Event: Windows Forensics Logs
Referrer: https://fareedfauzi.github.io/2023/12/22/Windows-Forensics-checklist-cheatsheet.html
Windows event logs analysis
Located at C:\Windows\System32\winevt\Logs
Interesting log sources
Security.evtx
Security-related events
System.evtx
Tracks system component events
Application.evtx
Logs application-specific events
Microsoft-Windows-Sysmon/Operational.evtx
Enhanced process, network, and file monitoring
Microsoft-Windows-PowerShell/Operational.evtx
Records PowerShell activity
Microsoft-Windows-Windows Defender/Operational.evtx
Logs Windows Defender events
Microsoft-Windows-WMI-Activity/Operational.evtx
Logs WMI events
Microsoft-Windows-Bits Client/Operational.evtx
Logs BITS events
Microsoft-Windows-DNS Client/Operational.evtx
Logs DNS events
Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational.evtx
Logs RDP session events
Microsoft-Windows-TerminalServices-RDPClient/Operational.evtx
Logs RDP session events
Microsoft-Windows-TerminalServices-LocalSessionManager/Operational.evtx
Logs RDP session events
Microsoft-Windows-TaskScheduler/Operational.evtx
Logs Task Scheduler events
Microsoft-Windows-DNS-Server%4Operational.evtx
Active Directory Server Logs
Directory Service.evtx
Active Directory Server Logs
File Replication Service.evtx
Active Directory Server Logs
%SystemDrive%\inetpub\logs\LogFiles
IIS log
%SystemRoot%\System32\LogFiles\HTTPERR
IIS log
%ProgramFiles%\Microsoft\Exchange Server\V15\Logging
Exchange log
Panther*.log
Windows setup details
RPC Client Access*.log
Exchange Server, if applicable
Third party antivirus log
AV logs
Important Security Event IDs
4624
Security
Successful Login
4625
Security
Failed Login
4634/4647
Security
User Initiated Logoff/An Account was Logged Off
4648
Security
A Logon was Attempted Using Explicit Credentials
4656
Security
The object is requested
4657
Security
A registry value was modified
4662
Security
An Operation was Performed on an Object
4663
Security
An Attempt was Made to Access an Object
4672
Security
Special Logon
4688
Security
Process Creation
4689
Security
Process Termination
4697
Security
Service Installed
4698/4702/4700
Security
Scheduled Task Created or Updated
4699
Security
Scheduled Task Deleted
4701
Security
Scheduled Task Enabled
4702
Security
Service Removed
4720
Security
A User Account was Created
4722
Security
A User Account was Enabled
4723
Security
An Attempt was Made to Change an Account's Password
4724
Security
An Attempt was Made to Reset an Account's Password
4725
Security
A User Account was Disabled
4726
Security
A User Account was Deleted
4728
Security
A Member was Added to a Security-Enabled Global Group
4729
Security
A Member was Removed from a Security-Enabled Global Group
4732
Security
A Security-Enabled Local Group was Created - A member was added to a security-enabled local group
4733
Security
A Security-Enabled Local Group was Changed
4734
Security
A Security-Enabled Local Group was Deleted
4741
Security
A Computer Account was Created
4742
Security
A Computer Account was Changed
4768
Security (DC)
Kerberos TGT request
4769
Security (DC)
Kerberos Service Ticket request
4771
Security
Locked Out Account
4776
Security
NTLM authentication
4778
Security
Session Reconnected
4779
Security
Session Disconnected by User
4794
Security
An Attempt was Made to Set the Directory Services Restore Mode Administrator Password
5136
Security
Directory Service Changes
5140
Security
A Network Share Object was Accessed
5141
Security
A Directory Service Object was Deleted
5145
Security
Network Share Object was Checked
5156
Security
The Windows Filtering Platform has permitted a connection
5376
Security
Credential Manager Credentials Submitted
5377
Security
Credential Manager Credentials Auto-Logon
1102
Security
Event Log Cleared
1100
Security
Event Log Service Shutdown
Logon type corresponding to Succesfull (4624) or Failed logins (4625)
2
Logon via console
3
Network Logon. A user or computer logged on to this computer from the network
4
Batch Logon (Task scheduler and AT)
5
Windows Service logon
7
Credentials used to unlock screen
8
Network logon sending credentials (cleartext)
9
Different credentials used than logon user
10
Remote Interactive logon (RDP)
11
Cached credentials used to logon
12
Cached remote interactive (RDP)
13
Cached Unlock (Similar to logon type 7)
Other's log important Event IDs
7045
System
Service installed
7034
System
The service terminated unexpectedly
7035
System
Service Control Manager
7036
System
Service State Change
7040
System
Service was changed from disabled to auto start.
7001
System
Service Start Failed
1001
System
BSOD
6005
System
Start-up time of the machine
6006
System
Shutdown time of the machine
104
System
Log cleared
2003
Microsoft-Windows-Windows Firewall with Advanced Security
Firewall was disabled
2004
Microsoft-Windows-Windows Firewall with Advanced Security
Rule has been added to the Window Firewall exception list
2005
Microsoft-Windows-Windows Firewall with Advanced Security
Rule has been modified
2006
Microsoft-Windows-Windows Firewall with Advanced Security
Deleted firewall rule
1116
Microsoft Windows Windows Defender/Operational
Defender Antivirus has detected malware
1117
Microsoft Windows Windows Defender/Operational
Action taken
1006
Microsoft Windows Windows Defender/Operational
Scan result
5001
Microsoft Windows Windows Defender/Operational
Disabling Real Time Protection
5007
Microsoft Windows Windows Defender/Operational
Excluded Files and Folders
4103
Microsoft Windows PowerShell/Operational
Module logging
4104
Microsoft Windows PowerShell/Operational
Script Block Logging - Executing a Remote Command
4105
Microsoft Windows PowerShell/Operational
Transcription Logging
4688
Microsoft Windows PowerShell/Operational
Process Creation (including PowerShell processes)
400
Windows PowerShell
Start of a PowerShell activity, whether local or remote.
403
Windows PowerShell
Completion of a PowerShell activity
800
Windows PowerShell
Pipeline execution
3
Microsoft-Windows-Bits Client/operational
BITS job was created
4
Microsoft-Windows-Bits Client/operational
BITS Job was completed
59
Microsoft-Windows-Bits Client/operational
BITS Job was started/resumed
60
Microsoft-Windows-Bits Client/operational
BITS Job was stopped. (Status code defines whether successful or not)
16403
Microsoft Windows Bits Client
BITS Job parameters were defined
1000
Application
Application Error/crash
1001
Application
Application Error reporting
1002
Application
Application Hang
1024
Application
Software Installation
1040
Application
User Initiated Software Installation
1033
Application
Software installed
1034
Application
Windows Installer removed the product
3006
Microsoft-Windows-DNS Client/operational
DNS query was called
3010
Microsoft-Windows-DNS Client/operational
DNS query sent to DNS server
3011
Microsoft-Windows-DNS Client/operational
Received response DNS server
11707
Application
Installation operation completed successfully
11708
Application
Installation failed
11724
Application
Installation completed successfully
1
Microsoft-Windows-Sysmon/Operational
Process Creation
2
Microsoft-Windows-Sysmon/Operational
A process changed a file creation time
3
Microsoft-Windows-Sysmon/Operational
Network connection detected
6
Microsoft-Windows-Sysmon/Operational
Driver Loaded
7
Microsoft-Windows-Sysmon/Operational
Image Loaded
8
Microsoft-Windows-Sysmon/Operational
CreateRemoteThread
10
Microsoft-Windows-Sysmon/Operational
ProcessAccess
11
Microsoft-Windows-Sysmon/Operational
FileCreate
12
Microsoft-Windows-Sysmon/Operational
RegistryEvent (Object create and delete)
1149
Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational
RDP User authentication succeeded
21
Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational
RDP Session logon succeeded
24
Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational
RDP Session has been disconnected
25
Microsoft-Windows-TerminalServices-RemoteConnectionManager/Operational
RDP Session reconnection succeeded
131
RDPCoreTS
RDP connection is first established
106
Task Scheduler
New scheduled task is created
140
Task Scheduler
Scheduled task is updated
141
Task Scheduler
User deleted Task Scheduler task
200
Task Scheduler
Task executed
201
Task Scheduler
Task scheduler successfully completed the task
5857
WMI-Activity Operational
WMI activity is detected
5858
WMI-Activity Operational
WMI error
5859
WMI-Activity Operational
Subscription-based activity
5860
WMI-Activity Operational
Detailed subscription-based activity
5861
WMI-Activity Operational
Permanent subscription activity
Event ID KB: https://system32.eventsentry.com/ and https://www.myeventlog.com/search/browse
File sharing
Windows Admin share (net use)
Security
4648
Source
SMBClient-Security
31001
Source
Security
4624, 4672, 4776, 4768, 4769, 5140, 5145
Destination
Remote login
RDP
Security
4648
Source
RDPClient Operational
1024, 1025, 1026, 1102
Source
Security
4624 (logon type 10 or 12), 4778, 4779
Destination
RDPCoreTS Operational
131, 98, 99
Destination
RemoteConnection Manager Operational
216, 1149
Destination
RemoteConnection Manager Admin
1158
Destination
LocalSession Manager Operational
21, 23, 24, 25, 41
Destination
SSH
Security
4624,4625,4688, 5154
Destination
System
10016
Destination
Remote Execution
Pass-The-Hash-Ticket (WCE)
System
7045, 7036 (WCESERVICE)
Source
Security
4624, 4634
Destination
Security
4776, 4771, 5156
DC
Pass-The-Hash-Ticket (Mimikatz)
Security
4624, 4672, 4634
Destination
Security
4776, 4771, 5156, 4769
DC
PsExec
Security
4648
Source
Security
4624 (Logon type 3 or 2), 4672, 5140
Destination
System
7045, 7036
Destination
Remote Services
Security
4624 (Logon type 3), 4697
Destination
System
7034, 7035, 7036, 7040, 7045
Destination
Scheduled Task
Security
4648
Source
Security
4672, 4624, 4698, 4702, 4699, 4700, 4701
Destination
Task scheduler Operational
106, 140, 141, 200, 201
Destination
WMIC
Security
4648
Source
Security
4624, 4672
Destination
WMI Activity Operational
5857,5860,5861
Destination
WinRM and Powershell
Security
4648
Source
WinRM Operational
6,8,15,16,33
Source
Powershell Operational
40691, 40692, 8193, 8194, 8197
Source
Security
4624, 4672
Destination
Powershell Operational
4103, 4104, 53504
Destination
Powershell
400, 403, 800
Destination
WinRM
91, 168
Destination
SMB
Security
4688,4624,4656,5140,5142,5143,5144,5145
Source
SMB Server Operational
4100,4103,4104,800,4104,40961,40962
Source
DCOM
Security
4624,4662, 4688, 4697, 4698, 4702
Destination
File Transfer
Security
4688
Destination
Microsoft-Windows-PowerShell/ Operational
4103, 4104
Destination
Last updated