Project solution Autopsy-updated
Project solution Autopsy-updated
Page 1 of 28
Contents
1. Introduction of Case............................................................................................................................................................................2
2. Possible Case Scenario:.......................................................................................................................................................................2
3. Summary of Suspect:...........................................................................................................................................................................2
4. Table of Evidence Found:...................................................................................................................................................................3
5. Evidence Screenshots:.........................................................................................................................................................................5
6. Contemporaneous Analysis Notes:...................................................................................................................................................11
7. Evidence Mapping:............................................................................................................................................................................15
8. References:..........................................................................................................................................................................................16
Page 2 of 28
Page 3 of 28
1. Introduction of Case
The suspect, known as "Dev," is believed to be involved in stealing banking information from players in the game called PUBG and
hacking their devices through a fake link that resembles the official game link. He allegedly sells the stolen account information in the
black market. There is currently no evidence to convict the suspect, as his laptop was confiscated after several players reported their
concerns to the authorities, leading to his eventual identification. The police wish to determine whether they can secure a conviction and
if the evidence is sufficient to file charges against him or trace the network through which he operates, if it exists
During the investigation possible case scenario involvement of stealing banking information from players and hacking of few devices
using fake links. Therefore, person interested to sells the stolen account information in black market. Normally during investigation
process there are multiple challenges occurs therefore better experience required for case solving approach. In early stage need to
configure autopsy tool and load the provided image for forensic analysis because it is standard level analysis tool also provide all
sensitive information free of cost. Based on the given evidence in current report a complete analysis section is given where all required
evidence is included like files, logs, images and other digital resources. The evidence also provides the information about different
incident activities
3. Summary of Suspect:
To solve the current problem during investigation process we need to access an image file about data and need to load in computing
device using software application called autopsy. After the process completion we will get complete report about the evidence and
incident sensitive information then it will prove all evidences are linked each other
Page 4 of 28
Figure: creation new case
Page 5 of 28
Figure: final implementation
Page 6 of 28
Page 7 of 28
Page 8 of 28
Page 9 of 28
4. Table of Evidence Found:
Page 10 of 28
Page 11 of 28
Page 12 of 28
Page 13 of 28
Page 14 of 28
No Description of Significance to Full Provenance Method of
item case Discovery
1 The evidence data The text file Name: For information access
contains a text file contains the /img_Dev and john (1).E01/windows apply the search method
which is proper information about files/link.txt and get the sensitive
encrypted and need attacking linked Name: link.txt information easily
to decrypt hashed activities Is Deleted: No
values Type: File System MIME
Type: file: 8881
File Name Allocation:Allocated
Metadata Allocation: Allocated
Modified: 2024-10-28 14:20:14 GST
Accessed: 2024-10-28 00:00:00 GST
Created: 2024-04-17 23:22:35 GST
Changed: 0000-00-00 00:00:00
MD5:
9f5e22214951d44c9076f60d1c77f66dd1dfb045f489e
2a7047606b936a3af16
Page 15 of 28
Page 16 of 28
2. Evidence Screenshots:
In this picture below the evidence contains the different set of text files
Evidence Item1:
Location on
image:
/img_Dev and
john
(1).E01/users/
Public/Docum
ents/National
Instruments/C
ircuit Design
Suite
14.2/samples/
LabVIEW
Multisim API
Toolkit/SPIC
E Command
Line/SPICE
Command
Line.pdf/imag
e1.jpg
In this picture below we see email data details with contains sensitive information
Evidence Item2:
Location on
image:
/img_Dev
and john
(1).E01/users/
Public/Docu
ments/Nation
al
Instruments/
Circuit
Design Suite
14.2/samples/
LabVIEW
Multisim API
Toolkit/SPIC
E Command
Line/SPICE
Command
Line.pdf/ima
ge4.pn
Page 17 of 28
It contains the PUBG mobile competition and symbolized the image
Evidence Item3:
Location on
image:
/img_Dev
and john
(1).E01/iMazi
ng/Resources
/emojis/64@7
2/u1F308.png
The given figure contains windows based suspected files and provide complete level of
Evidence Item4: sensitive information
Location on
image:
/img_Dev
and john
(1).E01/Win
dows
Mail/w.hc
Page 18 of 28
A set of link image contains suspected laptop image file involved in criminal activity
Evidence Item5:
Location on
image:
/img_Dev
and john
(1).E01/users/
Public/Docu
ments/Nation
al
Instruments/
Circuit
Design Suite
14.2/samples/
LabVIEW
Multisim API
Toolkit/SPIC
E Command
Line/SPICE
Command
Line.pdf/ima
ge8.png
The given evidence item contains the bill materials in shape of documents
Evidence Item6:
Page 19 of 28
Location on
image:
/img_Dev
and john
(1).E01/users/
Public/Docu
ments/Nation
al
Instruments/
Circuit
Design Suite
14.2/samples/
QuizShowPro
ject/reports/B
illsOfMateria
ls.xls
Location on
image:
/img_Dev
and john
(1).E01/user
s/Public/Doc
uments/Nati
onal
Instruments/
Circuit
Design Suite
14.2/samples
/QuizShowP
roject/datash
eets/74AC74
.pdf/image1.
tif
Page 20 of 28
Evidence
Item8:
PUBG image
files
/img_Dev
and john
(1).E01/iMa
zing/Resour
ces/MediaC
opyStatusO
K.png
The given figure contains set of images available steganogrpahy data which contains evidence related
information
Evidence
Item9:
Email
encrypted
data
/img_Dev
and john
(1).E01/iMa
zing/Resour
ces/MediaC The given figure contains the multiple messages with encrypted data and attacker decrypt the information
opyStatus
msg.txt
Page 21 of 28
3. Contemporaneous Analysis Notes:
In figure we can see all type of case data loaded after proper file
verification approach and necessary data is collected
YES 2024/11/11 18:51:44
A text file inside
encrypted file
Page 22 of 28
YES 2024/11/1 19:4:59
Promotional email 1
messages
The images are linked with each other to collect the sensitive
information
Steganography YES 2024/11/2 19:55:33
images 3
Page 23 of 28
Evidence of laptop
YES 2024/11/2 21:43:44
Bill based
3
documents:
Page 24 of 28
YES 2024/11/2 21:43:44
3 Nothing found
Registry analysis
and
Registry protected
area.
YES 2024/11/2 22:43:44
3 Nothing found
IM clients
YES 2024/11/2 22:43:44
3 Nothing found
Clean-up utilities.
Check log files
YES 2024/11/2 23:48:44
3 Nothing found
Examine different
file types.
Encryption, Steg.
YES 2024/11/2 23:55:44
3 Nothing found
Print artefacts
YES 2024/11/2 23:57:44
3 Nothing found
CD/DVD burning
apps:
Page 25 of 28
4. Evidence Mapping:
Page 26 of 28
5. References:
M. A. Neaimi, H. A. Hamadi, C. Y. Yeun and M. J. Zemerly, "Digital Forensic Analysis of Files Using Deep Learning," 2020 3rd
International Conference on Signal Processing and Information Security (ICSPIS), DUBAI, United Arab Emirates, 2020, pp. 1-4, doi:
10.1109/ICSPIS51252.2020.9340141.
O. J. Adebayo, I. Suleiman, A. Y. Ade, S. O. Ganiyu and I. O. Alabi, "Digital Forensic analysis for enhancing information security," 2015
International Conference on Cyberspace (CYBER-Abuja), Abuja, Nigeria, 2015, pp. 38-44, doi: 10.1109/CYBER-Abuja.2015.7360517.
S. Raghavan and S. V. Raghavan, "A study of forensic & analysis tools," 2013 8th International Workshop on Systematic Approaches to
Digital Forensics Engineering (SADFE), Hong Kong, China, 2013, pp. 1-5, doi: 10.1109/SADFE.2013.6911540.
M. H. Ling, H. K. T. Ng, P. S. Chan and N. Balakrishnan, "Autopsy Data Analysis for a Series System With Active Redundancy Under a
Load-Sharing Model," in IEEE Transactions on Reliability, vol. 65, no. 2, pp. 957-968, June 2016, doi: 10.1109/TR.2016.2521766.
Page 27 of 28
Page 28 of 28