Malware can hide, but it must run" are legendary words for any forensic investigator to live by. As we peek days, weeks, months, sometimes even years back in time, what artifacts are available to help us determine if malware did run? If only there was a native artifact that contained execution information...but wait, there is! In this talk, we will examine Windows execution artifacts including the ShimCache, RecentFileCache, and the newer Amcache hive found in Windows 8 and 10. We will examine the structures of these artifacts, as well as the different points of information recorded by each. Lastly, we will also discuss ways for the forensic investigator to include these artifacts in their investigation, including various parsing tools and analysis techniques.
Want to hear more from Matt?
Join him and other speakers at the Data Breach Investigation Summit & Training. The most effective way to improve your readiness and strategy in combating risk and the damage that results from even a minor compromise. The courses will provide you hands-on, immersion training on what it takes to identify, respond, investigate and defend against data breaches in your organization. And, you'll be able to collaborate with fellow attendees facing similar sets of challenges during the complimentary lunch and learns and @Night sessions. Hear from industry renowned speakers, providing you with actionable knowledge of new trends and best practices to help reduce your risk of advanced threats. Learn more and register.