ForensicVM Case Study - Bart the hacker

Challenge Description

This appendix details the ForensicVM Case Study and Challenge, which is designed to highlight the differences between the evidence collected by dead-box forensics and live-forensics in a virtualized environment. The data set was created with VirtualBox and features a Windows 11 Pro environment equipped with various local and cloud applications. The image was captured using the FTK Imager in Expert Witness Format (EWF).

  • Virtualisation is required to extract vital evidence.

  • Bypassing the ‘Bart’ password is necessary to access the applications.

  • Existing passwords within the data set must remain unchanged to maintain the integrity of the challenge.

  • The Bart windows password is simple, but the challenge encourages ethical hacking skills to bypass or decrypt it.

Steps to Solve the Challenge

The following steps provide a structured approach to tackle the ForensicVM challenge:

  1. Utilise dead box forensics techniques in autopsy software to attempt full data retrieval from cloud applications and local applications. Document all findings.

  2. Virtualize the forensic image using the autopsy ForensicVM plugin.

  3. Attempt to identify and bypass the Bart password to gain access to the applications.

  4. Run the ForensicVM

  5. Without internet access, systematically extract information from each application cloud and local application. Document all findings.

  6. Enable internet access and repeat the information extraction process, noting any differences.

  7. Record any additional information obtained after establishing an Internet connection.

  8. Identify and document information related to the two financial applications present in the environment.

  9. Extract and analyse data related to cryptocurrency.

  10. Create a comprehensive chain of custody for all investigative actions taken.

  11. Conduct and document a memory dump and network traffic dump.

  12. Capture all investigative actions via video and take screenshots for evidence support.

For further information, refer to the ForensicVM Autopsy Plugin User Manual available at:

ForensicVM Autopsy Plugin User Manual

The complete dataset can be accessed via the following links:

Challenge Solution

Dead box forensics

The resolution of the digital forensic challenge began with the establishment of a new case within the forensic autopsy software. The initial phase involved the creation of a case as captured in Figure Fig. 252.

Creation of a New Case

Fig. 252 Creation of a New Case

Subsequently, the case details were entered as demonstrated in Figure Fig. 253, ensuring that all pertinent information was correctly documented.

Entering Case Information

Fig. 253 Entering Case Information

Optional case information was also provided to provide additional context and metadata for the investigation, as shown in Figure Fig. 254.

Providing Optional Case Information

Fig. 254 Providing Optional Case Information

To facilitate analysis, host information was generated as shown in Figure Fig. 255, which helps align the investigative environment with the specifics of the case.

Generating Host Information

Fig. 255 Generating Host Information

The subsequent step was to select the disk image or VM file that contained the forensic evidence, ensuring that the correct data source was incorporated into the investigation (Figure Fig. 256).

Disk Image or VM File Selection

Fig. 256 Disk Image or VM File Selection

The timezone configuration is critical for accurate timestamp analysis; therefore, the forensic image path was established and the timezone was adjusted to Europe/Lisbon as part of the configuration process (Figure Fig. 257).

Configuring the Forensic Image Path and Timezone

Fig. 257 Configuring the Forensic Image Path and Timezone :label: fig:autopsy_0006

For initial data processing, ingest plugins were selected, specifically ‘Recent Activity’ and ‘Picture Analyser’, to extract relevant user activities and image-related evidence (Figure Fig. 258).

Selection of Initial Ingest Plugins

Fig. 258 Selection of Initial Ingest Plugins

The investigator then waited for the completion of the addition of the data source, monitoring the progress to ensure successful incorporation into the case (Figure Fig. 259).

Monitoring Data Source Addition

Fig. 259 Monitoring Data Source Addition

Upon successful addition of the data source, as confirmed by the software, the evidence was ready for a thorough examination (Figure Fig. 260).

Confirmation of Data Source Addition

Fig. 260 Confirmation of Data Source Addition

Exploration within the “Os accounts” section yielded security answers that were potential avenues for password bypass efforts, with all answers being “textbf{bart}”, which could provide a breakthrough in the case (Figure Fig. 261).

OS Accounts and Security Answers

Fig. 261 OS Accounts and Security Answers

In the process of forensic analysis, the discovery of the password ‘textbf{Lisa@Springfield}’ via the Autofill feature in the Autopsy Web form represents a pivotal development. This password is a critical piece of evidence for the case, as it could potentially grant access to restricted areas that may contain further information or clues. The uncovering of this password, as displayed in Figure Fig. 262, underscores the importance of thorough examination of digital artefacts which may hold vital information within a forensic investigation.

Discovery of a Password via Web Form Autofill

Fig. 262 Discovery of a Password via Web Form Autofill

Moreover, the identification of specific applications such as Eraser 6.2.0.2993, which is designed for secure file deletion, and HomeBank 5.7.1, a personal finance application, can offer valuable insights into the suspect’s actions and intents. As depicted in Figure Fig. 263, the presence of these applications may suggest attempts to conceal activities or manage finances in a way that is pertinent to the investigation.

Applications of Interest Including Secure File Deletion and Personal Finance Management Tools

Fig. 263 Applications of Interest Including Secure File Deletion and Personal Finance Management Tools

The further discovery of Money Manager Ex v.1.6.4, another financial management tool, as indicated in Figure Fig. 264, reinforces the financial angle of the user’s activity profile. This could be integral to constructing a narrative regarding the suspect’s financial dealings or motivations.

Additional Financial Application Money Manager Ex Indicating In-Depth Financial Activities

Fig. 264 Additional Financial Application Money Manager Ex Indicating In-Depth Financial Activities

Lastly, the opening of a financial database named example.xhb from the HomeBank files, as shown in Figure Fig. 265, further corroborates the financial dimension of the investigation. This particular file may contain transaction records, budgets, or other financial data which could be analysed to provide a clearer understanding of the suspect’s financial behaviour or potential illicit activities.

Opened Financial Database example.xhb Revealing Recent User Activities with Financial Data

Fig. 265 Opened Financial Database example.xhb Revealing Recent User Activities with Financial Data

The discovery of the example.xhb database in XML format, as depicted in Figure Fig. 266, adds a layer of complexity due to the proprietary structure of the file. This could imply that special attention must be paid to decipher the data structure to interpret the financial information contained within. The proprietary nature of the format might necessitate the use of specific tools or methods to extract and analyse the data accurately.

Proprietary XML Structure of the example.xhb Database

Fig. 266 Proprietary XML Structure of the example.xhb Database

The identification of cloud applications in the forensic investigation is critical as it may provide insight into data that is not stored locally on the device. The accounts discovered through the Autopsy software, including GitHub, live.com, discord.com, and evernote.com, extend the potential for finding evidence to the cloud. The presence of these services as shown in Figure Fig. 267, suggests a broad range of user activity, from software development and project management to personal communication and note-taking, which could be relevant to the case.

Overview of Cloud Applications Uncovered in Autopsy

Fig. 267 Overview of Cloud Applications Uncovered in Autopsy

Tagging folders related to financial applications within Autopsy helps in organising evidence and highlights the importance of financial data in the investigation. As illustrated in Figure Fig. 268, tagging these folders ensures that relevant information is easily accessible and distinguishable from other unrelated data, facilitating a more efficient investigation process.

Tagging of Folders Pertaining to Financial Applications

Fig. 268 Tagging of Folders Pertaining to Financial Applications

The creation of an Autopsy HTML report is a critical step for documenting the investigation, offering a comprehensive and accessible format for presenting the findings. The series of figures, from Figure Fig. 269 to Figure Fig. 273, encapsulate various aspects of the report, from the general overview to specific details regarding data sources and tagged items.

Snapshot of the Autopsy HTML Report Interface

Fig. 269 Snapshot of the Autopsy HTML Report Interface

Detailing the Data Source 'bart.E01' within the HTML Report

Fig. 270 Detailing the Data Source ‘bart.E01’ within the HTML Report

Autopsy HTML Report Showing Tagged Items and Analysis Results

Fig. 271 Autopsy HTML Report Showing Tagged Items and Analysis Results

Compilation of All Results in the Autopsy HTML Report

Fig. 272 Compilation of All Results in the Autopsy HTML Report

Report Detailing Found Cloud Applications and Associated Usernames

Fig. 273 Report Detailing Found Cloud Applications and Associated Usernames

Local applications and those identified as relevant through tagging were systematically documented within the Autopsy report as well. This incorporation of tagged local and cloud applications allows for a more comprehensive review of the software environment of the system under investigation (Figure Fig. 274).

Tagged files depicting local and cloud applications within Autopsy

Fig. 274 Tagged files depicting local and cloud applications within Autopsy

Live forensic with ForensicVM - Phase 1: Network disabled

The commencement of live forensics entails the virtualization of the forensic image, utilizing the capabilities of the ForensicVM server and client infrastructure.

The initial step involves initiating the ForensicVM client ingest module via Autopsy, as illustrated in Figure Fig. 275.

Run ingest modules: ForensicVM Client

Fig. 275 Run ingest modules: ForensicVM Client

Subsequently, a comprehensive virtualization of the image was executed. Utilizing the command textbf{Virtualize - a) Convert to VM}, a duplicate of the forensic image is created. This process entails altering the hardware abstraction layer by incorporating virtio optimized drivers, culminating in the creation of a ForensicVM, as depicted in Figure Fig. 276, Figure Fig. 277, and Figure Fig. 278.

ForensicVM client main form

Fig. 276 ForensicVM client main form

Forensic image to forensicVM Conversion progress

Fig. 277 Forensic image to forensicVM Conversion progress

ForensicVM First execution

Fig. 278 ForensicVM First execution

The recovery questions were noted to be identical (textbf{bart}), prompting an attempt to use them as the password. This strategy proved effective due to the recovery questions being set identically to the password, as shown in Figure Fig. 279.

Password recovery utilizing identical security questions

Fig. 279 Password recovery utilizing identical security questions

Access was successfully gained to the Bart desktop, which featured a wallpaper indicating potential malicious intent with the message “I will hack Springfield…,” as seen in Figure Fig. 280.

Bart desktop with indicative wallpaper message

Fig. 280 Bart desktop with indicative wallpaper message

The desktop was populated with numerous icons, one of which was for the Evernote cloud application. Activating this icon initiated Evernote, within which several recent notes were apparent: Extra images, Secret nuclear plants, Bart Simpson Passwords, and My pass, as illustrated in Figure Fig. 281.

Evernote application with recent notes

Fig. 281 Evernote application with recent notes

In the forensic investigation within the Evernote application, a notebook titled textbf{Bart secret plans} containing three notes was identified. The procedure to export these notes to the forensicVM evidence drive is crucial, as illustrated in Figure Fig. 282.

Evernote notebook 'Bart secret plans'

Fig. 282 Evernote notebook ‘Bart secret plans’

To commence the note export process, the notes were first converted into PDF format as shown in Figure Fig. 283.

Exporting notes as PDF

Fig. 283 Exporting notes as PDF

The notes were then methodically stored in a subfolder named Evernote, located within the Cloud_applications tag in Autopsy. The textbf{Bart secret plans} file was exported to this specific folder, detailed in Figure Fig. 284.

PDF export destination folder structure

Fig. 284 PDF export destination folder structure

A verification step was conducted to ensure that the exported PDFs contained all potential evidence, as confirmed in Figure Fig. 285.

Verification of exported PDF content

Fig. 285 Verification of exported PDF content

The export procedure was repeated for another notebook titled textbf{Primeiro bloco de notas}, which was also moved to the Evernote folder on the evidence disk, as depicted in Figure Fig. 286.

Exporting 'Primeiro bloco de notas' from Evernote

Fig. 286 Exporting ‘Primeiro bloco de notas’ from Evernote

Investigation revealed that the bart secret plans notebook was shared by a user named Nuno Mourinho, which may indicate collaborative or shared use of the contents, as evidenced by Figures Fig. 287 and Fig. 288.

Shared user detail for 'bart secret plans' notebook

Fig. 287 Shared user detail for ‘bart secret plans’ notebook

Notebook sharing information indicating 'Nuno Mourinho'

Fig. 288 Notebook sharing information indicating ‘Nuno Mourinho’

Additionally, the Evernote trash was scrutinized, and it was confirmed that no notes had been deleted, as shown in Figure Fig. 289. The absence of deleted notes might suggest that the user did not attempt to remove evidence or considered the contents of the notes to be non-incriminating.

Checking Evernote trash for deleted notes

Fig. 289 Checking Evernote trash for deleted notes

The forensic analysis included the observation of software behavior in a controlled environment. The Discord application displayed a notification for an update, which could not be completed due to a lack of internet connectivity, leaving the application in a state of limbo as depicted in Figure Fig. 290.

Discord application unable to update without internet connection

Fig. 290 Discord application unable to update without internet connection

Subsequently, GitHub Desktop was launched, which is a graphical client interface for interacting with GitHub repositories. It attempted to locate a repository named hackSpringField, but without internet access, the search was unsuccessful, as demonstrated in Figure Fig. 291.

GitHub Desktop failing to find the 'hackSpringField' repository

Fig. 291 GitHub Desktop failing to find the ‘hackSpringField’ repository

Due to the absence of an internet or local network connection, the content within the GitHub repository could not be retrieved or reviewed, which is an essential aspect to consider for future investigative steps. This scenario is highlighted in Figure Fig. 292.

Unreachable GitHub repository contents due to lack of network connectivity

Fig. 292 Unreachable GitHub repository contents due to lack of network connectivity

The investigation then moved to financial applications, with a specific focus on Homebank. An attempt to launch this application was made as indicated by the presence of its icon, and this is captured in Figure Fig. 293.

Locating the Homebank application

Fig. 293 Locating the Homebank application

Upon accessing Homebank, the last opened file named example.xhb was identified, suggesting a possible area of interest for the investigation. The examination of this file is depicted in Figure Fig. 294.

Opening the last accessed file in Homebank

Fig. 294 Opening the last accessed file in Homebank

Within the example.xhb file, the existence of a Bitcoin account was noted. Even though the file bore the name ‘example’, it was considered worthy of detailed examination to discern any potential financial improprieties or to trace financial transactions, as shown in Figure Fig. 295.

Evidence of a Bitcoin account in the Homebank file 'example.xhb'

Fig. 295 Evidence of a Bitcoin account in the Homebank file ‘example.xhb’

So far, this analysis underscores the complexity of digital forensics, particularly when dealing with cloud-based services and financial software, where access to the content is often restricted without proper connectivity or credentials.

Upon uncovering Bitcoin-related transaction data within the Homebank application, steps were taken to document this information. The transactions were exported to a PDF file for ease of analysis and future reference, a process captured in Figures Fig. 296 and Fig. 297.

Exporting Bitcoin transaction data to PDF

Fig. 296 Exporting Bitcoin transaction data to PDF

The process of printing transaction data to a PDF file

Fig. 297 The process of printing transaction data to a PDF file

The forensic examination then proceeded to another financial application, Money Manager Ex. Upon initiation, the application’s dashboard revealed an account with the noteworthy title ‘Springfield ransom’, as displayed in Figure Fig. 298.

Dashboard of Money Manager Ex showing the 'Springfield ransom' account

Fig. 298 Dashboard of Money Manager Ex showing the ‘Springfield ransom’ account

Within this application, two significant transactions were identified: a withdrawal of 222 million by a user named Homer, and a deposit of 100 million to a Mr. Burns. These transactions, detailed in Figure Fig. 299, could suggest a flow of funds that may be pertinent to the investigation.

Transactions in Money Manager Ex involving significant sums of money

Fig. 299 Transactions in Money Manager Ex involving significant sums of money

To collate the findings, a PDF document was created and stored on an evidence drive, ensuring the preservation of the data uncovered during the investigation. This step is illustrated in Figures Fig. 300 and ref{fig:autopsy_0056}.

Compiling findings into a PDF document

Fig. 300 Compiling findings into a PDF document

Saving the PDF document to the evidence drive

Fig. 301 Saving the PDF document to the evidence drive

Finally, verification was carried out to ensure that the PDF created indeed contained the exported transaction data, as can be affirmed by Figure Fig. 302.

Confirmation of the exported transaction data within the PDF document

Fig. 302 Confirmation of the exported transaction data within the PDF document

Live forensic with ForensicVM - Phase 2: Network enabled

In the continuation of the live forensic analysis using ForensicVM, the investigation progressed to include cloud-based evidence following the activation of the network interface. This crucial step is depicted in Figure Fig. 303.

Enabling the network interface on the ForensicVM webscreen

Fig. 303 Enabling the network interface on the ForensicVM webscreen

One of the primary cloud applications scrutinised was GitHub Desktop. This application was of particular interest as it may contain repositories that could provide evidence of illicit activity if the computer in question belonged to a potential hacker. The repository named hackSpringField was cloned as an initial step, a process illustrated in Figure Fig. 304.

Cloning the deleted repository 'hackSpringField' using GitHub Desktop

Fig. 304 Cloning the deleted repository ‘hackSpringField’ using GitHub Desktop

Within the cloned repository, a README file disclosed Bart’s likely malicious intent, containing the message “I will hack Springfield Buhahahahahaha!”, as seen in Figure Fig. 305.

The README file within the 'hackSpringField' repository indicating potential malevolent intentions

Fig. 305 The README file within the ‘hackSpringField’ repository indicating potential malevolent intentions

The exploration of Bart’s GitHub repositories revealed several with names that suggest they could be tools for malicious purposes:

  • RATreeViewSpringField

  • StichRATSpringfield

  • TheFatRatSpringField

  • awesome-ratSpringField

  • basicRATSpringField

These repositories were cloned as part of the investigatory process, as documented in Figures Fig. 306, Fig. 307, and Fig. 308.

Cloning of repositories suspected to be associated with malicious activities

Fig. 306 Cloning of repositories suspected to be associated with malicious activities

Acquiring repository content for further forensic analysis

Fig. 307 Acquiring repository content for further forensic analysis

Documentation of the cloned repositories from the suspected hacker's GitHub account

Fig. 308 Documentation of the cloned repositories from the suspected hacker’s GitHub account

Subsequently, the cloned repositories were transferred to a specifically labelled folder ‘Github-Internet On’ within the cloud_applications autopsy tag folder, with the process captured in Figures Fig. 309, Fig. 310, and Fig. 311.

Copying cloned repositories to the designated forensic analysis folder

Fig. 309 Copying cloned repositories to the designated forensic analysis folder

Organising the collected repositories in the 'Github-Internet On' folder for detailed examination

Fig. 310 Organising the collected repositories in the ‘Github-Internet On’ folder for detailed examination

The shared notebook named bart secret plans now has 14 notes, an increase of 11 notes from when the system was examined in offline mode. This surge in content could indicate active use or automated synchronization once the network was enabled. Among these notes, several are titled with ‘Command and Control (C2C)’, each followed by a sequence number, which suggests a structured approach to potentially illicit command sequences. Furthermore, the presence of Evernote Cloud API python guide notes could imply an intention to leverage Evernote as a platform for issuing commands to compromised systems or for managing a network of controlled devices. An illustrative note contains the command sdelete -z c:, which is known to overwrite free space on a drive with zeros, typically a method to prevent data recovery – a concerning find, possibly indicative of attempts to obfuscate or destroy evidence. This detail is depicted in Figure Fig. 311.

Screenshot illustrating the use of 'sdelete' command within a note from the 'bart secret plans' notebook

Fig. 311 Screenshot illustrating the use of ‘sdelete’ command within a note from the ‘bart secret plans’ notebook

In a detailed examination, all notes from the bart secret plans notebook were exported as multiple webpages to be preserved as evidence, as shown in Figures Fig. 312 and Fig. 313.

Exporting the contents of 'bart secret plans' to webpages, part 1

Fig. 312 Exporting the contents of ‘bart secret plans’ to webpages, part 1

Exporting the contents of 'bart secret plans' to webpages, part 2

Fig. 313 Exporting the contents of ‘bart secret plans’ to webpages, part 2

Similarly, the Primeiro bloco de notas (First Notebook) was exported, revealing an additional note not previously visible in offline mode. The findings are presented in Figure Fig. 314.

The export process of the 'Primeiro bloco de notas' indicating the presence of an additional note

Fig. 314 The export process of the ‘Primeiro bloco de notas’ indicating the presence of an additional note

Upon inspecting the Discord application, which was set to the Portuguese language, we accessed the user bart.simpson’s server. The server’s activity log, accessed via the bart.simpson_springfield login, can be observed in Figure Fig. 315.

Accessing Discord server with bart.simpson\_springfield user credentials

Fig. 315 Accessing Discord server with bart.simpson_springfield user credentials

Further investigation within the server revealed a channel named ‘Servidor de bart.simpson’ (bart.simpson’s server), which contained an announcement seemingly related to the sale of data on the dark web, as captured in Figure Fig. 317 after opening the server shown in Figure Fig. 316.

The Discord server 'Servidor de bart.simpson' accessed for investigation

Fig. 316 The Discord server ‘Servidor de bart.simpson’ accessed for investigation

Announcement on 'Servidor de bart.simpson' revealing intentions to sell data on the dark web

Fig. 317 Announcement on ‘Servidor de bart.simpson’ revealing intentions to sell data on the dark web

Within the Discord channel named cyber-security-bypass, the user ‘bart’ claimed to have ex-filtrated data from the Springfield Nuclear Plant. Evidence of such a breach was showcased in an Excel format, which was presented as a sample of the exfiltrated data. Additionally, ‘bart’ stipulated a ransom demand of 1000 dollars for the recovery of the data, directing the payment to be made to a specified Bitcoin wallet. This incriminating interaction, including the digital ransom note and the proof of the stolen data, is captured in Figure Fig. 318.

Screenshot displaying the ransom demand and sample of exfiltrated data from Springfield Nuclear Plant on Discord

Fig. 318 Screenshot displaying the ransom demand and sample of exfiltrated data from Springfield Nuclear Plant on Discord

Subsequent to the discovery of the Discord communication, efforts were made to download the chain of custody report utilizing the ForensicVM webscreen interface. This procedure is critical for maintaining the integrity of the digital evidence and ensuring that all investigative actions are properly documented. The process of downloading this report is depicted in Figures Fig. 319 and Fig. 320.

Downloading the chain of custody report via the ForensicVM webscreen interface, part 1

Fig. 319 Downloading the chain of custody report via the ForensicVM webscreen interface, part 1

Downloading the chain of custody report via the ForensicVM webscreen interface, part 2

Fig. 320 Downloading the chain of custody report via the ForensicVM webscreen interface, part 2

The next phase in the investigative process involves exporting the ForensicVM evidence disk in the virtual machine disk (VMDK) format. This step is necessary to facilitate the importation of the disk into the Autopsy analysis tool for a comprehensive examination. The sequence of actions taken to halt the ForensicVM, followed by the initiation of the ‘Import Evidence Disk’ process, is sequentially illustrated in Figures Fig. 321 through Fig. 324.

Initiating the export of ForensicVM evidence disk from the Autopsy Forensic Client main interface

Fig. 321 Initiating the export of ForensicVM evidence disk from the Autopsy Forensic Client main interface

Stopping the ForensicVM in preparation for exporting the evidence disk

Fig. 322 Stopping the ForensicVM in preparation for exporting the evidence disk

Selection of the 'Import Evidence Disk' option in the Autopsy Forensic Client

Fig. 323 Selection of the ‘Import Evidence Disk’ option in the Autopsy Forensic Client

../_images/autopsy_0079.jpg

Fig. 324 Finalization of the ForensicVM evidence disk export in VMDK format.

In the final step of the digital forensic analysis, a new data source was added to the Autopsy forensic software. This new data source was the VMDK disk which contained the evidence that had been previously gathered from ForensicVM. This action is paramount for enabling a detailed examination and analysis within the Autopsy environment. The step-by-step process of adding this new evidence source is captured in Figures Fig. 325 through Fig. 330.

../_images/autopsy_0080.jpg

Fig. 325 Initiating the addition of a new data source in Autopsy.

../_images/autopsy_0081.jpg

Fig. 326 Selecting the evidence disk for the new data source.

../_images/autopsy_0082.jpg

Fig. 327 Confirming the selection of the VMDK disk file.

../_images/autopsy_0083.jpg

Fig. 328 Setting up the data source parameters in Autopsy.

../_images/autopsy_0084.jpg

Fig. 329 Progression of the data source addition process.

../_images/autopsy_0085.jpg

Fig. 330 Completion of the new data source addition in Autopsy.

Post-importation of the meticulously crafted evidence disk into Autopsy, the investigation is poised to enter a detailed examination phase. The evidence disk, structured with folders mirroring the tags utilized within Autopsy, allows for an organized and efficient review process. The subsequent investigative steps will leverage the logical structure and tagging system to ensure a comprehensive analysis of the data.

The primary step involves the cataloging and verification of the imported data against the original evidence tags. This ensures that the transfer has been successful and that the integrity of the data has been maintained during the process. The alignment of folders with Autopsy tags streamlines the verification process, allowing investigators to swiftly confirm the presence and accuracy of all tagged items.

Following this, a thorough content analysis within each tagged folder will be undertaken. Since these folders are organized based on the categorization relevant to the investigation, the analysis can be targeted and specific. Investigators will parse through each category, looking for suspicious patterns or incriminating evidence that correlates with the activities under investigation.

Subsequently, cross-referencing the extracted evidence with the case timeline will be imperative. The analysis will involve correlating timestamps of file creation, modification, and deletion with the case events. Such a timeline analysis can often unearth critical insights into the suspect’s behavior and modus operandi.

The investigation will also include a thorough review of any executable files and scripts that were used or potentially created as part of the suspect’s activities. The scripts found in the ‘C2C’ (Command and Control) folders, for example, will be scrutinized to understand the nature of the commands issued, their targets, and the extent of control exerted over compromised systems.

A meticulous examination of communication logs and metadata is also essential. This includes not only traditional system logs but also any extracted communication from applications such as Discord, as indicated by the presence of specific tags and folders. Insights gleaned from these sources can be invaluable in establishing the suspect’s network of contacts and the breadth of the cyber-security breach.

In addition, a deep-dive analysis into the files marked for deletion or those found within the unallocated space of the file system will be conducted. Using file carving techniques, investigators aim to recover and reconstruct such files, as they may hold critical evidence that the suspect attempted to obscure or erase.

Finally, the entire investigation will be supported by a robust documentation process. Each step, discovery, and piece of evidence will be recorded with exacting detail. This ensures that the chain of custody is preserved and that all the investigative actions can withstand the rigorous scrutiny of legal proceedings.