Windows Registry Analysis
The Windows Registry stores configuration and activity data, including user behavior, persistence mechanisms, and system changes. In forensics challenges, analyzing registry hives can reveal malware persistence, executed programs, connected devices, and user accounts.
| Tool | Purpose |
|---|---|
| Registry Explorer | GUI Registry browser for artifact timelines and bookmarkable keys |
| RECmd | Command‑line companion to Registry Explorer with batch query support |
| RegRipper | Parse individual hives using plugins (e.g. runkeys, software, network) |
| python-registry | Parse registry hives via Python (useful for automation or CTFs) |
| Hive | Location | Contains |
|---|---|---|
| SYSTEM | C:\Windows\System32\config\SYSTEM |
Hardware, services, network configuration, and control sets |
| SOFTWARE | C:\Windows\System32\config\SOFTWARE |
Installed applications, versioning, execution history |
| SAM | C:\Windows\System32\config\SAM |
Local user accounts and password hashes |
| SECURITY | C:\Windows\System32\config\SECURITY |
Security policy and audit configuration |
| NTUSER.DAT | C:\Users\<user>\NTUSER.DAT |
Per‑user settings, recent documents, Run keys |
| USRCLASS.DAT | C:\Users\<user>\AppData\Local\Microsoft\Windows\USRCLASS.DAT |
User shellbags (folders visited, UI states) |
Attackers often modify registry keys to achieve persistence or command execution at startup.
Common locations to inspect:
| Registry Path | Purpose | Notes |
|---|---|---|
HKCU\Software\Microsoft\Windows\CurrentVersion\Run |
User-level autoruns | Executes apps on logon |
HKLM\Software\Microsoft\Windows\CurrentVersion\Run |
System-wide autoruns | Persists services |
HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit |
Logon initialization chain | Check for appended malware |
HKLM\SYSTEM\CurrentControlSet\Services\ |
Service persistence | Lists drivers & rootkits |
HKLM\SYSTEM\CurrentControlSet\Control\Lsa |
Credential providers | Impersonation or injection points |
HKLM\SYSTEM\CurrentControlSet\Services\PortProxy\v4tov4\tcp |
Port proxy rules | Used for internal proxy pivoting |