5. Insight view

The Insight tab contains a number of information panels that together give a concise overview of the information inside the case, revealing suspect behavior and giving rise to follow-up investigative questions.

The information is extracted from a variety of sources, such as emails and documents, web browser histories, Windows registries and more.

Clicking on entries like a document type or custodian name in the Insight tab will add a relevant search for that item category to the Cluster Map in the Search view. The main window will then automatically switch to the Search view as well.

Note

The boxes in the Insight section and the Case section can now be reordered and resized to accommodate a user’s needs and display.

5.1. Case info

Case info section shows the basic case information such as the case folder, case size, creation date, etc.

5.2. Evidence

The Evidence section shows important global statistics regarding your data. A detailed description of each category can be found in the Facet panel explaining the Features facet.

5.3. Types

The Types section shows a breakdown of the different types of files and other items in the case. It shows the same hierarchical structure as the Type facet described in Facet panel.

5.4. Custodians

The Custodians section shows the list of custodians in the case, if any, together with the number of items that are assigned to them. A pie chart showing these amounts is shown to the right of the table.

For detailed information on how to define custodians see the section titled “Custodians” in Facet panel.

5.5. Internet Artifacts

The Internet Artifacts section contains information about web browser activity, based on the browser histories detected in the evidence data.

All major browsers are supported: MS Internet Explorer/Edge, Mozilla Firefox, Google Chrome and Apple Safari.

The top chart shows the list of encountered browser histories, listing the following information:

  • The path of the browser history in the evidence data.
  • The type of browser, represented by the browser’s desktop icon.
  • The number of visited URLs in the browser history, both as a number and as a bar showing the amount relative to the total amount of visited URLs in the entire case.
  • The last used date of the browser history, i.e. the last time a new URL was added or a visit count was updated. Note that manual deletions of URLs in the history by the end user are not taken into account when determining the last used dates; it is merely indicative of when the regular day-to-day usage of that browser ended.

At the very top of this list is a row that represents the total amount of visited URLs in the case, regardless of location and web browser type.

Beneath the list of browser histories there is a breakdown of the visited URLs:

  • The “Top 100 visited URLs” table shows the most visited URLs, with for each URL the number of visits as indicated by the browser history.
  • The “Top 100 visited domains” table shows the most visited domains, together with the sum of the visit counts of all URLs in that domain. Subdomains are treated as independent domains.
  • The panels “Social media”, “Cloud storage”, “Webmail” and “Productivity” show the number of visits that belong to some commonly used websites, such as Facebook and Twitter for social media, DropBox and OneDrive for cloud storage, Gmail and Yahoo Mail for webmail, etc.

By default, this breakdown covers all visited URLs in the case. By clicking on a row in the list of browser histories one can narrow down on the visited URLs in that particular browser history. The selected browser is indicated by the blue URL count bar.

Note

The categories and domains that are checked can be configured by editing the common-websites.xml file in the [CASEDIR]\prefs folder.

Warning

During the development of this functionality we observed that the semantics of a “visited URL” may differ between browsers, possibly even between browser versions. In some cases it indicates that the user explicitly visited a URL by entering it in the browser’s address bar or by clicking a link. In other cases all resources loaded as a consequence of displaying that page may also be registered as “visited”, even resources from other domains, without making any distinction between the explicitly entered or clicked URLs on the one hand and the other resources on the other hand. One should therefore carefully look at the operation of a specific browser before drawing any final conclusions.

5.6. Timeline

The Timeline shows the timestamps of all items in the case over the years of months. This not only gives a rough overview of events over time, but can also be used to find data anomalies, e.g. unexpected peaks or gaps in the volume of emails, which for example may be caused by an incomplete capture of evidence files, bugs in the custodian’s software, default values entered by client software and actions of malicious custodians (resetting date fields, deleting information).

To the right of the chart are all date fields that Intella currently supports. Each date field shows the number of items that have that date field set. Date fields that do not occur in this case are disabled. (De)selecting one of the checkboxes changes the Timeline to include or exclude the counts for that date field.

This update may take some time, depending on the case size and whether a local or remote case is used. The resulting counts are cached so that afterwards the user can toggle that checkbox and see the chart change instantly. The chart can alternatively show months or years.

Note

The Timeline’s time axis only shows dates between January 1 1969 and two years from “now”. This is to prevent obviously incorrect dates that have been extracted from corrupt files from spoiling the graph.

5.7. Identities

The Identities section consists of three tables with various types of identities, which may be representing users or other entities.

The User accounts table shows a list of user accounts extracted from the evidence data. These can be:

  • Windows user accounts, extracted from Windows registry hives.
  • Skype user accounts, extracted from Skype databases. These are the database’s local account, not the entire contacts list of that account.
  • Pidgin user accounts. Again these are the local accounts, not the entire contact list.
  • User accounts in cellphone reports as produced by Cellebrite UFED, Micro Systemation XRY and the Oxygen Forensic suite. See the documentation of the respective product for details on the correct interpretation of such information.

The “Origin” column in this table shows either a machine name extracted from a Windows registry or the location of the evidence file that the account was extracted from.

The Top 10 email addresses table shows the 10 email addresses with the highest number of emails in the case. Both the raw and deduplicated counts are shown. The top 10 is based on the raw counts.

The Top 10 host names table shows the host names that have the most emails associated with them. These are essentially the host names that show up when you expand the “All Senders and Receivers” branch in the Email Address facet. Both the raw and deduplicated counts are shown. The top 10 is based on the raw counts.

5.8. Notable Registry Artifacts

Note

The information provided in this view is experimental. We greatly value your feedback on this via our support portal at http://support.vound-software.com/ or via our community forum at http://community.vound-software.com/.

The Notable Registry Artifacts (NRA) section gives insight into the most important artifacts extracted from the Windows registry hives of the investigated machines/operating systems.

A case may contain evidence files (usually in the form of disk images) that relate to multiple operating systems (OSes), simply because multiple machines may be involved, but also because a machine may have multiple operating systems installed. Hence the artifacts are grouped by OS, labeled by the “Computer Name” that was extracted from the registry, and further subdivided in a number of categories.

The following artifact types are currently extracted and reported:

  • Basic OS information
  • OS time zones
  • OS user accounts
  • Network interfaces
  • Network connections
  • USB mass storage devices that have been connected
  • Recently used files
  • Shellbags
  • Typed URLs registered by web browsers using the registry

A “registry artifact” is a logical concept in Intella Connect that is modeled as an atomic item in the case and that holds important information typically used in digital forensic investigations. This information is specially selected for this purpose by experienced forensic experts. While the properties of a registry artifact may be scattered across different registry hives and backups of these hives, Intella Connect will unify them into a coherent item.

The NRA section is divided into two parts. On the left hand side, labeled “Overview”, the tree organizing the registry artifacts is shown. The first level nodes represent OSes labeled with the “Computer Name” extracted from the registry. One lever deeper we find sub-nodes for the various registry categories (e.g. “User Accounts”), followed by leaf nodes representing the actual artifacts (e.g. a specific User Account).

One can select a leaf node in this tree, which will show the properties of that registry artifact in the Details view on the right hand side. Clicking on button “Open in previewer” in the Details view opens the registry artifact item in the Previewer.

This shows additional information such as the location of the item and allows for browsing to nearby items in the item hierarchy using the Previewer’s Tree tab.

Besides the regular registry hives, the Windows registry maintains backup files in the form of so-called “RegBack” files. Intella Connect will process these files as well and display the extracted data in the NRA section. Values coming from such backup registry hives are marked with a “RegBack” label and are only displayed when they differ from the corresponding values in the current files. Not doing so would greatly increase the amount of redundant registry information.

5.8.1. Supported registry hives

Intella Connect will process the following registry hives:

Registry Hive Name Location
SYSTEM Windows/System32/config/SYSTEM
SYSTEM (RegBack)

Windows/System32/config/RegBack/SYSTEM

Windows/repair/SYSTEM

NTUSER.DAT Found under folder Users/<user id> or Documents and Settings
SOFTWARE Windows/System32/config/SOFTWARE
SOFTWARE (RegBack)

Windows/System32/config/RegBack/SOFTWARE

Windows/repair/SOFTWARE

SAM Windows/System32/config/SAM
SAM (RegBack)

Windows/System32/config/RegBack/SAM

Windows/repair/SAM

Note

Registry artifacts can be extracted from disk images and folders only if all relevant files are located in the proper folders, e.g. Windows\System32\config\SYSTEM.

Note

Support for Windows XP and older is limited.

5.8.2. Operating system information

This category contains only one item, named after the computer name stored in the registry. The properties of the OS Info item are extracted from the SOFTWARE and SYSTEM hives and the corresponding backup files. Keys extracted from SOFTWARE\Microsoft\Windows NT\CurrentVersion are:

  • ProductName
  • ProductId
  • CurrentVersion
  • RegisteredOwner
  • RegisteredOrganization
  • InstallDate

Keys extracted from SYSTEM\CurrentControlSetXXX are:

  • ComputerName
  • ShutdownTime

5.8.3. Time zones

The Time Zones category provides the time zone of the suspect’s machine. The properties of the time zone artifact are extracted from SYSTEM\CurrentControlSetXXX\Control\TimeZoneInformation. The following keys are extracted from the hive and make up a time zone artifact:

  • ActiveTimeBias
  • Bias
  • StandardBias
  • DaylightBias
  • TimeZoneKeyName
  • DaylightName
  • StandardName
  • DynamicDaylightTimeDisabled
  • DisableAutoDaylightTimeSet
  • DaylightStart
  • StandardStart

5.8.4. User accounts

The User Accounts category contains all user accounts detected in an OS. The user accounts are found and extracted from the SAM hive and the corresponding backup files from SAM\Domains\Account\Users. The following keys are extracted from the hive:

  • User RID Key/F:

    • Last Login Date
    • Password Reset Date
    • Account Expiration Date
    • Last Failed Login
    • Login Count
    • Password Required
  • User RID Key/V:

    • Privilege Lever
    • User Name
    • User Description
  • UserPasswordHint

  • ForcePasswordReset

5.8.5. Network interfaces

The Network Interfaces category contains all network adapters registered in the registry of an investigated OS. Information about network interfaces is extracted from the SYSTEM and SOFTWARE registry hives and their backup files. The following keys found in SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkCards\<ID> refer to basic network interface properties:

  • Service Name (it is used as a lookup reference for DHCP settings)
  • Description

The DHCP settings are obtained from the following keys in SYSTEM\currentControlSetNameXXX\Services \Tcpip\Parameters\Interfaces\<Name>:

  • LeaseObtainedTime
  • LeaseTerminatesTime
  • T1
  • T2
  • DhcpIpAddress
  • DhcpDefaultGateway
  • DhcpNameServer
  • DhcpServer
  • DhcpSubnetMask
  • DhcpDomains
  • EnableDHCP

5.9. Network connections

The Network Connections category contains all connections to networks stored and extracted from the Windows registry. Information about registered network connections is obtained from a single place: SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Profiles\<ProfileName>.

5.9.1. USB mass storage devices

Under USB Mass Storage Devices one can find data about USB devices that have been connected to the machine(s) being investigated. When a user connects a USB device, the Windows operating system keeps track of that device in the registry. All relevant data are distributed across the SOFTWARE and SYSTEM registry hives and their backups. Besides the hives, certain USB-related information can be found in the setupapi.dev Windows log files.

In the SYSTEM hive all data about USB drives are stored in the CurrentControlSetXXX\Enum\USBSTOR branch. Under its sub-key MountedDevices, the Windows registry registers USB device connections in registry values having the DosDevices keyword in their value name. Besides the keyword, the key name contains a device GUID value. The signature of the connected device is stored as a byte array in the registry value. The USB vendor name is stored in CurrentControlSetXXX\Enum\USB.

The SOFTWARE hive stores information about connected portable devices. The names of the portable devices can be found at Microsoft\Windows Portable Devices\Devices.

Device installation dates are stored in the textual setupapi.dev files. Intella Connect searches for sections containing the USBSTOR keyword and extracts device identifier and device installation dates from them.

5.9.2. Recent files

Information about the most recently used files is extracted from the NTUSER registry hive. All relevant information is found in the following location: Software\Microsoft\Windows\CurrentVersion\Explorer\RecentDocs\<extension>. Recent files are grouped by file extension. For each file extension the registry maintains a separate MRU list.

The last access timestamp is stored only for the most recent items of each extension. For the rest of the items Intella Connect provides users with an estimated time period, based on the order of the items in the MRU lists.

Furthermore the files accessed before and after the current file are shown in the Details view.

5.9.3. Shellbags

The Shellbags category contains all shellbags extracted from registry hives. A shellbag is a registry item that stores data about user actions in a Windows file system folder. Extracted are Access, LastModified, LastExplored and Create dates, the size of the folder and information about the OS user that accessed or modified the folder. All relevant information (registry keys) is extracted from the NTUSER.DAT registry hive in the following branches:

  • Software\Microsoft\Windows\Shell
  • Software\Microsoft\Windows\ShellNoRoam

5.9.4. Typed URLs

The Typed URLs category contains the most recent URLs of webpages that a user has visited with the MS Internet Explorer or MS Edge browsers. This information is extracted from the NTUSER.DAT registry hive in the Software\Microsoft\Internet Explorer\TypedURLs branch.

5.10. Devices

The Devices section contains a list of all USB mass storage devices that have been connected to the suspect machines. This information is taken from the Notable Registry Artifacts section. It provides the ability to quickly oversee and sort all devices found in the case.

5.11. Networks

The Networks section contains a list of wired and wireless networks that a suspect machine has been connected to. This information is taken from the Notable Registry Artifacts section and from cellphone reports. It provides the ability to quickly oversee and sort all networks found in the case.

5.12. Significant Words

The Significant Words panel visualizes important words encountered in the item texts in the case, based on a statistical model of term relevance. The bigger the font of a particular word, the higher the relevance that word may have for the data set at hand.

These results are purely suggestive: though they are based on commonly used information retrieval techniques, they only look at the evidence data. In particular, they do not take the investigative research questions into account, or any investigative results such as items tagged as “relevant”.

The Paragraphs section shows statistics on the paragraphs that Intella Connect has registered, when the Analyze Paragraphs setting was set on the source(s) in the case. It lists the number of unique and duplicate paragraphs, both as raw numbers and as percentages. Furthermore, the Paragraphs marked as Seen or Unseen are counted. Finally, the number of Documents, Emails and Other item types with unique content (i.e. a paragraph that does not occur in any other item) is listed. These groups can be clicked, which shows these item sets in the Search tab.

5.13. Workflow

The Workflow section lists additional tasks that one might consider after the initial indexing is done. These tasks can further refine the case index quality and kick-start the investigation and analysis phases.

Additional Processing category:

  • The Export encrypted items link opens up the Export wizard for all items that are encrypted but have not been decrypted.

Export encrypted items list exports the metadata of these items to a CSV file.

  • The Export unprocessed items link opens up the Export wizard for all items that fall into the “Extraction Unsupported” category in the Features facet.

Export unprocessed items list exports the metadata of these items to a CSV file.

  • The Export exception items link opens up the Export wizard for all items that fall into the “Exception Items” category in the Features facet.

Search & Analysis category:

  • The Run content analysis link initiates the content analysis procedure for all items in the case. This detects person, organization and location names used in the item texts and reports them in the Content Analysis facets.
  • Add keyword list adds a keyword list to the case, for use in the Keyword Lists facet or Keywords tab in the Statistics view.
  • Add MD5 list adds an MD5 or message hash list, for use in the MD5 and Message Hash facet.
  • Add saved search adds a saved search obtained from another case to this case, for use in the Saved Searches facet and Keywords tab in the Statistics view.

Report category:

There are currently no tasks available in this category.