Techniques that can be used to discover evidence in support of incidents where removeable devices were involved.
Windows
USB Key Identification
Track USB devices plugged into a machine.
WIN: XP+
SRV: NULL
Location
1
2
3
HKLM\SYSTEM\CurrentControlSet\Enum\USBSTOR
HKLM\SYSTEM\CurrentControlSet\Enum\USB
Interpretation and Investigative Notes
- Identify vendor, product, and version of a USB device plugged into a machine.
- Identify a unique USB device plugged into the machine
- Determine the time a device was plugged into the machine
- Devices that do not have a unique serial number will have an “&” in the second character of the serial number.
Tools
Sources
Plug and Play (PnP) Events
When a PnP driver is initiated, the service will log an event and provide status details. It is important to note that this event will trigger for any PnP device, USB, Firewire, PCMIA, etc.
WIN: XP+
SRV: NULL
Location
1
2
3
4
5
6
7
8
9
# WINDOWS XP
C:\Windows\setupapi.log
# WINDOWS 7+
C:\Windows\setupapi.dev.log
HKLM\SYSTEM\CurrentControlSet\Enum\USBSTOR\Ven_Prod_Ver\USB_Serial_#\Properties{83da6326-####-####-####-############}####
%SYSTEM ROOT%\System32\winevt\logs\System.evtx
Interpretation and Investigative Notes
HKLM\SYSTEM\CurrentControlSet\Enum\USBSTOR\Ven_Prod_Ver\USB_Serial_#\Properties{83da6326-####-####-####-############}####
- Event IDs (Last portion of Registry Key entry as represented by
\####
)- 0064: First Install (Win7+)
- 0066: Last Connected (Win8+)
- 0067: Last Removal (Win8+)
- Event IDs (Last portion of Registry Key entry as represented by
%SYSTEM ROOT%\System32\winevt\logs\System.evtx
- Event IDs
- 200001: PnP Driver Install Attempted
- Includes following information
- Timestamp
- Device Information
- Device Serial Number
- Status (0 = No Errors)
- Includes following information
- 200001: PnP Driver Install Attempted
- Event IDs
- Search for device serial number.
- Log files are set to local times
Tools
- Registry Explorer (RECmd)
- Event Log Explorer
- Event Log Parser (EvtxECmd)
- Native Event Viewer
Sources
Account Responsible
Identify the user that used the USB device
WIN: XP+
SRV: NULL
Location
1
NTUSER.DAT\Software\Microsoft\Windows\CurrentVersion\Explorer\MountPoints2
Interpretation and Investigative Notes
- Look for the GUID from the registry key below
HKLM\SYSTEM\MountedDevices
- The above GUID will be used to identify the user that plugged in the device. The last write time of this key also corresponds to the last write time the device was plugged into the machine by that user. The number will be references in the number in the MountPoint registry key in the users
NTUSER.DAT
file.
Tools
Sources
Volume and Device Serial Number
Discover the Volume Serial Number of the Filesystem Partition on the USB and the Unique Device Serial Number and Model.
WIN: XP+
SRV: NULL
Location
1
Software\Microsoft\WindowsNT\CurrentVersion\ENDMgmt
Interpretation and Investigative Notes
- Use the Volume Name and USB Unique Serial Number to:
- Find last integer number in line
- Convert Decimal Serial Number into the Hex Serial Number
- Knowing both the Volume Serial Number and the Volume Name, you can correlate the data across SHORTCUT File (.LNK) analysis and the RECENTDOCs key.
- The .LNK file contains the Volume Serial Number and Name.
- The RECENTDOCs key will contain the Volume Name when the device was opened by Windows Explorer.
Tools
- Registry Explorer (RECmd)
- PowerShell
vol %Drive Letter%:
- WMI
wmic diskdrive get Model, Name, InterfaceType, SerialNumber
Sources
Drive Letter and Volume Name Identification
Discover the last drive letter of the USB Device when it was pluigged into the machine.
WIN: XP+
SRV: Not Tested
Location
1
2
3
4
5
6
7
8
9
10
# WINDOWS XP
# Identify ParentIdPrefix
HKLM\SYSTEM\CurrentControlSet\Enum\USBSTOR
# Use ParentIdPrefix to discover the last Mount Point
HKLM\SYSTEM\MountedDevices
# WINDOWS 7+
Software\Microsoft\Windows Portable Devices\Devices
HKLM\SYSTEM\MountedDevices
Interpretation and Investigative Notes
- Identify the USB device that was last mapped to a specific drive letter. This technique will only work for the last drive mapped. It does not contain historical records of every drive letter mapped to a removable drive.
Tools
Sources
Shortcut Files (.LNK)
Shortcut files automatically created by windows when accessing recent items and opening local and remote data files and documents. Windows 11 contains a shortcut (.LNK) files that direct to the application, file, or directory.