Windows Services is a key component of the Windows operating system that allows long-running processes to be created and managed in their own sessions. These services start running in the background usually on system boot without any user interaction and can continue to run long after the user has signed off the system. A broad range of functions are handled by these services including, data backup, network connections, user credentials, and more. Developers opt to use these services for functions required to run in the background without user interference, they do so by creating applications that can be installed as a Windows service.
Numerous amounts of malware and worms in the wild utilize Windows services, as the component provides desirable features such as persistence. Bad actors can have their malware create new services or replace existing ones and these services could be rootkits, backdoors etc. Analysis of the Windows services artifact can help in finding evidence of persistent malware.
Windows services artifact source file is located at C:\Windows\config\SYSTEM. Within the SYSTEM hive, the artifact data can be found at the location: CurrentControlSet\Services
The SYSTEM file, which contains the Windows services artifact, is a registry hive. This is a database where necessary operating system and\or application configurations are maintained. It is made up of keys and values. Keys can be containers that may contain other subkeys. Keys point to values that have variable length data sets. Windows provides an executable file called regedit.exe that can be used to view and make changes to the registry database.
This section will discuss how to use ArtiFast Windows to extract Windows Services artifact from Windows
machines and what kind of digital forensics insight we can gain from the artifact.
After you have created your case and added evidence for the investigation, at the Artifact Parser selection
phase, you can select Windows services artifact:
Once ArtiFast parser plugins complete processing the artifact for analysis, it can be reviewed via “Artifact View” or “Timeline View,” with indexing, filtering, and searching capabilities. Below is a detailed description of the Windows Services artifact in ArtiFast software.
Windows Services Artifact
The artifact contains information on the current services
that are on a specific system. The details you can view include:
For more information or suggestions please contact: ummulkulthum.wambai@forensafe.com