🖥️
Windows DFIR
  • Introduction
  • Windows Artifacts
    • Windows Quick Tips
      • Windows Command Line
      • Workstation File/Folder Locations
      • Server File/Folder Locations
    • Account Usage
      • Authentications SAM Artifacts
        • Last Login
        • Last Failed Login
        • Last Password Change
      • Authentications (Windows Event Log)
        • Logon ID
      • Group Membership
        • Event ID: 4798
        • Event ID: 4799
      • RDP
        • Source System Artifacts - Quick Reference
        • Destination System Artifacts - Quick Reference
      • SSH
      • Rouge Local Accounts
      • CrowdStrike Searches
        • Event Name - UserLogon
        • Event Name - UserLogonFailed
        • Event Name - UserLogonFailed2
        • Event Name - SsoApplicationAccess
    • Browser Usage
      • History & Downloads
        • Viewing History Files - DB Browser
        • Transition Types
      • Auto-Complete Data
      • Bookmarks
      • Browser Preferences
      • Cache
      • Cookies
      • Extensions
      • Super Cookies (HTML5 Web Storage)
      • Media History
      • Private Browsing
      • Session Restore
      • Stored Credentials
      • Suggested/Frequent Sites
      • DB Browser Queries
        • Firefox
        • Chrome
        • Media History
      • PowerShell Scripts
        • Browser Extension Finder
        • Browser History Finder
    • Processes
      • at.exe
      • explorer.exe
      • lsass.exe
      • lsaiso.exe
      • PuTTy.exe
        • X11 Forwarding
      • runtimebroker.exe
      • services.exe
      • smss.exe
      • System
      • svchost.exe
        • Services
      • winlogon.exe
      • wininit.exe
    • Cloud Storage
    • Deleted File or File Knowledge
      • WordWheelQuery (Win 7+)
      • ACMRU (Win XP)
      • Internet Explorer file:///
      • Last Visited MRU
      • Thumbs.db (Win XP)
      • Thumbcache
      • Recycle Bin
      • User Typed Paths
      • Windows Search Database
    • File Download
      • Zone.Identifer
      • Open/Save Most Recently Used (MRU)
      • Email
      • Drive By Downloads
        • Malvertising
      • Web Browsing
        • Cache Files
      • CrowdStrike Searches
        • MoTW
    • Folder/File Opening/Creation
      • Recent Files
      • Office Recent Files
      • Shell Bags
      • .lnk Files
      • Jump Lists
        • AppIDs
      • Prefetch
      • Index.dat file://
      • PowerShell Scripts
        • .lnk Files
    • Persistence
      • Registry
        • NTUSER.DAT & HKU\SID
        • Run and Run Once
        • Shell Folders and UserInit Key
        • Services
        • Logon Scripts
        • Office Add-ins
        • Winlogon Shell
        • Image File Execution Options (IFEO)
        • AppInit_DLLs
        • Scheduled Tasks
      • Scheduled Tasks
        • Scheduled Task Destination System Artifacts
        • Scheduled Task Source System Artifacts
      • Startup
      • Tool: AutoRuns
      • Accounts
      • WMI Event Consumers
        • WMI: Source System Artifacts
        • WMI: Destination System Artifacts
        • WMI: PowerShell Analysis
      • PowerShell Scripts
        • Startup Programs
      • CrowdStrike Searches
        • Files Written to Startup Folder
        • Files Written to Startup Folder from the Internet
        • Local Account Creation/Deletion
        • Azure Account Creation/Deletion
        • Scheduled Tasks
    • Physical Location
      • Time zone
      • Wireless SSID
      • Network History (Vista/Win7–11)
      • Cookies
      • Browser Search Terms
    • Program Execution
      • Prefetch
        • Decoding Prefetch Files with Eric Zimmerman's PECmd Tool
      • BAM/DAM
      • CapabilityAccessManager
      • UserAssist
      • Last Visited MRU
      • RunMRU
      • MUI Cache
      • ShimCache
      • Amcache
      • Jump Lists
    • Shadow Copies
      • VSC Permissions
      • Event ID 8193: Volume Shadow Copy Service Error
    • USB Usage
      • Key Identification
      • Drive Letter and Volume Name
      • Connection Timestamps
      • User
      • Volume Name
      • Plug & Play Event Log
    • Windows Services
      • DoSvc (Delivery Optimization)
    • System Information
    • Event IDs
      • Authentication / Account
        • 4624 - Authentication Success
          • Logon Types
        • 4625 - Authentication Failure
          • SubStatus Codes
        • 4634 - Account Logoff
        • 4648 - Explicit Credentials Success
        • 4672 - Special Privileges
        • 4720 - Account Creation
        • 4722 - Account Enabled
        • 4732 - Addition to Local Group
        • 4738 - Account Changed
        • 4776 - Kerberos Authentication Attempt
          • Substatus Codes
        • 4771 - Kerberos Failure
        • 4768
      • File System
        • 1006
        • 4688 - Process Created
        • 4663
        • 4656
        • 6416
        • 20001
        • 20003
  • Windows DFIR & MITTR
    • Initial Access
      • Content Injection
      • Drive-by Compromise
        • Watering Hole Attack
        • Microsoft Files (Payload Execution)
        • Exploit Delivery
        • Viewing Browser History Files
      • Phishing
    • Execution
    • Persistence
    • Privilege Escalation
    • Defense Evasion
    • Credential Access
      • Logon ID
    • Discovery
    • Lateral Movement
    • Collection
    • Command and Control
    • Exfiltration
    • Impact
  • SOC Related
    • Cached Credentials
    • Domain Controller Password Spraying
Powered by GitBook
On this page
  • Overview
  • Components Managed by the System Process
  • Forensic and Technical Significance

Was this helpful?

  1. Windows Artifacts
  2. Processes

System

The System Process, often represented as System or system.exe in various system monitoring tools, is a critical component of the Windows operating system. Unlike most processes, the System Process does not originate from an executable image on disk; therefore, it doesn't have an image path. It is a fundamental process responsible for managing kernel-mode operations and is essential for the Windows kernel to function correctly.

Overview

  • Image Path: Not applicable, as the System Process is not generated from an executable image.

  • Parent Process: None. The System Process is a core process initiated by the operating system at boot time; it does not have a parent process in the traditional sense.

  • Number of Instances: One. There is only a single instance of the System Process running on a Windows system, reflecting its unique and integral role in system operations.

  • User Account: Local System. The process runs with Local System privileges, the highest level of privilege on a Windows system.

  • Start Time: At boot time. The System Process is one of the first processes to start when Windows boots up, underlining its importance in the overall system architecture.

  • Command Line Example: Not applicable (system is not launched from an executable path but is a fundamental part of the Windows kernel).

    • The System Process does not have a command line as it is a core part of the operating system's kernel architecture.

  • Description: The System Process is responsible for managing most kernel-mode threads. Kernel-mode threads are low-level operations closely tied to the core functions of the operating system. These operations include managing hardware interactions, system services, and the execution of system-level instructions.

Components Managed by the System Process

  • Kernel-Mode Drivers (.sys files): The System Process oversees the execution of drivers, which are essential for hardware components to communicate effectively with the operating system.

  • Important System DLLs: Dynamic Link Libraries (DLLs) necessary for the functioning of the system also run under the System Process. These DLLs provide a variety of system-level functionalities and are invoked by applications and other system processes.

  • Kernel Executable (ntoskrnl.exe): Perhaps the most critical component under the System Process is the kernel executable, ntoskrnl.exe. This executable contains the kernel and executive layers of the Windows NT kernel space, handling processes and memory management, scheduling, and hardware virtualization.

Forensic and Technical Significance

The System Process is a focal point for understanding low-level system activity and diagnosing system health and performance issues. In digital forensics, analyzing the behavior and the threads running under the System Process can provide insights into system operations, potential rootkits, or other kernel-mode malware that operate at a low level to avoid detection. Given its critical role and high privilege level, any anomalies associated with the System Process warrant careful investigation, as they may indicate sophisticated attacks or system integrity issues.

Previoussmss.exeNextsvchost.exe

Last updated 1 year ago

Was this helpful?