CMP020L020S Digital Forensics Coursework Portfolio 2 – Forensic Analysis of an Attack

Published: 03 Jun, 2025
Category Coursework Subject Education
University University of Roehampton London (UOR) Module Title CMP020L020S Digital Forensics
Title of Coursework: Coursework Portfolio 2 – Forensic Analysis of an Attack
Count words: 1500 words

Learning Outcomes of CMP020L020S: 

  • LO2: Describe the legal, ethical and professional role of a digital forensic practitioner.
  • LO3: Apply appropriate practices, tools, and techniques in the context of a given investigative scenario.
  • LO4: Analyse and synthesise the outcomes of a digital forensic investigation as a report

CMP020L020S Academic Misconduct: 

“Academic integrity and honesty are fundamental to the academic work you produce at the University of Roehampton. You are expected to complete coursework which is your own and which is referenced appropriately. The university has in place measures to detect academic dishonesty in all its forms. If you are found to be cheating or attempting to gain an unfair advantage over other students in any way, this is considered academic misconduct, and you will be penalised accordingly.”

CMP020L020S Coursework Introduction:

This portfolio is designed to empower you to investigate Registry, memory and file system of an image and engage in hands-on investigation gaining practical experience with tools commonly employed in real-world scenarios. you are strongly advised to:

  • READ THIS COURSEWORK DOCUMENT CAREFULLY!
  • Fully understand the aims and objectives of this coursework. If you are unclear on any aspect of this assignment, please speak to your course instructor as soon as possible.

This portfolio contains 3 components, and your goal is to complete all components as required.

Do You Need help on CMP020L020S Coursework Assignment

Order Non Plagiarized Assignment

CMP020L020S SCENARIO:

You as a cyber security analyst have been alerted to suspicious activity on a Windows virtual machine (VM) within a corporate network. Upon investigation, it is discovered that suspect may have been involved in a security breach. The VM was allegedly used by an insider threat to distribute a suspicious software and potentially tampered with sensitive data from the company’s network. A member of the cyber security team has created a digital forensic image from the VM and you as an analyst must investigate the VM image, focusing on analysing the Windows registry and memory artifacts to identify evidence of a malicious software activity and assess the damage that may have been caused by the software.
Having received forensic images via a chain of custody process (Portfolio Evidence Case), you are required to use digital forensics tools such as FTK Imager, Autopsy and Volatility3 to analyse them, consider the predefined questions and document your investigation. However, you can choose tool of your choice to conduct your analysis.
Your investigative objectives are as follows:

  1. Identify evidence of malicious activity within the Windows Registry and memory.
  2. Analyse the relevant artifacts from the Windows Registry.
  3. Analyse memory to identify running processes, loaded modules.
  4. Assess the damage that can be caused by the software

Investigation process:

  1. Initial Examination: Verify the integrity of the forensic image and memory of the virtual machine to ensure the integrity of the image.
  2. The Windows Registry Analysis: Utilise appropriate tool to examine the Windows registry hives within the VM image.
  3. Memory Analysis: Analyse memory dumps extracted from the VM using an appropriate tool such as Volatility tool.
  4. Please remember that your investigation should follow the best practice guidelines (ACPO) and comply with any best practice requirements for the investigation of digital devices in the UK

CMP020L020S Submission:

Component 1: The Windows Registry Analysis (Maximum 50 marks)

To begin your investigation, utilise a suitable tool like Autopsy to analyse the Windows registry from the image `win10_Portfolio3-disk.vhd`. The following questions are designed to guide you through the investigation process. Review them to identify any suspicious files, describe your approach and methodology, and include supporting notes along with screenshots and/or digital forensic artifacts (e.g., pictures, text documents, files).

1. From which operating system (program name) was the forensic image (win10
Portfolio3-disk.vhd) acquired? What is the computer’s name? What is the source file
containing this information? What is the Path?
2. Who is the owner of this device?
3. What is the Timezone setting.
4. What is the Device ID for the win10_Portfolio3-disk.vhd?
5. Identify the information of network interface(s) with an IP address assigned by DHCP? What is DHCP IP Address?
6. How many user accounts are listed?
7. Who was the last user to login to the PC?
8. Identify what is the account name of the user who mostly uses the computer?
9. Identify when was the last recorded computer shutdown date/time?
10. Which user was logged into the device on 22nd March 2024.
11. Which account(s) were created on 22nd March 2024 and at what time?
12. Investigate user accounts and identify which accounts are administrator group members?
13. How many files are under AtomicRedTeam?
14. What is the Parent MFT Entry Number for the file "ART-attack.ps1"?
15. Open the UserSettings from HKLM\System\ControlSet001\Services\bam .
Which executables files did the BAM record for the user (RID 1001). What is the last
execution date and time?
16. When T1055.exe and T1036.003.exe was created?
17. How many .exe file was executed on 22nd March 2024?
18. How many .dll file was created on 22nd March 2024?
19. How many .bat file was created on 22nd March 2024?
20. Was Notepad opened on 22nd March 2024?
21. What is the name of the malicious file accessed on 22nd March 2024? by whom and at what time?
22. Is there evidence that the SYSMON program was executed on 22nd March 2024?
23. Is there evidence that the AdFind tool was installed and executed on 22nd March 2024?
24. How many times was the command prompt and PowerShell executed on 22nd March 2024?
25. Open C:\Windows\Prefetch
What size was recorded for AtomicService.exe?
26. Investigate C:\Windows\Prefetch path to produce a timeline of suspicious execution events for the following programs:

  • POWERSHELL.exe
  • cmd.exe
  • NET.exe
  • REG.exe
  • SCHTASKS.exe
  • SC.exe
  • ATOMICSERVICE.EXE
  • MAVINJECT.exe
  • NOTEPAD.exe

27. Investigate the Student NTUSER\Software hive to identify path of the AtomicService.exe file that was added to the run keys?
28. Identify what is the name of the suspicious script in the StartUp folder?
29. Investigate HKLM\Software hive and identify which tasks were scheduled to start at Logon and Startup and how many times they were executed?

CMP020L020S Component 2: Memory Analysis (Maximum 35 marks)

For this part of your assessment, you are required to complete the following tasks and to analyse win10-Portfolio3-memory.raw using an appropriate tool such as Volatility to analyse the VM’s memory.

Task 1: Provide a timeline of Execution Events for the following events

  • POWERSHELL.exe
  • Sysmon Program
  • NOTEPAD.exe
  • ATOMICSERVICE.EXE

Task 2: Extract Atomaticservice Dump. Evaluate the strings to identify if there is any additional information.

Task 3: Identifying Process Owners and SIDs for the following:

  • POWERSHELL.exe
  • NOTEPAD.exe
  • ATOMICSERVICE.EXE

CMP020L020S Component 3: Executive summary (Maximum 10 marks)

For this part of your assessment please provide an executive summary of the investigation carried out and rational for the approach taken and highlight other points of significant interest. You are also required to reflect on your investigation and comment on the learning experience and anything you would do differently if conducting the work again.

Achieve Higher Grades CMP020L020S Assignment

Order Non Plagiarized Assignment

Do you need help with your CMP020L020S Digital Forensics Coursework Portfolio 2 – Forensic Analysis of an Attack? Our assignment help here for you! Whether you need someone to do my assignment for me or Coursework Help , our experts are ready to help you in your Assignments. Students can easily pay our experts for professional guidance with their coursework. Contact us today and get the best assignment help services from experienced writers.

Workingment Unique Features

Hire Assignment Helper Today!


MANG6046 Optimisation and Decision Modelling Individual Coursework Brief Sem 01 | UoS

This piece of work will count for 80% of the overall mark for MANG6046. You need to submit a report of your comment on a project and an Excel file (not multiple Excel files) in two separate folders (one is called Individual Coursework_Reports Only; the other is called Individual Coursework_Excel Files.

CTEC3754D Malware Analysis Coursework Brief 2024-25 | DMU

Evaluate malware evasive techniques, e.g., packing, obfuscation, and anti-disassembly. antis and pro-boxing, etc. and how to circumvent them. Investigate, select, and apply real malware through static and dynamic analyses using standard tools and techniques.

CMP7205 Applied Statistics—PG CWK Assignment Brief 2024-25 | BCU

CMP7205 Task: Report your statistical analysis on a reasonably complex dataset(s) in a professional manner, using appropriate probabilistic and/or statistical techniques implemented with modern statistical software.

Managing Customer Experience CW1 Summative Assessment Brief | BPP University

You are required to write a 2500-word report on the customer experience (referred to as CX from now on in this brief) strategy.

Leading Through Digital Change CWK Assessment Brief | BPP

In recent decades, businesses around the world have faced challenges by the persistent stream of disruptive digital innovations (DDI). T

Leading Through Digital Change Formative CW3 Brief - BPP

LTDC CW3 : A digital transformation strategy outlines how a company will utilise digital technology to continually develop novel products, services, processes, and channels of engagement (Pratt, 2023).

FY028 Inquiry Based Learning CW1 Assignment Brief June 2025 | BNU

FY028 Assignment task: For this assignment you will need to investigate the impact of technological trends on customer satisfaction at a small or medium-sized restaurant of your choice.

6020SSL: International Logistics CW1 Assignment Brief | CU

6020SSL: Analyse  and  critically  evaluate  a  range  of  logistics  practices  applied  across  different  industries  and geographical situations.  Examine  the  implications  of  inventory  holding  and replenishment  policy  when  considering  other  logistics functions and business constraints.

CC5067NI Smart Data Discovery Coursework 01 Question Paper Spring 2025 | LMU

Contract cheating (also known as assessment outsourcing, commissioning or ghost writing) is when someone seeks out another party, or an AI generator service, to produce work or buy an essay or assignment.

UMSD9F-15-3 MDGC Coursework Brief | UWE Bristol

UMSD9F-15-3 : To demonstrate your ability to apply concepts from the module to MNEs under domestic and global contexts, to undertake a theoretically informed analysis, and to draw conclusions

Online Assignment Help in UK