DMG File Opened
Overview
Evidence: DMG File Opened Description: Collects previously opened DMG files. Category: DiskFilesystem Platform: macos Short Name: dmgf Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No
Background
DMG (disk image) files are commonly used on macOS for software distribution and data storage. When a DMG file is opened, macOS stores extended attributes (xattrs) including fsck information and recent checksums on the file. These attributes provide forensic evidence of DMG file access, helping investigators identify software installations, data transfers, or malicious payloads delivered via DMG files.
Data Collected
This collector gathers structured data about dmg file opened.
DMG File Opened Data
ID
ID
123
Path
Path
Example value
Username
Username
Example value
Fsck
Fsck
Example value
RecentCksumDate
Recent Cksum Date
2023-10-15 14:30:25+03:00
RecentCksumType
Recent Cksum Type
Example value
RecentCksum
Recent Cksum
Example value
Collection Method
This collector scans the file system for DMG files and extracts extended attributes (com.apple.diskimages.fsck and com.apple.diskimages.recentcksum) to identify which DMG files were previously opened. It parses the recentcksum attribute to extract timestamps, checksum types, and checksum values, providing a timeline of DMG file access.
Forensic Value
DMG file access history is valuable for identifying software installations, detecting unauthorized application deployments, tracking malware delivery mechanisms, and establishing file access timelines. The checksum information can be used to verify file integrity and correlate DMG files across multiple systems. This evidence is particularly useful for detecting supply chain attacks, insider threats, and unauthorized software installations.
Last updated
Was this helpful?

