Skip to main content

Process for restoring/booting .tib file

Thread needs solution

Hello all,

 

I have no experience with using Acronis software or managing .tib files so I'll try and be as clear and concise as possible. I tried finding steps on how to do this through the knowledgebase but I was unable to find anything helpful for my situation.

 

I received some .tib backups of a windows host that I need to analyze for suspicious activity. They are currently saved on the C drive of a Windows machine that I'm hoping to restore/boot the images onto for analysis. I have Acronis Cyber Protect Home Office installed on this host I'm using for the analysis. 

 

What I'm having trouble understanding is the process of restoring these images. I created a USB boot drive of Acronis Universal Restore that I'm assuming I'll need to boot/restore these images, but the USB boot drive is not recognizing the existence of these backups. I'm also confused on how the USB boot drive of Universal Restore can restore these .tib files since they're being stored on the C drive of the host I'm trying to restore them onto. Would I have to store them on a separate external drive for Universal Restore to recognize them?

 

If anyone has steps for this process, or an article that can help explain this process, I'd greatly appreciate it. Hopefully this makes some sense. I'll try and answer any questions to the best of my knowledge.

 

Thank you

0 Users found this helpful

Tyler, welcome to these public User Forums.

I received some .tib backups of a windows host that I need to analyze for suspicious activity. They are currently saved on the C drive of a Windows machine that I'm hoping to restore/boot the images onto for analysis. I have Acronis Cyber Protect Home Office installed on this host I'm using for the analysis. 

First question: do you really need to restore these backups and then boot the Windows PC to be able to analyse their contents?

Doing the above carries a lot more considerations such as what was the original computer that the backups were created from?  What hardware did it have, what BIOS boot mode did it use for Windows, what version of Windows etc...

If you can do the analysis by looking at the contents of the backup .tib files, then there is no need to restore them as provided the .tib files are valid, then you should be able to open them in Explorer by double-clicking on the .tib file, then navigate through the contents as you would any other file, including being able to copy & paste anything that catches your interest.

Be careful of restoring these backup files on to an active computer as you could completely overwrite the current Windows OS and render the computer unbootable!

Steve Smith wrote:

Tyler, welcome to these public User Forums.

I received some .tib backups of a windows host that I need to analyze for suspicious activity. They are currently saved on the C drive of a Windows machine that I'm hoping to restore/boot the images onto for analysis. I have Acronis Cyber Protect Home Office installed on this host I'm using for the analysis. 

Hello Steve,

 

Thank you for your reply, you make some valid points that we'll take into consideration.

 

We're tasked with determining which one out of three backups is the one that contains malware attempting to "beacon out". It would require a considerable amount of time going through folders and files individually to determine files and directories that look to be out of place. This is why we thought it would be easier to restore the images on a test machine in an isolated environment to gather that information.

 

We're not too concerned overwriting the OS on the test machine since it can be reimaged to its current state. The specs on the original computer is something I did not consider and I would have to gather more information about since its not readily available to me. Thank you for making that observation.