MACB Timestamps and $I30in NTFS File Systems
MACB TimeStamps and $I30 (NTFS)
forensicsWiki- useful for basic information on everything
M=Modification
A=Access
C= MFT record change
B= Birth (creation of file)
Note; NTFS is one of the only file systems to record the birth- when the file was created
These are stored in $MFT
$SI – Standard Information
$FN – Filename
Both contain these attributes- they are found within the MFT
$FN- only modifiable by Windows Kernel- meaning that it will have a different comparison to $SI
So anti-forensics such as Time Stomp will impact Standard Information, not Filename
Windows 10 demo VM (Courtesy of 13cubed)
A file is created at 1:40 am, its MAB are all the same- 1:40am
When changed and saved at 1:41am the modification will be change but nothing else
Referring to the table above, this is because:
However, we did access it, so why did it not change?
This is because of a registry key
This means date access time stamps are not tracked- it is updated under only certain circumstances
Note; in a forensic investigation, if we see a file that has a modification which is dated before creation we know
that copying has occurred.
that copying has occurred.
Example: Jane has been under investigation for copying sensitive information to her laptop, which runs on the
NTFS file system. In her recent documents are a few documents with random names; their access date is that
of five minutes ago, yet the medication date matches that of the files in question.
NTFS file system. In her recent documents are a few documents with random names; their access date is that
of five minutes ago, yet the medication date matches that of the files in question.
Time stomp
Pre-fetch, look for timestomp- we can see it’s access and creation time.
Note; 
The modification is after the creation and access; this tells up the program has been run atleast twice- which
enough to argue against it being an accident
enough to argue against it being an accident
Remember- timestomp impacts the $SI but not $FN
In command line, using it you can change the MACB times to whatever you want
Analyse MFT-
will fully parse the MFT and present in in multiple formats, including MFT.
This will be covered more next week.
But it should end up looking as such:
Note; must take time zones in to account
Looking at the bottom- it is very clear that time stamping has occurred.
Index Attribute- $I30
Critical to understand, It is the index of the files in a directory- it contains all the MACB timestamps of these.
This is a duplicate of the $FN stamps.
Any given $I30 index file includes:
Full file name
Parent directory
MACB timestamps (duplicate of $FN)
Size- physical and logical size
Note; evidence of deleted or overwritten files may be present within the slack of the $I30 file
How to get these?
INDXParse
But before that: how do we find an index file if we just have hex infront of us:
49 4E 44 58
These represent an index file
Situation
We have an $I30 file which we want to explore it a bit further
We save the file and then use a program called INDXParse.py which can scan the slack space to look for
$I30 information about deleted files.
$I30 information about deleted files.
A successful result will look like this
So we can now see even more information about the file.
A tutorial will be available on both the MFTanalyzer and INDXParser with examples next week.
Comments
Post a Comment