A threat hunting forensics tool designed to identify and analyze potential security threats in files and directories. The tool collects various file properties, such as owner, creation timestamp, modification timestamp, and compilation date.
A query can be created to identify all files in a specific directory that are not owned by TrustedInstaller. This could indicate that malware has been installed.
SELECT TOP 1000 *
FROM [FileProperties]
WHERE
[FileOwner] <> 'TrustedInstaller'
AND [DirectoryLocation] = ':\Windows\System32'
ORDER BY [PrevalenceCount] DESC
Another query can be created to detect potential timestomping or backdating of files. This involves checking that the MFT creation timestamp matches the OS-reported creation timestamp.
SELECT TOP 1000 *
FROM [FileProperties]
WHERE
([MftTimeAccessed] <> [LastAccessTime]) OR
([MftTimeCreation] <> [CreationTime])
ORDER BY [DateSeen] DESC
> Visit Judge Jury and Executable Website <