Skip to content

Commit 52ad013

Browse files
authored
Update README.md
1 parent e081cfb commit 52ad013

File tree

1 file changed

+55
-40
lines changed

1 file changed

+55
-40
lines changed

README.md

Lines changed: 55 additions & 40 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@ Features:
1010
* Auto-Install of MemProcFS, AmcacheParser, AppCompatCacheParser, Elasticsearch, entropy, EvtxECmd, ImportExcel, IPinfo CLI, Kibana, lnk_parser, RECmd, SBECmd, xsv, and YARA
1111
* Auto-Update of MemProcFS, AmcacheParser, AppCompatCacheParser, Elasticsearch, entropy, EvtxECmd (incl. Maps), ImportExcel, IPinfo CLI, Kibana, lnk_parser, RECmd, SBECmd, xsv, and YARA
1212
* Update-Info when there's a new version of ClamAV or a new Dokany File System Library Bundle available
13+
* Pagefile Support
1314
* OS Fingerprinting
1415
* Multi-Threaded scan w/ ClamAV for Windows
1516
* Collection of infected files detected by ClamAV for further analysis (PW: infected)
@@ -19,14 +20,18 @@ Features:
1920
* Checking for Suspicious Port Numbers
2021
* Process Tree (TreeView) including complete Process Call Chain (Special thanks to [Dominik Schmidt](https://github.com/DaFuqs))
2122
* Checking Processes for Unusual Parent-Child Relationships and Number of Instances
23+
* Checking Processes for Unusual User Context
2224
* Checking for Process Path Masquerading and Process Name Masquerading (Damerau Levenshtein Distance)
2325
* Web Browser History (Google Chrome, Microsoft Edge and Firefox)
24-
* Extracting Windows Event Log Files and processing w/ EvtxECmd → Timeline Explorer ([EZTools](https://ericzimmerman.github.io/) by Eric Zimmerman)
26+
* Extracting Windows Event Log Files and processing w/ EvtxECmd → Timeline Explorer ([EZTools](https://ericzimmerman.github.io/) by Eric Zimmerman)
27+
* Event Log Overview
28+
* Processing Windows Event Logs w/ Zircolite - A standalone SIGMA-based detection tool for EVTX
2529
* Analyzing extracted Amcache.hve w/ Amcacheparser ([EZTools](https://ericzimmerman.github.io/) by Eric Zimmerman)
2630
* Analyzing Application Compatibility Cache aka ShimCache w/ AppCompatcacheParser ([EZTools](https://ericzimmerman.github.io/) by Eric Zimmerman)
2731
* Analyzing Syscache w/ RECmd ([EZTools](https://ericzimmerman.github.io/) by Eric Zimmerman)
2832
* Analyzing UserAssist Artifacts w/ RECmd ([EZTools](https://ericzimmerman.github.io/) by Eric Zimmerman)
2933
* Analyzing ShellBags Artifacts w/ RECmd ([EZTools](https://ericzimmerman.github.io/) by Eric Zimmerman)
34+
* Simple Prefetch View (based on Forensic Timeline)
3035
* Analyzing Auto-Start Extensibility Points (ASEPs) w/ RECmd ([EZTools](https://ericzimmerman.github.io/) by Eric Zimmerman)
3136
* Analyzing RecentDocs, Office Trusted Document w/ RECmd ([EZTools](https://ericzimmerman.github.io/) by Eric Zimmerman)
3237
* Analyzing Registry w/ Kroll RECmd Batch File ([Kroll Batch File](https://github.com/EricZimmerman/RECmd/projects/1) by Andrew Rathbun)
@@ -36,83 +41,90 @@ Features:
3641
* Integration of PowerShell module [ImportExcel](https://github.com/dfinke/ImportExcel) by Doug Finke
3742
* CSV output data for analysis w/ Timeline Explorer (e.g. timeline-reverse.csv, findevil.csv, web.csv)
3843
* Collecting Evidence Files (Secure Archive Container → PW: MemProcFS)
44+
* and much more
3945

4046
## Download
4147
Download the latest version of **MemProcFS-Analyzer** from the [Releases](https://github.com/evild3ad/MemProcFS-Analyzer/releases) section.
4248

4349
## Usage
4450
Launch Windows PowerShell (or Windows PowerShell ISE or Visual Studio Code w/ PSVersion: 5.1) as Administrator and open/run MemProcFS-Analyzer.ps1.
4551

46-
![File-Browser](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/01.png)
47-
**Fig 1:** Select your Raw Physical Memory Dump (File Browser)
52+
![File-Browser](https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432/Screenshots/01.png)
53+
**Fig 1:** Select your Raw Physical Memory Dump and select your pagefile.sys (Optional)
4854

49-
![Auto-Install](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/02.png)
55+
![Auto-Install](https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432/Screenshots/02.png)
5056
**Fig 2:** MemProcFS-Analyzer auto-installs dependencies (First Run)
5157

52-
![Microsoft-Internet-Symbol-Store](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/03.png)
58+
![Microsoft-Internet-Symbol-Store](https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432/Screenshots/03.png)
5359
**Fig 3:** Accept Terms of Use (First Run)
5460

55-
![MemProcFS](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/04.png)
61+
![MemProcFS](https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432/Screenshots/04.png)
5662
**Fig 4:** If you find MemProcFS useful, please become a sponsor at: https://github.com/sponsors/ufrisk
5763

58-
![Mounted](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/05.png)
64+
![Mounted](https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432/Screenshots/05.png)
5965
**Fig 5:** You can investigate the mounted memory dump by exploring drive letter X:
6066

61-
![Auto-Update](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/06.png)
67+
![Auto-Update](https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432/Screenshots/06.png)
6268
**Fig 6:** MemProcFS-Analyzer checks for updates (Second Run)
6369

6470
Note: It's recommended to uncomment/disable the "Updater" function after installation. Check out the "Main" in the bottom of the script.
6571

66-
![ClamAV-Scan](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/07.png)
72+
![FindEvil](https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432/Screenshots/07.png)
6773
**Fig 7:** FindEvil feature and additional analytics
6874

69-
![Processes](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/08.png)
75+
![Processes](https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432/Screenshots/08.png)
7076
**Fig 8:** Processes
7177

72-
![RunningAndExited](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/09.png)
78+
![RunningAndExited](https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432/Screenshots/09.png)
7379
**Fig 9:** Running and Exited Processes
7480

75-
![ProcessTree](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/10.png)
81+
![ProcessTree](https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432/Screenshots/10.png)
7682
**Fig 10:** Process Tree (GUI)
7783

78-
![ProcessTreeSearch](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/11.png)
84+
![ProcessTreeSearch](https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432/Screenshots/11.png)
7985
**Fig 11:** Checking Process Tree (to find anomalies)
8086

81-
![ProcessTreeAlerts](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/12.png)
87+
![ProcessTreeAlerts](https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432/Screenshots/12.png)
8288
**Fig 12:** Process Tree: Alert Messages w/ Process Call Chain
8389

84-
![IPinfo](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/13.png)
85-
**Fig 13:** GeoIP w/ IPinfo.io
90+
![PropertiesView](https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432/Screenshots/13.png)
91+
**Fig 13:** Process Tree: Properties View → Double-Click on process or alert message
8692

87-
![MapReport](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/14.png)
88-
**Fig 14:** Map IPs w/ IPinfo.io
93+
![IPinfo](https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432/Screenshots/14.png)
94+
**Fig 14:** GeoIP w/ IPinfo.io
8995

90-
![EVTX](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/15.png)
91-
**Fig 15:** Processing Windows Event Logs (EVTX)
96+
![MapReport](https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432/Screenshots/15.png)
97+
**Fig 15:** Map IPs w/ IPinfo.io
9298

93-
![Amcache](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/16.png)
94-
**Fig 16:** Processing extracted Amcache.hve → XLSX
99+
![EVTX](https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432/Screenshots/16.png)
100+
**Fig 16:** Processing Windows Event Logs (EVTX)
95101

96-
![ShimCache](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/17.png)
97-
**Fig 17:** Processing ShimCache → XLSX
102+
![Zircolite](https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432/Screenshots/17.png)
103+
**Fig 17:** Zircolite - A standalone SIGMA-based detection tool for EVTX (Mini-GUI)
98104

99-
![Timeline-Explorer](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/18.png)
100-
**Fig 18:** Analyze CSV output w/ Timeline Explorer (TLE)
105+
![Amcache](https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432/Screenshots/18.png)
106+
**Fig 18:** Processing extracted Amcache.hve → XLSX
101107

102-
![ELK-Import](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/19.png)
103-
**Fig 19:** ELK Import
108+
![ShimCache](https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432/Screenshots/19.png)
109+
**Fig 19:** Processing ShimCache → XLSX
104110

105-
![ELK-Timeline](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/20.png)
106-
**Fig 20:** Happy ELK Hunting!
111+
![Timeline-Explorer](https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432/Screenshots/20.png)
112+
**Fig 20:** Analyze CSV output w/ Timeline Explorer (TLE)
107113

108-
![Secure-Archive-Container](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/21.png)
109-
**Fig 21:** Multi-Threaded ClamAV Scan to help you finding evil! ;-)
114+
![ELK-Import](https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432/Screenshots/21.png)
115+
**Fig 21:** ELK Import
110116

111-
![Message-Box](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/22.png)
112-
**Fig 22:** Press **OK** to shutdown MemProcFS and Elastisearch/Kibana
117+
![ELK-Timeline](https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432/Screenshots/22.png)
118+
**Fig 22:** Happy ELK Hunting!
113119

114-
![Output](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/23.png)
115-
**Fig 23:** Secure Archive Container (PW: MemProcFS)
120+
![Secure-Archive-Container](https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432/Screenshots/23.png)
121+
**Fig 23:** Multi-Threaded ClamAV Scan to help you finding evil! ;-)
122+
123+
![Message-Box](https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432/Screenshots/24.png)
124+
**Fig 24:** Press **OK** to shutdown MemProcFS and Elastisearch/Kibana
125+
126+
![Output](https://github.com/evild3ad/MemProcFS-Analyzer/blob/e081cfb94cb4b8b7a8795e99bec28e0a3f7b0432/Screenshots/25.png)
127+
**Fig 25:** Secure Archive Container (PW: MemProcFS)
116128

117129
## Introduction MemProcFS and Memory Forensics
118130
Check out [Super Easy Memory Forensics](https://www.slideshare.net/IIJ_PR/super-easy-memory-forensics) by [Hiroshi Suzuki](https://twitter.com/herosi_t) and [Hisao Nashiwa](https://twitter.com/unk0unk0).
@@ -175,7 +187,7 @@ https://www.clamav.net/downloads#otherversions
175187
Dokany Library Bundle v2.0.6.1000 (2022-10-02)
176188
https://github.com/dokan-dev/dokany/releases/latest → DokanSetup.exe
177189

178-
Elasticsearch 8.4.3 (2022-10-05)
190+
Elasticsearch 8.5.1 (2022-11-15)
179191
https://www.elastic.co/downloads/elasticsearch
180192

181193
entropy v1.0 (2022-02-04)
@@ -184,19 +196,19 @@ https://github.com/merces/entropy
184196
EvtxECmd v1.0.0.0 (.NET 6)
185197
https://ericzimmerman.github.io/
186198

187-
ImportExcel 7.8.1 (2022-09-03)
199+
ImportExcel v7.8.2 (2022-10-22)
188200
https://github.com/dfinke/ImportExcel
189201

190202
Ipinfo CLI 2.10.0 (2022-09-28)
191203
https://github.com/ipinfo/cli
192204

193-
Kibana 8.4.3 (2022-10-05)
205+
Kibana 8.5.1 (2022-11-15)
194206
https://www.elastic.co/downloads/kibana
195207

196208
lnk_parser v0.2.0 (2022-08-10)
197209
https://github.com/AbdulRhmanAlfaifi/lnk_parser
198210

199-
MemProcFS v5.1.1 - The Memory Process File System (2022-09-26)
211+
MemProcFS v5.2.0 - The Memory Process File System (2022-11-16)
200212
https://github.com/ufrisk/MemProcFS
201213

202214
RECmd v2.0.0.0 (.NET 6)
@@ -211,6 +223,9 @@ https://github.com/BurntSushi/xsv
211223
YARA v4.2.3 (2022-08-09)
212224
https://virustotal.github.io/yara/
213225

226+
Zircolite v2.9.7 (2022-10-08)
227+
https://github.com/wagga40/Zircolite
228+
214229
## Links
215230
[MemProcFS](https://github.com/ufrisk/MemProcFS)
216231
[Demo of MemProcFS with Elasticsearch](https://www.youtube.com/watch?v=JcIlowlrvyI)

0 commit comments

Comments
 (0)