Forensics - Registry Furensics

Day 16

Learn what the Windows Registry is and how to investigate it.

Investigate the Gifts Delivery Malfunctioning

Overview


Room URL: https://tryhackme.com/room/registry-forensics-aoc2025-h6k9j2l5p8
Difficulty: Medium
Category: Forensics
Date Completed: 12/16/2025

Objectives


Table of Contents

Introduction
Walk Through
Lessons Learned
Resources


Introduction

Just as your brain stores everything you need to function—your behaviors, habits, and memories—the Windows operating system relies on its own "brain" to maintain its configurations and operations. This digital brain is known as the Windows Registry, a sophisticated hierarchical database that stores critical system information, user preferences, and application settings. Unlike a human brain confined to one location, the Windows Registry is distributed across multiple files called Hives, each specializing in different aspects of system configuration. Understanding the Registry is essential for cybersecurity professionals, particularly in forensic investigations where the Registry often contains the smoking gun evidence of compromise, unauthorized access, and malicious activity. In this challenge, you'll investigate the compromised dispatch-srv01 system using Registry forensics to uncover the artifacts of the TBFC intrusion that began on October 21st, 2025.

Registry Data

Hive Name Contains Location
SYSTEM - Services
- Mounted Devices
- Boot Configuration
- Drivers
- Hardware
C:\Windows\System32\config\SYSTEM
SECURITY - Local Security Policies
- Audit Policy Settings
C:\Windows\System32\config\SECURITY
SOFTWARE - Installed Programs
- OS Version and other info
- Autostarts
- Program Settings
C:\Windows\System32\config\SOFTWARE
SAM - Usernames and their Metadata
- Password Hashes
- Group Memberships
- Account Statuses
C:\Windows\System32\config\SAM
NTUSER.DAT - Recent Files
- User Preferences
- User-specific Autostarts
C:\Users\username\NTUSER.DAT
USRCLASS.DAT - Shellbags
- Jump Lists
C:\Users\username\AppData\Local\Microsoft\Windows\USRCLASS.DAT

Registry Keys

Registry Key Importance
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist It stores information on recently accessed applications launched via the GUI.
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\TypedPaths It stores all the paths and locations typed by the user inside the Explorer address bar.
HKLM\Software\Microsoft\Windows\CurrentVersion\App Paths It stores the path of the applications.
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\WordWheelQuery It stores all the search terms typed by the user in the Explorer search bar.
HKLM\Software\Microsoft\Windows\CurrentVersion\Run It stores information on the programs that are set to automatically start (startup programs) when the users logs in.
HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs It stores information on the files that the user has recently accessed.
HKLM\SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName It stores the computer's name (hostname).
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall It stores information on the installed programs.

Challenge Specific Locations

Hive on Disk Where You See It in Registry Editor
SYSTEM HKEY_LOCAL_MACHINE\SYSTEM
SECURITY HKEY_LOCAL_MACHINE\SECURITY
SOFTWARE HKEY_LOCAL_MACHINE\SOFTWARE
SAM HKEY_LOCAL_MACHINE\SAM
NTUSER.DAT HKEY_USERS\<SID> and HKEY_CURRENT_USER
USRCLASS.DAT HKEY_USERS\<SID>\Software\Classes

Walk Through

  1. Start the target machine
  2. What application was installed on the dispatch-srv01 before the abnormal activity started?
    1. The installed programs are listed in HKLM\Software\Microsoft\Windows\CurrentVersion\Uninstall
    2. I then sorted the table by timestamp . There was one program installed or modified on 10/21/2025
    3. Pasted image 20251216114959.png
  3. What is the full path where the user launched the application (found in question 1) from?
    1. At first I checked HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs to see if it was launched from there. It was not.
    2. Then I checked HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\UserAssist That is where it was launched from.
    3. Pasted image 20251216115656.png
  4. Which value was added by the application to maintain persistence on startup?
    1. The start up keys are at HKLM\Software\Microsoft\Windows\CurrentVersion\Run
    2. Pasted image 20251216120235.png

Lessons Learned


Resources

TryHackMe
Registry Explorer
RegSeek
Cheat Sheet