LetsDefend: Registry Forensics

LetsDefend: Registry Forensics

Scenario: Did the user run mimikatz.exe? Artifact: SYSTEM hive.

1. ShimCache (AppCompatCache)

Located in HKLM\SYSTEM\CurrentControlSet\Control\Session Manager\AppCompatCache. It tracks executables for compatibility. It works even if the file is deleted. We parse it with AppCompatCacheParser.exe. Finding: mimikatz.exe - Last Modified Time matches the attack window.

2. UserAssist

Located in NTUSER.DAT. Tracks GUI execution (double clicks). If found here, it proves the user ran it, not a system service.

Conclusion

The Registry never forgets.