Computer Forensic Examination Report 1
Computer Forensic Examination Report 1
Emmylou Bice
Table of Contents
Abstract..........................................................................................................................................3
1 Case Background.....................................................................................................................4
7 Corporate Breach.....................................................................................................................8
8 Analysis Results.......................................................................................................................8
9 Conclusion.............................................................................................................................13
10 References..............................................................................................................................14
COMPUTER FORENSIC EXAMINATION REPORT 3
Abstract
This paper documents the digital forensic examination details for the M57.biz data spill.
The data spill consists of a sensitive spreadsheet being sent over to a competitor’s website. The
main suspect in this case is Jean Jones. Digital forensics is meant to shine light on the
investigative or legal related questions to help a court decide the ruling of a court case. With the
M57.biz data spill, the company hired an investigator to analyze the evidence of the case. The
main questions to answer include how the information leave the company networks and whether
or not the main suspect, Jean Jones, is innocent or guilty. As the forensic investigator, I have
analyzed the evidence and collected plenty of data to produce this Examination report to present
1 Case Background
The company, M57.biz, encountered a data spill which consisted of a company sensitive
information leaving the corporate network to a competitor. This spreadsheet contains sensitive
employee personal identification information including names, salaries, and social security
numbers of some key M57.biz employees. The company suspects that Jean Jones, the Chief
Financial Officer (CFO), is highly linked to the data spillage as she was the only individual with
using a variety of forensics tools including the Forensic Tool Kit (FTK) Imager, Autopsy, and the
Microsoft Office Suite. Each of these tools provided different features to further analyze the
evidence files. With FTK Imager and Autopsy, I opened and analyzed the image of Jean’s
computer which led to discovering a variety of information to assist with closing the case.
expected outcomes of the investigation and to gather as much information as possible from the
personnel involved to have a better insight. Therefore, both Alison (M57.biz president) and Jean
were questioned to acquire their point of view on the data spill. With respect to this case, the
4. Are there any other parties involved in the case outside of the key suspects?
COMPUTER FORENSIC EXAMINATION REPORT 5
As this is an incident involving M57.biz information, legal authorities allow the company to
examine any company related property that might be relevant to the case. As Jean is the prime
suspect, the organization has the authority to search and seize any company assets Jean accessed
The following is the evidence provided for this investigation. These acquired artifacts and
information were carefully packaged and brought under a chain of custody to ensure the integrity
To ensure these artifacts keep their integrity, a chain of custody log was maintained shown
The evidence to search for includes the sensitive spreadsheet that contains employee PII.
During the investigation, I will search for this spreadsheet on the provided image of Jean’s
computer, identifying the document creation date and creator. I will also look for traces of any
evidence on who, when, and how the spreadsheet was transmitted and sent outside of the
company network. Lastly, I will locate any instances indicating whether the leak was intentional
or not.
The criminal offences facing ‘Jean Jones’ include: violating company email policies,
releasing of employee PII, and breaching company security. Depending on the location of
m57.biz, both Jean and the company could be facing additional criminal offenses such as social
security number disclosure laws in many locations like Connecticut. In Connecticut, there are
multiple laws or rules prohibiting or restricting individuals and business actions with respect to
I discovered the spreadsheet on the image of Jean’s computer. The filename is called
m57biz.xls the creation date is 7/20/2008 at 1:28:03 AM. The spreadsheet was not encrypted or
password protected therefore I did not need to crack any passwords or encryption to obtain
The following table identifies a series of highlighted emails that were sent between Jean
and Alison, M57.biz’s president. The series of emails led to identifying how the spreadsheet was
transmitted to the other company, who sent the spreadsheet, who the recipient was, and when the
transmission occurred. I had exported the emails into a CSV file to then be analyzed via
COMPUTER FORENSIC EXAMINATION REPORT 7
Microsoft Excel. I have also taken the emails directly and viewed them in Microsoft Outlook.
The last couple of messages in the table identifies the exact details of the transaction for when
them on 7/6/2008. Jean proceeds to continuously send Alison emails with links in it over the
course of the week. Although not shown in the timeline, Jean also sent Alison emails with links
which prompted Alison to restate to not send any links. About a week later, Jean emails Alison
asking which email to send to [email protected] email or the [email protected] email. This creates
confusion for Jean as she receives responses from both emails meaning people can reach Alison
through multiple emails. On 7/19/2008 at 4:32pm, Jean receives an email from who she believes
is Alison because the name displays as “[email protected]” however the email is from
“[email protected]”. Given, Alison has multiple emails, Jean must have gotten confused.
COMPUTER FORENSIC EXAMINATION REPORT 8
This email requests that Jean sends the employee background check information. Jean does not
respond to this, but then “Alison” asks for the file a few hours later. This creates a sense of
7 Corporate Breach
From the email timeline, I identified that Jean was at fault for the data spillage of the
sensitive spreadsheet that contained employee information. She violated company policy and
breached corporate security by sending out this information. However, because the emails
showed that there were multiple seemingly urgent messages coming from someone posing as
Alison, I have determined that Jean was a victim of a phishing attacks. A phishing attack is an
attack where the threat or adversary poses as a trusted individual or organization to trick victims
into sharing sensitive information by either replying to the email or clicking on suspicious links
(Malwarebytes, n.d.).
8 Analysis Results
To analyze Jean’s image, I used a combination of FTK Imager, Autopsy, and the
Microsoft Office Suite. The first step in analyzing the image includes verifying that the image
did not become corrupted during the ingest. The figure below identifies the integrity verification
results.
COMPUTER FORENSIC EXAMINATION REPORT 9
Once I verified that the evidence was loaded properly, I used both FTK Imager and
Autopsy to peruse the directories and folders of the system. From there, located on Jean’s
Desktop was the sensitive file named as m57biz.xls as shown in the Figure below.
This provides some proof that Jean may have been involved with the data spill since the
file was discovered on her system. Once this file was found, I identified that Alison created the
spreadsheet, but Jean was the last person to edit it as shown in the following figure.
data spill itself. In the evidence file, I located a series of .pst files on the system which are
emails. In autopsy, I was able to export the emails to a csv format for easy data analysis. I also
exported the .pst files directly to be examined via Microsoft Outlook. The following image
identifies an email from Alison requesting Jean to create the sensitive spreadsheet that consisted
The following figure identifies the spoofing email where the adversary
([email protected]) posed as Alison ([email protected]) and asked for the spreadsheet with
an urgent tone.
Jean responded to this email with the spreadsheet attached as depicted in the figure
below.
COMPUTER FORENSIC EXAMINATION REPORT 12
As a result of the investigation, I was able to recover relevant artifacts and emails for the
investigation all while maintaining integrity of the evidence files by using industry approved
tools. From the image, I confirmed that the spreadsheet was on Jean’s computer and was created
at 7/20/2008 at 1:28AM. From the emails identified, I was able to read through them and
determine the series of events and all the associated details that led up to the data spillage.
Overall, after analysis all the pieces of evidence, I concluded that Jean was the individual that
caused the spill, but was a victim of a phishing attack due to Alison having multiple emails and
the requester of the spreadsheet had Alison’s name despite being a Gmail address. Jean thought
policies, training, and technical protections. To include clearing stating what is an isn’t allowed
to me transmitted in the email policy, refreshing the entire staff on the dangers of phishing
attacks and how to spot them, and implementing a robust firewall and data loss prevention
COMPUTER FORENSIC EXAMINATION REPORT 13
software to block phishing attacks and ensure files are either prohibited from leaving the network
10 References
https://www.academia.edu/12324822/Example_of_An_Expert_Witness_Digital_forensics_
Report
https://www.cga.ct.gov/2011/rpt/2011-R-0369.htm