USN Journal
Overview
Evidence: USN Journal as CSV Description: Parse USN Journal Entries in CSV Format Category: DiskFilesystem Platform: windows Short Name: usncsv Is Parsed: Yes Sent to Investigation Hub: Yes Collect File(s): No
Background
The Update Sequence Number (USN) Journal is an NTFS feature that logs all changes made to files and directories on a volume. Every file system operation (create, delete, modify, rename) generates a USN record.
The USN Journal provides a comprehensive timeline of file system activity and can track changes that occurred before the system acquisition. It's particularly valuable for detecting file manipulation, identifying deleted files, and reconstructing attacker activity.
Data Collected
This collector gathers structured data about usn journal as csv.
USN Journal as CSV Data
FileName
File or directory name
document.docx
UpdateSequenceNumber
Unique sequence number
123456789
UpdateDateTime
When the change occurred
2023-10-15T14:30:00Z
UpdateReasonFlags
Type of change
FILE_CREATE+DATA_EXTEND
MftFileReference
MFT entry number
12345
MftFileReferenceSequence
MFT sequence number
1
MftParentFileReference
Parent directory MFT entry
5
MftParentFileReferenceSequence
Parent sequence number
1
FileAttributeFlags
File attributes
READ_ONLY+ARCHIVE
UpdateSourceFlags
Source of update
DATA_MANAGEMENT
Collection Method
This collector:
Reads the USN Journal from all fixed NTFS drives
Parses each USN record using
NtfsEnumerateUSNEntriesExports records to CSV format
Converts reason flags, source flags, and attribute flags to human-readable format
Update Reason Flags include: DATA_OVERWRITE, DATA_EXTEND, FILE_CREATE, FILE_DELETE, RENAME_OLD_NAME, RENAME_NEW_NAME, SECURITY_CHANGE, and many others.
Forensic Value
The USN Journal provides unparalleled visibility into file system activity and is essential for timeline reconstruction. Investigators use this data to reconstruct complete file activity timelines, detect mass file deletions or encryption (ransomware), identify file renaming operations, track file modifications by timestamp, detect data staging for exfiltration, identify temporary file usage, and correlate file system changes with other events.
Last updated
Was this helpful?

