🧰 Skills Applied
Digital forensics triage
Windows Registry analysis
USB artifact extraction (USBSTOR)
Event log correlation
Timeline reconstruction (MAC times)
Evidence documentation
Insider threat investigation
🛠 Tools Used
Windows Event Viewer
Registry Editor / RegRipper
USBSTOR artifact review
CyberChef
PowerShell (optional)
File timestamp analysis tools
✔ Summary of Findings
Identified unauthorized USB device connection
Found matching entries in the USBSTOR registry key confirming device presence
Correlated event logs showing file access around the time of the USB connection
Detected unusual file modification timestamps (MAC times)
Evidence strongly suggested possible data exfiltration via removable media
Recommended disabling removable drives, improving logging, and monitoring high-risk users
🧩 MITRE ATT&CK Techniques
T1020 — Automated Exfiltration
T1052 — Exfiltration over Removable Media
T1083 — File and Directory Discovery
Conducted a digital forensics investigation into a suspected data theft incident involving an unauthorized USB device. Analyzed USB artifacts, registry keys, timestamps, and file access behavior to determine whether sensitive data was copied.
Security team suspected:
The workstation showed signs of unusual activity around 10:47 PM.
Reviewed:
HKLM\SYSTEM\CurrentControlSet\Enum\USBSTOR
HKLM\SYSTEM\CurrentControlSet\Enum\USB
Found:
Reviewed:
Findings:
Reviewed:
Findings:
Checked:
Findings:
The combined evidence strongly supports unauthorized data transfer via a removable USB device by an internal user.
While Windows does not log copy events, the forensic timeline aligns precisely with suspicious activity.
Successfully built a full forensic timeline that identified high-risk insider behavior. Recommended DLP and monitoring upgrades to prevent future incidents.