Nissrensics: Lykke(h)julet

Challenge Name:

Nissrensics: Lykke(h)julet

Category:

Forensics

Challenge Description:

Det har været en hård dag, tid til at flade ud i sofaen og se Lykke(h)julet. Det er så sjovt at se deltagerne søge efter bogstaver og sammensætte dem til de rigtige ord!

OBS: Samme image som i "Nissrensics: Vandrestien"

Nissrensics: Vandrestien

Compared to earlier challenges, this description seemed vague to me. The references to searching, letters, assembling words, and hjul (wheel) suggest something related to search history, word fragments, or iterative guesses rather than a concrete file or artifact.

Approach

This challenge genuinely stumped me.

Over several days, I exhaustively examined the disk image using both Autopsy and manual tooling, including:

Browser Artifacts

Windows Artifacts

I repeated much of this analysis both on the live filesystem and within the Volume Shadow Copy recovered in Mørkets Dal

Despite all this, nothing obvious surfaced.

The Breakthrough: Recent Documents

Eventually, while reviewing Recent Documents in Autopsy, I noticed an unfamiliar but intriguing entry:

Recent Documents

One artifact stood out:

WordWheelQuery

That name immediately clicked with the challenge title.

What is WordWheelQuery?

WordWheelQuery is a Windows registry artifact that stores search terms entered into Windows Explorer’s search bar.

Every time a user types something into Explorer search, Windows:

This fits the challenge perfectly:

This is not an artifact I’ve ever encountered before, which was also why the title didn’t ring any bells initially.

Extracting the Artifact

Using Autopsy, I extracted the user’s registry hive:

Users/Nisseya/NTUSER.DAT

I then opened it with Eric Zimmermans Registry Explorer

Navigating to:

NTUSER.DAT
└── Software
    └── Microsoft
        └── Windows
            └── CurrentVersion
                └── Explorer
                    └── WordWheelQuery

Finding the flag

Inside WordWheelQuery, the stored search terms revealed a clear pattern of the flag, being typed as search terms:

WordWheelQuery

Flag

NC3{Ord.txthjul.docx}

Reflections and Learnings

This challenge was an excellent, and humbling, way to end the Nissrensics series.

As a final challenge, Lykke(h)julet perfectly reinforces the core lesson of the series: Digital forensics isn’t about finding “the flag”, it’s about understanding how users interact with their systems.