Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124

Disk Analysis
John Doe was accused of doing illegal activities. A disk image of his laptop was taken. Your task as a soc analyst is to analyze the image and understand what happened under the hood.

The MD5 hash of the suspect disk is present in the Provided Text Document File
9471e69c95d8909ae60ddff30d50ffa1
%UserProfile%\AppData\Local\Google\Chrome\User Data

Below is the History database and contains the Keyword_search_terms:

Analyzing the keyword_search_terms database, we find the typed terms however without a time field:



Which is equivalent to 2021-04-29 18:17:38 UTC
Looking through Chrome history, we find the user downloaded FileZilla, which is a client used to connect to FTP servers:

Then we need to check FileZilla artifacts located in:
C:\Users\<username>\AppData\Roaming\FileZilla\
We find recentservers.xml and the IP is 192.168.1.20:

In Recycle Bin, there is 1 entry only, corresponding to the password list:

So the list was removed at 2025-04-29 18:22:17 UTC
If TOR Browser was opened at least once, it should have a prefetch entry. Looking in Prefetch folder, we find no proof of execution for TOR Browser:

Looking through Chrome’s history database, we find the user logged in to his proton mail:

Looking in ConsoleHost_History, we find PowerShell command history:

We find that the user scanned dfir.science
20210429_152043.jpg is located in pictures/contact:

We should first export it:

Then we can analyze metadata using an online exif tool, and we get the GPS position:

We then translate this GPS position to a location using any online tool and we get Zambian:

Using exiftool, we find that the picture was taken using an LG mobile phone:

I exported UsrClass.dat and UsrClass.dat.LOG1 and UsrClass.dat.LOG2:

I then opened the 3 files using Shell Bag Explorer:

We can confirm there was an LG phone connected and the files came from Camera
We can crack the hash on hashes.com:

secretsdump.py -sam SAM -system SYSTEM LOCAL

Finally, I cracked the result on hashes.com:
