Web browsers
Web browsers are commonly used both by regular users, who are potential victims of spear-phishing attacks, and threat actors, who usually use them for downloading additional tooling and data exfiltration.
Let's focus on three main browsers – Microsoft Edge, Google Chrome, and Mozilla Firefox.
The main source of browser-related evidence is, of course, the history. Browsing history analysis may reveal locations from which the ransomware affiliates downloaded their tooling or, for example, uploaded collected data. Usually, this data is stored in SQLite databases, which can be found here:
- Microsoft Edge:
C:\Users\%USERNAME%\AppData\Local\Microsoft\Edge\User Data\Default\History
- Google Chrome:
C:\Users\%USERNAME%\AppData\Local\Google\Chrome\User Data\Default\History
- Mozilla Firefox:
C:\Users\%USERPNAME%\AppData\Roaming\Mozilla\Firefox\Profiles\<random text>.default\places.sqlite
As these are SQLite databases, they can be analyzed...