@@ -10,6 +10,7 @@ Features:
1010* Auto-Install of MemProcFS, AmcacheParser, AppCompatCacheParser, Elasticsearch, entropy, EvtxECmd, ImportExcel, IPinfo CLI, Kibana, lnk_parser, RECmd, SBECmd, xsv, and YARA
1111* Auto-Update of MemProcFS, AmcacheParser, AppCompatCacheParser, Elasticsearch, entropy, EvtxECmd (incl. Maps), ImportExcel, IPinfo CLI, Kibana, lnk_parser, RECmd, SBECmd, xsv, and YARA
1212* Update-Info when there's a new version of ClamAV or a new Dokany File System Library Bundle available
13+ * Pagefile Support
1314* OS Fingerprinting
1415* Multi-Threaded scan w/ ClamAV for Windows
1516* Collection of infected files detected by ClamAV for further analysis (PW: infected)
@@ -19,14 +20,18 @@ Features:
1920* Checking for Suspicious Port Numbers
2021* Process Tree (TreeView) including complete Process Call Chain (Special thanks to [ Dominik Schmidt] ( https://github.com/DaFuqs ) )
2122* Checking Processes for Unusual Parent-Child Relationships and Number of Instances
23+ * Checking Processes for Unusual User Context
2224* Checking for Process Path Masquerading and Process Name Masquerading (Damerau Levenshtein Distance)
2325* Web Browser History (Google Chrome, Microsoft Edge and Firefox)
24- * Extracting Windows Event Log Files and processing w/ EvtxECmd → ; Timeline Explorer ([ EZTools] ( https://ericzimmerman.github.io/ ) by Eric Zimmerman)
26+ * Extracting Windows Event Log Files and processing w/ EvtxECmd → ; Timeline Explorer ([ EZTools] ( https://ericzimmerman.github.io/ ) by Eric Zimmerman)
27+ * Event Log Overview
28+ * Processing Windows Event Logs w/ Zircolite - A standalone SIGMA-based detection tool for EVTX
2529* Analyzing extracted Amcache.hve w/ Amcacheparser ([ EZTools] ( https://ericzimmerman.github.io/ ) by Eric Zimmerman)
2630* Analyzing Application Compatibility Cache aka ShimCache w/ AppCompatcacheParser ([ EZTools] ( https://ericzimmerman.github.io/ ) by Eric Zimmerman)
2731* Analyzing Syscache w/ RECmd ([ EZTools] ( https://ericzimmerman.github.io/ ) by Eric Zimmerman)
2832* Analyzing UserAssist Artifacts w/ RECmd ([ EZTools] ( https://ericzimmerman.github.io/ ) by Eric Zimmerman)
2933* Analyzing ShellBags Artifacts w/ RECmd ([ EZTools] ( https://ericzimmerman.github.io/ ) by Eric Zimmerman)
34+ * Simple Prefetch View (based on Forensic Timeline)
3035* Analyzing Auto-Start Extensibility Points (ASEPs) w/ RECmd ([ EZTools] ( https://ericzimmerman.github.io/ ) by Eric Zimmerman)
3136* Analyzing RecentDocs, Office Trusted Document w/ RECmd ([ EZTools] ( https://ericzimmerman.github.io/ ) by Eric Zimmerman)
3237* Analyzing Registry w/ Kroll RECmd Batch File ([ Kroll Batch File] ( https://github.com/EricZimmerman/RECmd/projects/1 ) by Andrew Rathbun)
@@ -36,83 +41,90 @@ Features:
3641* Integration of PowerShell module [ ImportExcel] ( https://github.com/dfinke/ImportExcel ) by Doug Finke
3742* CSV output data for analysis w/ Timeline Explorer (e.g. timeline-reverse.csv, findevil.csv, web.csv)
3843* Collecting Evidence Files (Secure Archive Container → ; PW: MemProcFS)
44+ * and much more
3945
4046## Download
4147Download the latest version of ** MemProcFS-Analyzer** from the [ Releases] ( https://github.com/evild3ad/MemProcFS-Analyzer/releases ) section.
4248
4349## Usage
4450Launch Windows PowerShell (or Windows PowerShell ISE or Visual Studio Code w/ PSVersion: 5.1) as Administrator and open/run MemProcFS-Analyzer.ps1.
4551
46- ![ File-Browser] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/01.png )
47- ** Fig 1:** Select your Raw Physical Memory Dump (File Browser )
52+ ![ File-Browser] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432 /Screenshots/01.png )
53+ ** Fig 1:** Select your Raw Physical Memory Dump and select your pagefile.sys (Optional )
4854
49- ![ Auto-Install] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/02.png )
55+ ![ Auto-Install] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432 /Screenshots/02.png )
5056** Fig 2:** MemProcFS-Analyzer auto-installs dependencies (First Run)
5157
52- ![ Microsoft-Internet-Symbol-Store] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/03.png )
58+ ![ Microsoft-Internet-Symbol-Store] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432 /Screenshots/03.png )
5359** Fig 3:** Accept Terms of Use (First Run)
5460
55- ![ MemProcFS] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/04.png )
61+ ![ MemProcFS] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432 /Screenshots/04.png )
5662** Fig 4:** If you find MemProcFS useful, please become a sponsor at: https://github.com/sponsors/ufrisk
5763
58- ![ Mounted] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/05.png )
64+ ![ Mounted] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432 /Screenshots/05.png )
5965** Fig 5:** You can investigate the mounted memory dump by exploring drive letter X:
6066
61- ![ Auto-Update] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/06.png )
67+ ![ Auto-Update] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432 /Screenshots/06.png )
6268** Fig 6:** MemProcFS-Analyzer checks for updates (Second Run)
6369
6470Note: It's recommended to uncomment/disable the "Updater" function after installation. Check out the "Main" in the bottom of the script.
6571
66- ![ ClamAV-Scan ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/07.png )
72+ ![ FindEvil ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432 /Screenshots/07.png )
6773** Fig 7:** FindEvil feature and additional analytics
6874
69- ![ Processes] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/08.png )
75+ ![ Processes] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432 /Screenshots/08.png )
7076** Fig 8:** Processes
7177
72- ![ RunningAndExited] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/09.png )
78+ ![ RunningAndExited] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432 /Screenshots/09.png )
7379** Fig 9:** Running and Exited Processes
7480
75- ![ ProcessTree] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/10.png )
81+ ![ ProcessTree] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432 /Screenshots/10.png )
7682** Fig 10:** Process Tree (GUI)
7783
78- ![ ProcessTreeSearch] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/11.png )
84+ ![ ProcessTreeSearch] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432 /Screenshots/11.png )
7985** Fig 11:** Checking Process Tree (to find anomalies)
8086
81- ![ ProcessTreeAlerts] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/12.png )
87+ ![ ProcessTreeAlerts] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432 /Screenshots/12.png )
8288** Fig 12:** Process Tree: Alert Messages w/ Process Call Chain
8389
84- ![ IPinfo ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/13.png )
85- ** Fig 13:** GeoIP w/ IPinfo.io
90+ ![ PropertiesView ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432 /Screenshots/13.png )
91+ ** Fig 13:** Process Tree: Properties View &# 8594 ; Double-Click on process or alert message
8692
87- ![ MapReport ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/14.png )
88- ** Fig 14:** Map IPs w/ IPinfo.io
93+ ![ IPinfo ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432 /Screenshots/14.png )
94+ ** Fig 14:** GeoIP w/ IPinfo.io
8995
90- ![ EVTX ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/15.png )
91- ** Fig 15:** Processing Windows Event Logs (EVTX)
96+ ![ MapReport ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432 /Screenshots/15.png )
97+ ** Fig 15:** Map IPs w/ IPinfo.io
9298
93- ![ Amcache ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/16.png )
94- ** Fig 16:** Processing extracted Amcache.hve &# 8594 ; XLSX
99+ ![ EVTX ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432 /Screenshots/16.png )
100+ ** Fig 16:** Processing Windows Event Logs (EVTX)
95101
96- ![ ShimCache ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/17.png )
97- ** Fig 17:** Processing ShimCache &# 8594 ; XLSX
102+ ![ Zircolite ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432 /Screenshots/17.png )
103+ ** Fig 17:** Zircolite - A standalone SIGMA-based detection tool for EVTX (Mini-GUI)
98104
99- ![ Timeline-Explorer ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/18.png )
100- ** Fig 18:** Analyze CSV output w/ Timeline Explorer (TLE)
105+ ![ Amcache ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432 /Screenshots/18.png )
106+ ** Fig 18:** Processing extracted Amcache.hve &# 8594 ; XLSX
101107
102- ![ ELK-Import ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/19.png )
103- ** Fig 19:** ELK Import
108+ ![ ShimCache ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432 /Screenshots/19.png )
109+ ** Fig 19:** Processing ShimCache &# 8594 ; XLSX
104110
105- ![ ELK- Timeline] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/20.png )
106- ** Fig 20:** Happy ELK Hunting!
111+ ![ Timeline-Explorer ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432 /Screenshots/20.png )
112+ ** Fig 20:** Analyze CSV output w/ Timeline Explorer (TLE)
107113
108- ![ Secure-Archive-Container ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/21.png )
109- ** Fig 21:** Multi-Threaded ClamAV Scan to help you finding evil! ;-)
114+ ![ ELK-Import ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432 /Screenshots/21.png )
115+ ** Fig 21:** ELK Import
110116
111- ![ Message-Box ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c /Screenshots/22.png )
112- ** Fig 22:** Press ** OK ** to shutdown MemProcFS and Elastisearch/Kibana
117+ ![ ELK-Timeline ] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432 /Screenshots/22.png )
118+ ** Fig 22:** Happy ELK Hunting!
113119
114- ![ Output] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/23.png )
115- ** Fig 23:** Secure Archive Container (PW: MemProcFS)
120+ ![ Secure-Archive-Container] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432/Screenshots/23.png )
121+ ** Fig 23:** Multi-Threaded ClamAV Scan to help you finding evil! ;-)
122+
123+ ![ Message-Box] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432/Screenshots/24.png )
124+ ** Fig 24:** Press ** OK** to shutdown MemProcFS and Elastisearch/Kibana
125+
126+ ![ Output] ( https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432/Screenshots/25.png )
127+ ** Fig 25:** Secure Archive Container (PW: MemProcFS)
116128
117129## Introduction MemProcFS and Memory Forensics
118130Check out [ Super Easy Memory Forensics] ( https://www.slideshare.net/IIJ_PR/super-easy-memory-forensics ) by [ Hiroshi Suzuki] ( https://twitter.com/herosi_t ) and [ Hisao Nashiwa] ( https://twitter.com/unk0unk0 ) .
@@ -175,7 +187,7 @@ https://www.clamav.net/downloads#otherversions
175187Dokany Library Bundle v2.0.6.1000 (2022-10-02)
176188https://github.com/dokan-dev/dokany/releases/latest → ; DokanSetup.exe
177189
178- Elasticsearch 8.4.3 (2022-10-05 )
190+ Elasticsearch 8.5.1 (2022-11-15 )
179191https://www.elastic.co/downloads/elasticsearch
180192
181193entropy v1.0 (2022-02-04)
@@ -184,19 +196,19 @@ https://github.com/merces/entropy
184196EvtxECmd v1.0.0.0 (.NET 6)
185197https://ericzimmerman.github.io/
186198
187- ImportExcel 7 .8.1 (2022-09-03 )
199+ ImportExcel v7 .8.2 (2022-10-22 )
188200https://github.com/dfinke/ImportExcel
189201
190202Ipinfo CLI 2.10.0 (2022-09-28)
191203https://github.com/ipinfo/cli
192204
193- Kibana 8.4.3 (2022-10-05 )
205+ Kibana 8.5.1 (2022-11-15 )
194206https://www.elastic.co/downloads/kibana
195207
196208lnk_parser v0.2.0 (2022-08-10)
197209https://github.com/AbdulRhmanAlfaifi/lnk_parser
198210
199- MemProcFS v5.1.1 - The Memory Process File System (2022-09-26 )
211+ MemProcFS v5.2.0 - The Memory Process File System (2022-11-16 )
200212https://github.com/ufrisk/MemProcFS
201213
202214RECmd v2.0.0.0 (.NET 6)
@@ -211,6 +223,9 @@ https://github.com/BurntSushi/xsv
211223YARA v4.2.3 (2022-08-09)
212224https://virustotal.github.io/yara/
213225
226+ Zircolite v2.9.7 (2022-10-08)
227+ https://github.com/wagga40/Zircolite
228+
214229## Links
215230[ MemProcFS] ( https://github.com/ufrisk/MemProcFS )
216231[ Demo of MemProcFS with Elasticsearch] ( https://www.youtube.com/watch?v=JcIlowlrvyI )
0 commit comments