top of page

Acquiring Forensic Artifacts with Falcon Uploader and Amazon S3 Buckets

Updated: Jan 2


Often Incident Response Analysts struggle to extract forensic artifacts from specific systems during an incident investigation. Sometimes the target systems have restricted access to the Internet, so it's impossible to send data over protocols like SSH or SFTP. In other cases, the output of the tools used to collect the evidence is very large, so it becomes slow to upload this data to a common file storage solution like OneDrive or Box. The analysts could also perform faster investigations if they can surgically extract only specific artifacts from the compromised device instead of capturing hundreds of other artifacts that are not relevant or full disk images.

These challenges motivated us to develop a method for the extraction of specific forensic artifacts from Windows systems leveraging our own tool developed for this purpose: the Falcon Uploader. This method easily extracts forensic artifacts and stores them securely in encrypted AWS S3 buckets. The IR analysts can afterward download the artifacts from S3 and perform the analysis on their own workstations. The Falcon Uploader tool is free for non-commercial purposes and can be downloaded from the link below.

Create an AWS S3 bucket

In this section, we will cover the steps to create an S3 bucket that can be used to store forensic artifacts. It is essential that the data that will be uploaded to this bucket will be encrypted by default with server-side encryption. This will protect the data at rest to ensure its confidentiality.

1. Create a new bucket

On the AWS S3 console click on the button "Create bucket"

2. Give a name to the bucket

Under the General configuration section give a name to the bucket and select the region where the bucket should be created.

3. Data encryption

In the default encryption section, enable the option "Server-side encryption" and choose your preferred type of encryption.

4. Finalize the bucket creation

Scroll to the bottom of the page and click on the "Create bucket" button.

The new bucket should be now available in the list of buckets.

Prepare the AWS service account

In order to upload data to the AWS S3 bucket created previously, we must first create a dedicated service account that can be used for this purpose. This account must be restricted to perform only specific operations on the target bucket to prevent data breach incidents in case its credentials will be accidentally leaked by a person performing the data upload on behalf of the IR analyst.

1. Add a new user in the IAM Management Console

Open the IAM Management Console in your AWS subscription, click on "Users" under Access Management and click on the button "Add users"

2. Add user details and access type

Give a name to this user and select only the access key in the access type section.

3. Set permissions

Do not select anything on this screen. We will add the permissions later. Click on "Next: Tags"

4. Add tags

Add any custom tags that you may want to use on this screen. This is optional.

Click on "Next: Review" to continue.

5. Create the user

On this screen, you can ignore the warning about the user's permission. We will add the permissions in the next step.

Click on "Create user" to continue.

6. Download the user's security credentials

Click on "Download .csv" button to download the security credentials for the new user. You will need these credentials to perform the upload of the evidence to S3. It's highly recommended to store these credentials safely in a password manager and afterward delete the .csv file from the system.

Click on "Close" to exit the screen.

The new user should be now visible under "IAM/Users"

7. Access the details of the new user account

Under "IAM/Users" click on the name of the new user created to open the account details.

8. Add permissions

Click on "Add permissions" in the Permissions tab.

9. Create a new policy

Click on "Attach existing policies directly" and afterward on the button "Create policy"

In the Create policy editor screen click on the "JSON" tab.

Delete the default JSON content and insert the JSON template below. Replace the string "<BUCKET NAME>" with the name of the bucket that was created previously.


"Version": "2012-10-17",

"Statement": [


"Sid": "ListObjectsInBucket",

"Effect": "Allow",

"Action": [



"Resource": [

"arn:aws:s3:::<BUCKET NAME>"




"Sid": "AllObjectActions",

"Effect": "Allow",

"Action": "s3:*Object",

"Resource": [

"arn:aws:s3:::<BUCKET NAME>/*"





Click on "Next: tags"

10. Name your new policy

Create a name for your new policy and click on the "Create policy" button to save it.

11. Attach the new policy to the service account created previously

Repeat steps 7 and 8 to access the account details of the newly created user. Filter the existing policies to find the custom policy created in the previous step. Select the checkbox next to the policy name and click on "Next: Review".

Click on "Add permissions" on the next screen.

The new policy should be visible now on the user summary page under the "Permissions policies" tab.

Use the Falcon Uploader tool

Once the AWS service account and the bucket have been created, then the Falcon Uploader tool can be used for the acquisition of the forensic artifacts needed for the incident investigation. The tool can be downloaded from its GitHub repository below:

The tool has 32 and 64 bit versions. Choose the correct version for your target systems. The following parameters are required for the execution of the tool:

Source Directory: It's the Windows directory that contains the forensic artifacts that need to be acquired - e.g. C:\Windows\Prefetch

Collection Name: The identifier (tag) of the collection that will be performed - e.g. Prefetch

File Name Pattern: A string pattern that matches the files that are the target of the acquisition - e.g. *.pf

Bucket Name: This is the name of the AWS S3 bucket that was created for the acquisition

AWS Key ID: This is the key ID from the security credentials of the AWS service account that will be used for the acquisition

AWS Secret Access Key: This is the secret key from the security credentials of the AWS service account that will be used for the acquisition

Copy the Falcon Uploader tool to the target system. Then open a command prompt and execute the tool with the command line below:


Note: This software was written in Python and compiled as a Windows executable. Some Antivirus products could flag Python executables as malicious and block their execution. If you have issues running this tool, then try to create an exclusion for it in your Antivirus console.

The tool will print its progress to the console.

After the tool has finished all the operations we can verify that the files have been uploaded to S3 correctly. The tool will organize the evidence with the following folder structure: "Hostname/Collection Name/Artifacts"

The tool also uploads all the SHA1 file hashes calculated for each original artifact on the target system to the collection folder.

After the artifacts have been successfully uploaded to S3, they can be downloaded to the forensic workstation of the IR analyst with a tool like Cyberduck.

Final thoughts

The combination of a tool like Falcon Uploader and AWS S3 buckets can greatly improve the speed of IR investigations and reduce the time to respond to cyber threats. Unfortunately, this is sometimes not enough, so don't hesitate to contact us through our web contact form or write us directly at if you need further help with complex investigations involving hundreds, or thousands of devices. We have the tools and resources to investigate, hunt for threats, and respond at any scale.

258 views0 comments

Recent Posts

See All


bottom of page