Windows File Analyzer Tutorial: Step-by-Step File Forensics and Metadata Extraction
This tutorial walks through using a Windows file analyzer workflow to perform basic file forensics and extract metadata. It focuses on step-by-step, tool-agnostic techniques you can apply with common Windows utilities and third-party forensic tools.
1. Prepare your environment
- Isolate the evidence: Work on a copy of the suspect files or an image of the drive—never the original.
- Create a working folder: e.g., C:\ForensicWork</span></span> and set clear read-only copies of originals.
- Document everything: Keep a simple log (case ID, timestamps, tool versions, hashes, operator).
2. Capture hashes and basic file info
- Compute cryptographic hashes (MD5, SHA-1, SHA-256) for each file to ensure integrity. Use certutil or a hashing tool:
- certutil -hashfile “C:\ForensicWork\sample.docx” SHA256
- Record file timestamps (Created, Modified, Accessed). In PowerShell:
- Get-Item “C:\ForensicWork\sample.docx” | Select-Object Name, CreationTime, LastWriteTime, LastAccessTime
3. Identify file type and structure
- Check file signature (magic bytes) to verify true file type, not just extension. Use a hex viewer or the
file-style tools. - Open with appropriate viewers (text, hex, or native app) depending on file type to avoid altering metadata.
4. Extract metadata
- Document properties for Office files: Use exiftool or PowerShell:
- exiftool “C:\ForensicWork\sample.docx”
For PowerShell (limited): - (Get-Item “C:\ForensicWork\sample.docx”).VersionInfo
- exiftool “C:\ForensicWork\sample.docx”
- Image metadata (EXIF): exiftool extracts camera, GPS, timestamps, and software info:
- exiftool “C:\ForensicWork\image.jpg”
- PDF metadata: exiftool or PDF-specific parsers reveal author, creation/mod dates, and embedded objects.
5. Recover embedded or hidden data
- Search for alternate data streams (ADS) on NTFS:
- Get-Item -Path “C:\ForensicWork\sample.docx” -Stream *
Or use streams.exe from Sysinternals: - streams -s C:\ForensicWork
- Get-Item -Path “C:\ForensicWork\sample.docx” -Stream *
- Scan for embedded files within containers (Office, PDFs, archives) using tools like 7-Zip, binwalk, or forensic suites.
- Look for steganography in images/audio with specialized detectors when suspicion warrants.
6. Timeline and correlation
- Build a timeline from file timestamps, system logs, and application logs. Collect:
- File System metadata (MFT entries if available)
- Event logs (Windows Event Viewer exports)
- Correlate events with user activity (logon times, application launches) to contextualize file changes.
7. Preserve evidentiary trail
- Export reports with tool outputs, hashes, and screenshots.
- Store originals and working copies in write-protected archives and note storage locations in your log.
8. Common pitfalls and how to avoid them
- Altering timestamps inadvertently: Open files in read-only mode and avoid applications that auto-save.
- Relying on single indicator: Cross-validate metadata with multiple tools.
- Ignoring ADS and embedded objects: Always check streams and containers.
9. Example quick checklist
- Copy files to forensic workspace (read-only originals saved)
- Compute and record hashes (MD5/SHA256)
- Verify file type via magic bytes
- Extract metadata with exiftool and PowerShell
- Check ADS with streams or PowerShell
- Search for embedded files and malware indicators
- Build a timeline and export a report
Leave a Reply