In this module

Interactive Lab: MFT Deep Dive

14 hours · Module 1 · Free
Interactive Lab
This lab applies the MFT analysis techniques from WF1.1 through WF1.12 to a realistic forensic scenario. You will examine MFT data from the ransomware investigation (INC-NE-2026-1022), identify timestomped files, recover deleted file metadata, reconstruct the attack timeline from MFT timestamps, and produce a forensic summary of your findings. The lab uses the scenario engine to present evidence, pose analysis questions, and provide feedback on your decisions.
Deliverable: Completed MFT analysis exercise demonstrating timestomping detection, deleted file identification, timeline construction, and forensic finding documentation.
Estimated completion: 45 minutes

Lab: MFT Analysis — Ransomware Investigation (INC-NE-2026-1022)

You are the forensic examiner assigned to analyze the MFT from DESKTOP-NGE-FIN01, the patient zero workstation in the Northgate Engineering ransomware incident. The MFT has been extracted with KAPE and parsed with MFTECmd. Your objectives:

1. Identify attacker tools — Find executables deployed by the attacker in staging directories. Apply timestomping detection to determine real deployment times.

2. Reconstruct the encryption timeline — Identify the mass file modification event that represents the ransomware encryption. Determine the start time, duration, encryption speed, and affected directories.

3. Recover deleted evidence — Identify deleted MFT entries in the attacker's staging directories. Determine what metadata is recoverable and assess whether any deleted files had resident data.

4. Produce findings — Document three key MFT findings with evidence attribution, confidence assessment, and the real timeline.

Evidence Set

The following MFTECmd output data represents records extracted from DESKTOP-NGE-FIN01. Examine each evidence block and answer the analysis questions.

---

Evidence Block 1 — Attacker Staging Directory

Seven files found in C:\ProgramData\Updates\:

EntrySeqInUseFileNameCreated0x10 ($SI)Created0x30 ($FN)Size
452313Truesvchost-helper.exe2025-08-15T09:00:00.00000002026-03-18T02:12:44.3456721287,744
452325Trueupdate-service.dll2025-08-15T09:00:00.00000002026-03-18T02:12:45.1234567156,672
452332Trueconfig.dat2025-08-15T09:00:00.00000002026-03-18T02:12:45.89012344,096
452344Truemshelper64.exe2025-08-15T09:00:00.00000002026-03-18T02:13:01.5678901524,288
452352Truelocker.exe2025-08-15T09:00:00.00000002026-03-18T02:13:02.3456789389,120
458007Truereadme.txt2026-03-18T02:14:28.90123452026-03-18T02:14:28.90123451,247
458013Truecleanup.bat2026-03-18T02:17:55.67890122026-03-18T02:17:55.6789012312

Analysis Question 1: Which files show evidence of timestomping? What is the classification (confirmed, probable, possible) for each, and what is the real deployment time?

Five files are timestomped (entries 45231–45235): - All five have identical $SI Created timestamps (2025-08-15T09:00:00.0000000) with zero fractional seconds - All five have $FN Created timestamps in March 2026 (02:12–02:13 window) - Temporal inversion: $SI Created is 7 months before $FN Created - Classification: Confirmed timestomping (Method 1: temporal inversion + Method 2: zero fractional seconds) - Real deployment time: March 18, 2026, 02:12:44 to 02:13:02 (from $FN Created)

Two files are NOT timestomped (entries 45800–45801): - readme.txt and cleanup.bat have matching $SI and $FN Created timestamps with full nanosecond precision - readme.txt is likely the ransom note (created just before encryption started) - cleanup.bat is the post-encryption cleanup script (created after encryption completed) - The attacker timestomped the main tools but not the operational files created during the attack

---

Evidence Block 2 — Encryption Event

Mass file modification detected across user directories:

Time WindowFiles ModifiedDirectories AffectedAvg Interval
02:14:33.1234567 – 02:18:47.89012342,84712~85ms

The $SI Modified timestamps increase monotonically with consistent ~85ms intervals. All affected files also show a $SI Entry Modified timestamp matching the $SI Modified timestamp (indicating both data and metadata were changed simultaneously).

Analysis Question 2: What does this pattern represent? Calculate the encryption speed and estimate the total data encrypted (average file size 47 KB).

This is the ransomware encryption event: - Duration: 4 minutes 14.77 seconds (02:14:33 to 02:18:47) - Files encrypted: 2,847 - Speed: ~11.2 files per second (2,847 ÷ 254.77 seconds) - Estimated data: ~130 MB (2,847 × 47 KB) - The monotonically increasing timestamps with consistent intervals confirm automated processing — no human operates at this consistency - The simultaneous $SI Modified and $SI Entry Modified updates confirm data content was changed (encryption) and MFT metadata was updated (new file size, attributes) - The 12 affected directories show the ransomware's directory traversal path - The encryption started 91 seconds after the last attacker tool was deployed (02:13:02 → 02:14:33), consistent with a brief configuration/staging period before execution

---

Evidence Block 3 — Deleted Evidence

Three deleted entries found in C:\Windows\Temp\:

EntrySeqInUseFileNameCreated0x30 ($FN)Size$DATA Resident?
120448Falsedeploy.bat2026-03-18T02:14:28.2345678487Yes (487 bytes)
120456Falsecreds.txt2026-03-18T02:11:33.4567890223Yes (223 bytes)
120464Falsescan-results.csv2026-03-18T02:09:15.789012334,816No (non-resident)

Analysis Question 3: Assess the recoverability of each deleted file. Which files can you recover content from? What is the forensic significance of each?

Entry 12044 — deploy.bat (487 bytes, resident): - Recovery: FULL CONTENT RECOVERY — 487 bytes of resident data in the MFT record. The entry is free (not reallocated), so the content is intact. - Method: Extract 487 bytes from the $DATA attribute content area in the raw MFT record at offset 12044 × 1,024. - Significance: This is likely the ransomware deployment script. Created 5 seconds before the encryption event started. May contain the commands used to launch locker.exe across the network. - Confidence: HIGH — intact resident data in a free MFT entry.

Entry 12045 — creds.txt (223 bytes, resident): - Recovery: FULL CONTENT RECOVERY — 223 bytes of resident data. - Significance: Created during the credential harvesting phase (02:11, before tool deployment at 02:12). May contain harvested credentials, domain admin passwords, or service account credentials used for lateral movement. - Confidence: HIGH.

Entry 12046 — scan-results.csv (34,816 bytes, non-resident): - Recovery: METADATA ONLY from MFT — filename, timestamps, parent directory, file size recoverable. Content requires cluster-level recovery. - Content recovery depends on: whether the workstation has an SSD (TRIM may have zeroed clusters) or HDD, and whether the clusters have been reallocated since deletion. - Significance: Created during the reconnaissance phase (02:09, before credential harvesting). Likely contains network scan results identifying target systems. Size (34 KB) suggests a CSV with multiple columns across many hosts. - Confidence for content: LOW on SSD, MODERATE on HDD. Check cluster allocation status.

---

Final Exercise: Write a three-paragraph forensic summary of the MFT findings for INC-NE-2026-1022, covering: (1) attacker tool deployment with real timestamps, (2) the encryption event timeline, and (3) deleted evidence recovery. Include confidence assessments and note what additional artifact sources would corroborate each finding.

Example forensic summary:

MFT analysis of DESKTOP-NGE-FIN01 identifies five attacker tools deployed to C:\ProgramData\Updates\ between 02:12:44 and 02:13:02 UTC on March 18, 2026. All five executables were timestomped — $STANDARD_INFORMATION Created timestamps were set to August 15, 2025 to blend with legitimate software, but $FILE_NAME Created timestamps reveal the actual deployment during the intrusion window. The timestomping is confirmed through temporal inversion (7-month gap between $SI and $FN Created) and zero-fractional-second precision on all $SI timestamps. The identified tools include svchost-helper.exe (288 KB), update-service.dll (157 KB), config.dat (4 KB), mshelper64.exe (524 KB), and locker.exe (389 KB — the ransomware payload). Corroborate with Prefetch analysis for execution evidence and Event Logs for service creation.

The ransomware encryption event began at 02:14:33 and completed at 02:18:47 UTC — a 4-minute 15-second window during which 2,847 files across 12 directories were encrypted at approximately 11.2 files per second. The monotonically increasing $SI Modified timestamps with consistent 85ms intervals confirm automated processing. The encryption started 91 seconds after the last tool deployment, consistent with a configuration period before execution. Corroborate with Event Logs (process creation for locker.exe, VSS deletion events) and USN Journal (file modification reason codes during the encryption window).

Three deleted files were recovered from C:\Windows\Temp\. Two files with resident data (deploy.bat, 487 bytes; creds.txt, 223 bytes) are fully recoverable from their freed MFT entries — deploy.bat is the likely deployment script created 5 seconds before encryption, and creds.txt contains harvested credentials from the pre-encryption reconnaissance. A third file (scan-results.csv, 35 KB, non-resident) has recoverable metadata but content recovery depends on cluster allocation status. All recovery findings are documented with extraction methodology and confidence assessment. Corroborate with Prefetch (cmd.exe execution for deploy.bat) and Event Logs (authentication events using harvested credentials).

You've built the foundations of artifact-level forensic analysis.

WF0 gave you the taxonomy, NTFS architecture, and the five-step methodology. WF1 took you inside the MFT at the binary level — every attribute, every timestamp, every edge case. From here, every artifact category gets the same raw-first treatment.

  • WF2–WF10: every major Windows artifact decoded at binary level — USN Journal, Prefetch, Amcache, Shimcache, ShellBags, LNK, Jump Lists, SRUM, Event Logs, and the Registry hives
  • INC-NE-2026-0915 (WF13) — Insider data exfiltration capstone. Work the complete investigation from USB history to OneDrive exfiltration evidence
  • INC-NE-2026-1022 (WF14) — Ransomware capstone. Three-host triage (FIN01 → IT03 → FS01) across the 72-hour attack chain
  • The lab pack — 25+ realistic evidence files in 10 formats, simulated KAPE triage pre-populated, both capstones deployable to your own VM
  • Anti-forensic detection methodology — defeat timestomping, log clearing, and Prefetch deletion with cross-artifact correlation
Unlock with Specialist — £25/mo See Full Syllabus

Cancel anytime