This document provides an overview of leveraging NTFS timeline forensics in malware analysis. It discusses analyzing the Master File Table (MFT) of the NTFS file system to establish a timeline and location of system changes. The document analyzes a rogue antivirus malware sample to demonstrate the technique, extracting information from the MFT, prefetch folder, registry hives, and recovering deleted files. While useful, MFT analysis must be corroborated with other methods due to potential for attribute manipulation.
Related topics: