Windows forensics 4 : windows MACB timestamps
Info, Blue Teaming, 2023
Description :
Today we’re going to look at NTFS
timestamps, this includes how NTFS stores timestamps associated with files, how we can modify a files timestamps using timestomp
and how we can find evidence of timestomp.
What is MACB times ?
- It refers to the timestamps of the latest modification,access,change or creation of a certain file.
The big question here is why didn’t date accessed changed after we accessed the file, the answer is because of this registry key which is set to 1 by default
Setting this key to 1 means NTFS disables last access update
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem\NtfsDisableLastAccessUpdate
- timestomp is an anti forensics tool used to set the MACB time of any given file to any value.
- How to use the tool :
timestomp victim.txt -Z "Tuesday 07/04/2022 3:23:43 AM"
- Analyze MFT tool is a python tool designed the master file table from an
NTFS
volume and outputs the results in a comprehensive format.
How Analyze MFT works?
$MFT
is the most important file because it keeps track of all the files in disk, the thing is there is more than one copy of this f4 timestamps stored withing the MFT$SI
or$STANDARD_INFORMATION
$FILE_NAME
or$FN
- When we are looking at files with Windows explorer or cmd or powershell we are interacting with
$SI
, however there is another copy of the timestamps stored in$FN
, so the ANALYZE MFT compares the$STANDARD_INFORMATION
timestamps and the$FILE_NAME
timestamps in the Master File Table (MFT).
How to use Analyze MFT
- You can use **FTKImager to parse the $MFT file.
- If you switch to the directory where you exported
$MFT
, you won’t see it unless you use this command :
attrib
- or you can delete the hidden option using this command :
attrib -s -h $MFT
How to run Analyze MFT :
analyzeMFT.py -f $MFT -o output.csv -e