Skip to content

Commit 6926ab6

Browse files
authored
Update README.md
1 parent f5f84b6 commit 6926ab6

File tree

1 file changed

+48
-36
lines changed

1 file changed

+48
-36
lines changed

README.md

Lines changed: 48 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,10 @@ Features:
1616
* Collection of injected modules detected by MemProcFS PE_INJECT for further analysis (PW: infected)
1717
* Extracting IPv4/IPv6
1818
* IP2ASN Mapping and GeoIP w/ [IPinfo CLI](https://github.com/ipinfo/cli) → Get your token for free at [https://ipinfo.io/signup](https://ipinfo.io/signup)
19+
* Checking for Suspicious Port Numbers
20+
* Process Tree (TreeView) including complete Process Call Chain (Special thanks to [DaFuqs](https://github.com/DaFuqs))
1921
* Checking Processes for Unusual Parent-Child Relationships and Number of Instances
22+
* Checking for Process Path Masquerading and Process Name Masquerading (Damerau Levenshtein Distance)
2023
* Web Browser History (Google Chrome, Microsoft Edge and Firefox)
2124
* Extracting Windows Event Log Files and processing w/ EvtxECmd → Timeline Explorer ([EZTools](https://ericzimmerman.github.io/) by Eric Zimmerman)
2225
* Analyzing extracted Amcache.hve w/ Amcacheparser ([EZTools](https://ericzimmerman.github.io/) by Eric Zimmerman)
@@ -40,67 +43,76 @@ Download the latest version of **MemProcFS-Analyzer** from the [Releases](https:
4043
## Usage
4144
Launch Windows PowerShell (or Windows PowerShell ISE or Visual Studio Code w/ PSVersion: 5.1) as Administrator and open/run MemProcFS-Analyzer.ps1.
4245

43-
![File-Browser](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/01.png)
46+
![File-Browser](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/01.png)
4447
**Fig 1:** Select your Raw Physical Memory Dump (File Browser)
4548

46-
![Auto-Install](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/02.png)
49+
![Auto-Install](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/02.png)
4750
**Fig 2:** MemProcFS-Analyzer auto-installs dependencies (First Run)
4851

49-
![Microsoft-Internet-Symbol-Store](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/03.png)
52+
![Microsoft-Internet-Symbol-Store](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/03.png)
5053
**Fig 3:** Accept Terms of Use (First Run)
5154

52-
![MemProcFS](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/04.png)
55+
![MemProcFS](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/04.png)
5356
**Fig 4:** If you find MemProcFS useful, please become a sponsor at: https://github.com/sponsors/ufrisk
5457

55-
![Mounted](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/05.png)
58+
![Mounted](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/05.png)
5659
**Fig 5:** You can investigate the mounted memory dump by exploring drive letter X:
5760

58-
![Auto-Update](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/06.png)
61+
![Auto-Update](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/06.png)
5962
**Fig 6:** MemProcFS-Analyzer checks for updates (Second Run)
6063

6164
Note: It's recommended to uncomment/disable the "Updater" function after installation. Check out the "Main" in the bottom of the script.
6265

63-
![ClamAV-Scan](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/07.png)
66+
![ClamAV-Scan](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/07.png)
6467
**Fig 7:** FindEvil feature and additional analytics
6568

66-
![Processes](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/08.png)
69+
![Processes](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/08.png)
6770
**Fig 8:** Processes
6871

69-
![RunningAndExited](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/09.png)
72+
![RunningAndExited](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/09.png)
7073
**Fig 9:** Running and Exited Processes
7174

72-
![IPinfo](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/10.png)
73-
**Fig 10:** GeoIP w/ IPinfo.io
75+
![ProcessTree](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/10.png)
76+
**Fig 10:** Process Tree (GUI)
7477

75-
![MapReport](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/11.png)
76-
**Fig 11:** Map IPs w/ IPinfo.io
78+
![ProcessTreeSearch](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/11.png)
79+
**Fig 11:** Checking Process Tree (to find anomalies)
7780

78-
![EVTX](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/12.png)
79-
**Fig 12:** Processing Windows Event Logs (EVTX)
81+
![ProcessTreeAlerts](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/12.png)
82+
**Fig 12:** Process Tree: Alert Messages w/ Process Call Chain
8083

81-
![Amcache](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/13.png)
82-
**Fig 13:** Processing extracted Amcache.hve → XLSX
84+
![IPinfo](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/13.png)
85+
**Fig 13:** GeoIP w/ IPinfo.io
8386

84-
![ShimCache](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/14.png)
85-
**Fig 14:** Processing ShimCache → XLSX
87+
![MapReport](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/14.png)
88+
**Fig 14:** Map IPs w/ IPinfo.io
8689

87-
![Timeline-Explorer](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/15.png)
88-
**Fig 15:** Analyze CSV output w/ Timeline Explorer (TLE)
90+
![EVTX](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/15.png)
91+
**Fig 15:** Processing Windows Event Logs (EVTX)
8992

90-
![ELK-Import](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/16.png)
91-
**Fig 16:** ELK Import
93+
![Amcache](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/16.png)
94+
**Fig 16:** Processing extracted Amcache.hve → XLSX
9295

93-
![ELK-Timeline](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/17.png)
94-
**Fig 17:** Happy ELK Hunting!
96+
![ShimCache](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/17.png)
97+
**Fig 17:** Processing ShimCache → XLSX
9598

96-
![Secure-Archive-Container](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/18.png)
97-
**Fig 18:** Multi-Threaded ClamAV Scan to help you finding evil! ;-)
99+
![Timeline-Explorer](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/18.png)
100+
**Fig 18:** Analyze CSV output w/ Timeline Explorer (TLE)
98101

99-
![Message-Box](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/19.png)
100-
**Fig 19:** Press **OK** to shutdown MemProcFS and Elastisearch/Kibana
102+
![ELK-Import](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/19.png)
103+
**Fig 19:** ELK Import
101104

102-
![Output](https://github.com/evild3ad/MemProcFS-Analyzer/blob/aba7e8441da0a05b39882dd92cee7994f1a0daae/Screenshots/20.png)
103-
**Fig 20:** Secure Archive Container (PW: MemProcFS)
105+
![ELK-Timeline](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/20.png)
106+
**Fig 20:** Happy ELK Hunting!
107+
108+
![Secure-Archive-Container](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/21.png)
109+
**Fig 21:** Multi-Threaded ClamAV Scan to help you finding evil! ;-)
110+
111+
![Message-Box](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/22.png)
112+
**Fig 22:** Press **OK** to shutdown MemProcFS and Elastisearch/Kibana
113+
114+
![Output](https://github.com/evild3ad/MemProcFS-Analyzer/blob/f5f84b6d7b179c43f16913a79353576b42ac339c/Screenshots/23.png)
115+
**Fig 23:** Secure Archive Container (PW: MemProcFS)
104116

105117
## Introduction MemProcFS and Memory Forensics
106118
Check out [Super Easy Memory Forensics](https://www.slideshare.net/IIJ_PR/super-easy-memory-forensics) by [Hiroshi Suzuki](https://twitter.com/herosi_t) and [Hisao Nashiwa](https://twitter.com/unk0unk0).
@@ -153,10 +165,10 @@ https://ericzimmerman.github.io/
153165
ClamAV - Download → Alternate Versions → Windows Packages → Win64 → clamav-0.105.1.win.x64.msi (2022-07-26)
154166
https://www.clamav.net/downloads#otherversions
155167

156-
Dokany Library Bundle v2.0.5.1000 (2022-07-04)
168+
Dokany Library Bundle v2.0.6.1000 (2022-10-02)
157169
https://github.com/dokan-dev/dokany/releases/latest → DokanSetup.exe
158170

159-
Elasticsearch 8.4.1 (2022-08-30)
171+
Elasticsearch 8.4.3 (2022-10-05)
160172
https://www.elastic.co/downloads/elasticsearch
161173

162174
entropy v1.0 (2022-02-04)
@@ -168,16 +180,16 @@ https://ericzimmerman.github.io/
168180
ImportExcel 7.8.1 (2022-09-03)
169181
https://github.com/dfinke/ImportExcel
170182

171-
Ipinfo CLI 2.8.1 (2022-05-23)
183+
Ipinfo CLI 2.10.0 (2022-09-28)
172184
https://github.com/ipinfo/cli
173185

174-
Kibana 8.4.1 (2022-08-30)
186+
Kibana 8.4.3 (2022-10-05)
175187
https://www.elastic.co/downloads/kibana
176188

177189
lnk_parser v0.2.0 (2022-08-10)
178190
https://github.com/AbdulRhmanAlfaifi/lnk_parser
179191

180-
MemProcFS v5.0.3 - The Memory Process File System (2022-08-04)
192+
MemProcFS v5.1.1 - The Memory Process File System (2022-09-26)
181193
https://github.com/ufrisk/MemProcFS
182194

183195
RECmd v2.0.0.0 (.NET 6)

0 commit comments

Comments
 (0)