was truly connected to this computer.\n-   Pinpoint the USB to a certain user account.\n\n# What you will learn\n\n-   How to examine Windows artifacts related to USB devices.\n-   How to profile a connected USB device to a specific user account.\n-   How to use RegRipper to analyze Windows Registry artifacts.\n\n# Recommended tools\n\n-   **RegRipper**\n-   **Notepad**",
    "description_html": "<h1>Scenario</h1>\n<p>GameDevSoft is a software development company which is mainly known for game development. An employee in the main office was seen using his colleague's computer and had plugged in a USB on that computer too. When he was confronted about this incident, he said that he was helping fix an issue and that he never plugged any USB to this computer!</p>\n<p>Evidence given: <strong>WindowsRegistry folder</strong> [located at <strong>C:\\DFP\\Labs\\Module6\\Lab16\\WindowsRegistry</strong>] includes:</p>\n<ul>\n<li>NTUSER.Dat</li>\n<li>SAM</li>\n<li>SYSTEM</li>\n<li>SOFTWARE</li>\n<li>SECURITY</li>\n</ul>\n<h1>Goals</h1>\n<ul>\n<li>Prove that a USB was truly connected to this computer.</li>\n<li>Pinpoint the USB to a certain user account.</li>\n</ul>\n<h1>What you will learn</h1>\n<ul>\n<li>How to examine Windows artifacts related to USB devices.</li>\n<li>How to profile a connected USB device to a specific user account.</li>\n<li>How to use RegRipper to analyze Windows Registry artifacts.</li>\n</ul>\n<h1>Recommended tools</h1>\n<ul>\n<li><strong>RegRipper</strong></li>\n<li><strong>Notepad</strong></li>\n</ul>",
    "tasks": "# Tasks\n\n## Task 1: Analyzing Windows Registry Artifacts to Locate used USB Devices\n\nIn this task, you are required to analyze the Windows Registry files to locate USB artifacts and then, report back how many USBs were truly used on the system. In your report also include other USB device details such as the vendor name, product name, version number, serial number, friendly names, mount points, drive letters, etc.\n\nTo complete this task, use RegRipper [located at **C:\\DFP\\Tools\\Others\\RegRipper2.8-master**] to analyze the Windows \"SYSTEM\" registry file.\n\n**[Note:]** USB details are usually stored in the USBSTOR registry key\n\n**SYSTEM\\\\CurrentControlSet\\\\Enum\\\\USBSTOR**\n\n## Task 2: Profiling the User to the used USB Device\n\nIn this task you are required to complete the USB forensic analysis you started and prove that the USB devices that were connected to this machine were used by a specific user. You are also required to identify when the USB device was used.\n\nTo complete this task, use RegRipper to analyze the Windows \"NTUSER.DAT\" registry file, which was acquired from the suspect user account.\n\n**[Note:]** mounted device details could be found here:\n\n**NTUSER.DAT\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Explorer\\\\MountPoints2**",
    "tasks_html": "<h1>Tasks</h1>\n<h2>Task 1: Analyzing Windows Registry Artifacts to Locate used USB Devices</h2>\n<p>In this task, you are required to analyze the Windows Registry files to locate USB artifacts and then, report back how many USBs were truly used on the system. In your report also include other USB device details such as the vendor name, product name, version number, serial number, friendly names, mount points, drive letters, etc.</p>\n<p>To complete this task, use RegRipper [located at <strong>C:\\DFP\\Tools\\Others\\RegRipper2.8-master</strong>] to analyze the Windows \"SYSTEM\" registry file.</p>\n<p><strong>[Note:]</strong> USB details are usually stored in the USBSTOR registry key</p>\n<p><strong>SYSTEM\\CurrentControlSet\\Enum\\USBSTOR</strong></p>\n<h2>Task 2: Profiling the User to the used USB Device</h2>\n<p>In this task you are required to complete the USB forensic analysis you started and prove that the USB devices that were connected to this machine were used by a specific user. You are also required to identify when the USB device was used.</p>\n<p>To complete this task, use RegRipper to analyze the Windows \"NTUSER.DAT\" registry file, which was acquired from the suspect user account.</p>\n<p><strong>[Note:]</strong> mounted device details could be found here:</p>\n<p><strong>NTUSER.DAT\\Microsoft\\Windows\\CurrentVersion\\Explorer\\MountPoints2</strong></p>",
    "published_date": "2020-10-20T15:32:26Z",
    "solutions": "# SOLUTIONS\n\n## Task 1: Analyzing Windows Registry Artifacts to Locate used USB Devices\n\nThe good thing about analyzing Windows Registry Artifacts using RegRipper is that it is so easy. RegRipper performs a lot of analysis activities in the background though! We will be using the GUI version named rr.exe, but there is also a CLI version. \u00f0\u0178\u02dc\u0160\n\nLet's start RegRipper and load the SYSTEM registry file. All you need to do is double-click on the rr.exe file found in the RegRipper2.8-master directory. After running the application, make sure you select the file you want to analyze by pressing the \"Browse\" button and selecting the \"SYSTEM\" file. Then, press the other \"Browse\" button to specify where you want to store the results of the analysis that RegRipper will be doing for you. Finally, make sure that you select \"system\" from the drop-down profile list, even if it does not show in the list, just use the keyboard arrows to select it. With that done, you should have something like the following:\n\n![1](https://assets-ine-com.s3.amazonaws.com/content/ptp/lab_16_usb_forensic_analysis/1.png)\n\nNow all you need to do is press the \"Rip It\" button.\n\nRegRipper will do all the analysis, and then you will get a message saying that all is done. When you reach that point, you can move on to the second part of the analysis, that you must do yourself.\n\nAs previously mentioned, the USB details are usually stored in the USBSTOR registry key, which is located in the SYSTEM registry file in the following path:\n\n**SYSTEM\\\\CurrentControlSet\\\\Enum\\\\USBSTOR**\n\nOpen the SYSTEM-RegReport.txt file using Notepad++ and search for the USBSTOR keyword and find the line where it shows the \"ControlSet001\\\\Enum\\\\USBStor\". Remember that it will not always start with \"ControlSet001\". As you may recall from our Registry Forensic analysis, this depends on the Control Set we are working with. For this case, it was ControlSet001. Now, I assume you found the following results:\n\nDisk&Ven_Imation&Prod_Nano_Pro&Rev_PMAP [Tue Jun 21 01:53:14 2016]\n\n\u00e2\u20ac\u2039        S/N: 07B20C03C80830A9&0 [Tue Jun 21 01:53:14 2016]\n\n\u00e2\u20ac\u2039        Device Parameters LastWrite: [Tue Jun 21 01:53:14 2016]\n\n\u00e2\u20ac\u2039        Properties LastWrite : [Tue Jun 21 01:53:15 2016]\n\n\u00e2\u20ac\u2039        FriendlyName : Imation Nano Pro USB Device\n\nDisk&Ven_Lexar&Prod_JumpDrive&Rev_1100 [Tue Jun 21 02:01:59 2016]\n\n\u00e2\u20ac\u2039      S/N: AAI6UXDKZDV8E9OU&0 [Tue Jun 21 02:01:59 2016]\n\n\u00e2\u20ac\u2039      Device Parameters LastWrite: [Tue Jun 21 02:01:59 2016]\n\n\u00e2\u20ac\u2039      Properties LastWrite : [Tue Jun 21 02:02:00 2016]\n\n\u00e2\u20ac\u2039      FriendlyName : Lexar JumpDrive USB Device**\n\nBased on the results, we might have two entries here. Let's continue our analysis by analyzing the entries we found here and see what the vendors, product names, etc. are. The format used in a USBSTOR is shown above:\n\nDISK&Ven_{Name}&Prod_{Name}&Rev_{Value}\n\nSo, for the first entry, we have:\n\n-   Vendor: **Imation**\n-   Product: **Nano_Pro**\n-   Revision number: **PMAP**\n-   Serial No.: **07B20C03C80830A9&0**\n-   Friendly Name: **Imation Nano Pro USB Device**\n-   First time connected: **Tue Jun 21 01:53:14 2016**\n-   Last time used: **Tue Jun 21 01:53:15 2016**\n\nWhile, for the second entry we have:\n\n-   Vendor: **Lexar**\n-   Product: **JumpDrive**\n-   Revision No.: **1100**\n-   Serial No.: **AAI6UXDKZDV8E9OU&0**\n-   Friendly Name: **Lexar JumpDrive USB Device**\n-   First time connected: **Tue Jun 21 02:01:59 2016**\n-   Last time used: **Tue Jun 21 02:02:00 2016**\n\nBy the way, from the results we got, it is clear that each device was used exactly 1 second after it was first connected to the system.\n\nNow, we need to check the drive letter of the USBs that have been used on this system. This can be done by going to the location below:\n\n**SYSTEM\\\\MountedDevices**\n\nSo, in the results of RegRipper, search for the \"**MountedDevices**\" keyword. I assume you found the entries below. \n\n**MountedDevices**\n\nLastWrite time = Tue Jun 21 02:01:59 2016Z\n\n\\DosDevices\\\\C:\n\nDrive Signature = 3a db 0d ca\n\n\\\\??\\\\Volume{32138f1e-3788-11e6-8250-806e6f6e6963}\n\nDrive Signature = 3a db 0d ca\n\n\\??\\\\Volume{32138f1f-3788-11e6-8250-806e6f6e6963}\n\nDrive Signature = 3a db 0d ca\n\nDevice: _??_USBSTOR\\#Disk&Ven_Lexar&Prod_JumpDrive&Rev_1100\\#AAI6UXDKZDV8E9OU&0\\#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}\n\n\\\\DosDevices\\\\E:\n\n\\\\??\\\\Volume{**fb7f93ec-37a4-11e6-8254-080027d269d7**}\n\nDevice: \\\\??\\\\SCSI\\#CdRom&Ven_VBOX&Prod_CD-ROM\\#4&8f5d389&0&010000\\#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\n\n\\\\??\\\\Volume{32138f23-3788-11e6-8250-806e6f6e6963}\n\n\\\\DosDevices\\\\D:\n\nDevice: _??_USBSTOR\\#Disk&Ven_Imation&Prod_Nano_Pro&Rev_PMAP\\#07B20C03C80830A9&0\\#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}\n\n\\\\??\\\\Volume{**fb7f938e-37a4-11e6-8254-080027d269d7**}\n\n----------------------------------------\n\nmountdev2 v.20140721\n\n(System) Return contents of System hive MountedDevices key\n\nMountedDevices\n\nLastWrite time = Tue Jun 21 02:01:59 2016Z\n\nVolume Disk Sig Offset\n\n------- -------- --------\n\n\\\\??\\\\Volume{32138f1e-3788-11e6-8250-806e6f6e6963} 3a db 0d ca 0\n\n\\\\??\\\\Volume{32138f1f-3788-11e6-8250-806e6f6e6963} 3a db 0d ca 0\n\n\\\\DosDevices\\\\C: 3a db 0d ca 0\n\n\\\\??\\\\Volume{32138f1e-3788-11e6-8250-806e6f6e6963}\n\nTue Jun 21 08:14:37 2016\n\n\\\\??\\\\Volume{32138f1f-3788-11e6-8250-806e6f6e6963}\n\nTue Jun 21 08:14:37 2016\n\nDevice: \\\\??\\\\SCSI\\#CdRom&Ven_VBOX&Prod_CD-ROM\\#4&8f5d389&0&010000\\#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\n\n\\\\??\\\\Volume{32138f23-3788-11e6-8250-806e6f6e6963}\n\n\\\\DosDevices\\\\D:\n\nDevice: _??_USBSTOR\\#Disk&Ven_Imation&Prod_Nano_Pro&Rev_PMAP\\#07B20C03C80830A9&0\\#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}\n\n\\\\??\\\\Volume{**fb7f938e-37a4-11e6-8254-080027d269d7**}\n\nDevice: _??_USBSTOR\\#Disk&Ven_Lexar&Prod_JumpDrive&Rev_1100\\#AAI6UXDKZDV8E9OU&0\\#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}\n\n\\\\DosDevices\\\\E:\n\n\\\\??\\\\Volume{**fb7f93ec-37a4-11e6-8254-080027d269d7**}\n\nNow, I want you to go back and check the Volume GUIDs that are written in bold. So, it seems that the device that was used had the Volume GUID **fb7f93ec-37a4-11e6-8254-080027d269d7**. By inspecting this volume GUID, it seems that it was used with both USB drives, and it was mounted using the drive letter \"**E:**.\" Also, it seems that the \"**Lexar JumpDrive USB Device**\" was the last to be used on this system. We have two proofs to this fact. The first is the entry in the registry that still shows it was attached to it. The second is that if you go back to the last time it was used, you will find that it was used at \"**Tue Jun 21 02:02:00 2016**\" while the other USB was last used at \"**Tue Jun 21 01:53:15 2016**\". It seems that our fellow was using more than one USBs because the time between each usage is less than 7 minutes.\n\n## Task 2: Profiling the User to the used USB Device\n\nNow that we have found what USB devices were connected to this computer, we now need to check which user was using them. Since in our case we only have one user, we will just go through the single NTUSER.DAT file. Again, start RegRipper but this time make sure to load the \"**NTUSER.DAT**\" registry file, save your report to something like \"**NTUSER-RegReport.txt**,\" select the \"**ntuser**\" profile and then click on the \"**Rip It**\" button.\n\nAs a basic reminder, the mounted device details can be found in the registry path below:\n\n**NTUSER.DAT\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Explorer\\\\MountPoints2**\n\nNow, based on the GUID we found in the previous task, which was \"**fb7f93ec-37a4-11e6-8254-080027d269d7**.\" Let's see if we can locate an entry for this volume under this user's registry keys. Search for the keyword \"**MountPoints2**\" in the file NTUSER-RegReport.txt using Notepad++. I assume you found the following results.\n\nMountPoints2\n\nSoftware\\\\Microsoft\\\\Windows\\\\CurrentVersion\\\\Explorer\\\\MountPoints2\n\nLastWrite Time Tue Jun 21 02:02:04 2016 (UTC)\n\nRemote Drives:\n\nVolumes:\n\nTue Jun 21 08:38:46 2016 (UTC)\n\n{32138f1f-3788-11e6-8250-806e6f6e6963}\n\n**Tue Jun 21 02:02:04 2016 (UTC)**\n\n**{fb7f93ec-37a4-11e6-8254-080027d269d7}**\n\n**Tue Jun 21 01:59:52 2016 (UTC)**\n\n**{fb7f938e-37a4-11e6-8254-080027d269d7}**\n\nTue Jun 21 01:59:48 2016 (UTC)\n\n{32138f23-3788-11e6-8250-806e6f6e6963}\n\nI highlighted the ones we are interested in **bold**.\n\nIf we now pull all the details together, we can conclude that:\n\n1.  The USB device named \"**Imation Nano Pro USB Device**\" was:\n\n-   First installed at: Tue Jun 21 01:53:14 2016 **<- found from task \\#1**\n-   Last connected at: Tue Jun 21 01:53:15 2016 **<- found from task \\#1**\n- Used by the user at: **Tue Jun 21 01:59:52 2016 (UTC)** **<- found from user MountPoints2**\n\n  \n\n2.  While the USB device named \"**Lexar JumpDrive USB Device**\" was:\n\n-   First installed at: Tue Jun 21 02:01:59 2016 **<- found from task \\#1**\n-   Last connected at: Tue Jun 21 02:02:00 2016 **<- found from task \\#1**\n-   Used by the user at: **Tue Jun 21 02:02:04 2016 (UTC)** **<- found from user MountPoints2**\n\nAnd with this, we can conclude that this user truly mounted/used both USBs.",
    "solutions_html": "<h1>SOLUTIONS</h1>\n<h2>Task 1: Analyzing Windows Registry Artifacts to Locate used USB Devices</h2>\n<p>The good thing about analyzing Windows Registry Artifacts using RegRipper is that it is so easy. RegRipper performs a lot of analysis activities in the background though! We will be using the GUI version named rr.exe, but there is also a CLI version. \u00f0\u0178\u02dc\u0160</p>\n<p>Let's start RegRipper and load the SYSTEM registry file. All you need to do is double-click on the rr.exe file found in the RegRipper2.8-master directory. After running the application, make sure you select the file you want to analyze by pressing the \"Browse\" button and selecting the \"SYSTEM\" file. Then, press the other \"Browse\" button to specify where you want to store the results of the analysis that RegRipper will be doing for you. Finally, make sure that you select \"system\" from the drop-down profile list, even if it does not show in the list, just use the keyboard arrows to select it. With that done, you should have something like the following:</p>\n<p><img alt=\"1\" src=\"https://assets-ine-com.s3.amazonaws.com/content/ptp/lab_16_usb_forensic_analysis/1.png\" /></p>\n<p>Now all you need to do is press the \"Rip It\" button.</p>\n<p>RegRipper will do all the analysis, and then you will get a message saying that all is done. When you reach that point, you can move on to the second part of the analysis, that you must do yourself.</p>\n<p>As previously mentioned, the USB details are usually stored in the USBSTOR registry key, which is located in the SYSTEM registry file in the following path:</p>\n<p><strong>SYSTEM\\CurrentControlSet\\Enum\\USBSTOR</strong></p>\n<p>Open the SYSTEM-RegReport.txt file using Notepad++ and search for the USBSTOR keyword and find the line where it shows the \"ControlSet001\\Enum\\USBStor\". Remember that it will not always start with \"ControlSet001\". As you may recall from our Registry Forensic analysis, this depends on the Control Set we are working with. For this case, it was ControlSet001. Now, I assume you found the following results:</p>\n<p>Disk&amp;Ven_Imation&amp;Prod_Nano_Pro&amp;Rev_PMAP [Tue Jun 21 01:53:14 2016]</p>\n<p>\u00e2\u20ac\u2039        S/N: 07B20C03C80830A9&amp;0 [Tue Jun 21 01:53:14 2016]</p>\n<p>\u00e2\u20ac\u2039        Device Parameters LastWrite: [Tue Jun 21 01:53:14 2016]</p>\n<p>\u00e2\u20ac\u2039        Properties LastWrite : [Tue Jun 21 01:53:15 2016]</p>\n<p>\u00e2\u20ac\u2039        FriendlyName : Imation Nano Pro USB Device</p>\n<p>Disk&amp;Ven_Lexar&amp;Prod_JumpDrive&amp;Rev_1100 [Tue Jun 21 02:01:59 2016]</p>\n<p>\u00e2\u20ac\u2039      S/N: AAI6UXDKZDV8E9OU&amp;0 [Tue Jun 21 02:01:59 2016]</p>\n<p>\u00e2\u20ac\u2039      Device Parameters LastWrite: [Tue Jun 21 02:01:59 2016]</p>\n<p>\u00e2\u20ac\u2039      Properties LastWrite : [Tue Jun 21 02:02:00 2016]</p>\n<p>\u00e2\u20ac\u2039      FriendlyName : Lexar JumpDrive USB Device**</p>\n<p>Based on the results, we might have two entries here. Let's continue our analysis by analyzing the entries we found here and see what the vendors, product names, etc. are. The format used in a USBSTOR is shown above:</p>\n<p>DISK&amp;Ven_{Name}&amp;Prod_{Name}&amp;Rev_{Value}</p>\n<p>So, for the first entry, we have:</p>\n<ul>\n<li>Vendor: <strong>Imation</strong></li>\n<li>Product: <strong>Nano_Pro</strong></li>\n<li>Revision number: <strong>PMAP</strong></li>\n<li>Serial No.: <strong>07B20C03C80830A9&amp;0</strong></li>\n<li>Friendly Name: <strong>Imation Nano Pro USB Device</strong></li>\n<li>First time connected: <strong>Tue Jun 21 01:53:14 2016</strong></li>\n<li>Last time used: <strong>Tue Jun 21 01:53:15 2016</strong></li>\n</ul>\n<p>While, for the second entry we have:</p>\n<ul>\n<li>Vendor: <strong>Lexar</strong></li>\n<li>Product: <strong>JumpDrive</strong></li>\n<li>Revision No.: <strong>1100</strong></li>\n<li>Serial No.: <strong>AAI6UXDKZDV8E9OU&amp;0</strong></li>\n<li>Friendly Name: <strong>Lexar JumpDrive USB Device</strong></li>\n<li>First time connected: <strong>Tue Jun 21 02:01:59 2016</strong></li>\n<li>Last time used: <strong>Tue Jun 21 02:02:00 2016</strong></li>\n</ul>\n<p>By the way, from the results we got, it is clear that each device was used exactly 1 second after it was first connected to the system.</p>\n<p>Now, we need to check the drive letter of the USBs that have been used on this system. This can be done by going to the location below:</p>\n<p><strong>SYSTEM\\MountedDevices</strong></p>\n<p>So, in the results of RegRipper, search for the \"<strong>MountedDevices</strong>\" keyword. I assume you found the entries below. </p>\n<p><strong>MountedDevices</strong></p>\n<p>LastWrite time = Tue Jun 21 02:01:59 2016Z</p>\n<p>\\DosDevices\\C:</p>\n<p>Drive Signature = 3a db 0d ca</p>\n<p>\\??\\Volume{32138f1e-3788-11e6-8250-806e6f6e6963}</p>\n<p>Drive Signature = 3a db 0d ca</p>\n<p>\\??\\Volume{32138f1f-3788-11e6-8250-806e6f6e6963}</p>\n<p>Drive Signature = 3a db 0d ca</p>\n<p>Device: _??_USBSTOR#Disk&amp;Ven_Lexar&amp;Prod_JumpDrive&amp;Rev_1100#AAI6UXDKZDV8E9OU&amp;0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}</p>\n<p>\\DosDevices\\E:</p>\n<p>\\??\\Volume{<strong>fb7f93ec-37a4-11e6-8254-080027d269d7</strong>}</p>\n<p>Device: \\??\\SCSI#CdRom&amp;Ven_VBOX&amp;Prod_CD-ROM#4&amp;8f5d389&amp;0&amp;010000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}</p>\n<p>\\??\\Volume{32138f23-3788-11e6-8250-806e6f6e6963}</p>\n<p>\\DosDevices\\D:</p>\n<p>Device: _??_USBSTOR#Disk&amp;Ven_Imation&amp;Prod_Nano_Pro&amp;Rev_PMAP#07B20C03C80830A9&amp;0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}</p>\n<p>\\??\\Volume{<strong>fb7f938e-37a4-11e6-8254-080027d269d7</strong>}</p>\n<hr />\n<p>mountdev2 v.20140721</p>\n<p>(System) Return contents of System hive MountedDevices key</p>\n<p>MountedDevices</p>\n<p>LastWrite time = Tue Jun 21 02:01:59 2016Z</p>\n<p>Volume Disk Sig Offset</p>\n<hr />\n<p>\\??\\Volume{32138f1e-3788-11e6-8250-806e6f6e6963} 3a db 0d ca 0</p>\n<p>\\??\\Volume{32138f1f-3788-11e6-8250-806e6f6e6963} 3a db 0d ca 0</p>\n<p>\\DosDevices\\C: 3a db 0d ca 0</p>\n<p>\\??\\Volume{32138f1e-3788-11e6-8250-806e6f6e6963}</p>\n<p>Tue Jun 21 08:14:37 2016</p>\n<p>\\??\\Volume{32138f1f-3788-11e6-8250-806e6f6e6963}</p>\n<p>Tue Jun 21 08:14:37 2016</p>\n<p>Device: \\??\\SCSI#CdRom&amp;Ven_VBOX&amp;Prod_CD-ROM#4&amp;8f5d389&amp;0&amp;010000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}</p>\n<p>\\??\\Volume{32138f23-3788-11e6-8250-806e6f6e6963}</p>\n<p>\\DosDevices\\D:</p>\n<p>Device: _??_USBSTOR#Disk&amp;Ven_Imation&amp;Prod_Nano_Pro&amp;Rev_PMAP#07B20C03C80830A9&amp;0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}</p>\n<p>\\??\\Volume{<strong>fb7f938e-37a4-11e6-8254-080027d269d7</strong>}</p>\n<p>Device: _??_USBSTOR#Disk&amp;Ven_Lexar&amp;Prod_JumpDrive&amp;Rev_1100#AAI6UXDKZDV8E9OU&amp;0#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}</p>\n<p>\\DosDevices\\E:</p>\n<p>\\??\\Volume{<strong>fb7f93ec-37a4-11e6-8254-080027d269d7</strong>}</p>\n<p>Now, I want you to go back and check the Volume GUIDs that are written in bold. So, it seems that the device that was used had the Volume GUID <strong>fb7f93ec-37a4-11e6-8254-080027d269d7</strong>. By inspecting this volume GUID, it seems that it was used with both USB drives, and it was mounted using the drive letter \"<strong>E:</strong>.\" Also, it seems that the \"<strong>Lexar JumpDrive USB Device</strong>\" was the last to be used on this system. We have two proofs to this fact. The first is the entry in the registry that still shows it was attached to it. The second is that if you go back to the last time it was used, you will find that it was used at \"<strong>Tue Jun 21 02:02:00 2016</strong>\" while the other USB was last used at \"<strong>Tue Jun 21 01:53:15 2016</strong>\". It seems that our fellow was using more than one USBs because the time between each usage is less than 7 minutes.</p>\n<h2>Task 2: Profiling the User to the used USB Device</h2>\n<p>Now that we have found what USB devices were connected to this computer, we now need to check which user was using them. Since in our case we only have one user, we will just go through the single NTUSER.DAT file. Again, start RegRipper but this time make sure to load the \"<strong>NTUSER.DAT</strong>\" registry file, save your report to something like \"<strong>NTUSER-RegReport.txt</strong>,\" select the \"<strong>ntuser</strong>\" profile and then click on the \"<strong>Rip It</strong>\" button.</p>\n<p>As a basic reminder, the mounted device details can be found in the registry path below:</p>\n<p><strong>NTUSER.DAT\\Microsoft\\Windows\\CurrentVersion\\Explorer\\MountPoints2</strong></p>\n<p>Now, based on the GUID we found in the previous task, which was \"<strong>fb7f93ec-37a4-11e6-8254-080027d269d7</strong>.\" Let's see if we can locate an entry for this volume under this user's registry keys. Search for the keyword \"<strong>MountPoints2</strong>\" in the file NTUSER-RegReport.txt using Notepad++. I assume you found the following results.</p>\n<p>MountPoints2</p>\n<p>Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\MountPoints2</p>\n<p>LastWrite Time Tue Jun 21 02:02:04 2016 (UTC)</p>\n<p>Remote Drives:</p>\n<p>Volumes:</p>\n<p>Tue Jun 21 08:38:46 2016 (UTC)</p>\n<p>{32138f1f-3788-11e6-8250-806e6f6e6963}</p>\n<p><strong>Tue Jun 21 02:02:04 2016 (UTC)</strong></p>\n<p><strong>{fb7f93ec-37a4-11e6-8254-080027d269d7}</strong></p>\n<p><strong>Tue Jun 21 01:59:52 2016 (UTC)</strong></p>\n<p><strong>{fb7f938e-37a4-11e6-8254-080027d269d7}</strong></p>\n<p>Tue Jun 21 01:59:48 2016 (UTC)</p>\n<p>{32138f23-3788-11e6-8250-806e6f6e6963}</p>\n<p>I highlighted the ones we are interested in <strong>bold</strong>.</p>\n<p>If we now pull all the details together, we can conclude that:</p>\n<ol>\n<li>\n<p>The USB device named \"<strong>Imation Nano Pro USB Device</strong>\" was:</p>\n</li>\n<li>\n<p>First installed at: Tue Jun 21 01:53:14 2016 <strong>&lt;- found from task #1</strong></p>\n</li>\n<li>Last connected at: Tue Jun 21 01:53:15 2016 <strong>&lt;- found from task #1</strong></li>\n<li>\n<p>Used by the user at: <strong>Tue Jun 21 01:59:52 2016 (UTC)</strong> <strong>&lt;- found from user MountPoints2</strong></p>\n</li>\n<li>\n<p>While the USB device named \"<strong>Lexar JumpDrive USB Device</strong>\" was:</p>\n</li>\n<li>\n<p>First installed at: Tue Jun 21 02:01:59 2016 <strong>&lt;- found from task #1</strong></p>\n</li>\n<li>Last connected at: Tue Jun 21 02:02:00 2016 <strong>&lt;- found from task #1</strong></li>\n<li>Used by the user at: <strong>Tue Jun 21 02:02:04 2016 (UTC)</strong> <strong>&lt;- found from user MountPoints2</strong></li>\n</ol>\n<p>And with this, we can conclude that this user truly mounted/used both USBs.</p>",
    "flags": [],
    "min_points_to_pass": null,
    "access_type": "default",
    "user_status": "unstarted",
    "user_lab_status": null,
    "user_status_modified": null,
    "user_flags": [],
    "global_running_session": null
}